CVSSv3 16/09/2019info

CVSSv3 Base »

CVSSv3 Temp »

VulDB »

NVD »

Fornitore »

Research »

IDBaseVDBNVDVendResVulnerabilityCVE
1418795.44.76.1
 
 
OpenEMR cross site scriptingCVE-2019-8368
1418788.57.39.8
 
 
cURL TFTP Protocol Heap-based buffer overflowCVE-2019-5482
1418778.57.39.8
 
 
cURL FTP-Kerberos Double-Free buffer overflowCVE-2019-5481
1418764.74.74.7
 
 
IBM Sterling File Gateway Back-End Database sql injectionCVE-2019-4147
1418756.44.78.2
 
 
LogMeIn LastPass Clickjacking information disclosureCVE-2019-16371
1418745.34.85.9
 
 
Gradle PGP Signing SHA1 autenticazione deboleCVE-2019-16370
1418738.57.39.8
 
 
GitLab Omnibus logrotate escalazione di privilegiCVE-2019-15741
1418725.35.35.3
 
 
GitLab Community Edition/Enterprise Edition Image Upload Location information disclosureCVE-2019-15740
1418715.24.36.1
 
 
GitLab Community Edition/Enterprise Edition Markdown cross site scriptingCVE-2019-15739
1418705.35.35.3
 
 
GitLab Community Edition/Enterprise Edition ID Email information disclosureCVE-2019-15738
1418695.55.56.5
 
 
GitLab Community Edition/Enterprise Edition Session Management autenticazione deboleCVE-2019-15737
1418686.45.37.5
 
 
GitLab Community Edition/Enterprise Edition CI Pipeline denial of serviceCVE-2019-15736
1418674.34.34.3
 
 
GitLab Community Edition/Enterprise Edition Commit Title information disclosureCVE-2019-15734
1418667.27.27.2
 
 
OpenEMR Remote Code ExecutionCVE-2019-8371
1418658.57.39.8
 
 
XS Javascript xsAPI.c fxBeginHost buffer overflowCVE-2019-16366
1418644.43.35.5
 
 
Beego File Session Manager information disclosureCVE-2019-16355
1418634.03.34.7
 
 
Beego File Session Manager race condition directory traversalCVE-2019-16354
1418626.45.37.5
 
 
Emerson GE Automation Proficy Machine Edition Traffic Crash denial of serviceCVE-2019-16353
1418616.46.36.5
 
 
ffjpeg jfif.c jfif_load() buffer overflowCVE-2019-16352
1418605.44.36.5
 
 
ffjpeg huffman.c huffman_decode_step() denial of serviceCVE-2019-16351
1418595.44.36.5
 
 
ffjpeg dct.c idct2d8x8() denial of serviceCVE-2019-16350
1418584.43.35.5
 
 
Bento4 Ap4ByteStream.cpp ReadUI32 denial of serviceCVE-2019-16349
1418573.53.56.5
 
 
marc-q libwav wav_gain.c gain_file() denial of serviceCVE-2019-16348
1418565.55.58.8
 
 
ngiflib ngiflib.c WritePixels() buffer overflowCVE-2019-16347
1418557.56.38.8
 
 
ngiflib ngiflib.c WritePixel() buffer overflowCVE-2019-16346
1418548.57.39.8
 
 
Escuela de Gestion Publica Plurinacional Sistema Integrado de Gestion Academica Authentication Form sql injectionCVE-2019-16264
1418535.24.36.1
 
 
Dolibarr HTTP Header card.php cross site scriptingCVE-2019-16197
1418526.76.37.1
 
 
GitLab Enterprise Edition Access Control escalazione di privilegiCVE-2019-16170
1418518.57.39.8
 
 
D-Link DNS-320 CGI Script login_mgr.cgi command injectionCVE-2019-16057
1418505.24.36.1
 
 
CRM Plugin vCard Data cross site scriptingCVE-2019-15950
1418494.34.34.3
 
 
GitLab Community Edition/Enterprise Edition Branch Name information disclosureCVE-2019-15733
1418485.35.35.3
 
 
GitLab Community Edition/Enterprise Edition Project Import API information disclosureCVE-2019-15732
1418476.37.35.3
 
 
GitLab Community Edition/Enterprise Edition Merge Request escalazione di privilegiCVE-2019-15731
1418467.47.37.5
 
 
GitLab Community Edition/Enterprise Edition Jira Integration Server-Side Request ForgeryCVE-2019-15730
1418457.47.37.5
 
 
GitLab Community Edition/Enterprise Edition Kubernetes Integration Server-Side Request ForgeryCVE-2019-15728
1418445.35.35.3
 
 
GitLab Community Edition/Enterprise Edition Permission Check information disclosureCVE-2019-15727
1418435.35.35.3
 
 
GitLab Community Edition/Enterprise Edition Markdown IP Address information disclosureCVE-2019-15726
1418426.45.37.5
 
 
GitLab Community Edition/Enterprise Edition API information disclosureCVE-2019-15725
1418415.24.36.1
 
 
GitLab Community Edition/Enterprise Edition Label Description HTML Injection cross site scriptingCVE-2019-15724
1418406.37.35.3
 
 
GitLab Community Edition/Enterprise Edition escalazione di privilegiCVE-2019-15723

Do you want to use VulDB in your project?

Use the official API to access entries easily!