Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2019-5630

A Cross-Site Request Forgery (CSRF) vulnerability was found in Rapid7 Nexpose InsightVM Security Console versions 6.5.0 through 6.5.68. This issue allows attackers to exploit CSRF vulnerabilities on API endpoints using Flash to circumvent a cross-domain pre-flight OPTIONS request.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.011
EPSS Ranking 77.0%
CVSS Severity
CVSS v3 Score 5.9
CVSS v2 Score 6.8
Products affected by CVE-2019-5630
  • Rapid7 » Nexpose » Version: 6.5.0
    cpe:2.3:a:rapid7:nexpose:6.5.0
  • Rapid7 » Nexpose » Version: 6.5.1
    cpe:2.3:a:rapid7:nexpose:6.5.1
  • Rapid7 » Nexpose » Version: 6.5.10
    cpe:2.3:a:rapid7:nexpose:6.5.10
  • Rapid7 » Nexpose » Version: 6.5.11
    cpe:2.3:a:rapid7:nexpose:6.5.11
  • Rapid7 » Nexpose » Version: 6.5.12
    cpe:2.3:a:rapid7:nexpose:6.5.12
  • Rapid7 » Nexpose » Version: 6.5.13
    cpe:2.3:a:rapid7:nexpose:6.5.13
  • Rapid7 » Nexpose » Version: 6.5.14
    cpe:2.3:a:rapid7:nexpose:6.5.14
  • Rapid7 » Nexpose » Version: 6.5.15
    cpe:2.3:a:rapid7:nexpose:6.5.15
  • Rapid7 » Nexpose » Version: 6.5.16
    cpe:2.3:a:rapid7:nexpose:6.5.16
  • Rapid7 » Nexpose » Version: 6.5.17
    cpe:2.3:a:rapid7:nexpose:6.5.17
  • Rapid7 » Nexpose » Version: 6.5.18
    cpe:2.3:a:rapid7:nexpose:6.5.18
  • Rapid7 » Nexpose » Version: 6.5.19
    cpe:2.3:a:rapid7:nexpose:6.5.19
  • Rapid7 » Nexpose » Version: 6.5.2
    cpe:2.3:a:rapid7:nexpose:6.5.2
  • Rapid7 » Nexpose » Version: 6.5.20
    cpe:2.3:a:rapid7:nexpose:6.5.20
  • Rapid7 » Nexpose » Version: 6.5.21
    cpe:2.3:a:rapid7:nexpose:6.5.21
  • Rapid7 » Nexpose » Version: 6.5.22
    cpe:2.3:a:rapid7:nexpose:6.5.22
  • Rapid7 » Nexpose » Version: 6.5.23
    cpe:2.3:a:rapid7:nexpose:6.5.23
  • Rapid7 » Nexpose » Version: 6.5.24
    cpe:2.3:a:rapid7:nexpose:6.5.24
  • Rapid7 » Nexpose » Version: 6.5.25
    cpe:2.3:a:rapid7:nexpose:6.5.25
  • Rapid7 » Nexpose » Version: 6.5.26
    cpe:2.3:a:rapid7:nexpose:6.5.26
  • Rapid7 » Nexpose » Version: 6.5.27
    cpe:2.3:a:rapid7:nexpose:6.5.27
  • Rapid7 » Nexpose » Version: 6.5.28
    cpe:2.3:a:rapid7:nexpose:6.5.28
  • Rapid7 » Nexpose » Version: 6.5.29
    cpe:2.3:a:rapid7:nexpose:6.5.29
  • Rapid7 » Nexpose » Version: 6.5.3
    cpe:2.3:a:rapid7:nexpose:6.5.3
  • Rapid7 » Nexpose » Version: 6.5.30
    cpe:2.3:a:rapid7:nexpose:6.5.30
  • Rapid7 » Nexpose » Version: 6.5.31
    cpe:2.3:a:rapid7:nexpose:6.5.31
  • Rapid7 » Nexpose » Version: 6.5.32
    cpe:2.3:a:rapid7:nexpose:6.5.32
  • Rapid7 » Nexpose » Version: 6.5.33
    cpe:2.3:a:rapid7:nexpose:6.5.33
  • Rapid7 » Nexpose » Version: 6.5.34
    cpe:2.3:a:rapid7:nexpose:6.5.34
  • Rapid7 » Nexpose » Version: 6.5.35
    cpe:2.3:a:rapid7:nexpose:6.5.35
  • Rapid7 » Nexpose » Version: 6.5.36
    cpe:2.3:a:rapid7:nexpose:6.5.36
  • Rapid7 » Nexpose » Version: 6.5.37
    cpe:2.3:a:rapid7:nexpose:6.5.37
  • Rapid7 » Nexpose » Version: 6.5.38
    cpe:2.3:a:rapid7:nexpose:6.5.38
  • Rapid7 » Nexpose » Version: 6.5.39
    cpe:2.3:a:rapid7:nexpose:6.5.39
  • Rapid7 » Nexpose » Version: 6.5.4
    cpe:2.3:a:rapid7:nexpose:6.5.4
  • Rapid7 » Nexpose » Version: 6.5.40
    cpe:2.3:a:rapid7:nexpose:6.5.40
  • Rapid7 » Nexpose » Version: 6.5.41
    cpe:2.3:a:rapid7:nexpose:6.5.41
  • Rapid7 » Nexpose » Version: 6.5.42
    cpe:2.3:a:rapid7:nexpose:6.5.42
  • Rapid7 » Nexpose » Version: 6.5.43
    cpe:2.3:a:rapid7:nexpose:6.5.43
  • Rapid7 » Nexpose » Version: 6.5.44
    cpe:2.3:a:rapid7:nexpose:6.5.44
  • Rapid7 » Nexpose » Version: 6.5.45
    cpe:2.3:a:rapid7:nexpose:6.5.45
  • Rapid7 » Nexpose » Version: 6.5.46
    cpe:2.3:a:rapid7:nexpose:6.5.46
  • Rapid7 » Nexpose » Version: 6.5.47
    cpe:2.3:a:rapid7:nexpose:6.5.47
  • Rapid7 » Nexpose » Version: 6.5.48
    cpe:2.3:a:rapid7:nexpose:6.5.48
  • Rapid7 » Nexpose » Version: 6.5.49
    cpe:2.3:a:rapid7:nexpose:6.5.49
  • Rapid7 » Nexpose » Version: 6.5.5
    cpe:2.3:a:rapid7:nexpose:6.5.5
  • Rapid7 » Nexpose » Version: 6.5.50
    cpe:2.3:a:rapid7:nexpose:6.5.50
  • Rapid7 » Nexpose » Version: 6.5.51
    cpe:2.3:a:rapid7:nexpose:6.5.51
  • Rapid7 » Nexpose » Version: 6.5.52
    cpe:2.3:a:rapid7:nexpose:6.5.52
  • Rapid7 » Nexpose » Version: 6.5.53
    cpe:2.3:a:rapid7:nexpose:6.5.53
  • Rapid7 » Nexpose » Version: 6.5.54
    cpe:2.3:a:rapid7:nexpose:6.5.54
  • Rapid7 » Nexpose » Version: 6.5.55
    cpe:2.3:a:rapid7:nexpose:6.5.55
  • Rapid7 » Nexpose » Version: 6.5.56
    cpe:2.3:a:rapid7:nexpose:6.5.56
  • Rapid7 » Nexpose » Version: 6.5.57
    cpe:2.3:a:rapid7:nexpose:6.5.57
  • Rapid7 » Nexpose » Version: 6.5.58
    cpe:2.3:a:rapid7:nexpose:6.5.58
  • Rapid7 » Nexpose » Version: 6.5.59
    cpe:2.3:a:rapid7:nexpose:6.5.59
  • Rapid7 » Nexpose » Version: 6.5.6
    cpe:2.3:a:rapid7:nexpose:6.5.6
  • Rapid7 » Nexpose » Version: 6.5.60
    cpe:2.3:a:rapid7:nexpose:6.5.60
  • Rapid7 » Nexpose » Version: 6.5.61
    cpe:2.3:a:rapid7:nexpose:6.5.61
  • Rapid7 » Nexpose » Version: 6.5.62
    cpe:2.3:a:rapid7:nexpose:6.5.62
  • Rapid7 » Nexpose » Version: 6.5.63
    cpe:2.3:a:rapid7:nexpose:6.5.63
  • Rapid7 » Nexpose » Version: 6.5.64
    cpe:2.3:a:rapid7:nexpose:6.5.64
  • Rapid7 » Nexpose » Version: 6.5.65
    cpe:2.3:a:rapid7:nexpose:6.5.65
  • Rapid7 » Nexpose » Version: 6.5.66
    cpe:2.3:a:rapid7:nexpose:6.5.66
  • Rapid7 » Nexpose » Version: 6.5.67
    cpe:2.3:a:rapid7:nexpose:6.5.67
  • Rapid7 » Nexpose » Version: 6.5.68
    cpe:2.3:a:rapid7:nexpose:6.5.68
  • Rapid7 » Nexpose » Version: 6.5.7
    cpe:2.3:a:rapid7:nexpose:6.5.7
  • Rapid7 » Nexpose » Version: 6.5.8
    cpe:2.3:a:rapid7:nexpose:6.5.8
  • Rapid7 » Nexpose » Version: 6.5.9
    cpe:2.3:a:rapid7:nexpose:6.5.9


Contact Us

Shodan ® - All rights reserved