Vulnerabilities
Vulnerable Software
Security Vulnerabilities - Known exploited
CVE-2019-1458
Known exploited
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.
CVSS Score
7.8
EPSS Score
0.926
Published
2019-12-10
CVE-2019-5544
Known exploited
OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.
CVSS Score
9.8
EPSS Score
0.93
Published
2019-12-06
CVE-2019-7193
Known exploited
This improper input validation vulnerability allows remote attackers to inject arbitrary code to the system. To fix the vulnerability, QNAP recommend updating QTS to their latest versions.
CVSS Score
9.8
EPSS Score
0.415
Published
2019-12-05
CVE-2019-7194
Known exploited
This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.
CVSS Score
9.8
EPSS Score
0.931
Published
2019-12-05
CVE-2019-7195
Known exploited
This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.
CVSS Score
9.8
EPSS Score
0.89
Published
2019-12-05
CVE-2019-7192
Known exploited
This improper access control vulnerability allows remote attackers to gain unauthorized access to the system. To fix these vulnerabilities, QNAP recommend updating Photo Station to their latest versions.
CVSS Score
9.8
EPSS Score
0.943
Published
2019-12-05
CVE-2019-15271
Known exploited
A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.
CVSS Score
8.8
EPSS Score
0.098
Published
2019-11-26
CVE-2019-5825
Known exploited
Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVSS Score
6.5
EPSS Score
0.759
Published
2019-11-25
CVE-2019-13720
Known exploited
Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVSS Score
8.8
EPSS Score
0.904
Published
2019-11-25
CVE-2019-6693
Known exploited
Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS configuration backup file may allow an attacker with access to the backup file to decipher the sensitive data, via knowledge of the hard-coded key. The aforementioned sensitive data includes users' passwords (except the administrator's password), private keys' passphrases and High Availability password (when set).
CVSS Score
6.5
EPSS Score
0.749
Published
2019-11-21


Contact Us

Shodan ® - All rights reserved