Vulnerabilities (CVE)

Filtered by NVD-CWE-noinfo
Total 32127 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-3628 1 Mcafee 1 Enterprise Security Manager 2024-11-21 6.5 MEDIUM 8.8 HIGH
Privilege escalation in McAfee Enterprise Security Manager (ESM) 11.x prior to 11.2.0 allows authenticated user to gain access to a core system component via incorrect access control.
CVE-2019-3621 2 Mcafee, Microsoft 2 Data Loss Prevention Endpoint, Windows 2024-11-21 4.6 MEDIUM 6.8 MEDIUM
Authentication protection bypass vulnerability in McAfee Data Loss Prevention (DLPe) for Windows 11.x prior to 11.3.0 allows physical local user to bypass the Windows lock screen via DLPe processes being killed just prior to the screen being locked or when the screen is locked. The attacker requires physical access to the machine.
CVE-2019-3599 1 Mcafee 1 Agent 2024-11-21 4.3 MEDIUM 7.5 HIGH
Information Disclosure vulnerability in Remote logging (which is disabled by default) in McAfee Agent (MA) 5.x allows remote unauthenticated users to access sensitive information via remote logging when it is enabled.
CVE-2019-3597 1 Mcafee 1 Network Security Manager 2024-11-21 7.5 HIGH 6.5 MEDIUM
Authentication Bypass vulnerability in McAfee Network Security Manager (NSM) 9.1 < 9.1.7.75.2 and 9.2 < 9.2.7.31 (9.2 Update 2) allows unauthenticated users to gain administrator rights via incorrect handling of expired GUI sessions.
CVE-2019-3593 2 Mcafee, Microsoft 2 Total Protection, Windows 2024-11-21 5.6 MEDIUM 7.5 HIGH
Exploitation of Privilege/Trust vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Prior to 16.0.R18 allows local users to bypass product self-protection, tamper with policies and product files, and uninstall McAfee software without permission via specially crafted malware.
CVE-2019-3592 1 Mcafee 1 Agent 2024-11-21 4.6 MEDIUM 7.2 HIGH
Privilege escalation vulnerability in McAfee Agent (MA) before 5.6.1 HF3, allows local administrator users to potentially disable some McAfee processes by manipulating the MA directory control and placing a carefully constructed file in the MA directory.
CVE-2019-3582 1 Mcafee 1 Endpoint Security 2024-11-21 6.1 MEDIUM 8.6 HIGH
Privilege Escalation vulnerability in Microsoft Windows client in McAfee Endpoint Security (ENS) 10.6.1 and earlier allows local users to gain elevated privileges via a specific set of circumstances.
CVE-2019-3566 1 Whatsapp 2 Whatsapp, Whatsapp Business 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
A bug in WhatsApp for Android's messaging logic would potentially allow a malicious individual who has taken over over a WhatsApp user's account to recover previously sent messages. This behavior requires independent knowledge of metadata for previous messages, which are not available publicly. This issue affects WhatsApp for Android 2.19.52 and 2.19.54 - 2.19.103, as well as WhatsApp Business for Android starting in v2.19.22 until v2.19.38.
CVE-2019-3493 1 Microfocus 2 Network Automation, Network Operations Management 2024-11-21 6.5 MEDIUM 8.8 HIGH
A potential security vulnerability has been identified in Micro Focus Network Automation Software 9.20, 9.21, 10.00, 10.10, 10.20, 10.30, 10.40, 10.50, 2018.05, 2018.08, 2018.11, and Micro Focus Network Operations Management (NOM) all versions. The vulnerability could be remotely exploited to Remote Code Execution.
CVE-2019-3484 1 Hp 1 Arcsight Logger 2024-11-21 7.2 HIGH 7.8 HIGH
Mitigates a remote code execution issue in ArcSight Logger versions prior to 6.7.
CVE-2019-3483 1 Hp 1 Arcsight Logger 2024-11-21 6.8 MEDIUM 6.5 MEDIUM
Mitigates a potential information leakage issue in ArcSight Logger versions prior to 6.7.
CVE-2019-3479 1 Hp 1 Arcsight Logger 2024-11-21 7.5 HIGH 9.8 CRITICAL
Mitigates a potential remote code execution issue in ArcSight Logger versions prior to 6.7.
CVE-2019-3476 1 Microfocus 1 Data Protector 2024-11-21 7.5 HIGH 9.8 CRITICAL
Remote arbitrary code execution in Micro Focus Data Protector, version 10.03 this vulnerability could allow remote arbitrary code execution.
CVE-2019-3462 3 Canonical, Debian, Netapp 5 Ubuntu Linux, Advanced Package Tool, Debian Linux and 2 more 2024-11-21 9.3 HIGH 8.1 HIGH
Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
CVE-2019-3430 1 Zte 1 Zxcloud Goldendata Vap 2024-11-21 4.0 MEDIUM 4.9 MEDIUM
All versions up to V4.01.01.02 of ZTE ZXCLOUD GoldenData VAP product have an information disclosure vulnerability. Attackers could use this vulnerability to collect data information and damage the system.
CVE-2019-3428 1 Zte 2 Zxcdn Iamweb, Zxcdn Iamweb Firmware 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
The version V6.01.03.01 of ZTE ZXCDN IAMWEB product is impacted by a configuration error vulnerability. An attacker could directly access the management portal in HTTP, resulting in users’ information leakage.
CVE-2019-3424 1 Ztehome 2 C520v21, C520v21 Firmware 2024-11-21 6.4 MEDIUM 8.2 HIGH
authentication issues vulnerability, which exists in V2.1.14 and below versions of C520V21 smart camera devices. An attacker can automatically obtain access to web services from the authorized browser of the same computer and perform operations.
CVE-2019-3420 1 Zte 2 Zxhn H108n, Zxhn H108n Firmware 2024-11-21 3.3 LOW 6.5 MEDIUM
All versions up to V2.5.0_EG1T5_TED of ZTE ZXHN H108N product are impacted by an information leak vulnerability. An attacker could exploit the vulnerability to obtain sensitive information and perform unauthorized operations.
CVE-2019-3419 1 Zte 2 Zxmp M721 Dx, Zxmp M721 Dx Firmware 2024-11-21 2.7 LOW 5.7 MEDIUM
A security vulnerability exists in a management port in the version of ZTE's ZXMP M721V3.10P01B10_M2NCP. An attacker could exploit this vulnerability to build a link to the device and send specific packets to cause a denial of service.
CVE-2019-3405 1 360 2 360f5, 360f5 Firmware 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
In the 3.1.3.64296 and lower version of 360F5, the third party can trigger the device to send a deauth frame by constructing and sending a specific illegal 802.11 Null Data Frame, which will cause other wireless terminals connected to disconnect from the wireless, so as to attack the router wireless by DoS. At present, the vulnerability has been effectively handled, and users can fix the vulnerability after updating the firmware version.