Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-12889

EPSS 0.26% · P49
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-12889

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An unauthenticated privilege escalation exists in SailPoint Desktop Password Reset 7.2. A user with local access to only the Windows logon screen can escalate their privileges to NT AUTHORITY\System. An attacker would need local access to the machine for a successful exploit. The attacker must disconnect the computer from the local network / WAN and connect it to an internet facing access point / network. At that point, the attacker can execute the password-reset functionality, which will expose a web browser. Browsing to a site that calls local Windows system functions (e.g., file upload) will expose the local file system. From there an attacker can launch a privileged command shell.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
SailPoint Technologies Desktop Password Reset 权限许可和访问控制问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SailPoint Technologies Desktop Password Reset是美国SailPoint Technologies公司的一款桌面密码管理实用程序。 SailPoint Technologies Desktop Password Reset 7.2版本中存在安全漏洞。本地攻击者可利用该漏洞将用户权限提升至NT AUTHORITYSystem。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2019-12889

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/nulsect0r/CVE-2019-12889POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-12889

登录查看更多情报信息。

Same Patch Batch · n/a · 2019-08-20 · 82 CVEs total

CVE-2019-3965OpenEMR 跨站脚本漏洞
CVE-2019-2126Android 资源管理错误漏洞
CVE-2018-18056Texas Instruments TM4C 信息泄露漏洞
CVE-2019-3963OpenEMR 跨站脚本漏洞
CVE-2017-18533WordPress rimons-twitter-widget插件跨站脚本漏洞
CVE-2017-18530WordPress rating-bws插件跨站脚本漏洞
CVE-2017-18529WordPress promobar插件跨站脚本漏洞
CVE-2017-18528WordPress pdf-print插件跨站脚本漏洞
CVE-2015-9320WordPress option-tree插件跨站脚本漏洞
CVE-2017-18531WordPress raygun4wp插件跨站脚本漏洞
CVE-2019-3964OpenEMR 跨站脚本漏洞
CVE-2019-3966OpenEMR 跨站脚本漏洞
CVE-2019-3967OpenEMR 路径遍历漏洞
CVE-2019-3968OpenEMR 命令注入漏洞
CVE-2019-10745assign-deep 输入验证错误漏洞
CVE-2019-13520Fuji Electric Alpha5 Smart Loader 缓冲区错误漏洞
CVE-2019-2120Android 权限许可和访问控制问题漏洞
CVE-2019-2121Android Framework组件竞争条件问题漏洞
CVE-2019-2122Android 权限许可和访问控制问题漏洞
CVE-2019-2125Android 权限许可和访问控制问题漏洞

Showing top 20 of 82 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-12889

No comments yet


Leave a comment