Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-19368

EPSS 75.64% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-19368

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A Reflected Cross Site Scripting was discovered in the Login page of Rumpus FTP Web File Manager 8.2.9.1. An attacker can exploit it by sending a crafted link to end users and can execute arbitrary Javascripts
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Rumpus FTP Web File Manager 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Rumpus FTP Web File Manager是一款文件传输服务器。 Rumpus FTP Web File Manager 8.2.9.1版本中的登录页面存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2019-19368

#POC DescriptionSource LinkShenlong Link
1Rumpus FTP Web File Manager 8.2.9.1 contains a reflected cross-site scripting vulnerability via the Login page. An attacker can send a crafted link to end users and can execute arbitrary JavaScript.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-19368.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-19368

登录查看更多情报信息。

Same Patch Batch · n/a · 2019-12-16 · 40 CVEs total

CVE-2019-14604Intel Quartus Prime Pro 代码问题漏洞
CVE-2019-14568Intel Rapid Storage Technology 安全漏洞
CVE-2019-14612多款Intel产品缓冲区错误漏洞
CVE-2019-14611多款Intel产品输入验证错误漏洞
CVE-2019-14609多款Intel产品输入验证错误漏洞
CVE-2019-14610多款Intel产品安全漏洞
CVE-2019-14608多款Intel产品安全漏洞
CVE-2019-14607多款Intel产品代码问题漏洞
CVE-2019-14605Intel SCS Platform Discovery Utility 安全漏洞
CVE-2019-14603Intel Quartus Prime Pro Edition 安全漏洞
CVE-2019-11157多款Intel产品代码问题漏洞
CVE-2019-14599Intel Control Center-I 代码问题漏洞
CVE-2019-19743D-Link DIR-615 输入验证错误漏洞
CVE-2019-19731Roxy Fileman 路径遍历漏洞
CVE-2019-18831Barco ClickShare Button R9861500D01 信息泄露漏洞
CVE-2019-18830Barco ClickShare Button R9861500D01 操作系统命令注入漏洞
CVE-2019-18828Barco ClickShare Button R9861500D01 安全漏洞
CVE-2019-18827Barco ClickShare Button R9861500D01 输入验证错误漏洞
CVE-2019-18826Barco ClickShare Button R9861500D01 信任管理问题漏洞
CVE-2019-19783Cyrus IMAP 输入验证错误漏洞

Showing top 20 of 40 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-19368

No comments yet


Leave a comment