Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-13028
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-28 Jun, 2019 | 22:15
Updated At-05 Jul, 2019 | 18:33

An incorrect implementation of a local web server in eID client (Windows version before 3.1.2, Linux version before 3.0.3) allows remote attackers to execute arbitrary code (.cgi, .pl, or .php) or delete arbitrary files via a crafted HTML page. This is a product from the Ministry of Interior of the Slovak Republic.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.08.8HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Primary2.06.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

minv
minv
>>electronic_identification_cards_client>>Versions before 3.0.3(exclusive)
cpe:2.3:a:minv:electronic_identification_cards_client:*:*:*:*:*:linux:*:*
minv
minv
>>electronic_identification_cards_client>>Versions before 3.1.2(exclusive)
cpe:2.3:a:minv:electronic_identification_cards_client:*:*:*:*:*:windows:*:*
Weaknesses
CWE IDTypeSource
CWE-284Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.csirt.gov.sk/aktualne-7d7.html?id=194cve@mitre.org
Exploit
Third Party Advisory
https://www.csirt.gov.sk/doc/eid_klient_tlacova_sprava.pdfcve@mitre.org
Third Party Advisory
https://www.minv.sk/?tlacove-spravy&sprava=pouzivatelom-e-sluzieb-automaticky-aktualizujeme-aplikaciu-pre-elektronicky-obciansky-preukazcve@mitre.org
Third Party Advisory
Change History
0Changes found

Details not found