Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-15638
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-04 Dec, 2019 | 15:15
Updated At-14 Dec, 2019 | 14:08

COPA-DATA zenone32 zenon Editor through 8.10 has an Uncontrolled Search Path Element.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Primary2.04.4MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

copadata
copadata
>>zenon>>Versions up to 8.10(inclusive)
cpe:2.3:a:copadata:zenon:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-427Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://forum.copadata.com/cve@mitre.org
Product
https://www.copadata.com/en/support-services/knowledge-base-faq/pcd-sva-2019-5-nbspcopa-data-editor-security-3225/cve@mitre.org
Vendor Advisory
https://www.copadata.com/fileadmin/user_upload/faq/files/CD_SVA_2019_5.pdfcve@mitre.org
Vendor Advisory
Change History
0Changes found

Details not found