Exploit Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on August 23rd, 2019 📆 | 3452 Views ⚑


Zoho ManageEngine ServiceDesk Plus AjaxDomainServlet User information disclosure [Disputed]

CVSS Meta Temp Score Current Exploit Price (≈)
3.5 $0-$5k

A vulnerability, which was classified as problematic, has been found in Zoho ManageEngine ServiceDesk Plus (affected version not known). Affected by this issue is an unknown function of the component AjaxDomainServlet. The manipulation with an unknown input leads to a information disclosure vulnerability (User). Using CWE to declare the problem leads to CWE-200. Impacted is confidentiality.

The weakness was released 08/21/2019. This vulnerability is handled as CVE-2019-15045 since 08/14/2019. The technical details are unknown and an exploit is not available.

The real existence of this vulnerability is still doubted at the moment.

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.



VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.5

VulDB Base Score: ≈3.5
VulDB Temp Score: ≈3.5
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Information disclosure / User (CWE-200)
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: no mitigation known

0-Day Time: 🔒

08/14/2019 CVE assigned
08/21/2019 +7 days Advisory disclosed
08/22/2019 +1 days VulDB entry created
08/22/2019 +0 days VulDB last updateVendor: manageengine.com

Disputed: 🔍

CVE: CVE-2019-15045 (🔒)

Created: 08/22/2019 09:28 AM
Complete: 🔍

Check our Alexa App!


Premium WordPress Themes Download
Premium WordPress Themes Download
Download Nulled WordPress Themes
Free Download WordPress Themes
download udemy paid course for free

Tagged with:

Leave a Reply ✍