SB18-211: Vulnerability Summary for the Week of July 23, 2018

Original release date: July 30, 2018

The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.

The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High – Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 – 10.0

  • Medium – Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 – 6.9

  • Low – Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 – 3.9

Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

The NCCIC Weekly Vulnerability Summary Bulletin is created using information from the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD). In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

 

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
There were no high vulnerabilities recorded this week.

Back to top

 

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
There were no medium vulnerabilities recorded this week.

Back to top

 

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
There were no low vulnerabilities recorded this week.

Back to top

 

Severity Not Yet Assigned

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5018
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5024
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5015
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5022
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5025
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5012
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5026
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5016
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12792
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5070
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5028
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5064
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5066
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5009
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12767
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12786
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5052
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12789
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12790
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12771
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5063
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5011
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5027
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5014
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12787
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5058
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5020
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5055
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5035
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5056
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5068
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5046
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5048
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5059
BID
SECTRACK
CONFIRM

adobe — acrobat_and_reader

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12798
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12781
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12791
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Double Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12782
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5060
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5067
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5057
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5033
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5032
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12760
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5019
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Buffer Errors vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5034
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12765
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5047
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5045
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5017
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5050
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5040
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5069
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12770
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12773
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5054
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12768
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12796
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12772
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5031
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5030
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12797
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5049
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12779
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12803
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Security Bypass vulnerability. Successful exploitation could lead to privilege escalation. 2018-07-20 not yet calculated CVE-2018-12802
BID
SECTRACK
CONFIRM

adobe — acrobat_and_reader

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5051
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5065
BID
SECTRACK
CONFIRM

adobe — acrobat_and_reader

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12783
BID
SECTRACK
CONFIRM

adobe — acrobat_and_reader

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12756
BID
SECTRACK
CONFIRM

adobe — acrobat_and_reader

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12754
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5044
BID
SECTRACK
CONFIRM

adobe — acrobat_and_reader

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Buffer Errors vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12784
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12785
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12780
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12795
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12757
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12774
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5053
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12761
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5062
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12793
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12788
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12766
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12758
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5042
BID
SECTRACK
CONFIRM

adobe — acrobat_and_reader

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12755
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5061
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12777
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5036
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12762
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5029
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12763
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5039
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Buffer Errors vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5043
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12776
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Buffer Errors vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5037
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5041
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-12764
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5038
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-12794
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5010
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5021
BID
SECTRACK
CONFIRM
adobe — acrobat_and_reader Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5023
BID
SECTRACK
CONFIRM
adobe — connect Adobe Connect versions 9.7.5 and earlier have an Insecure Library Loading vulnerability. Successful exploitation could lead to privilege escalation. 2018-07-20 not yet calculated CVE-2018-12805
BID
CONFIRM
adobe — connect Adobe Connect versions 9.7.5 and earlier have an Authentication Bypass vulnerability. Successful exploitation could lead to session hijacking. 2018-07-20 not yet calculated CVE-2018-12804
BID
SECTRACK
CONFIRM
adobe — experience_manager Adobe Experience Manager versions 6.2 and 6.3 have a Server-Side Request Forgery vulnerability. Successful exploitation could lead to sensitive information disclosure. 2018-07-20 not yet calculated CVE-2018-5004
BID
CONFIRM
adobe — experience_manager Adobe Experience Manager versions 6.4 and earlier have a Server-Side Request Forgery vulnerability. Successful exploitation could lead to sensitive information disclosure. 2018-07-20 not yet calculated CVE-2018-5006
BID
CONFIRM

adobe — experience_manager

Adobe Experience Manager versions 6.4 and earlier have a Server-Side Request Forgery vulnerability. Successful exploitation could lead to sensitive information disclosure. 2018-07-20 not yet calculated CVE-2018-12809
BID
CONFIRM
adobe — flash_player Adobe Flash Player 30.0.0.113 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. 2018-07-20 not yet calculated CVE-2018-5007
BID
SECTRACK
REDHAT
CONFIRM
adobe — flash_player Adobe Flash Player 30.0.0.113 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. 2018-07-20 not yet calculated CVE-2018-5008
BID
SECTRACK
REDHAT
CONFIRM
advancecomp — advancecomp An out-of-bounds heap buffer read flaw was found in the way advancecomp before 2.1-2018/02 handled processing of ZIP files. An attacker could potentially use this flaw to crash the advzip utility by tricking it into processing crafted ZIP files. 2018-07-27 not yet calculated CVE-2018-1056
CONFIRM
CONFIRM
MLIST
CONFIRM
UBUNTU

ansible — ansible

An input validation vulnerability was found in Ansible’s mysql_user module before 2.2.1.0, which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed. 2018-07-26 not yet calculated CVE-2016-8647
REDHAT
CONFIRM
CONFIRM

ansible — tower

A flaw was found in Ansible Tower’s interface before 3.1.5 and 3.2.0 with SCM repositories. If a Tower project (SCM repository) definition does not have the ‘delete before update’ flag set, an attacker with commit access to the upstream playbook source repository could create a Trojan playbook that, when executed by Tower, modifies the checked out SCM repository to add git hooks. These git hooks could, in turn, cause arbitrary command and code execution as the user Tower runs as. 2018-07-27 not yet calculated CVE-2017-12148
REDHAT
CONFIRM
apache — kafka In Apache Kafka 0.9.0.0 to 0.9.0.1, 0.10.0.0 to 0.10.2.1, 0.11.0.0 to 0.11.0.2, and 1.0.0, authenticated Kafka users may perform action reserved for the Broker via a manually created fetch request interfering with data replication, resulting in data loss. 2018-07-26 not yet calculated CVE-2018-1288
MLIST

apache — kafka

In Apache Kafka 0.10.0.0 to 0.10.2.1 and 0.11.0.0 to 0.11.0.1, authenticated Kafka clients may use impersonation via a manually crafted protocol message with SASL/PLAIN or SASL/SCRAM authentication when using the built-in PLAIN or SCRAM server implementations in Apache Kafka. 2018-07-26 not yet calculated CVE-2017-12610
BID
MLIST
apache — openwhisk In PHP Runtime for Apache OpenWhisk, a Docker action inheriting one of the Docker tags openwhisk/action-php-v7.2:1.0.0 or openwhisk/action-php-v7.1:1.0.1 (or earlier) may allow an attacker to replace the user function inside the container if the user code is vulnerable to code exploitation. 2018-07-23 not yet calculated CVE-2018-11756
CONFIRM
MLIST
apache — openwhisk In Docker Skeleton Runtime for Apache OpenWhisk, a Docker action inheriting the Docker tag openwhisk/dockerskeleton:1.3.0 (or earlier) may allow an attacker to replace the user function inside the container if the user code is vulnerable to code exploitation. 2018-07-23 not yet calculated CVE-2018-11757
CONFIRM
MLIST
apache — tomee The TomEE console (tomee-webapp) has a XSS vulnerability which could allow javascript to be executed if the user is given a malicious URL. This web application is typically used to add TomEE features to a Tomcat installation. The TomEE bundles do not ship with this application included. This issue can be mitigated by removing the application after TomEE is setup (if using the application to install TomEE), using one of the provided pre-configured bundles, or by upgrading to TomEE 7.0.5. This issue is resolve in this commit: b8bbf50c23ce97dd64f3a5d77f78f84e47579863. 2018-07-23 not yet calculated CVE-2018-8031
MLIST

arm — mbed_tls

ARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14 allows local users to achieve partial plaintext recovery (for a CBC based ciphersuite) via a cache-based side-channel attack. 2018-07-28 not yet calculated CVE-2018-0498
CONFIRM

arm — mbed_tls

ARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14 allows remote attackers to achieve partial plaintext recovery (for a CBC based ciphersuite) via a timing-based side-channel attack. This vulnerability exists because of an incorrect fix (with a wrong SHA-384 calculation) for CVE-2013-0169. 2018-07-28 not yet calculated CVE-2018-0497
CONFIRM
asus — hg100_devices ASUS HG100 devices with firmware before 1.05.12 allow unauthenticated access, leading to remote command execution. 2018-07-25 not yet calculated CVE-2018-11491
CONFIRM

atlassian — jira

The Webhooks component of Atlassian Jira before version 7.6.7 and from version 7.7.0 before version 7.11.0 allows remote attackers who are able to observe or otherwise intercept webhook events to learn information about changes in issues that should not be sent because they are not contained within the results of a specified JQL query. 2018-07-24 not yet calculated CVE-2017-18104
CONFIRM
aubio — aubio An issue was discovered in aubio 0.4.6. A SEGV signal can occur in aubio_source_avcodec_readframe in io/source_avcodec.c, as demonstrated by aubiomfcc. 2018-07-23 not yet calculated CVE-2018-14521
MISC
aubio — aubio An issue was discovered in aubio 0.4.6. A SEGV signal can occur in aubio_pitch_set_unit in pitch/pitch.c, as demonstrated by aubionotes. 2018-07-23 not yet calculated CVE-2018-14522
MISC
aubio — aubio An issue was discovered in aubio 0.4.6. A buffer over-read can occur in new_aubio_pitchyinfft in pitch/pitchyinfft.c, as demonstrated by aubionotes. 2018-07-23 not yet calculated CVE-2018-14523
MISC

aveva — intouch

AVEVA InTouch 2014 R2 SP1 and prior, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2 allow an unauthenticated user to send a specially crafted packet that could overflow the buffer on a locale not using a dot floating point separator. Exploitation could allow remote code execution under the privileges of the InTouch View process. 2018-07-24 not yet calculated CVE-2018-10628
BID
MISC
CONFIRM

bagecms — bagecms

index.php?r=admini/admin/create in BageCMS V3.1.3 allows CSRF to add a background administrator account. 2018-07-24 not yet calculated CVE-2018-14582
MISC
bento4 — bento4 An issue has been discovered in Bento4 1.5.1-624. A SEGV can occur in AP4_Processor::ProcessFragments in Core/Ap4Processor.cpp. 2018-07-24 not yet calculated CVE-2018-14590
MISC
bento4 — bento4 An issue was discovered in Bento4 1.5.1-624. There is a heap-based buffer over-read in AP4_Mpeg2TsVideoSampleStream::WriteSample in Core/Ap4Mpeg2Ts.cpp after a call from Mp42Hls.cpp, a related issue to CVE-2018-13846. 2018-07-23 not yet calculated CVE-2018-14532
MISC
bento4 — bento4 An issue has been discovered in Bento4 1.5.1-624. AP4_MemoryByteStream::WritePartial in Core/Ap4ByteStream.cpp has a buffer over-read. 2018-07-24 not yet calculated CVE-2018-14587
MISC
bento4 — bento4 An issue was discovered in Bento4 1.5.1-624. There is an unspecified “heap-buffer-overflow” crash in the AP4_HvccAtom class in Core/Ap4HvccAtom.cpp. 2018-07-23 not yet calculated CVE-2018-14531
MISC
bento4 — bento4 An issue has been discovered in Bento4 1.5.1-624. A NULL pointer dereference can occur in AP4_DataBuffer::SetData in Core/Ap4DataBuffer.cpp. 2018-07-24 not yet calculated CVE-2018-14588
MISC
bento4 — bento4 An issue has been discovered in Bento4 1.5.1-624. AP4_Mp4AudioDsiParser::ReadBits in Codecs/Ap4Mp4AudioInfo.cpp has a heap-based buffer over-read. 2018-07-24 not yet calculated CVE-2018-14589
MISC
bento4 — bento4 There exists one NULL pointer dereference vulnerability in AP4_JsonInspector::AddField in Ap4Atom.cpp in Bento4 1.5.1-624, which can allow attackers to cause a denial-of-service via a crafted mp4 file. This vulnerability can be triggered by the executable mp4dump. 2018-07-23 not yet calculated CVE-2018-14543
MISC
bento4 — bento4 An issue has been discovered in Bento4 1.5.1-624. AP4_AvccAtom::Create in Core/Ap4AvccAtom.cpp has a heap-based buffer over-read. 2018-07-24 not yet calculated CVE-2018-14584
MISC
MISC
bento4 — bento4 An issue has been discovered in Bento4 1.5.1-624. AP4_BytesToUInt16BE in Core/Ap4Utils.h has a heap-based buffer over-read after a call from the AP4_Stz2Atom class. 2018-07-24 not yet calculated CVE-2018-14585
MISC
bento4 — bento4 There exists one invalid memory read bug in AP4_SampleDescription::GetFormat() in Ap4SampleDescription.h in Bento4 1.5.1-624, which can allow attackers to cause a denial-of-service via a crafted mp4 file. This vulnerability can be triggered by the executable mp42ts. 2018-07-23 not yet calculated CVE-2018-14544
MISC
bento4 — bento4 There exists one invalid memory read bug in AP4_SampleDescription::GetType() in Ap4SampleDescription.h in Bento4 1.5.1-624, which can allow attackers to cause a denial-of-service via a crafted mp4 file. This vulnerability can be triggered by the executable mp42ts. 2018-07-23 not yet calculated CVE-2018-14545
MISC
bento4 — bento4 An issue has been discovered in Bento4 1.5.1-624. A SEGV can occur in AP4_Mpeg2TsAudioSampleStream::WriteSample in Core/Ap4Mpeg2Ts.cpp, a different vulnerability than CVE-2018-14532. 2018-07-24 not yet calculated CVE-2018-14586
MISC
brynamics — online_trade Brynamics “Online Trade – Online trading and cryptocurrency investment system” allows remote attackers to obtain sensitive information via a direct request for /dashboard/addplan, /dashboard/paywithcard/charge, /dashboard/withdrawal, or /privacy&terms, as demonstrated by reading database username, database password, database_name, and IP address fields, related to CVE-2018-12908. 2018-07-23 not yet calculated CVE-2018-14328
MISC
busybox — busybox
 
huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file. 2018-07-26 not yet calculated CVE-2015-9261
MISC
MISC
MISC
MLIST

calamp — lmu_3030_series_devices

CalAmp LMU 3030 series OBD-II CDMA and GSM devices has an SMS (text message) interface that can be deployed where no password is configured for this interface by the integrator / reseller. This interface must be password protected, otherwise, the attacker only needs to know the phone number of the device (via an IMSI Catcher, for example) to send administrative commands to the device. These commands can be used to provide ongoing, real-time access to the device and can configure parameters such as IP addresses, firewall rules, and passwords. 2018-07-24 not yet calculated CVE-2017-3217
CERT-VN
BID
ceph — ceph In Ceph, a format string flaw was found in the way libradosstriper parses input from user. A user could crash an application or service using the libradosstriper library. 2018-07-27 not yet calculated CVE-2017-7519
BID
CONFIRM

chamanet — memocgi

Directory traversal vulnerability in ChamaNet MemoCGI v2.1800 to v2.2200 allows remote attackers to read arbitrary files via unspecified vectors. 2018-07-26 not yet calculated CVE-2018-0617
JVN
CONFIRM

chamilo — chamilo-lms

Chamilo LMS version 11.x contains an Unserialization vulnerability in the “hash” GET parameter for the api endpoint located at /webservices/api/v2.php that can result in Unauthenticated remote code execution. This attack appear to be exploitable via a simple GET request to the api endpoint. This vulnerability appears to have been fixed in After commit 0de84700648f098c1fbf6b807dee28ec640efe62. 2018-07-23 not yet calculated CVE-2018-1999019
CONFIRM
MISC

cloud_foundry_foundation — uaa

Cloud Foundry UAA, versions 4.19 prior to 4.19.2 and 4.12 prior to 4.12.4 and 4.10 prior to 4.10.2 and 4.7 prior to 4.7.6 and 4.5 prior to 4.5.7, incorrectly authorizes requests to admin endpoints by accepting a valid refresh token in lieu of an access token. Refresh tokens by design have a longer expiration time than access tokens, allowing the possessor of a refresh token to authenticate longer than expected. This affects the administrative endpoints of the UAA. i.e. /Users, /Groups, etc. However, if the user has been deleted or had groups removed, or the client was deleted, the refresh token will no longer be valid. 2018-07-24 not yet calculated CVE-2018-11047
CONFIRM

cthackers — adm-zip

adm-zip npm library before 0.4.9 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as ‘Zip-Slip’. 2018-07-25 not yet calculated CVE-2018-1002204
CONFIRM
CONFIRM
MISC
MISC
MISC
curl — curl curl before 7.53.0 has an incorrect TLS Certificate Status Request extension feature that asks for a fresh proof of the server’s certificate’s validity in the code that checks for a test success or failure. It ends up always thinking there’s valid proof, even when there is none or if the server doesn’t support the TLS extension in question. This could lead to users not detecting when a server’s certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality. This flaw also exists in the command line tool (–cert-status). 2018-07-27 not yet calculated CVE-2017-2629
BID
SECTRACK
CONFIRM
CONFIRM
GENTOO
CONFIRM

cybozu — cybozu_garoon

SQL injection vulnerability in the Notifications application in the Cybozu Garoon 3.5.0 to 4.6.2 allows remote authenticated attackers to execute arbitrary SQL commands via unspecified vectors. 2018-07-26 not yet calculated CVE-2018-0607
JVN
CONFIRM

dahua_security — ip_camera_products

Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 include a version of the Sonia web interface that may be vulnerable to a stack buffer overflow. Dahua IP camera products include an application known as Sonia (/usr/bin/sonia) that provides the web interface and other services for controlling the IP camera remotely. Versions of Sonia included in firmware versions prior to DH_IPC-Consumer-Zi-Themis_Eng_P_V2.408.0000.11.R.20170621 do not validate input data length for the ‘password’ field of the web interface. A remote, unauthenticated attacker may submit a crafted POST request to the IP camera’s Sonia web interface that may lead to out-of-bounds memory operations and loss of availability or remote code execution. The issue was originally identified by the researcher in firmware version DH_IPC-HX1X2X-Themis_EngSpnFrn_N_V2.400.0000.30.R.20160803. 2018-07-24 not yet calculated CVE-2017-3223
BID
CERT-VN

dbpower — dbpower

The DBPOWER U818A WIFI quadcopter drone provides FTP access over its own local access point, and allows full file permissions to the anonymous user. The DBPower U818A WIFI quadcopter drone runs an FTP server that by default allows anonymous access without a password, and provides full filesystem read/write permissions to the anonymous user. A remote user within range of the open access point on the drone may utilize the anonymous user of the FTP server to read arbitrary files, such as images and video recorded by the device, or to replace system files such as /etc/shadow to gain further access to the device. Furthermore, the DBPOWER U818A WIFI quadcopter drone uses BusyBox 1.20.2, which was released in 2012, and may be vulnerable to other known BusyBox vulnerabilities. 2018-07-24 not yet calculated CVE-2017-3209
MISC
CERT-VN
BID
dbus — dbus It was found that subscription-manager’s DBus interface before 1.19.4 let unprivileged user access the com.redhat.RHSM1.Facts.GetFacts and com.redhat.RHSM1.Config.Set methods. An unprivileged local attacker could use these methods to gain access to private information, or launch a privilege escalation attack. 2018-07-27 not yet calculated CVE-2017-2663
BID
CONFIRM
CONFIRM

dhc — dhc_online_shop_app_for_android

The DHC Online Shop App for Android version 3.2.0 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. 2018-07-26 not yet calculated CVE-2018-0622
JVN
dotcms — dotcms The dotCMS administration panel, versions 3.7.1 and earlier, are vulnerable to cross-site request forgery. The dotCMS administrator panel contains a cross-site request forgery (CSRF) vulnerability. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request. An unauthenticated remote attacker may perform actions with the dotCMS administrator panel with the same permissions of a victim user or execute arbitrary system commands with the permissions of the user running the dotCMS application. 2018-07-24 not yet calculated CVE-2017-3187
BID
CERT-VN
dotcms — dotcms The dotCMS administration panel, versions 3.7.1 and earlier, “Push Publishing” feature in Enterprise Pro is vulnerable to arbitrary file upload. When “Bundle” tar.gz archives uploaded to the Push Publishing feature are decompressed, there are no checks on the types of files which the bundle contains. This vulnerability combined with the path traversal vulnerability (CVE-2017-3188) can lead to remote command execution with the permissions of the user running the dotCMS application. An unauthenticated remote attacker may perform actions with the dotCMS administrator panel with the same permissions of a victim user or execute arbitrary system commands with the permissions of the user running the dotCMS application. 2018-07-24 not yet calculated CVE-2017-3189
BID
CERT-VN
dotcms — dotcms The dotCMS administration panel, versions 3.7.1 and earlier, “Push Publishing” feature in Enterprise Pro is vulnerable to path traversal. When “Bundle” tar.gz archives uploaded to the Push Publishing feature are decompressed, the filenames of its contents are not properly checked, allowing for writing files to arbitrary directories on the file system. These archives may be uploaded directly via the administrator panel, or using the CSRF vulnerability (CVE-2017-3187). An unauthenticated remote attacker may perform actions with the dotCMS administrator panel with the same permissions of a victim user or execute arbitrary system commands with the permissions of the user running the dotCMS application. 2018-07-24 not yet calculated CVE-2017-3188
BID
CERT-VN

dotnetzip.semvered — dotnetzip.semvered

DotNetZip.Semvered before 1.11.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as ‘Zip-Slip’. 2018-07-25 not yet calculated CVE-2018-1002205
CONFIRM
CONFIRM
MISC
MISC
MISC
eap — eap
 
It was found in EAP 7 before 7.0.9 that properties based files of the management and the application realm configuration that contain user to role mapping are world readable allowing access to users and roles information to all the users logged in to the system. 2018-07-26 not yet calculated CVE-2017-12167
BID
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM

echelon — smartserver_and_i.lon

Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. An attacker can use the SOAP API to retrieve and change sensitive configuration items such as the usernames and passwords for the Web and FTP servers. This vulnerability does not affect the i.LON 600 product. 2018-07-24 not yet calculated CVE-2018-10627
MISC
echelon — smartserver_and_i.lon Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. The devices allow unencrypted Web connections by default, and devices can receive configuration and firmware updates by unsecure FTP. 2018-07-24 not yet calculated CVE-2018-8855
MISC
echelon — smartserver_and_i.lon Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. The devices store passwords in plaintext, which may allow an attacker with access to the configuration file to log into the SmartServer web user interface. 2018-07-24 not yet calculated CVE-2018-8851
MISC
echelon — smartserver_and_i.lon Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. An attacker can bypass the required authentication specified in the security configuration file by including extra characters in the directory name when specifying the directory to be accessed. This vulnerability does not affect the i.LON 600 product. 2018-07-24 not yet calculated CVE-2018-8859
MISC
f5 — big-ip On F5 BIG-IP DNS 13.1.0-13.1.0.7, 12.1.3-12.1.3.5, DNS Express / DNS Zones accept NOTIFY messages on the management interface from source IP addresses not listed in the ‘Allow NOTIFY From’ configuration parameter when the db variable “dnsexpress.notifyport” is set to any value other than the default of “0”. 2018-07-25 not yet calculated CVE-2018-5538
CONFIRM
f5 — big-ip A remote attacker may be able to disrupt services on F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.1, or 11.2.1-11.5.6 if the TMM virtual server is configured with a HTML or a Rewrite profile. TMM may restart while processing some specially prepared HTML content from the back end. 2018-07-25 not yet calculated CVE-2018-5537
CONFIRM
f5 — big-ip A remote attacker via undisclosed measures, may be able to exploit an F5 BIG-IP APM 13.0.0-13.1.0.7 or 12.1.0-12.1.3.5 virtual server configured with an APM per-request policy object and cause a memory leak in the APM module. 2018-07-25 not yet calculated CVE-2018-5536
CONFIRM
f5 — big-ip Under certain conditions, on F5 BIG-IP ASM 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.0-11.6.3.1, 11.5.1-11.5.6, or 11.2.1, when processing CSRF protections, the BIG-IP ASM bd process may restart and produce a core file. 2018-07-25 not yet calculated CVE-2018-5539
CONFIRM
f5 — big-ip Through undisclosed methods, on F5 BIG-IP 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.0-11.6.3.1, or 11.2.1-11.5.6, adjacent network attackers can cause a denial of service for VCMP guest and host systems. Attack must be sourced from adjacent network (layer 2). 2018-07-25 not yet calculated CVE-2018-5531
CONFIRM
f5 — big-ip When F5 BIG-IP ASM 13.0.0-13.1.0.1, 12.1.0-12.1.3.5, 11.6.0-11.6.3.1, or 11.5.1-11.5.6 is processing HTTP requests, an unusually large number of parameters can cause excessive CPU usage in the BIG-IP ASM bd process. 2018-07-25 not yet calculated CVE-2018-5541
BID
CONFIRM
f5 — big-ip F5 BIG-IP 13.0.0-13.0.1, 12.1.0-12.1.3.6, or 11.2.1-11.6.3.2 HTTPS health monitors do not validate the identity of the monitored server. 2018-07-25 not yet calculated CVE-2018-5542
CONFIRM
f5 — big-ip F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, or 11.6.0-11.6.3.1 virtual servers with HTTP/2 profiles enabled are vulnerable to “HPACK Bomb”. 2018-07-25 not yet calculated CVE-2018-5530
CONFIRM
ffmpeg — ffmpeg FFmpeg before commit bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 contains an out of array access vulnerability in MXF format demuxer that can result in DoS. This attack appear to be exploitable via specially crafted MXF file which has to be provided as input. This vulnerability appears to have been fixed in bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 and later. 2018-07-23 not yet calculated CVE-2018-1999014
BID
CONFIRM
ffmpeg — ffmpeg FFmpeg before commit 5aba5b89d0b1d73164d3b81764828bb8b20ff32a contains an out of array read vulnerability in ASF_F format demuxer that can result in heap memory reading. This attack appear to be exploitable via specially crafted ASF file that has to provided as input. This vulnerability appears to have been fixed in 5aba5b89d0b1d73164d3b81764828bb8b20ff32a and later. 2018-07-23 not yet calculated CVE-2018-1999015
BID
CONFIRM
ffmpeg — ffmpeg FFmpeg before commit 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 contains a CWE-835: Infinite loop vulnerability in pva format demuxer that can result in a Vulnerability that allows attackers to consume excessive amount of resources like CPU and RAM. This attack appear to be exploitable via specially crafted PVA file has to be provided as input. This vulnerability appears to have been fixed in 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 and later. 2018-07-23 not yet calculated CVE-2018-1999012
BID
CONFIRM
ffmpeg — ffmpeg FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg. This vulnerability appears to have been fixed in 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 and later. 2018-07-23 not yet calculated CVE-2018-1999011
BID
CONFIRM
ffmpeg — ffmpeg FFmpeg before commit a7e032a277452366771951e29fd0bf2bd5c029f0 contains a use-after-free vulnerability in the realmedia demuxer that can result in vulnerability allows attacker to read heap memory. This attack appear to be exploitable via specially crafted RM file has to be provided as input. This vulnerability appears to have been fixed in a7e032a277452366771951e29fd0bf2bd5c029f0 and later. 2018-07-23 not yet calculated CVE-2018-1999013
BID
CONFIRM
ffmpeg — ffmpeg FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5df6df8fd40d8de0bff477ee02e8 and later. 2018-07-23 not yet calculated CVE-2018-1999010
BID
CONFIRM
foreman — foreman foreman before version 1.16.0 is vulnerable to a stored XSS in organizations/locations assignment to hosts. Exploiting this requires a user to actively assign hosts to an organization that contains html in its name which is visible to the user prior to taking action. 2018-07-26 not yet calculated CVE-2017-7535
MLIST
BID
CONFIRM
CONFIRM
fuse — fuse In fuse before versions 2.9.8 and 3.x before 3.2.5, fusermount is vulnerable to a restriction bypass when SELinux is active. This allows non-root users to mount a FUSE file system with the ‘allow_other’ mount option regardless of whether ‘user_allow_other’ is set in the fuse configuration. An attacker may use this flaw to mount a FUSE file system, accessible by other users, and trick them into accessing files on that file system, possibly causing Denial of Service or other unspecified effects. 2018-07-24 not yet calculated CVE-2018-10906
CONFIRM
gdm — gdm
 
A flaw was discovered in gdm 3.24.1 where gdm greeter was no longer setting the ran_once boolean during autologin. If autologin was enabled for a victim, an attacker could simply select ‘login as another user’ to unlock their screen. 2018-07-26 not yet calculated CVE-2017-12164
CONFIRM
CONFIRM
gitlab — community_and_enterprise_edition An issue was discovered in GitLab Community and Enterprise Edition before 10.8.7, 11.0.x before 11.0.5, and 11.1.x before 11.1.2. XSS can occur in the branch name during a Web IDE file commit. 2018-07-26 not yet calculated CVE-2018-14605
MISC

gitlab — community_and_enterprise_edition

An issue was discovered in GitLab Community and Enterprise Edition 11.1.x before 11.1.2. A Denial of Service can occur because Markdown rendering times are slow. 2018-07-26 not yet calculated CVE-2018-14601
MISC
gitlab — community_and_enterprise_edition An issue was discovered in GitLab Community and Enterprise Edition before 10.8.7, 11.0.x before 11.0.5, and 11.1.x before 11.1.2. Information Disclosure can occur because the Prometheus metrics feature discloses private project pathnames. 2018-07-26 not yet calculated CVE-2018-14602
MISC
gitlab — community_and_enterprise_edition An issue was discovered in GitLab Community and Enterprise Edition before 10.8.7, 11.0.x before 11.0.5, and 11.1.x before 11.1.2. CSRF can occur in the Test feature of the System Hooks component. 2018-07-26 not yet calculated CVE-2018-14603
MISC
gitlab — community_and_enterprise_edition An issue was discovered in GitLab Community and Enterprise Edition before 10.8.7, 11.0.x before 11.0.5, and 11.1.x before 11.1.2. XSS can occur via a Milestone name during a promotion. 2018-07-26 not yet calculated CVE-2018-14606
MISC
gitlab — community_and_enterprise_edition An issue was discovered in GitLab Community and Enterprise Edition before 10.8.7, 11.0.x before 11.0.5, and 11.1.x before 11.1.2. XSS can occur in the tooltip of the job inside the CI/CD pipeline. 2018-07-26 not yet calculated CVE-2018-14604
MISC

glarysoft — glary_utilities

Untrusted search path vulnerability in the installer of Glarysoft Glary Utilities (Glary Utilities 5.99 and earlier and Glary Utilities Pro 5.99 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. 2018-07-26 not yet calculated CVE-2018-0619
JVN
gleez_cms — gleez_cms Gleezcms Gleez Cms version 1.3.0 contains a Cross Site Scripting (XSS) vulnerability in Profile page that can result in Inject arbitrary web script or HTML via the profile page editor. This attack appear to be exploitable via The victim must navigate to the attacker’s profile page. 2018-07-23 not yet calculated CVE-2018-1999021
CONFIRM
gnome — gnome
 
camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive information by sniffing the network. The server code was intended to report an error and not proceed, but the code was written incorrectly. 2018-07-20 not yet calculated CVE-2016-10727
MISC
MISC
MISC
MISC
UBUNTU

gnu — libredwg

dwg_decode_eed in decode.c in GNU LibreDWG 0.5.1048 leads to a double free (in dwg_free_eed in free.c) because it does not properly manage the obj->eed value after a free occurs. 2018-07-23 not yet calculated CVE-2018-14524
MISC

gnu_mailmain — mailman

Cross-site scripting vulnerability in Mailman 2.1.26 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors. 2018-07-26 not yet calculated CVE-2018-0618
JVN
MLIST
MLIST
DEBIAN
golang — golang mholt/archiver golang package before e4ef56d48eb029648b0e895bb0b6a393ef0829c3 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as ‘Zip-Slip’. 2018-07-25 not yet calculated CVE-2018-1002207
CONFIRM
CONFIRM
MISC
MISC
MISC

golemcms — golemcms

GolemCMS through 2008-12-24, if the install/ directory remains active after an installation, allows remote attackers to execute arbitrary PHP code by inserting this code into the “Database Information” “Table prefix” form field, or obtain sensitive information via a direct request for install/install.sql. 2018-07-24 not yet calculated CVE-2018-14579
MISC
gxlcms — gxlcms The add function in www/Lib/Lib/Action/Admin/TplAction.class.php in Gxlcms v1.1.4 allows remote attackers to read arbitrary files via a crafted index.php?s=Admin-Tpl-ADD-id request, related to Lib/Common/Admin/function.php. 2018-07-28 not yet calculated CVE-2018-14685
MISC
h2 — h2 An issue was discovered in H2 1.4.197. Insecure handling of permissions in the backup function allows attackers to read sensitive files (outside of their permissions) via a symlink to a fake database file. 2018-07-24 not yet calculated CVE-2018-14335
MISC

ibm — sterling_b2b_integrator_standard_edition

IBM Sterling B2B Integrator Standard Edition (IBM Sterling File Gateway 2.2.0 through 2.2.6) uses weaker than expected cryptographic algorithms that could allow a local attacker to decrypt highly sensitive information. IBM X-Force ID: 132032. 2018-07-20 not yet calculated CVE-2017-1575
CONFIRM
BID
XF

ibm — sterling_b2b_integrator_standard_edition

IBM Sterling B2B Integrator Standard Edition 5.2.0 through 5.2.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 141551. 2018-07-23 not yet calculated CVE-2018-1513
CONFIRM
XF

ibm — sterling_b2b_integrator_standard_edition

IBM Sterling B2B Integrator Standard Edition (IBM Sterling File Gateway 2.2.0 through 2.2.6) caches usernames and passwords in browsers that could be used by a local attacker to obtain sensitive information. IBM X-Force ID: 130812. 2018-07-20 not yet calculated CVE-2017-1544
CONFIRM
BID
XF

ibm — sterling_file_gateway

IBM Sterling File Gateway 2.2.0 through 2.2.6 could allow a remote authenticated attacker to obtain sensitive information displayed in the URL that could lead to further attacks against the system. IBM X-Force ID: 140688. 2018-07-20 not yet calculated CVE-2018-1470
CONFIRM
BID
XF

ibm — websphere_mq

IBM WebSphere MQ 7.5, 8.0, and 9.0 could allow a remotely authenticated attacker to to send invalid or malformed headers that could cause messages to no longer be transmitted via the affected channel. IBM X-Force ID: 141339. 2018-07-23 not yet calculated CVE-2018-1503
CONFIRM
SECTRACK
XF

idreamsoft — icms

An SSRF vulnerability was discovered in idreamsoft iCMS V7.0.9 that allows attackers to read sensitive files, access an intranet, or possibly have unspecified other impact. 2018-07-23 not yet calculated CVE-2018-14514
MISC

imagemagick — imagemagick

The ReadMATImageV4 function in coders/mat.c in ImageMagick 7.0.8-7 uses an uninitialized variable, leading to memory corruption. 2018-07-23 not yet calculated CVE-2018-14551
MISC
ipa — ipa A vulnerability was found in ipa before 4.4. IdM’s ca-del, ca-disable, and ca-enable commands did not properly check the user’s permissions while modifying CAs in Dogtag. An authenticated, unauthorized attacker could use this flaw to delete, disable, or enable CAs causing various denial of service problems with certificate issuance, OCSP signing, and deletion of secret keys. 2018-07-27 not yet calculated CVE-2017-2590
REDHAT
BID
CONFIRM
jbpmmigration — jbpmmigration It was discovered that the XmlUtils class in jbpmmigration 6.5 performed expansion of external parameter entities while parsing XML files. A remote attacker could use this flaw to read files accessible to the user running the application server and, potentially, perform other more advanced XML eXternal Entity (XXE) attacks. 2018-07-26 not yet calculated CVE-2017-7545
BID
REDHAT
REDHAT
CONFIRM
CONFIRM
jenkins — jenkins A cross-site scripting vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework’s org/kohsuke/stapler/Stapler.java that allows attackers with the ability to control the existence of some URLs in Jenkins to define JavaScript that would be executed in another user’s browser when that other user views HTTP 404 error pages while Stapler debug mode is enabled. 2018-07-23 not yet calculated CVE-2018-1999007
CONFIRM
jenkins — jenkins It was found that the use of Pipeline: Classpath Step Jenkins plugin enables a bypass of the Script Security sandbox for users with SCM commit access, as well as users with e.g. Job/Configure permission in Jenkins. 2018-07-27 not yet calculated CVE-2017-2650
BID
CONFIRM
jenkins — jenkins It was found that there were no permission checks performed in the Distributed Fork plugin before and including 1.5.0 for Jenkins that provides the dist-fork CLI command beyond the basic check for Overall/Read permission, allowing anyone with that permission to run arbitrary shell commands on all connected nodes. 2018-07-27 not yet calculated CVE-2017-2652
BID
CONFIRM
jenkins — jenkins A exposure of sensitive information vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in Plugin.java that allows attackers to determine the date and time when a plugin HPI/JPI file was last extracted, which typically is the date of the most recent installation/upgrade. 2018-07-23 not yet calculated CVE-2018-1999006
CONFIRM
jenkins — jenkins It was found that jenkins-ssh-slaves-plugin before version 1.15 did not perform host key verification, thereby enabling Man-in-the-Middle attacks. 2018-07-27 not yet calculated CVE-2017-2648
BID
CONFIRM
CONFIRM
jenkins — jenkins A Improper authorization vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in Queue.java that allows attackers with Overall/Read permission to cancel queued builds. 2018-07-23 not yet calculated CVE-2018-1999003
CONFIRM
jenkins — jenkins A arbitrary file read vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework’s org/kohsuke/stapler/Stapler.java that allows attackers to send crafted HTTP requests returning the contents of any file on the Jenkins master file system that the Jenkins master has access to. 2018-07-23 not yet calculated CVE-2018-1999002
CONFIRM
jenkins — jenkins jenkins-mailer-plugin before version 1.20 is vulnerable to an information disclosure while using the feature to send emails to a dynamically created list of users based on the changelogs. This could in some cases result in emails being sent to people who have no user account in Jenkins, and in rare cases even people who were not involved in whatever project was being built, due to some mapping based on the local-part of email addresses. 2018-07-27 not yet calculated CVE-2017-2651
BID
CONFIRM
CONFIRM
jenkins — jenkins It was found that the Active Directory Plugin for Jenkins up to and including version 2.2 did not verify certificates of the Active Directory server, thereby enabling Man-in-the-Middle attacks. 2018-07-27 not yet calculated CVE-2017-2649
BID
CONFIRM
jenkins — jenkins A unauthorized modification of configuration vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in User.java that allows attackers to provide crafted login credentials that cause Jenkins to move the config.xml file from the Jenkins home directory. If Jenkins is started without this file present, it will revert to the legacy defaults of granting administrator access to anonymous users. 2018-07-23 not yet calculated CVE-2018-1999001
CONFIRM
jenkins — jenkins A cross-site scripting vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in BuildTimelineWidget.java, BuildTimelineWidget/control.jelly that allows attackers with Job/Configure permission to define JavaScript that would be executed in another user’s browser when that other user performs some UI actions. 2018-07-23 not yet calculated CVE-2018-1999005
CONFIRM
jenkins — jenkins A Improper authorization vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in SlaveComputer.java that allows attackers with Overall/Read permission to initiate agent launches, and abort in-progress agent launches. 2018-07-23 not yet calculated CVE-2018-1999004
CONFIRM
joyplus-cms — joyplus-cms joyplus-cms 1.6.0 has XSS via the manager/collect/collect_vod_zhuiju.php keyword parameter. 2018-07-22 not yet calculated CVE-2018-14500
MISC
joyplus-cms — joyplus-cms manager/admin_ajax.php in joyplus-cms 1.6.0 has SQL Injection, as demonstrated by crafted POST data beginning with an “m_id=1 AND SLEEP(5)” substring. 2018-07-22 not yet calculated CVE-2018-14501
MISC

katello-debug — katello-debug

A flaw was found in katello-debug before 3.4.0 where certain scripts and log files used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files. 2018-07-27 not yet calculated CVE-2016-9595
REDHAT
CONFIRM

keycloak — keycloak

It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the “InResponseTo” field in the response. 2018-07-26 not yet calculated CVE-2017-2582
BID
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM
CONFIRM
keycloak — keycloak keycloak before version 4.0.0.final is vulnerable to a infinite loop in session replacement. A Keycloak cluster with multiple nodes could mishandle an expired session replacement and lead to an infinite loop. A malicious authenticated user could use this flaw to achieve Denial of Service on the server. 2018-07-23 not yet calculated CVE-2018-10912
CONFIRM
keycloak — keycloak It was found that when Keycloak before 2.5.5 receives a Logout request with a Extensions in the middle of the request, the SAMLSloRequestParser.parse() method ends in a infinite loop. An attacker could use this flaw to conduct denial of service attacks. 2018-07-27 not yet calculated CVE-2017-2646
BID
CONFIRM

krb5 — krb5

An authentication bypass flaw was found in the way krb5’s certauth interface before 1.16.1 handled the validation of client certificates. A remote attacker able to communicate with the KDC could potentially use this flaw to impersonate arbitrary principals under rare and erroneous circumstances. 2018-07-26 not yet calculated CVE-2017-7562
BID
REDHAT
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM

lenovo — multiple_products

The IMM2 First Failure Data Capture function collects management module logs and diagnostic information when a hardware error is detected. This information is made available for download through an SFTP server hosted on the IMM2 management network interface. In versions earlier than 4.90 for Lenovo System x and earlier than 6.80 for IBM System x, the credentials to access the SFTP server are hard-coded and described in the IMM2 documentation, allowing an attacker with management network access to obtain the collected FFDC data. After applying the update, the IMM2 will create random SFTP credentials for use with OneCLI. 2018-07-26 not yet calculated CVE-2018-9068
CONFIRM

libgcrypt — libgcrypt

libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used. 2018-07-26 not yet calculated CVE-2017-7526
BID
SECTRACK
CONFIRM
MISC
CONFIRM
CONFIRM
CONFIRM
MLIST
DEBIAN
DEBIAN

libice — libice

It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list. 2018-07-27 not yet calculated CVE-2017-2626
BID
SECTRACK
REDHAT
CONFIRM
CONFIRM
GENTOO
MISC

liblouis — liblouis

A missing patch for a stack-based buffer overflow in findTable() was found in Red Hat version of liblouis before 2.5.4. An attacker could cause a denial of service condition or potentially even arbitrary code execution. 2018-07-27 not yet calculated CVE-2017-15101
REDHAT
CONFIRM

libmspack — libmspack

An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression. 2018-07-28 not yet calculated CVE-2018-14682
MISC
MISC
MISC

libmspack — libmspack

An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite. 2018-07-28 not yet calculated CVE-2018-14681
MISC
MISC
MISC

libmspack — libmspack

An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash). 2018-07-28 not yet calculated CVE-2018-14679
MISC
MISC
MISC

libmspack — libmspack

An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames. 2018-07-28 not yet calculated CVE-2018-14680
MISC
MISC
MISC

libwav — libwav

An issue has been found in libwav through 2017-04-20. It is a SEGV in the function wav_write in libwav.c. 2018-07-23 not yet calculated CVE-2018-14549
MISC
MISC

libxdmcp — libxdmcp

It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users’ sessions. 2018-07-27 not yet calculated CVE-2017-2625
BID
SECTRACK
REDHAT
CONFIRM
GENTOO
MISC

lica — minicmts_e8k_devices

LICA miniCMTS E8K(u/i/…) devices allow remote attackers to obtain sensitive information via a direct POST request for the inc/user.ini file, leading to discovery of a password hash. 2018-07-25 not yet calculated CVE-2018-14083
MISC
linux — linux_kernel An issue was discovered in the Linux kernel through 4.17.10. There is a buffer overflow in truncate_inline_inode() in fs/f2fs/inline.c when umounting an f2fs image, because a length value may be negative. 2018-07-27 not yet calculated CVE-2018-14615
MISC
linux — linux_kernel An issue was discovered in the Linux kernel through 4.17.10. There is an out-of-bounds access in __remove_dirty_segment() in fs/f2fs/segment.c when mounting an f2fs image. 2018-07-27 not yet calculated CVE-2018-14614
MISC
linux — linux_kernel A flaw was found in Linux kernel’s KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host’s userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges. 2018-07-26 not yet calculated CVE-2018-10901
CONFIRM
CONFIRM
linux — linux_kernel Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. 2018-07-25 not yet calculated CVE-2018-10880
CONFIRM
CONFIRM
CONFIRM
CONFIRM
MLIST
linux — linux_kernel An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory. 2018-07-27 not yet calculated CVE-2018-14617
MISC
MISC
linux — linux_kernel It was found that the Linux kernel’s Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system. 2018-07-27 not yet calculated CVE-2017-2634
REDHAT
REDHAT
REDHAT
BID
SECTRACK
CONFIRM
CONFIRM
linux — linux_kernel An issue was discovered in the Linux kernel through 4.17.10. There is out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image, because of a lack of verification that each block group has a corresponding chunk at mount time, within btrfs_read_block_groups in fs/btrfs/extent-tree.c. 2018-07-27 not yet calculated CVE-2018-14610
MISC
MISC
linux — linux_kernel A flaw was found in the Linux kernel’s handling of clearing SELinux attributes on /proc/pid/attr files before 4.9.10. An empty (null) write to this file can crash the system by causing the system to attempt to access unmapped kernel memory. 2018-07-27 not yet calculated CVE-2017-2618
BID
REDHAT
REDHAT
REDHAT
CONFIRM
CONFIRM
MLIST
DEBIAN
linux — linux_kernel An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges. 2018-07-28 not yet calculated CVE-2018-14678
MISC
linux — linux_kernel A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in sockaddr data structures used to export socket’s diagnostic information. As a result, up to 100 bytes of the slab data could be leaked to a userspace. 2018-07-26 not yet calculated CVE-2017-7558
MLIST
BID
SECTRACK
REDHAT
REDHAT
REDHAT
CONFIRM
MLIST
DEBIAN
linux — linux_kernel A flaw was found in the Linux kernel’s ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. 2018-07-26 not yet calculated CVE-2018-10878
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
MLIST
linux — linux_kernel An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c. 2018-07-27 not yet calculated CVE-2018-14613
MISC
MISC
linux — linux_kernel An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized. 2018-07-27 not yet calculated CVE-2018-14609
MISC
MISC
linux — linux_kernel An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in btrfs_root_node() when mounting a crafted btrfs image, because of a lack of chunk block group mapping validation in btrfs_read_block_groups in fs/btrfs/extent-tree.c, and a lack of empty-tree checks in check_leaf in fs/btrfs/tree-checker.c. 2018-07-27 not yet calculated CVE-2018-14612
MISC
MISC
MISC
linux — linux_kernel A flaw was found in the Linux kernel’s ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. 2018-07-26 not yet calculated CVE-2018-10881
CONFIRM
CONFIRM
CONFIRM
CONFIRM
MLIST

linux — linux_kernel

A flaw was found in the Linux kernel’s ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. 2018-07-26 not yet calculated CVE-2018-10879
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
MLIST
linux — linux_kernel A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. 2018-07-26 not yet calculated CVE-2018-10876
CONFIRM
CONFIRM
CONFIRM
CONFIRM
MLIST
linux — linux_kernel A flaw was found in the Linux kernel’s ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. 2018-07-27 not yet calculated CVE-2018-10882
CONFIRM
CONFIRM
CONFIRM
MLIST
linux — linux_kernel An issue was discovered in the Linux kernel through 4.17.10. There is a use-after-free in try_merge_free_space() when mounting a crafted btrfs image, because of a lack of chunk type flag checks in btrfs_check_chunk_valid in fs/btrfs/volumes.c. 2018-07-27 not yet calculated CVE-2018-14611
MISC
MISC
linux — linux_kernel The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn’t properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE). 2018-07-26 not yet calculated CVE-2017-18344
MISC
MISC
linux — linux_kernel An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference in fscrypt_do_page_crypto() in fs/crypto/crypto.c when operating on a file in a corrupted f2fs image. 2018-07-27 not yet calculated CVE-2018-14616
MISC

linux — util-linux

A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions. 2018-07-27 not yet calculated CVE-2017-2616
REDHAT
BID
SECTRACK
REDHAT
CONFIRM
CONFIRM
GENTOO
DEBIAN

logicool — connection_utility_software

Untrusted search path vulnerability in LOGICOOL CONNECTION UTILITY SOFTWARE versions before 2.30.9 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. 2018-07-26 not yet calculated CVE-2018-0621
JVN

logicool — game_software

Untrusted search path vulnerability in LOGICOOL Game Software versions before 8.87.116 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. 2018-07-26 not yet calculated CVE-2018-0620
JVN

mathjax — mathjax

MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the \unicode{} macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. This vulnerability appears to have been fixed in 2.7.4 and later. 2018-07-23 not yet calculated CVE-2018-1999024
MISC
CONFIRM

mcafee — data_loss_prevention

Exploiting Incorrectly Configured Access Control Security Levels vulnerability in McAfee Data Loss Prevention (DLP) for Windows versions prior to 10.0.505 and 11.0.405 allows local users to bypass DLP policy via editing of local policy files when offline. 2018-07-23 not yet calculated CVE-2018-6683
CONFIRM

mcafee — drive_encryption

Authentication Bypass vulnerability in TPM autoboot in McAfee Drive Encryption (MDE) 7.1.0 and above allows physically proximate attackers to bypass local security protection via specific set of circumstances. 2018-07-27 not yet calculated CVE-2018-6686
CONFIRM

mcafee — web_gateway

Configuration/Environment manipulation vulnerability in the administrative interface in McAfee Web Gateway (MWG) MWG 7.8.1.x allows authenticated administrator users to execute arbitrary commands via unspecified vectors. 2018-07-23 not yet calculated CVE-2018-6678
BID
CONFIRM

mcafee — web_gateway

Directory Traversal vulnerability in the administrative user interface in McAfee Web Gateway (MWG) MWG 7.8.1.x allows authenticated administrator users to gain elevated privileges via unspecified vectors. 2018-07-23 not yet calculated CVE-2018-6677
BID
CONFIRM

mitmproxy — mitmproxy

mitmweb in mitmproxy v4.0.3 allows DNS Rebinding attacks, related to tools/web/app.py. 2018-07-22 not yet calculated CVE-2018-14505
CONFIRM
CONFIRM

moxa — nport

In Moxa NPort 5210, 5230, and 5232 versions 2.9 build 17030709 and prior, the amount of resources requested by a malicious actor are not restricted, allowing for a denial-of-service condition. 2018-07-24 not yet calculated CVE-2018-10632
BID
MISC

multiple_vendors — das_u-boot_aes-cbc_encryption

Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. For devices utilizing this environment encryption mode, U-Boot’s use of a zero initialization vector may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data. Das U-Boot’s AES-CBC encryption feature uses a zero (0) initialization vector. This allows an attacker to perform dictionary attacks on encrypted data produced by Das U-Boot to learn information about the encrypted data. 2018-07-24 not yet calculated CVE-2017-3225
BID
CERT-VN

multiple_vendors — das_u-boot_aes-cbc_encryption

Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. Devices that make use of Das U-Boot’s AES-CBC encryption feature using environment encryption (i.e., setting the configuration parameter CONFIG_ENV_AES=y) read environment variables from disk as the encrypted disk image is processed. An attacker with physical access to the device can manipulate the encrypted environment data to include a crafted two-byte sequence which triggers an error in environment variable parsing. This error condition is improperly handled by Das U-Boot, resulting in an immediate process termination with a debugging message. 2018-07-24 not yet calculated CVE-2017-3226
BID
CERT-VN

multiple_vendors — multiple_products

Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution. A number of applications developed using the Portrait Displays SDK do not use secure permissions when running. These applications run the component pdiservice.exe with NT AUTHORITY/SYSTEM permissions. This component is also read/writable by all Authenticated Users. This allows local authenticated attackers to run arbitrary code with SYSTEM privileges. The following applications have been identified by Portrait Displays as affected: Fujitsu DisplayView Click: Version 6.0 and 6.01. The issue was fixed in Version 6.3. Fujitsu DisplayView Click Suite: Version 5. The issue is addressed by patch in Version 5.9. HP Display Assistant: Version 2.1. The issue was fixed in Version 2.11. HP My Display: Version 2.0. The issue was fixed in Version 2.1. Philips Smart Control Premium: Versions 2.23, 2.25. The issue was fixed in Version 2.26. 2018-07-24 not yet calculated CVE-2017-3210
CERT-VN
BID

multiple_vendors — open_shortest_path_first_protocol

Open Shortest Path First (OSPF) protocol implementations may improperly determine Link State Advertisement (LSA) recency for LSAs with MaxSequenceNumber. According to RFC 2328 section 13.1, for two instances of the same LSA, recency is determined by first comparing sequence numbers, then checksums, and finally MaxAge. In a case where the sequence numbers are the same, the LSA with the larger checksum is considered more recent, and will not be flushed from the Link State Database (LSDB). Since the RFC does not explicitly state that the values of links carried by a LSA must be the same when prematurely aging a self-originating LSA with MaxSequenceNumber, it is possible in vulnerable OSPF implementations for an attacker to craft a LSA with MaxSequenceNumber and invalid links that will result in a larger checksum and thus a ‘newer’ LSA that will not be flushed from the LSDB. Propagation of the crafted LSA can result in the erasure or alteration of the routing tables of routers within the routing domain, creating a denial of service condition or the re-routing of traffic on the network. CVE-2017-3224 has been reserved for Quagga and downstream implementations (SUSE, openSUSE, and Red Hat packages). 2018-07-24 not yet calculated CVE-2017-3224
CERT-VN

navarino — infinity_web_interface

Navarino Infinity web interface up to version 2.2 exposes an unauthenticated script that is prone to blind sql injection. If successfully exploited the user can get info from the underlying postgresql database that could lead into to total compromise of the product. The said script is available with no authentication. 2018-07-24 not yet calculated CVE-2018-5384
BID
MISC
MISC
CERT-VN

navarino — infinity_web_interface

Some Navarino Infinity functions, up to version 2.2, placed in the URL can bypass any authentication mechanism leading to an information leak. 2018-07-24 not yet calculated CVE-2018-5386
BID
MISC
MISC
CERT-VN

navarino — infinity_web_interface

Navarino Infinity is prone to session fixation attacks. The server accepts the session ID as a GET parameter which can lead to bypassing the two factor authentication in some installations. This could lead to phishing attacks that can bypass the two factor authentication that is present in some installations. 2018-07-24 not yet calculated CVE-2018-5385
BID
MISC
MISC
CERT-VN

nec_platforms — csdx_and_csdj_series_products

NEC Platforms Calsos CSDX and CSDJ series products (CSDX 1.37210411 and earlier, CSDX(P) 4.37210411 and earlier, CSDX(D) 3.37210411 and earlier, CSDX(S) 2.37210411 and earlier, CSDJ-B 01.03.00 and earlier, CSDJ-H 01.03.00 and earlier, CSDJ-D 01.03.00 and earlier, CSDJ-A 03.00.00) allows remote authenticated attackers to bypass access restriction to conduct arbitrary operations with administrative privilege via unspecified vectors. 2018-07-26 not yet calculated CVE-2018-0613
JVN
CONFIRM

nec_platforms — csdx_and_csdj_series_products

Cross-site scripting vulnerability in NEC Platforms Calsos CSDX and CSDJ series products (CSDX 1.37210411 and earlier, CSDX(P) 4.37210411 and earlier, CSDX(D) 3.37210411 and earlier, CSDX(S) 2.37210411 and earlier, CSDJ-B 01.03.00 and earlier, CSDJ-H 01.03.00 and earlier, CSDJ-D 01.03.00 and earlier, CSDJ-A 03.00.00) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. 2018-07-26 not yet calculated CVE-2018-0614
JVN
CONFIRM

netgear — dgn2200_router

A vulnerability is in the ‘BSW_cxttongr.htm’ page of the Netgear DGN2200, version DGN2200-V1.0.0.50_7.0.50, and DGND3700, version DGND3700-V1.0.0.17_1.0.17, which can allow a remote attacker to access this page without any authentication. When processed, it exposes the admin password in clear text before it gets redirected to absw_vfysucc.cgia. An attacker can use this password to gain administrator access to the targeted router’s web interface. 2018-07-24 not yet calculated CVE-2016-5649
MISC

netgear — wndr4500_router

There are few web pages associated with the genie app on the Netgear WNDR4500 running firmware version V1.0.1.40_1.0.6877. Genie app adds some capabilities over the Web GUI and can be accessed even when you are away from home. A remote attacker can access genie_ping.htm or genie_ping2.htm or genie_ping3.htm page without authentication. Once accessed, the page will be redirected to the aCongratulations2.htma page, which reveals some sensitive information such as 2.4GHz & 5GHz Wireless Network Name (SSID) and Network Key (Password) in clear text. 2018-07-24 not yet calculated CVE-2016-5638
MISC

netpbm — netpbm

An out-of-bounds write vulnerability was found in netpbm before 10.61. A maliciously crafted file could cause the application to crash or possibly allow code execution. 2018-07-27 not yet calculated CVE-2017-2580
BID
CONFIRM

netpbm — netpbm

An out-of-bounds read vulnerability was found in netpbm before 10.61. The expandCodeOntoStack() function has an insufficient code value check, so that a maliciously crafted file could cause the application to crash or possibly allows code execution. 2018-07-27 not yet calculated CVE-2017-2579
BID
CONFIRM

netpbm — netpbm

A null pointer dereference vulnerability was found in netpbm before 10.61. A maliciously crafted SVG file could cause the application to crash. 2018-07-27 not yet calculated CVE-2017-2586
BID
CONFIRM

netpbm — netpbm

A memory allocation vulnerability was found in netpbm before 10.61. A maliciously crafted SVG file could cause the application to crash. 2018-07-27 not yet calculated CVE-2017-2587
BID
CONFIRM

netpbm — netpbm

An out-of-bounds write vulnerability was found in netpbm before 10.61. A maliciously crafted file could cause the application to crash or possibly allow code execution. 2018-07-27 not yet calculated CVE-2017-2581
BID
CONFIRM

network — manager_vpnc

Network Manager VPNC plugin (aka networkmanager-vpnc) before version 1.2.6 is vulnerable to a privilege escalation attack. A new line character can be used to inject a Password helper parameter into the configuration data passed to VPNC, allowing an attacker to execute arbitrary commands as root. 2018-07-26 not yet calculated CVE-2018-10900
CONFIRM
CONFIRM
CONFIRM
CONFIRM
MISC
DEBIAN

niushop — b2b2c_multi-business_basic

A file upload vulnerability in application/shop/controller/member.php in Niushop B2B2C Multi-business basic version V1.11 allows any remote member to upload a .php file to the web server via a profile avatar field, by using an image Content-Type (e.g., image/jpeg) with a modified filename and file content. This results in arbitrary code execution by requesting that .php file. 2018-07-23 not yet calculated CVE-2018-14570
MISC

october — cms

October CMS version prior to build 437 contains a Cross Site Scripting (XSS) vulnerability in the Media module and create folder functionality that can result in an Authenticated user with media module permission creating arbitrary folder name with XSS content. This attack appear to be exploitable via an Authenticated user with media module permission who can create arbitrary folder name (XSS). This vulnerability appears to have been fixed in build 437. 2018-07-23 not yet calculated CVE-2018-1999008
CONFIRM

october — cms

October CMS version prior to Build 437 contains a Local File Inclusion vulnerability in modules/system/traits/ViewMaker.php#244 (makeFileContents function) that can result in Sensitive information disclosure and remote code execution. This attack appear to be exploitable remotely if the /backend path is accessible. This vulnerability appears to have been fixed in Build 437. 2018-07-23 not yet calculated CVE-2018-1999009
CONFIRM

open-audit — community

Cross-site scripting (XSS) vulnerability in the Groups Page in Open-Audit Community 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the group name. 2018-07-25 not yet calculated CVE-2018-14493
MISC

open_networking_foundation — onos

Open Networking Foundation (ONF) ONOS version 1.13.2 and earlier version contains a Directory Traversal vulnerability in core/common/src/main/java/org/onosproject/common/app/ApplicationArchive.java line 35 that can result in arbitrary file deletion (overwrite). This attack appear to be exploitable via a specially crafted zip file should be uploaded. 2018-07-23 not yet calculated CVE-2018-1999020
MISC
CONFIRM

openshift — enterprise

A flaw was found in all Openshift Enterprise versions using the openshift elasticsearch plugin. An attacker with knowledge of the given name used to authenticate and access Elasticsearch can later access it without the token, bypassing authentication. This attack also requires that the Elasticsearch be configured with an external route, and the data accessed is limited to the indices. 2018-07-27 not yet calculated CVE-2017-12195
REDHAT
REDHAT
CONFIRM

ovirt-engine — ovirt-engine

ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues. 2018-07-27 not yet calculated CVE-2017-15113
BID
REDHAT
CONFIRM
CONFIRM

pear — html_quickform

PEAR HTML_QuickForm version 3.2.14 contains an eval injection (CWE-95) vulnerability in HTML_QuickForm’s getSubmitValue method, HTML_QuickForm’s validate method, HTML_QuickForm_hierselect’s _setOptions method, HTML_QuickForm_element’s _findValue method, HTML_QuickForm_element’s _prepareValue method. that can result in Possible information disclosure, possible impact on data integrity and execution of arbitrary code. This attack appear to be exploitable via A specially crafted query string could be utilised, e.g. http://www.example.com/admin/add_practice_type_id[1]=fubar%27])%20OR%20die(%27OOK!%27);%20//&mode=live. This vulnerability appears to have been fixed in 3.2.15. 2018-07-23 not yet calculated CVE-2018-1999022
CONFIRM
CONFIRM

pidgin — pidgin

An out-of-bounds write flaw was found in the way Pidgin before 2.12.0 processed XML content. A malicious remote server could potentially use this flaw to crash Pidgin or execute arbitrary code in the context of the pidgin process. 2018-07-27 not yet calculated CVE-2017-2640
BID
REDHAT
CONFIRM
GENTOO
DEBIAN

pivotal — application_service

Pivotal Apps Manager included in Pivotal Application Service, versions 2.2.x prior to 2.2.1 and 2.1.x prior to 2.1.8 and 2.0.x prior to 2.0.17 and 1.12.x prior to 1.12.26, does not escape all user-provided content when sending invitation emails. A malicious authenticated user can inject content into an invite to another user, exploiting the trust implied by the source of the email. 2018-07-24 not yet calculated CVE-2018-11044
CONFIRM

plexus-archiver — plexus-archiver

plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as ‘Zip-Slip’. 2018-07-25 not yet calculated CVE-2018-1002200
REDHAT
REDHAT
CONFIRM
CONFIRM
MISC
MISC
MISC
DEBIAN

poppler — poppler

Poppler through 0.62 contains a Buffer Overflow vulnerability due to an incorrect memory access that is not mapped in its memory space, as demonstrated by pdfunite. This can result in memory corruption and denial of service. This may be exploitable when a victim opens a specially crafted PDF file. 2018-07-25 not yet calculated CVE-2018-13988
MISC

postgresql — postgresql

Privilege escalation flaws were found in the Red Hat initialization scripts of PostgreSQL. An attacker with access to the postgres user account could use these flaws to obtain root access on the server machine. 2018-07-27 not yet calculated CVE-2017-15097
SECTRACK
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM

powerdns — recursor

An issue has been found in the parsing of authoritative answers in PowerDNS Recursor before 4.0.8, leading to a NULL pointer dereference when parsing a specially crafted answer containing a CNAME of a different class than IN. An unauthenticated remote attacker could cause a denial of service. 2018-07-27 not yet calculated CVE-2017-15120
MLIST
CONFIRM
CONFIRM
DEBIAN

pydio — pydio

Pydio version 8.2.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in ./core/vendor/meenie/javascript-packer/example-inline.php line 48; ./core/vendor/dapphp/securimage/examples/test.mysql.static.php lines: 114,118 that can result in an unauthenticated remote attacker manipulating the web client via XSS code injection. This attack appear to be exploitable via the victim openning a specially crafted URL. This vulnerability appears to have been fixed in version 8.2.1. 2018-07-23 not yet calculated CVE-2018-1999016
CONFIRM
MISC

pydio — pydio

Pydio version 8.2.1 and prior contains an Unvalidated user input leading to Remote Code Execution (RCE) vulnerability in plugins/action.antivirus/AntivirusScanner.php: Line 124, scanNow($nodeObject) that can result in An attacker gaining admin access and can then execute arbitrary commands on the underlying OS. This attack appear to be exploitable via The attacker edits the Antivirus Command in the antivirus plugin, and executes the payload by uploading any file within Pydio. 2018-07-23 not yet calculated CVE-2018-1999018
MISC

pydio — pydio

Pydio version 8.2.0 and earlier contains a Server-Side Request Forgery (SSRF) vulnerability in plugins/action.updater/UpgradeManager.php Line: 154, getUpgradePath($url) that can result in an authenticated admin users requesting arbitrary URL’s, pivoting requests through the server. This attack appears to be exploitable via the attacker gaining access to an administrative account, enters a URL into Upgrade Engine, and reloads the page or presses “Check Now”. This vulnerability appears to have been fixed in 8.2.1. 2018-07-23 not yet calculated CVE-2018-1999017
CONFIRM
MISC

qemu — qemu

An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the ‘vnc_refresh_server_surface’. A user inside a guest could use this flaw to crash the QEMU process. 2018-07-27 not yet calculated CVE-2017-2633
MLIST
BID
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM
CONFIRM
CONFIRM

qemu — qemu

A heap buffer overflow flaw was found in QEMU’s Cirrus CLGD 54xx VGA emulator’s VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process. 2018-07-27 not yet calculated CVE-2016-9603
BID
SECTRACK
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM
MLIST
GENTOO
CONFIRM

qemu — qemu

Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process. 2018-07-27 not yet calculated CVE-2017-2620
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
MLIST
BID
SECTRACK
CONFIRM
MLIST
MLIST
GENTOO
GENTOO
CONFIRM
CONFIRM

qemu — qemu

The Network Block Device (NBD) server in Quick Emulator (QEMU) before 2.11 is vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS. 2018-07-27 not yet calculated CVE-2017-15119
MISC
BID
REDHAT
REDHAT
CONFIRM
MISC
UBUNTU
DEBIAN

qemu — qemu

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server’s response to a ‘NBD_OPT_LIST’ request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process. 2018-07-27 not yet calculated CVE-2017-2630
MLIST
BID
REDHAT
CONFIRM
MLIST
GENTOO

qemu — qemu

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS. 2018-07-27 not yet calculated CVE-2017-15118
MISC
BID
REDHAT
CONFIRM
MISC
UBUNTU
EXPLOIT-DB

qemu — qemu

An assertion-failure flaw was found in Qemu before 2.10.1, in the Network Block Device (NBD) server’s initial connection negotiation, where the I/O coroutine was undefined. This could crash the qemu-nbd server if a client sent unexpected data during connection negotiation. A remote user or process could use this flaw to crash the qemu-nbd server resulting in denial of service. 2018-07-26 not yet calculated CVE-2017-7539
MLIST
BID
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM
CONFIRM
CONFIRM

quazip — quazip

QuaZIP before 0.7.6 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as ‘Zip-Slip’. 2018-07-25 not yet calculated CVE-2018-1002209
MISC
CONFIRM
CONFIRM
MISC

quick_heal — multiple_products

Quick Heal Total Security 64 bit 17.00 (QHTS64.exe), (QHTSFT64.exe) – Version 10.0.1.38; Quick Heal Total Security 32 bit 17.00 (QHTS32.exe), (QHTSFT32.exe) – Version 10.0.1.38; Quick Heal Internet Security 64 bit 17.00 (QHIS64.exe), (QHISFT64.exe) – Version 10.0.0.37; Quick Heal Internet Security 32 bit 17.00 (QHIS32.exe), (QHISFT32.exe) – Version 10.0.0.37; Quick Heal AntiVirus Pro 64 bit 17.00 (QHAV64.exe), (QHAVFT64.exe) – Version 10.0.0.37; and Quick Heal AntiVirus Pro 32 bit 17.00 (QHAV32.exe), (QHAVFT32.exe) – Version 10.0.0.37 allow DLL Hijacking because of Insecure Library Loading. 2018-07-25 not yet calculated CVE-2018-8090
MISC

red_hat — certificate_system

An input validation error was found in Red Hat Certificate System’s handling of client provided certificates before 8.1.20-1. If the certreq field is not present in a certificate an assertion error is triggered causing a denial of service. 2018-07-26 not yet calculated CVE-2017-7509
SECTRACK
REDHAT
CONFIRM

red_hat — cloudforms

A number of unused delete routes are present in CloudForms before 5.7.2.1 which can be accessed via GET requests instead of just POST requests. This could allow an attacker to bypass the protect_from_forgery XSRF protection causing the routes to be used. This attack would require additional cross-site scripting or similar attacks in order to execute. 2018-07-27 not yet calculated CVE-2017-2653
BID
REDHAT
CONFIRM

red_hat — cloudforms

A flaw was found in CloudForms before 5.9.0.22 in the self-service UI snapshot feature where the name field is not properly sanitized for HTML and JavaScript input. An attacker could use this flaw to execute a stored XSS attack on an application administrator using CloudForms. Please note that CSP (Content Security Policy) prevents exploitation of this XSS however not all browsers support CSP. 2018-07-27 not yet calculated CVE-2017-15125
BID
REDHAT
CONFIRM

red_hat — cloudforms

The dialog for creating cloud volumes (cinder provider) in CloudForms does not filter cloud tenants by user. An attacker with the ability to create storage volumes could use this to create storage volumes for any other tenant. 2018-07-27 not yet calculated CVE-2017-7497
REDHAT
REDHAT
CONFIRM

red_hat — cloudforms

It was found that CloudForms does not verify that the server hostname matches the domain name in the certificate when using a custom CA and communicating with Red Hat Virtualization (RHEV) and OpenShift. This would allow an attacker to spoof RHEV or OpenShift systems and potentially harvest sensitive information from CloudForms. 2018-07-27 not yet calculated CVE-2017-2639
BID
SECTRACK
REDHAT
CONFIRM

red_hat — cloudforms

A logic error in valid_role() in CloudForms role validation before 5.7.1.3 could allow a tenant administrator to create groups with a higher privilege level than the tenant administrator should have. This would allow an attacker with tenant administration access to elevate privileges. 2018-07-27 not yet calculated CVE-2017-2632
REDHAT
BID
CONFIRM

red_hat — cloudforms_management_engine

CloudForms Management Engine (cfme) is vulnerable to an improper security setting in the dRuby component of CloudForms. An attacker with access to an unprivileged local shell could use this flaw to execute commands as a high privileged user. 2018-07-24 not yet calculated CVE-2018-10905
CONFIRM

red_hat — cloudforms_management_engine

CloudForms Management Engine (cfme) before 5.7.3 and 5.8.x before 5.8.1 lacks RBAC controls on certain methods in the rails application portion of CloudForms. An attacker with access could use a variety of methods within the rails application portion of CloudForms to escalate privileges. 2018-07-26 not yet calculated CVE-2017-2664
BID
REDHAT
REDHAT
CONFIRM

red_hat — cloudforms_management_engine

In CloudForms Management Engine (cfme) before 5.7.3 and 5.8.x before 5.8.1, it was found that privilege check is missing when invoking arbitrary methods via filtering on VMs that MiqExpression will execute that is triggerable by API users. An attacker could use this to execute actions they should not be allowed to (e.g. destroying VMs). 2018-07-26 not yet calculated CVE-2017-7530
BID
REDHAT
CONFIRM

red_hat — enterprise_linux

A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the “Allow” and “Deny” configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource. 2018-07-26 not yet calculated CVE-2017-12171
BID
SECTRACK
REDHAT
CONFIRM

red_hat — enterprise_linux

It was found that sssd’s sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it. 2018-07-27 not yet calculated CVE-2017-12173
REDHAT
REDHAT
CONFIRM

red_hat — enterprise_linux

It was discovered that rpm-ostree and rpm-ostree-client before 2017.3 fail to properly check GPG signatures on packages when doing layering. Packages with unsigned or badly signed content could fail to be rejected as expected. This issue is partially mitigated on RHEL Atomic Host, where certificate pinning is used by default. 2018-07-27 not yet calculated CVE-2017-2623
BID
REDHAT
CONFIRM

red_hat — enterprise_linux_server

It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package before 10.6.4. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates. 2018-07-26 not yet calculated CVE-2017-7537
REDHAT
CONFIRM
CONFIRM

red_hat — jboss_bpm_suite_and_jboss_data_virtualization_and_services

It was discovered that the Dashbuilder login page as used in Red Hat JBoss BPM Suite before 6.4.2 and Red Hat JBoss Data Virtualization & Services before 6.4.3 could be opened in an IFRAME, which made it possible to intercept and manipulate requests. An attacker could use this flaw to trick a user into performing arbitrary actions in the Console (clickjacking). 2018-07-27 not yet calculated CVE-2017-2658
REDHAT
BID
REDHAT
CONFIRM

red_hat — jboss_brms_and_bpm_suite

JBoss BRMS 6 and BPM Suite 6 before 6.4.3 are vulnerable to a stored XSS via several lists in Business Central. The flaw is due to lack of sanitation of user input when creating new lists. Remote, authenticated attackers that have privileges to create lists can store scripts in them, which are not properly sanitized before showing to other users, including admins. 2018-07-27 not yet calculated CVE-2017-2674
BID
REDHAT
REDHAT
CONFIRM

red_hat — jboss_brms_and_bpm_suite

JBoss BRMS 6 and BPM Suite 6 before 6.4.3 are vulnerable to a reflected XSS via artifact upload. A malformed XML file, if uploaded, causes an error message to appear that includes part of the bad XML code verbatim without filtering out scripts. Successful exploitation would allow execution of script code within the context of the affected user. 2018-07-27 not yet calculated CVE-2017-7463
BID
REDHAT
REDHAT
CONFIRM

red_hat — jboss_eap

It was found that the JAXP implementation used in JBoss EAP 7.0 for SAX and DOM parsing is vulnerable to certain XXE flaws. An attacker could use this flaw to cause DoS, SSRF, or information disclosure if they are able to provide XML content for parsing. 2018-07-27 not yet calculated CVE-2017-7464
BID
CONFIRM

red_hat — jboss_enterprise_application

It was found that the log file viewer in Red Hat JBoss Enterprise Application 6 and 7 allows arbitrary file read to authenticated user via path traversal. 2018-07-27 not yet calculated CVE-2017-2595
REDHAT
REDHAT
BID
SECTRACK
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM

red_hat — jboss_fuse

It was discovered that the hawtio servlet 1.4 uses a single HttpClient instance to proxy requests with a persistent cookie store (cookies are stored locally and are not passed between the client and the end URL) which means all clients using that proxy are sharing the same cookies. 2018-07-26 not yet calculated CVE-2017-2589
REDHAT
CONFIRM

red_hat — openstack_platform

A design flaw issue was found in the Red Hat OpenStack Platform director use of TripleO to enable libvirtd based live-migration. Libvirtd is deployed by default (by director) listening on 0.0.0.0 (all interfaces) with no-authentication or encryption. Anyone able to make a TCP connection to any compute host IP address, including 127.0.0.1, other loopback interface addresses, or in some cases possibly addresses that have been exposed beyond the management interface, could use this to open a virsh session to the libvirtd instance and gain control of virtual machine instances or possibly take over the host. 2018-07-26 not yet calculated CVE-2017-2637
BID
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM
CONFIRM
CONFIRM

red_hat — satellite

Red Hat Satellite before 6.5 is vulnerable to a XSS in discovery rule when you are entering filter and you use autocomplete functionality. 2018-07-26 not yet calculated CVE-2017-12175
BID
CONFIRM
CONFIRM

red_hat — satellite

A cross-site scripting (XSS) flaw was found in how an organization name is displayed in Satellite 5, before 5.8. A user able to change an organization’s name could exploit this flaw to perform XSS attacks against other Satellite users. 2018-07-26 not yet calculated CVE-2017-7538
SECTRACK
REDHAT
CONFIRM

red_hat — spacewalk-channel

It was found that spacewalk-channel can be used by a non-admin user or disabled users to perform administrative tasks due to an incorrect authorization check in backend/server/rhnChannel.py. 2018-07-27 not yet calculated CVE-2017-7470
BID
REDHAT
CONFIRM

red_hat — undertow

It was discovered that Undertow before 1.4.17, 1.3.31 and 2.0.0 processes http request headers with unusual whitespaces which can cause possible http request smuggling. 2018-07-27 not yet calculated CVE-2017-12165
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM

red_hat — undertow

It was found in Undertow before 1.3.28 that with non-clean TCP close, the Websocket server gets into infinite loop on every IO thread, effectively causing DoS. 2018-07-27 not yet calculated CVE-2017-2670
REDHAT
BID
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM
DEBIAN

red_hat — undertow

It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own. 2018-07-27 not yet calculated CVE-2017-2666
REDHAT
BID
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM
DEBIAN

red_hat — virtualization

When updating a password in the rhvm database the ovirt-aaa-jdbc-tool tools before 1.1.3 fail to correctly check for the current password if it is expired. This would allow access to an attacker with access to change the password on accounts with expired passwords, gaining access to those accounts. 2018-07-27 not yet calculated CVE-2017-2614
REDHAT
CONFIRM

redhat — openstack-neutron

A race-condition flaw was discovered in openstack-neutron before 7.2.0-12.1, 8.x before 8.3.0-11.1, 9.x before 9.3.1-2.1, and 10.x before 10.0.2-1.1, where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net.bridge.bridge-nf-call-iptables. The race was only triggered by an update, at which point an attacker could access exposed tenant VMs and network resources. 2018-07-26 not yet calculated CVE-2017-7543
BID
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM

redhat — openstack_orchestration

An access-control flaw was found in the OpenStack Orchestration (heat) service before 8.0.0, 6.1.0 and 7.0.2 where a service log directory was improperly made world readable. A malicious system user could exploit this flaw to access sensitive information. 2018-07-27 not yet calculated CVE-2017-2621
BID
REDHAT
REDHAT
CONFIRM

redhat — openstack_workflow

An accessibility flaw was found in the OpenStack Workflow (mistral) service where a service log directory was improperly made world readable. A malicious system user could exploit this flaw to access sensitive information. 2018-07-27 not yet calculated CVE-2017-2622
REDHAT
CONFIRM

rsa — archer

RSA Archer, versions prior to 6.4.0.1, contain a stored cross-site scripting vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When application users access the corrupted data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. 2018-07-24 not yet calculated CVE-2018-11059
FULLDISC
BID
SECTRACK

rsa — archer

RSA Archer, versions prior to 6.4.0.1, contain an authorization bypass vulnerability in the REST API. A remote authenticated malicious Archer user could potentially exploit this vulnerability to elevate their privileges. 2018-07-24 not yet calculated CVE-2018-11060
FULLDISC
BID
SECTRACK

sage — xrt_treasury

Sage XRT Treasury, version 3, fails to properly restrict database access to authorized users, which may enable any authenticated user to gain full access to privileged database functions. Sage XRT Treasury is a business finance management application. Database user access privileges are determined by the USER_CODE field associated with the querying user. By modifying the USER_CODE value to match that of a privileged user, a low-privileged, authenticated user may gain privileged access to the SQL database. A remote, authenticated user can submit specially crafted SQL queries to gain privileged access to the application database. 2018-07-24 not yet calculated CVE-2017-3183
CERT-VN
BID

samba — samba

A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack. 2018-07-27 not yet calculated CVE-2017-12151
BID
SECTRACK
REDHAT
REDHAT
CONFIRM
CONFIRM
CONFIRM
CONFIRM
DEBIAN
CONFIRM

samba — samba

An information leak flaw was found in the way SMB1 protocol was implemented by Samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker. 2018-07-26 not yet calculated CVE-2017-12163
BID
SECTRACK
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
DEBIAN
CONFIRM
CONFIRM

samba — samba

It was found that samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8 did not enforce “SMB signing” when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in plain-text. 2018-07-26 not yet calculated CVE-2017-12150
BID
SECTRACK
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
DEBIAN
CONFIRM

seacms — seacms

SeaCMS 6.61 has two XSS issues in the admin_config.php file via certain form fields. 2018-07-23 not yet calculated CVE-2018-14517
MISC

sel — acselerator_architect

SEL AcSELerator Architect version 2.2.24.0 and prior can be exploited when the AcSELerator Architect FTP client connects to a malicious FTP server, which may cause denial of service via 100% CPU utilization. Restart of the application is required. 2018-07-24 not yet calculated CVE-2018-10608
MISC

sel — acselerator_architect

SEL AcSELerator Architect version 2.2.24.0 and prior allows unsanitized input to be passed to the XML parser, which may allow disclosure and retrieval of arbitrary data, arbitrary code execution (in certain situations on specific platforms), and denial of service attacks. 2018-07-24 not yet calculated CVE-2018-10600
MISC

sel — compass

SEL Compass version 3.0.5.1 and prior allows all users full access to the SEL Compass directory, which may allow modification or overwriting of files within the Compass installation folder, resulting in escalation of privilege and/or malicious code execution. 2018-07-24 not yet calculated CVE-2018-10604
MISC

sharpcompress — sharpcompress

SharpCompress before 0.21.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as ‘Zip-Slip’. 2018-07-25 not yet calculated CVE-2018-1002206
CONFIRM
CONFIRM
MISC
MISC
MISC

sharplibzip — sharplibzip

sharplibzip before 1.0 RC1 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as ‘Zip-Slip’. 2018-07-25 not yet calculated CVE-2018-1002208
CONFIRM
CONFIRM
MISC
MISC
MISC

siemens — ethernet_modules

A vulnerability has been identified in Firmware variant IEC 61850 for EN100 Ethernet module (All versions < V4.33), Firmware variant PROFINET IO for EN100 Ethernet module (All versions), Firmware variant Modbus TCP for EN100 Ethernet module (All versions), Firmware variant DNP3 TCP for EN100 Ethernet module (All versions), Firmware variant IEC104 for EN100 Ethernet module (All versions). Specially crafted packets to port 102/tcp could cause a denial-of-service condition in the EN100 communication module if oscillographs are running. A manual restart is required to recover the EN100 module functionality. Successful exploitation requires an attacker with network access to send multiple packets to the EN100 module. As a precondition the IEC 61850-MMS communication needs to be activated on the affected EN100 modules. No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the network functionality of the device, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. 2018-07-23 not yet calculated CVE-2018-11452
CONFIRM

siemens — ethernet_modules

A vulnerability has been identified in Firmware variant IEC 61850 for EN100 Ethernet module (All versions < V4.33), Firmware variant PROFINET IO for EN100 Ethernet module (All versions), Firmware variant Modbus TCP for EN100 Ethernet module (All versions), Firmware variant DNP3 TCP for EN100 Ethernet module (All versions), Firmware variant IEC104 for EN100 Ethernet module (All versions), SIPROTEC 5 relays with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.80), SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules (All versions). Specially crafted packets to port 102/tcp could cause a denial-of-service condition in the affected products. A manual restart is required to recover the EN100 module functionality of SIPROTEC 4 and SIPROTEC Compact relays. Successful exploitation requires an attacker with network access to send multiple packets to the affected products or modules. As a precondition the IEC 61850-MMS communication needs to be activated on the affected products or modules. No user interaction or privileges are required to exploit the vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the network functionality of the device, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. 2018-07-23 not yet calculated CVE-2018-11451
CONFIRM

sourcetree — sourcetree

There was an argument injection vulnerability in Sourcetree for macOS via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for macOS from 1.0b2 before 2.7.6 are affected by this vulnerability. 2018-07-24 not yet calculated CVE-2018-13385
CONFIRM

sourcetree — sourcetree

There was an argument injection vulnerability in Sourcetree for Windows via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for Windows before version 2.6.9 are affected by this vulnerability. 2018-07-24 not yet calculated CVE-2018-13386
CONFIRM

spice — spice

A vulnerability was discovered in SPICE before 0.13.90 in the server’s protocol handling. An authenticated attacker could send crafted messages to the SPICE server causing a heap overflow leading to a crash or possible code execution. 2018-07-27 not yet calculated CVE-2016-9577
REDHAT
REDHAT
BID
REDHAT
REDHAT
CONFIRM
DEBIAN

spice — spice

A vulnerability was discovered in SPICE before 0.13.90 in the server’s protocol handling. An attacker able to connect to the SPICE server could send crafted messages which would cause the process to crash. 2018-07-27 not yet calculated CVE-2016-9578
REDHAT
REDHAT
BID
REDHAT
REDHAT
CONFIRM
DEBIAN

suricata — suricata

An issue was discovered in Suricata before 3.1.2. If an ICMPv4 error packet is received as the first packet on a flow in the to_client direction, it confuses the rule grouping lookup logic. The toclient inspection will then continue with the wrong rule group. This can lead to missed detection. 2018-07-23 not yet calculated CVE-2016-10728
MISC
MISC
MISC

suricata — suricata

Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received). 2018-07-23 not yet calculated CVE-2018-14568
MISC
MISC
MISC
MISC

symantec — management_agent

The Inventory Plugin for Symantec Management Agent prior to 7.6 POST HF7, 8.0 POST HF6, or 8.1 RU7 may be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels. 2018-07-25 not yet calculated CVE-2018-5240
BID
CONFIRM

tenda — ac7

Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI. 2018-07-21 not yet calculated CVE-2018-14492
MISC

thomson_reuters — ultratax_cs

Thomson Reuters UltraTax CS 2017 on Windows, in a client/server configuration, transfers customer records and bank account numbers in cleartext over SMBv2, which allows attackers to (1) obtain sensitive information by sniffing the network or (2) conduct man-in-the-middle (MITM) attacks via unspecified vectors. The customer record transferred in cleartext contains: Client ID, Full Name, Spouse’s Full Name, Social Security Number, Spouse’s Social Security Number, Occupation, Spouse’s Occupation, Daytime Phone, Home Phone, Tax Preparer, Federal and State Taxes to File, Bank Name, Bank Account Number, and possibly other sensitive information. 2018-07-26 not yet calculated CVE-2018-14607
MISC

thomson_reuters — ultratax_cs

Thomson Reuters UltraTax CS 2017 on Windows has a password protection option; however, the level of protection might be inconsistent with some customers’ expectations because the data is directly accessible in cleartext. Specifically, it stores customer data in unique directories (%install_path%\WinCSI\UT17DATA\client_ID\file_name.XX17) that can be bypassed without authentication by examining the strings of the .XX17 file. The strings stored in the .XX17 file contain each customer’s: Full Name, Spouse’s Name, Social Security Number, Date of Birth, Occupation, Home Address, Daytime Phone Number, Home Phone Number, Spouse’s Address, Spouse’s Daytime Phone Number, Spouse’s Social Security Number, Spouse’s Home Phone Number, Spouse’s Occupation, Spouse’s Date of Birth, and Spouse’s Filing Status. 2018-07-26 not yet calculated CVE-2018-14608
MISC

threatmetrix — threatmetrix_sdk

On the iOS platform, the ThreatMetrix SDK versions prior to 3.2 fail to validate SSL certificates provided by HTTPS connections, which may allow an attacker to perform a man-in-the-middle (MITM) attack. ThreatMetrix is a security library for mobile applications, which aims to provide fraud prevention and device identity capabilities. The ThreatMetrix SDK versions prior to 3.2 do not validate SSL certificates on the iOS platform. An affected application will communicate with https://ift.tt/2LPeRKA, regardless of whether the connection is secure or not. An attacker on the same network as or upstream from the iOS device may be able to view or modify ThreatMetrix network traffic that should have been protected by HTTPS. 2018-07-24 not yet calculated CVE-2017-3182
CERT-VN
BID

thulac — thulac

An issue was discovered in libthulac.so in THULAC through 2018-02-25. A heap-based buffer over-read can occur in NGramFeature::find_bases in include/cb_ngram_feature.h. 2018-07-23 not yet calculated CVE-2018-14565
MISC

thulac — thulac

An issue was discovered in libthulac.so in THULAC through 2018-02-25. A SEGV can occur in NGramFeature::find_bases in include/cb_ngram_feature.h. 2018-07-23 not yet calculated CVE-2018-14564
MISC

thulac — thulac

An issue was discovered in libthulac.so in THULAC through 2018-02-25. “operator delete” is used with “operator new[]” in the TaggingLearner class in include/cb_tagging_learner.h, possibly leading to memory corruption. 2018-07-23 not yet calculated CVE-2018-14563
MISC

thulac — thulac

An issue was discovered in libthulac.so in THULAC through 2018-02-25. A NULL pointer dereference can occur in the BasicModel class in include/cb_model.h. 2018-07-23 not yet calculated CVE-2018-14562
MISC

tibco — multiple_products

Multiple TIBCO Products are prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The products and versions that are affected include the following: TIBCO Silver Fabric Enabler for Spotfire Web Player 2.1.2 and earlier TIBCO Spotfire Analyst 7.5.0 TIBCO Spotfire Analyst 7.6.0 TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Analytics Platform for AWS Marketplace 7.0.2 and earlier TIBCO Spotfire Automation Services 6.5.3 and earlier TIBCO Spotfire Automation Services 7.0.0, and 7.0.1 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 6.5.3 and earlier TIBCO Spotfire Deployment Kit 7.0.0, and 7.0.1 TIBCO Spotfire Deployment Kit 7.5.0 TIBCO Spotfire Deployment Kit 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 6.5.2 and earlier TIBCO Spotfire Desktop 7.0.0, and 7.0.1 TIBCO Spotfire Desktop 7.5.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.0.1 and earlier TIBCO Spotfire Desktop Language Packs 7.5.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 TIBCO Spotfire Professional 6.5.3 and earlier TIBCO Spotfire Professional 7.0.0 and 7.0.1 TIBCO Spotfire Web Player 6.5.3 and earlier TIBCO Spotfire Web Player 7.0.0 and 7.0.1 2018-07-24 not yet calculated CVE-2017-3180
BID
CONFIRM

tibco — multiple_products

Multiple TIBCO Products are prone to multiple unspecified SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following products and versions are affected: TIBCO Spotfire Analyst 7.7.0 TIBCO Spotfire Connectors 7.6.0 TIBCO Spotfire Deployment Kit 7.7.0 TIBCO Spotfire Desktop 7.6.0 TIBCO Spotfire Desktop 7.7.0 TIBCO Spotfire Desktop Developer Edition 7.7.0 TIBCO Spotfire Desktop Language Packs 7.6.0 TIBCO Spotfire Desktop Language Packs 7.7.0 The following components are affected: TIBCO Spotfire Client TIBCO Spotfire Web Player Client 2018-07-24 not yet calculated CVE-2017-3181
BID
CONFIRM

tightrope_media — carousel_digital_signage

A Local File Inclusion (LFI) vulnerability exists in the Web Interface API of TightRope Media Carousel Digital Signage before 7.3.5. The RenderingFetch API allows for the downloading of arbitrary files through the use of directory traversal sequences, aka CSL-1683. 2018-07-23 not yet calculated CVE-2018-14573
CONFIRM

vmware — esxi_and_workstation_and_fusion

VMware ESXi (6.7 before ESXi670-201806401-BG, 6.5 before ESXi650-201806401-BG, 6.0 before ESXi600-201806401-BG and 5.5 before ESXi550-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain a denial-of-service vulnerability due to NULL pointer dereference issue in RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs. 2018-07-25 not yet calculated CVE-2018-6972
BID
SECTRACK
SECTRACK
CONFIRM

vmware — horizon_view_agents

VMware Horizon View Agents (7.x.x before 7.5.1) contain a local information disclosure vulnerability due to insecure logging of credentials in the vmmsi.log file when an account other than the currently logged on user is specified during installation (including silent installations). Successful exploitation of this issue may allow low privileged users access to the credentials specified during the Horizon View Agent installation. 2018-07-25 not yet calculated CVE-2018-6971
BID
SECTRACK
SECTRACK
CONFIRM

wancms — wancms

wancms 1.0 through 5.0 allows remote attackers to cause a denial of service (resource consumption) via a checkcode (aka verification code) URI in which the values of font_size, width, and height are large numbers. 2018-07-25 not yet calculated CVE-2018-14596
MISC

wesnoth — battle_for _wesnoth

The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content. 2018-07-23 not yet calculated CVE-2018-1999023
CONFIRM

wildfly — core

WildFly Core before version 6.0.0.Alpha3 does not properly validate file paths in .war archives, allowing for the extraction of crafted .war archives to overwrite arbitrary files. This is an instance of the ‘Zip Slip’ vulnerability. 2018-07-27 not yet calculated CVE-2018-10862
REDHAT
REDHAT
REDHAT
CONFIRM
MISC

wizkunde — samlbase

Wizkunde SAMLBase may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers. 2018-07-24 not yet calculated CVE-2018-5387
MISC
CERT-VN

wordpress — wordpress

The Mondula Multi Step Form plugin through 1.2.5 for WordPress allows XSS via the fw_data [id][1], fw_data [id][2], fw_data [id][3], fw_data [id][4], or email field of the contact form, exploitable with an fw_send_email action to wp-admin/admin-ajax.php. 2018-07-25 not yet calculated CVE-2018-14430
MISC

wuzhi — cms

A SQL injection was discovered in WUZHI CMS 4.1.0 that allows remote attackers to inject a malicious SQL statement via the index.php?m=promote&f=index&v=search keywords parameter. 2018-07-23 not yet calculated CVE-2018-14515
MISC

wuzhi — cms

An XSS vulnerability was discovered in WUZHI CMS 4.1.0. There is persistent XSS that allows remote attackers to inject arbitrary web script or HTML via the form[content] parameter to the index.php?m=feedback&f=index&v=contact URI. 2018-07-23 not yet calculated CVE-2018-14513
MISC

wuzhi — cms 

An XSS vulnerability was discovered in WUZHI CMS 4.1.0. There is persistent XSS that allows remote attackers to inject arbitrary web script or HTML via the form[nickname] parameter to the index.php?m=core&f=set&v=sendmail URI. When the administrator accesses the “system settings – mail server” screen, the XSS payload is triggered. 2018-07-23 not yet calculated CVE-2018-14512
MISC

x.org — x.org

It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack. 2018-07-27 not yet calculated CVE-2017-2624
BID
SECTRACK
CONFIRM
MLIST
GENTOO
GENTOO
MISC

xiao5ucompany — xiao5ucompany

Feedback.asp in Xiao5uCompany 1.7 has XSS because the XSS protection mechanism in Safe.asp is insufficient (for example, it considers SCRIPT and IMG elements, but does not consider VIDEO elements). 2018-07-23 not yet calculated CVE-2018-14527
MISC

xycms — xycms

system/edit_book.php in XYCMS 1.7 has stored XSS via a crafted add_do.php request, related to add_book.php. 2018-07-28 not yet calculated CVE-2018-14686
MISC

xyhcms — xyhcms

xyhai.php?s=/Auth/addUser in XYHCMS 3.5 allows CSRF to add a background administrator account. 2018-07-24 not yet calculated CVE-2018-14583
MISC

zeroturnaround — zt_zip

zt-zip before 1.13 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as ‘Zip-Slip’. 2018-07-25 not yet calculated CVE-2018-1002201
MISC
CONFIRM
CONFIRM
MISC
MISC

zip4j — zip4j

zip4j before 1.3.3 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as ‘Zip-Slip’. 2018-07-25 not yet calculated CVE-2018-1002202
MISC
MISC
MISC

zjonsson — node-unzipper

unzipper npm library before 0.8.13 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as ‘Zip-Slip’. 2018-07-25 not yet calculated CVE-2018-1002203
MISC
CONFIRM
CONFIRM
MISC
MISC

zte — zxcdn-sns

SQL injection vulnerability in all versions prior to V4.01.01 of the ZTE ZXCDN-SNS product allows remote attackers to execute arbitrary SQL commands via the aoData parameter, resulting in the disclosure of database information. 2018-07-25 not yet calculated CVE-2017-10936
CONFIRM

zte — zxiptv-epg

All versions prior to V5.09.02.02T4 of the ZTE ZXIPTV-EPG product use the Java RMI service in which the servers use the Apache Commons Collections (ACC) library that may result in Java deserialization vulnerabilities. An unauthenticated remote attacker can exploit the vulnerabilities by sending a crafted RMI request to execute arbitrary code on the target host. 2018-07-25 not yet calculated CVE-2017-10934
CONFIRM

zte — zxiptv-ucm

SQL injection vulnerability in all versions prior to V2.01.05.09 of the ZTE ZXIPTV-UCM product allows remote attackers to execute arbitrary SQL commands via the opertype parameter, resulting in the disclosure of database information. 2018-07-25 not yet calculated CVE-2017-10937
CONFIRM

zte — zxr10_1800-2s

All versions prior to ZSRV2 V3.00.40 of the ZTE ZXR10 1800-2S products allow remote authenticated users to bypass the original password authentication protection to change other user’s password. 2018-07-25 not yet calculated CVE-2017-10935
CONFIRM

Back to top


This product is provided subject to this Notification and this Privacy & Use policy.

2,148 Replies to “SB18-211: Vulnerability Summary for the Week of July 23, 2018”

  1. If youРІre not often familiar for Generic cialis 5mg online underestimates, or worsen their side effects, there are most, canadian online pharmaceutics time after time episodes anecdotal. generic viagra 100mg Ptpovo ngrlyc

  2. I wanted to follow along and allow you to know how great I loved discovering your site today. I might consider it a honor to do things at my office and be able to utilize the tips shared on your website and also take part in visitors’ feedback like this. Should a position associated with guest publisher become offered at your end, you should let me know. cbd for pets pure cbd for sale

  3. Taxi moto line
    128 Rue la Boétie
    75008 Paris
    +33 6 51 612 712  

    Taxi moto paris

    I do trust all of the ideas you’ve offered for your post.
    They’re really convincing and will definitely work. Still, the posts are very brief for starters.
    Could you please extend them a little from subsequent
    time? Thank you for the post.

  4. M.E.C Mon Electricien Catalan
    44 Rue Henry de Turenne
    66100 Perpignan
    0651212596

    Electricien Perpignan

    Excellent post! We will be linking to this particularly great content on our site.
    Keep up the good writing.

  5. Independance Immobilière – Agence Dakar Sénégal
    Av. Fadiga, Immeuble Lahad Mbacké
    BP 2975 Dakar
    +221 33 823 39 30

    Agence Immobilière Dakar

    Write more, thats all I have to say. Literally, it seems as though you relied
    on the video to make your point. You obviously know what youre
    talking about, why waste your intelligence on just posting videos to your blog when you could be giving us something informative to read?

  6. Howdy! Do you know if they make any plugins to protect against hackers?
    I’m kinda paranoid about losing everything I’ve worked hard on. Any recommendations?

  7. You could definitely see your expertise within the article you write. The arena hopes for more passionate writers such as you who aren’t afraid to mention how they believe. At all times follow your heart.|

  8. I happen to be writing to make you understand what a terrific experience our princess went through visiting yuor web blog. She realized such a lot of things, with the inclusion of what it is like to possess an incredible teaching style to make the others without hassle thoroughly grasp various tricky topics. You undoubtedly surpassed visitors’ expected results. Thanks for showing those warm and friendly, trustworthy, revealing not to mention unique tips on your topic to Sandra.

  9. I happen to be writing to make you understand what a wonderful experience our princess went through visiting yuor web blog. She realized too many things, with the inclusion of what it is like to possess an incredible teaching style to make the rest without problems understand various very confusing topics. You undoubtedly surpassed visitors’ expected results. Thanks for supplying those warm and helpful, trustworthy, revealing not to mention unique tips on your topic to Tanya.

  10. I needed to post you that little bit of observation to say thank you as before for these gorgeous knowledge you’ve documented here. It has been certainly particularly generous of people like you to convey freely exactly what a lot of people could possibly have made available as an e book to earn some cash for their own end, even more so considering the fact that you could possibly have done it if you ever decided. The ideas also acted like a fantastic way to comprehend other individuals have similar dreams like my own to grasp good deal more in terms of this issue. I’m sure there are many more fun occasions ahead for individuals that go through your blog post.

  11. I am also commenting to let you know of the helpful encounter my friend’s daughter found reading through your web page. She figured out numerous issues, not to mention what it’s like to have an amazing giving mood to have men and women really easily have an understanding of selected impossible subject areas. You really exceeded our own expectations. Many thanks for imparting the interesting, safe, explanatory and even easy thoughts on the topic to Janet.

  12. Thank you for every one of your labor on this web site. My daughter really loves managing investigations and it’s really obvious why. Most people learn all regarding the lively mode you present rewarding techniques through this web site and even inspire participation from some others on the point then our favorite princess is really starting to learn a whole lot. Take advantage of the rest of the year. You are always doing a splendid job.

  13. A lot of thanks for each of your hard work on this web page. Kim really likes going through investigation and it’s really easy to understand why. Many of us know all of the dynamic method you make powerful steps on this web blog and as well as improve participation from people on that issue so our girl is in fact learning a lot of things. Have fun with the remaining portion of the new year. You are conducting a pretty cool job.

  14. My spouse and i got quite joyful that Jordan managed to do his reports through the entire precious recommendations he had through the web pages. It is now and again perplexing to just continually be handing out secrets which people may have been selling. So we keep in mind we have got the writer to give thanks to for that. The most important illustrations you have made, the simple web site navigation, the relationships you will help foster – it’s got many incredible, and it’s really helping our son in addition to the family know that the situation is exciting, which is rather mandatory. Thank you for everything!

  15. Thanks for your concepts. One thing we’ve noticed is banks along with financial institutions are aware of the spending practices of consumers while also understand that most of the people max out and about their real credit cards around the getaways. They properly take advantage of this specific fact and commence flooding your current inbox along with snail-mail box using hundreds of no-interest APR card offers just after the holiday season concludes. Knowing that should you be like 98% of American community, you’ll rush at the possible opportunity to consolidate card debt and shift balances for 0 apr interest rates credit cards. jjjihkm https://thyroidmedi.com – what to take for thyroid pain

  16. Thanks for your suggestions. One thing I’ve noticed is the fact that banks as well as financial institutions really know the spending routines of consumers as well as understand that many people max away their credit cards around the vacations. They sensibly take advantage of this particular fact and start flooding your own inbox as well as snail-mail box along with hundreds of 0 APR credit card offers right after the holiday season comes to an end. Knowing that in case you are like 98% of all American open public, you’ll hop at the possiblity to consolidate personal credit card debt and move balances for 0 interest rates credit cards. gggffhk https://stomachmedi.com – drugs used for stomach problems

  17. Thanks for your suggestions. One thing I’ve noticed is the fact that banks as well as financial institutions really know the spending routines of consumers as well as understand that many people max away their own credit cards around the vacations. They sensibly take advantage of this particular fact and begin flooding your own inbox as well as snail-mail box along with hundreds of Zero APR credit card offers right after the holiday season finishes. Knowing that if you’re like 98% of all American open public, you’ll leap at the opportunity to consolidate credit debt and move balances to 0 annual percentage rates credit cards. feeeegj https://pancreasmedi.com – stomach drugs for sale

  18. Today, with all the fast life style that everyone is having, credit cards have a big demand throughout the economy. Persons coming from every area of life are using credit card and people who aren’t using the credit cards have made up their minds to apply for even one. Thanks for expressing your ideas about credit cards. https://impotencemedi.com buy impotence threatment