The NCCIC Weekly Vulnerability Summary Bulletin is created using information from the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD). In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.
High Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
There were no high vulnerabilities recorded this week. |
Medium Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
intel — core_i3 | Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis. | 2018-08-14 | 5.4 | CVE-2018-3615 CONFIRM CONFIRM BID SECTRACK MISC CONFIRM CONFIRM CONFIRM CONFIRM CONFIRM CISCO CONFIRM CERT-VN CONFIRM |
intel — core_i3 | Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis. | 2018-08-14 | 4.7 | CVE-2018-3620 CONFIRM CONFIRM BID SECTRACK CONFIRM CONFIRM REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT MISC FEDORA FEDORA CONFIRM FREEBSD CONFIRM CONFIRM CONFIRM CONFIRM CISCO UBUNTU UBUNTU UBUNTU UBUNTU UBUNTU DEBIAN CONFIRM CERT-VN CONFIRM |
intel — core_i3 | Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis. | 2018-08-14 | 4.7 | CVE-2018-3646 CONFIRM CONFIRM BID SECTRACK CONFIRM CONFIRM REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT REDHAT MISC FEDORA FEDORA CONFIRM FREEBSD CONFIRM CONFIRM CONFIRM CONFIRM CISCO UBUNTU UBUNTU UBUNTU UBUNTU UBUNTU DEBIAN CONFIRM CERT-VN CONFIRM |
Low Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
There were no low vulnerabilities recorded this week. |
Severity Not Yet Assigned
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
3par — service_processor | A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be exploited remotely to allow cross-site request forgery. | 2018-08-14 | not yet calculated | CVE-2018-7097 CONFIRM |
3par — service_processor | A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be locally exploited to allow disclosure of privileged information. | 2018-08-14 | not yet calculated | CVE-2018-7099 CONFIRM |
3par — service_processor | A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be exploited remotely to allow access restriction bypass. | 2018-08-14 | not yet calculated | CVE-2018-7095 CONFIRM |
3par — service_processor | A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be locally exploited to allow directory traversal. | 2018-08-14 | not yet calculated | CVE-2018-7098 CONFIRM |
3par — service_processor | A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-5.0.0.0-22913(GA). The vulnerability may be exploited locally to allow disclosure of privileged information. | 2018-08-14 | not yet calculated | CVE-2018-7094 CONFIRM |
3par — service_processor | A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be exploited remotely to allow code execution. | 2018-08-14 | not yet calculated | CVE-2018-7096 CONFIRM |
apache — commons_compress | When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17’s ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress’ zip package. | 2018-08-16 | not yet calculated | CVE-2018-11771 SECTRACK MLIST |
apache — http_server |
Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the “Location” or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31). | 2018-08-14 | not yet calculated | CVE-2016-4975 BID CONFIRM CONFIRM |
apache — spark | From version 1.3.0 onward, Apache Spark’s standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property ‘spark.authenticate.secret’ establishes a shared secret for authenticating requests to submit jobs via spark-submit. However, the REST API does not use this or any other authentication mechanism, and this is not adequately documented. In this case, a user would be able to run a driver program without authenticating, but not launch executors, using the REST API. This REST API is also used by Mesos, when set up to run in cluster mode (i.e., when also running MesosClusterDispatcher), for job submission. Future versions of Spark will improve documentation on these points, and prohibit setting ‘spark.authenticate.secret’ when running the REST APIs, to make this clear. Future versions will also disable the REST API by default in the standalone master by changing the default value of ‘spark.master.rest.enabled’ to ‘false’. | 2018-08-13 | not yet calculated | CVE-2018-11770 BID MLIST CONFIRM |
bytedance — musical.ly_app_for_ios | Musical.ly Inc., musical.ly – your video social network, 6.1.6, 2017-10-03, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key. | 2018-08-15 | not yet calculated | CVE-2017-13101 CERT-VN |
uber_technologies — ubereats_app_for_ios | Uber Technologies, Inc. UberEATS: Uber for Food Delivery, 1.108.10001, 2017-11-02, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key. | 2018-08-15 | not yet calculated | CVE-2017-13104 CERT-VN |
pinterest — pinterest_app_for_ios | Pinterest, 6.37, 2017-10-24, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key. | 2018-08-15 | not yet calculated | CVE-2017-13103 CERT-VN |
distinctdev — the_moron_test_app_for_ios | DistinctDev, Inc., The Moron Test, 6.3.1, 2017-05-04, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key. | 2018-08-15 | not yet calculated | CVE-2017-13100 CERT-VN |
gameloft — asphalt_xtreme_offroad_rally_racing_app_for_ios | Gameloft Asphalt Xtreme: Offroad Rally Racing, 1.6.0, 2017-08-13, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key. | 2018-08-15 | not yet calculated | CVE-2017-13102 CERT-VN |
asustor — adm | ASUSTOR ADM 3.1.0.RFQ3 uses the same default root:admin username and password as it does for the NAS itself for applications that are installed from the online repository. This may allow an attacker to login and upload a webshell. | 2018-08-16 | not yet calculated | CVE-2018-11509 MISC EXPLOIT-DB |
asustor — adm | The tree list functionality in the photo gallery application in ASUSTOR ADM 3.1.0.RFQ3 has a SQL injection vulnerability that affects the ‘album_id’ or ‘scope’ parameter via a photo-gallery/api/album/tree_lists/ URI. | 2018-08-16 | not yet calculated | CVE-2018-11511 MISC EXPLOIT-DB |
atlassian — confluence_questions | The acceptAnswer resource in Atlassian Confluence Questions before version 2.6.6, the bundled version of Confluence Questions was updated to a fixed version in Confluence version 6.9.0, allows remote attackers to modify a comment into an answer via a Cross-site request forgery (CSRF) vulnerability. | 2018-08-15 | not yet calculated | CVE-2018-13394 CONFIRM |
atlassian — confluence_questions | The convertCommentToAnswer resource in Atlassian Confluence Questions before version 2.6.6, the bundled version of Confluence Questions was updated to a fixed version in Confluence version 6.9.0, allows remote attackers to modify a comment into an answer via a Cross-site request forgery (CSRF) vulnerability. | 2018-08-15 | not yet calculated | CVE-2018-13393 CONFIRM |
atlassian — fisheye_and_crucible | Several resources in Atlassian Fisheye and Crucible before version 4.6.0 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in linked issue keys. | 2018-08-13 | not yet calculated | CVE-2018-13392 BID CONFIRM CONFIRM |
btrfsmaintenance — btrfsmaintenance | An issue was discovered in evaluate_auto_mountpoint in btrfsmaintenance-functions in btrfsmaintenance through 0.4.1. Code execution as root can occur via a specially crafted filesystem label if btrfs-{scrub,balance,trim} are set to auto in /etc/sysconfig/btrfsmaintenance (this is not the default, though). | 2018-08-15 | not yet calculated | CVE-2018-14722 MLIST CONFIRM |
cisco — asr_9000_series_aggregation_services_router_software | A vulnerability in the Local Packet Transport Services (LPTS) feature set of Cisco ASR 9000 Series Aggregation Services Router Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input and validation checking on certain Precision Time Protocol (PTP) ingress traffic to an affected device. An attacker could exploit this vulnerability by injecting malformed traffic into an affected device. A successful exploit could allow the attacker to cause services on the device to become unresponsive, resulting in a DoS condition. Cisco Bug IDs: CSCvj22858. | 2018-08-15 | not yet calculated | CVE-2018-0418 CISCO |
cisco — asyncos_software_for_cisco_web_security_appliances |
A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected system. The vulnerability exists because the affected software improperly manages memory resources for TCP connections to a targeted device. An attacker could exploit this vulnerability by establishing a high number of TCP connections to the data interface of an affected device via IPv4 or IPv6. A successful exploit could allow the attacker to exhaust system memory, which could cause the system to stop processing new connections and result in a DoS condition. System recovery may require manual intervention. Cisco Bug IDs: CSCvf36610. | 2018-08-15 | not yet calculated | CVE-2018-0410 BID CISCO |
qnap– qts | Command injection vulnerability in Helpdesk versions 1.1.21 and earlier in QNAP QTS 4.2.6 build 20180531, QTS 4.3.3 build 20180528, QTS 4.3.4 build 20180528 and their earlier versions could allow remote attackers to run arbitrary commands in the compromised application. | 2018-08-13 | not yet calculated | CVE-2018-0714 CONFIRM |
cisco — email_security_appliances | A vulnerability in certain attachment detection mechanisms of Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass the filtering functionality of an affected system. The vulnerability is due to the improper detection of content within executable (EXE) files. An attacker could exploit this vulnerability by sending a customized EXE file that is not recognized and blocked by the ESA. A successful exploit could allow an attacker to send email messages that contain malicious executable files to unsuspecting users. Cisco Bug IDs: CSCvh03786. | 2018-08-15 | not yet calculated | CVE-2018-0419 CISCO |
cisco — ios_software_and_ios_xe_software | A vulnerability in the implementation of RSA-encrypted nonces in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to obtain the encrypted nonces of an Internet Key Exchange Version 1 (IKEv1) session. The vulnerability exists because the affected software responds incorrectly to decryption failures. An attacker could exploit this vulnerability sending crafted ciphertexts to a device configured with IKEv1 that uses RSA-encrypted nonces. A successful exploit could allow the attacker to obtain the encrypted nonces. Cisco Bug IDs: CSCve77140. | 2018-08-14 | not yet calculated | CVE-2018-0131 BID CISCO |
cisco — multiple_products | A vulnerability in the XCP Router service of the Cisco Unified Communications Manager IM & Presence Service (CUCM IM&P) and the Cisco TelePresence Video Communication Server (VCS) and Expressway could allow an unauthenticated, remote attacker to cause a temporary service outage for all IM&P users, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a malicious IPv4 or IPv6 packet to an affected device on TCP port 7400. An exploit could allow the attacker to overread a buffer, resulting in a crash and restart of the XCP Router service. Cisco Bug IDs: CSCvg97663, CSCvi55947. | 2018-08-15 | not yet calculated | CVE-2018-0409 BID BID CISCO |
cisco — registered_envelope_service | A vulnerability in the web-based management interface of the Cisco Registered Envelope Service could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected service. The vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based management interface of the affected service. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information. Cisco Bug IDs: CVE-2018-0367. | 2018-08-15 | not yet calculated | CVE-2018-0367 CISCO |
cisco — small_business_100_and_300_series_wireless_access_points | A vulnerability in the implementation of Extensible Authentication Protocol over LAN (EAPOL) functionality in Cisco Small Business 100 Series Wireless Access Points and Cisco Small Business 300 Series Wireless Access Points could allow an authenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper processing of certain EAPOL frames. An attacker could exploit this vulnerability by sending a stream of crafted EAPOL frames to an affected device. A successful exploit could allow the attacker to force the access point (AP) to disassociate all the associated stations (STAs) and to disallow future, new association requests. Cisco Bug IDs: CSCvj97472. | 2018-08-15 | not yet calculated | CVE-2018-0415 CISCO |
cisco — small_business_100_and_300_series_wireless_access_points | A vulnerability in the implementation of Extensible Authentication Protocol over LAN (EAPOL) functionality in Cisco Small Business 100 Series Wireless Access Points and Cisco Small Business 300 Series Wireless Access Points could allow an unauthenticated, adjacent attacker to force the downgrade of the encryption algorithm that is used between an authenticator (access point) and a supplicant (Wi-Fi client). The vulnerability is due to the improper processing of certain EAPOL messages that are received during the Wi-Fi handshake process. An attacker could exploit this vulnerability by establishing a man-in-the-middle position between a supplicant and an authenticator and manipulating an EAPOL message exchange to force usage of a WPA-TKIP cipher instead of the more secure AES-CCMP cipher. A successful exploit could allow the attacker to conduct subsequent cryptographic attacks, which could lead to the disclosure of confidential information. Cisco Bug IDs: CSCvj29229. | 2018-08-15 | not yet calculated | CVE-2018-0412 CISCO |
cisco — unified_communications_domain_manager_software | A vulnerability in Cisco Unified Communications Domain Manager Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on an affected system. The vulnerability is due to improper validation of input that is passed to the affected software. An attacker could exploit this vulnerability by persuading a user of the affected software to access a malicious URL. A successful exploit could allow the attacker to access sensitive, browser-based information on the affected system or perform arbitrary actions in the affected software in the security context of the user. Cisco Bug IDs: CSCvh49694. | 2018-08-15 | not yet calculated | CVE-2018-0386 CISCO |
cisco — web_security_appliance | A vulnerability in the account management subsystem of Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials. The vulnerability is due to improper implementation of access controls. An attacker could exploit this vulnerability by authenticating to the device as a specific user to gain the information needed to elevate privileges to root in a separate login shell. A successful exploit could allow the attacker to escape the CLI subshell and execute system-level commands on the underlying operating system as root. Cisco Bug IDs: CSCvj93548. | 2018-08-15 | not yet calculated | CVE-2018-0428 BID CISCO |
cisco — web_security_appliance | A vulnerability in the CronJob scheduler API of Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to perform a command injection attack. The vulnerability is due to incorrect input validation of user-supplied data. An attacker could exploit this vulnerability by sending a malicious packet. A successful exploit could allow the attacker to execute arbitrary commands with root privileges. Cisco Bug IDs: CSCvi42263. | 2018-08-15 | not yet calculated | CVE-2018-0427 BID CISCO |
citrix — xenserver | Citrix XenServer 7.1 and newer allows Directory Traversal. | 2018-08-15 | not yet calculated | CVE-2018-14007 BID CONFIRM CONFIRM |
clavister — cos_core | The IKEv1 implementation in Clavister cOS Core before 11.00.11, 11.20.xx before 11.20.06, and 12.00.xx before 12.00.09 allows remote attackers to decrypt RSA-encrypted nonces by leveraging a Bleichenbacher attack. | 2018-08-15 | not yet calculated | CVE-2018-8753 MISC CONFIRM |
crestron — tsw-x60_and_mc3 | Crestron TSW-X60 all versions prior to 2.001.0037.001 and MC3 all versions prior to 1.502.0047.00, The passwords for special sudo accounts may be calculated using information accessible to those with regular user privileges. Attackers could decipher these passwords, which may allow them to execute hidden API calls and escape the CTP console sandbox environment with elevated privileges. | 2018-08-10 | not yet calculated | CVE-2018-13341 BID MISC |
crestron — tsw-x60_and_mc3 | For Crestron TSW-X60 version prior to 2.001.0037.001 and MC3 version prior to 1.502.0047.001, The devices are shipped with authentication disabled, and there is no indication to users that they need to take steps to enable it. When compromised, the access to the CTP console is left open. | 2018-08-10 | not yet calculated | CVE-2018-10630 BID MISC |
cryo — cryo | A code injection in cryo 0.0.6 allows an attacker to arbitrarily execute code due to insecure implementation of deserialization. | 2018-08-17 | not yet calculated | CVE-2018-3784 MISC |
delta_electronics — cncsoft_with_screeneditor | CNCSoft Version 1.00.83 and prior with ScreenEditor Version 1.00.54 has multiple stack-based buffer overflow vulnerabilities that could cause the software to crash due to lacking user input validation before copying data from project files onto the stack. Which may allow an attacker to gain remote code execution with administrator privileges if exploited. | 2018-08-13 | not yet calculated | CVE-2018-10636 BID MISC |
delta_electronics — cncsoft_with_screeneditor | CNCSoft Version 1.00.83 and prior with ScreenEditor Version 1.00.54 has two out-of-bounds read vulnerabilities could cause the software to crash due to lacking user input validation for processing project files. Which may allow an attacker to gain remote code execution with administrator privileges if exploited. | 2018-08-13 | not yet calculated | CVE-2018-10598 BID MISC |
dojo — toolkit | In Dojo Toolkit before 1.14, there is unescaped string injection in dojox/Grid/DataGrid. | 2018-08-17 | not yet calculated | CVE-2018-15494 MISC MISC |
eclipse — openj9 | In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows, Linux and AIX JVMs and can be disabled using the command line option -Dcom.ibm.tools.attach.enable=no. | 2018-08-14 | not yet calculated | CVE-2018-12539 CONFIRM |
eclipse — vert.x | In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response. | 2018-08-14 | not yet calculated | CVE-2018-12537 REDHAT CONFIRM CONFIRM CONFIRM CONFIRM MISC |
edimax — ew-7438rpn_mini | An issue was discovered in Edimax EW-7438RPn Mini v2 before version 1.26. There is XSS in an SSID field. | 2018-08-13 | not yet calculated | CVE-2018-10569 MISC MISC |
eltex — esp-200_firmware | An authenticated attacker can execute arbitrary code using command ejection in Eltex ESP-200 firmware version 1.2.0. | 2018-08-17 | not yet calculated | CVE-2018-15356 MISC |
eltex — esp-200_firmware | An attacker without authentication can login with default credentials for privileged users in Eltex ESP-200 firmware version 1.2.0. | 2018-08-17 | not yet calculated | CVE-2018-15360 MISC |
eltex — esp-200_firmware | An authenticated attacker with low privileges can activate high privileged user and use it to expand attack surface in Eltex ESP-200 firmware version 1.2.0. | 2018-08-17 | not yet calculated | CVE-2018-15358 MISC |
eltex — esp-200_firmware | An authenticated attacker with low privileges can extract password hash information for all users in Eltex ESP-200 firmware version 1.2.0. | 2018-08-17 | not yet calculated | CVE-2018-15357 MISC |
eltex — esp-200_firmware | An authenticated attacker with low privileges can use insecure sudo configuration to expand attack surface in Eltex ESP-200 firmware version 1.2.0. | 2018-08-17 | not yet calculated | CVE-2018-15359 MISC |
embedthis — goahead_and_appweb | An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted “Host” header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ‘]’ character in an IPv6 address. | 2018-08-17 | not yet calculated | CVE-2018-15505 MISC MISC MISC |
embedthis — goahead_and_appweb | An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11. | 2018-08-17 | not yet calculated | CVE-2018-15504 MISC MISC MISC |
ericsson-lg — ipecs_nms_30m | Ericsson-LG iPECS NMS 30M allows directory traversal via ipecs-cm/download?filename=../ URIs. | 2018-08-15 | not yet calculated | CVE-2018-15138 EXPLOIT-DB |
ethereum — all_for_one_game | The maxRandom function of a smart contract implementation for All For One, an Ethereum gambling game, generates a random value with publicly readable variables because the _seed value can be retrieved with a getStorageAt call. Therefore, it allows attackers to always win and get rewards. | 2018-08-15 | not yet calculated | CVE-2018-12056 MISC |
ethereum — bitcoin_red_token | An integer overflow in the distributeBTR function of a smart contract implementation for Bitcoin Red (BTCR), an Ethereum ERC20 token, allows the owner to accomplish an unauthorized increase of digital assets by providing a large address[] array, as exploited in the wild in May 2018, aka the “ownerUnderflow” issue. | 2018-08-15 | not yet calculated | CVE-2018-11687 MISC |
f5 — big-ip | The svpn and policyserver components of the F5 BIG-IP APM client prior to version 7.1.7.1 for Linux and macOS runs as a privileged process and can allow an unprivileged user to get ownership of files owned by root on the local client host. A malicious local unprivileged user may gain knowledge of sensitive information, manipulate certain data, or assume super-user privileges on the local client host. | 2018-08-17 | not yet calculated | CVE-2018-5546 SECTRACK CONFIRM |
f5 — big-ip | Windows Logon Integration feature of F5 BIG-IP APM client prior to version 7.1.7.1 for Windows by default uses Legacy logon mode which uses a SYSTEM account to establish network access. This feature displays a certificate user interface dialog box which contains the link to the certificate policy. By clicking on the link, unprivileged users can open additional dialog boxes and get access to the local machine windows explorer which can be used to get administrator privilege. Windows Logon Integration is vulnerable when the APM client is installed by an administrator on a user machine. Users accessing the local machine can get administrator privileges | 2018-08-17 | not yet calculated | CVE-2018-5547 SECTRACK CONFIRM |
flintcms — flintcms | A privilege escalation detected in flintcms versions | 2018-08-17 | not yet calculated | CVE-2018-3783 MISC |
git-dummy-commit — git-dummy-commit | A command injection in git-dummy-commit v1.3.0 allows os level commands to be executed due to an unescaped parameter. | 2018-08-17 | not yet calculated | CVE-2018-3785 MISC |
gnome — display_manager | The daemon in GDM through 3.29.1 does not properly unexport display objects from its D-Bus interface when they are destroyed, which allows a local attacker to trigger a use-after-free via a specially crafted sequence of D-Bus method calls, resulting in a denial of service or potential code execution. | 2018-08-14 | not yet calculated | CVE-2018-14424 CONFIRM UBUNTU DEBIAN |
ks_mobile– live.me_app_for_android | Live.me – live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key. | 2018-08-15 | not yet calculated | CVE-2017-13107 CERT-VN |
cheetah_mobile– cm_launcher_3d_app_for_android | Cheetahmobile CM Launcher 3D – Theme, wallpaper, Secure, Efficient, 5.0.3, 2017-09-19, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key. | 2018-08-15 | not yet calculated | CVE-2017-13106 CERT-VN |
hawk_mobile_hi_security_labs — hi_security_virus_cleaner_app_for_android | Hi Security Virus Cleaner – Antivirus, Booster, 3.7.1.1329, 2017-09-13, Android application accepts all SSL certificates during SSL communication. This opens the application up to a man-in-the-middle attack having all of its encrypted traffic intercepted and read by an attacker. | 2018-08-15 | not yet calculated | CVE-2017-13105 CERT-VN |
psafe_tools — dfndr_security_app_for_android | DFNDR Security Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key. | 2018-08-15 | not yet calculated | CVE-2017-13108 CERT-VN |
hikvision — ip_cameras | A buffer overflow vulnerability in the web server of some Hikvision IP Cameras allows an attacker to send a specially crafted message to affected devices. Due to the insufficient input validation, successful exploit can corrupt memory and lead to arbitrary code execution or crash the process. | 2018-08-13 | not yet calculated | CVE-2018-6414 CONFIRM |
hp — multiple_inkjet_printers | A security vulnerability has been identified with certain HP Inkjet printers. A maliciously crafted file sent to an affected device can cause a static buffer overflow, which could allow remote code execution. | 2018-08-13 | not yet calculated | CVE-2018-5925 BID SECTRACK MISC HP |
hp — multiple_inkjet_printers | A security vulnerability has been identified with certain HP Inkjet printers. A maliciously crafted file sent to an affected device can cause a stack buffer overflow, which could allow remote code execution. | 2018-08-13 | not yet calculated | CVE-2018-5924 BID SECTRACK MISC HP |
hpe — multiple_products | A security vulnerability in HPE Integrated Lights-Out 3 prior to v1.90, iLO 4 prior to v2.60, iLO 5 prior to v1.30, Moonshot Chassis Manager firmware prior to v1.58, and Moonshot Component Pack prior to v2.55 could be remotely exploited to create a denial of service. | 2018-08-14 | not yet calculated | CVE-2018-7093 SECTRACK CONFIRM |
hpe — officeconnect_1810_switch_series | A potential security vulnerability has been identified in HPE OfficeConnect 1810 Switch Series (HP 1810-24G – P.2.22 and previous versions, HP 1810-48G PK.1.34 and previous versions, HP 1810-8 v2 P.2.22 and previous versions). The vulnerability could allow local disclosure of sensitive information. | 2018-08-14 | not yet calculated | CVE-2018-7100 SECTRACK CONFIRM |
hpe — xp_p9000_command_view_advanced_edition | A security vulnerability in HPE XP P9000 Command View Advanced Edition (CVAE) Device Manager (DevMgr 8.5.0-00 and prior to 8.6.0-00), Configuration Manager (CM 8.5.0-00 and prior to 8.6.0-00) could be exploited to allow local and remote unauthorized access to sensitive information. | 2018-08-14 | not yet calculated | CVE-2018-7077 CONFIRM |
ibm — api_connect | IBM API Connect’s Developer Portal 5.0.0.0 through 5.0.8.3 is vulnerable to Server Side Request Forgery. An attacker, using specially crafted input parameters can trick the server into making potentially malicious calls within the trusted network. IBM X-Force ID: 146370. | 2018-08-16 | not yet calculated | CVE-2018-1712 XF CONFIRM |
ibm — maximo_asset_management | IBM Maximo Asset Management 7.6 through 7.6.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 147003. | 2018-08-16 | not yet calculated | CVE-2018-1715 XF CONFIRM |
ibm — rational_clearquest | IBM Rational ClearQuest 8.0 through 8.0.1.9 and 9.0 through 9.0.1.3 (CQ OSLC linkages, EmailRelay) fails to check the SSL certificate against the requested hostname. It is subject to a man-in-the-middle attack with an impersonating server observing all the data transmitted to the real server. IBM X-Force ID: 113353. | 2018-08-13 | not yet calculated | CVE-2016-2922 XF CONFIRM |
ibm — security_access_manager_for enterprise_single_sign_on | IBM Security Access Manager for Enterprise Single Sign-On 8.2.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 134913. | 2018-08-17 | not yet calculated | CVE-2017-1732 CONFIRM XF |
ibm — tivoli_application_dependency_discovery_manager | IBM Tivoli Application Dependency Discovery Manager 7.2.2 and 7.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 11029. | 2018-08-15 | not yet calculated | CVE-2018-1455 XF CONFIRM |
ibm — urbancode_deploy | IBM UrbanCode Deploy 6.1 through 6.9.6.0 could allow a remote attacker to traverse directories on the system. An unauthenticated attacker could alter UCD deployments. IBM X-Force ID: 135522. | 2018-08-13 | not yet calculated | CVE-2017-1749 XF CONFIRM |
ibm — urbancode_deploy |
Sensitive information about the configuration of the IBM UrbanCode Deploy 6.1 through 6.9.6.0 server and database can be obtained by a user who has been given elevated permissions in the UI, even after those elevated permissions have been revoked. IBM X-Force ID: 125147. | 2018-08-13 | not yet calculated | CVE-2017-1286 XF CONFIRM |
intelbras — win_240 | A Cross-site scripting (XSS) vulnerability was discovered on Intelbras Win 240 V1.1.0 devices. An attacker can change the Admin Password without a Login. | 2018-08-15 | not yet calculated | CVE-2018-10369 MISC |
jetbrains — dotpeek_and_resharper_ultimate | JetBrains dotPeek before 2018.2 and ReSharper Ultimate before 2018.1.4 allow attackers to execute code by decompiling a compiled .NET object (such as a DLL or EXE file) with a specific file, because of Deserialization of Untrusted Data. | 2018-08-13 | not yet calculated | CVE-2018-14878 CONFIRM MISC |
keycloak — keycloak | It was found that an authenticated user could manipulate user session information to trigger an infinite loop in keycloak. A malicious user could use this flaw to conduct a denial of service attack against the server. | 2018-08-13 | not yet calculated | CVE-2018-10842 CONFIRM |
kraftway — 24f2xg_router_firmware | Denial of service via crafting malicious link and sending it to a privileged user can cause Denial of Service in Kraftway 24F2XG Router firmware version 3.5.30.1118. | 2018-08-17 | not yet calculated | CVE-2018-15351 MISC |
kraftway — 24f2xg_router_firmware | An attacker with low privileges can cause denial of service in Kraftway 24F2XG Router firmware version 3.5.30.1118. | 2018-08-17 | not yet calculated | CVE-2018-15352 MISC |
kraftway — 24f2xg_router_firmware | A Buffer Overflow exploited through web interface by remote attacker can cause remote code execution in Kraftway 24F2XG Router firmware 3.5.30.1118. | 2018-08-17 | not yet calculated | CVE-2018-15353 MISC |
kraftway — 24f2xg_router_firmware | A Buffer Overflow exploited through web interface by remote attacker can cause denial of service in Kraftway 24F2XG Router firmware 3.5.30.1118. | 2018-08-17 | not yet calculated | CVE-2018-15354 MISC |
kraftway — 24f2xg_router_firmware | Router Default Credentials in Kraftway 24F2XG Router firmware version 3.5.30.1118 allow remote attackers to get privileged access to the router. | 2018-08-17 | not yet calculated | CVE-2018-15350 MISC |
kraftway — 24f2xg_router_firmware | Usage of SSLv2 and SSLv3 leads to transmitted data decryption in Kraftway 24F2XG Router firmware 3.5.30.1118. | 2018-08-17 | not yet calculated | CVE-2018-15355 MISC |
lg — android_devices | Certain LG devices based on Android 6.0 through 8.1 have incorrect access control in the GNSS application. The LG ID is LVE-SMP-180004. | 2018-08-17 | not yet calculated | CVE-2018-14982 CONFIRM |
lg — android_devices | Certain LG devices based on Android 6.0 through 8.1 have incorrect access control for MLT application intents. The LG ID is LVE-SMP-180006. | 2018-08-17 | not yet calculated | CVE-2018-15482 CONFIRM |
lg — android_devices | Certain LG devices based on Android 6.0 through 8.1 have incorrect access control for SystemUI application intents. The LG ID is LVE-SMP-180005. | 2018-08-17 | not yet calculated | CVE-2018-14981 CONFIRM |
libcgroup — libcgroup | libcgroup up to and including 0.41 creates /var/log/cgred with mode 0666 regardless of the configured umask, leading to disclosure of information. | 2018-08-14 | not yet calculated | CVE-2018-14348 SUSE CONFIRM FEDORA CONFIRM |
libgit2 — libgit2 | In ng_pkt in transports/smart_pkt.c in libgit2 before 0.26.6 and 0.27.x before 0.27.4, a remote attacker can send a crafted smart-protocol “ng” packet that lacks a ‘ |