Vulnerability Summary for the Week of January 8, 2018

Released
Jan 15, 2018
Document ID
SB18-015

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. NVD is sponsored by CISA. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High: vulnerabilities with a CVSS base score of 7.0–10.0
  • Medium: vulnerabilities with a CVSS base score of 4.0–6.9
  • Low: vulnerabilities with a CVSS base score of 0.0–3.9

Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis. 

 

High Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
advantech -- webaccessA SQL Injection issue was discovered in WebAccess versions prior to 8.3. WebAccess does not properly sanitize its inputs for SQL commands.2018-01-057.5CVE-2017-16716
BID
MISC
advantech -- webaccessA Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple instances of a vulnerability that allows too much data to be written to a location on the stack.2018-01-057.5CVE-2017-16724
BID
MISC

Back to top

 

Medium Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
advantech -- webaccessA Path Traversal issue was discovered in WebAccess versions prior to 8.3. An attacker has access to files within the directory structure of the target device.2018-01-055.0CVE-2017-16720
BID
MISC
advantech -- webaccessAn Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple vulnerabilities that may allow an attacker to cause the program to use an invalid memory address, resulting in a program crash.2018-01-055.0CVE-2017-16728
BID
MISC
advantech -- webaccessAn Improper Input Validation issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows some inputs that may cause the program to crash.2018-01-055.0CVE-2017-16753
BID
MISC

Back to top

 

Low Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
There were no low vulnerabilities recorded this week.

Back to top

 

Severity Not Yet Assigned

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
adobe -- flash
 
An Out-of-bounds Read issue was discovered in Adobe Flash Player before 28.0.0.137. This vulnerability occurs because of computation that reads data that is past the end of the target buffer. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.2018-01-09not yet calculatedCVE-2018-4871
BID
SECTRACK
REDHAT
CONFIRM
advantech -- webaccess
 
An Unrestricted Upload Of File With Dangerous Type issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows a remote attacker to upload arbitrary files.2018-01-11not yet calculatedCVE-2017-16736
MISC
advantech -- webaccess
 
A use-after-free issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows an unauthenticated attacker to specify an arbitrary address.2018-01-11not yet calculatedCVE-2017-16732
MISC
apache -- activemq
 
In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identified to be present in the web based administration console. The root cause of this issue is improper user data output validation.2018-01-10not yet calculatedCVE-2016-6810
CONFIRM
BID
SECTRACK
MLIST
apache -- geode
 
When an Apache Geode cluster before v1.3.0 is operating in secure mode, a user with read access to specific regions within a Geode cluster may execute OQL queries containing a region name as a bind parameter that allow read access to objects within unauthorized regions.2018-01-09not yet calculatedCVE-2017-9796
MLIST
apache -- geode
 
When an Apache Geode cluster before v1.3.0 is operating in secure mode, a user with read access to specific regions within a Geode cluster may execute OQL queries that allow read and write access to objects within unauthorized regions. In addition a user could invoke methods that allow remote code execution.2018-01-09not yet calculatedCVE-2017-9795
BID
MLIST
apache -- geode
 
When an Apache Geode cluster before v1.3.0 is operating in secure mode and an authenticated user connects to a Geode cluster using the gfsh tool with HTTP, the user is able to obtain status information and control cluster members even without CLUSTER:MANAGE privileges.2018-01-09not yet calculatedCVE-2017-12622
MLIST
apache -- sling
 
The Apache Sling JCR ContentLoader 2.1.4 XmlReader used in the Sling JCR content loader module makes it possible to import arbitrary files in the content repository, including local files, causing potential information leaks. Users should upgrade to version 2.1.6 of the JCR ContentLoader2018-01-08not yet calculatedCVE-2012-3353
CONFIRM
MLIST
apache -- sling
 
A flaw in the way URLs are escaped and encoded in the org.apache.sling.xss.impl.XSSAPIImpl#getValidHref and org.apache.sling.xss.impl.XSSFilterImpl#isValidHref allows special crafted URLs to pass as valid, although they carry XSS payloads. The affected versions are Apache Sling XSS Protection API 1.0.4 to 1.0.18, Apache Sling XSS Protection API Compat 1.1.0 and Apache Sling XSS Protection API 2.0.0.2018-01-10not yet calculatedCVE-2017-15717
MLIST
artifex_software -- mupdf
 
In MuPDF 1.12.0, there is an infinite loop vulnerability and application hang in the pdf_parse_array function (pdf/pdf-parse.c) because EOF is not considered. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted pdf file.2018-01-13not yet calculatedCVE-2018-5686
MISC
aruba_networks -- clearpass_policy_manager
 
Aruba Networks ClearPass Policy Manager 6.1.x, 6.2.x before 6.2.5.61640 and 6.3.x before 6.3.0.61712, when configured to use tunneled and non-tunneled EAP methods in a single policy construct, allows remote authenticated users to gain privileges by advertising independent inner and outer identities within a tunneled EAP method.2018-01-08not yet calculatedCVE-2014-2071
CONFIRM
asternic.org -- flash_operator_panel
 
The callforward module in User Control Panel (UCP) in Nicolas Gudino (aka Asternic) Flash Operator Panel (FOP) 2.31.03 allows remote authenticated users to execute arbitrary commands via the command parameter.2018-01-13not yet calculatedCVE-2018-5694
MISC
atlassian -- jira
 
The issue search resource in Atlassian Jira before version 7.4.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the orderby parameter.2018-01-12not yet calculatedCVE-2017-16864
CONFIRM
atlassian -- jira
 
The IncomingMailServers resource in Atlassian Jira before version 7.6.2 allows remote attackers to modify the "incoming mail" whitelist setting via a Cross-site request forgery (CSRF) vulnerability.2018-01-12not yet calculatedCVE-2017-16862
CONFIRM
atlassian -- jira
 
The printable searchrequest issue resource in Atlassian Jira before version 7.2.12 and from version 7.3.0 before 7.6.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the jqlQuery query parameter.2018-01-12not yet calculatedCVE-2017-14594
CONFIRM
avantfax -- avantfax
 
AvantFAX 3.3.3 has XSS via an arbitrary parameter name to the default URI, as demonstrated by a parameter whose name contains a SCRIPT element and whose value is 1.2018-01-10not yet calculatedCVE-2017-18024
MISC
aztech -- adsl_devices
 
cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote attackers to cause a denial of service (WAN connectivity reset) via a direct request.2018-01-12not yet calculatedCVE-2014-6435
MISC
BID
aztech -- adsl_devices
 
Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login.2018-01-12not yet calculatedCVE-2014-6436
MISC
BUGTRAQ
BID
aztech -- adsl_devices
 
Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices allow remote attackers to obtain sensitive device configuration information via vectors involving the ROM file.2018-01-12not yet calculatedCVE-2014-6437
MISC
BUGTRAQ
BID
barcodewiz -- barcode
 
Multiple buffer overflows in BarCodeWiz BarCode before 6.7 ActiveX control (BarcodeWiz.DLL) allow remote attackers to execute arbitrary code via a long argument to the (1) BottomText or (2) TopText property.2018-01-09not yet calculatedCVE-2018-5221
MISC
MISC
cisco -- unified communications_manager
 
A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to perform a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the web-based management interface to click a link that is designed to submit malicious input to the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information on the targeted device. Cisco Bug IDs: CSCvg51264.2018-01-11not yet calculatedCVE-2018-0118
BID
CONFIRM
cobham -- sea_tel_116_build_222429_satellite_devices
 
Persistent XSS exists in the web server on Cobham Sea Tel 116 build 222429 satellite communication system devices: remote attackers can inject malicious JavaScript code using the device's TELNET shell built-in commands, as demonstrated by the "set ship name" command. This is similar to a Cross Protocol Injection with SNMP.2018-01-07not yet calculatedCVE-2018-5071
MISC
cobham -- sea_tel_121_build_222701_devices
 
Cobham Sea Tel 121 build 222701 devices allow remote attackers to bypass authentication via a direct request to MenuDealerGx.html, MenuDealer.html, MenuEuNCGx.html, MenuEuNC.html, MenuSysGx.html, or MenuSys.html.2018-01-07not yet calculatedCVE-2018-5267
MISC
cobham -- sea_tel_121_build_222701_devices
 
Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potentially sensitive information about valid usernames by reading the loginName lines at the js/userLogin.js URI. NOTE: default passwords for the standard usernames are listed in the product's documentation: Dealer with password seatel3, SysAdmin with password seatel2, and User with password seatel1.2018-01-07not yet calculatedCVE-2018-5266
MISC
communigate -- communigate_pro
 
The "XML Interface to Messaging, Scheduling, and Signaling" (XIMSS) protocol implementation in CommuniGate Pro (CGP) 6.2 suffers from a Missing XIMSS Protocol Validation attack that leads to an email spoofing attack, allowing a malicious authenticated attacker to send a message from any source email address. The attack uses an HTTP POST request to a /Session URI, and interchanges the XML From and To elements.2018-01-08not yet calculatedCVE-2018-3815
MISC
comsenz_technology -- discuz!_discuzx
 
Discuz! DiscuzX X3.4 allows remote attackers to bypass intended access restrictions via the archiver\index.php action parameter.2018-01-12not yet calculatedCVE-2018-5377
MISC
comsenz_technology -- discuz!_discuzx
 
Discuz! DiscuzX X3.4 has XSS via the include\spacecp\spacecp_space.php appid parameter in a delete action.2018-01-12not yet calculatedCVE-2018-5375
MISC
comsenz_technology -- discuz!_discuzx
 
Discuz! DiscuzX X3.4 has XSS via the include\spacecp\spacecp_upload.php op parameter.2018-01-12not yet calculatedCVE-2018-5376
MISC
comsenz_technology -- discuz!_discuzx
 
Discuz! DiscuzX X3.4 has XSS via the view parameter to include/space/space_poll.php, as demonstrated by a mod=space do=poll request to home.php.2018-01-10not yet calculatedCVE-2018-5331
MISC
comsenz_technology -- discuz!_discuzx
 
Discuz! DiscuzX X3.4 allows remote authenticated users to bypass intended attachment-deletion restrictions via a modified aid parameter.2018-01-08not yet calculatedCVE-2018-5259
MISC
MISC
condor5 -- muviko
 
Multiple SQL injection vulnerabilities in Muviko 1.1 allow remote attackers to execute arbitrary SQL commands via the (1) email parameter to login.php; the (2) season_id parameter to themes/flixer/ajax/load_season.php; the (3) movie_id parameter to themes/flixer/ajax/get_rating.php; the (4) rating or (5) movie_id parameter to themes/flixer/ajax/update_rating.php; or the (6) id parameter to themes/flixer/ajax/set_player_source.php.2018-01-12not yet calculatedCVE-2017-17970
MISC
EXPLOIT-DB
cups -- cups
 
The browsing feature in the server in CUPS does not filter ANSI escape sequences from shared printer names, which might allow remote attackers to execute arbitrary code via a crafted printer name.2018-01-12not yet calculatedCVE-2014-8166
MLIST
MLIST
BID
CONFIRM
d-link -- dsl-2640u_devices
 
diag_ping.cmd on D-Link DSL-2640U devices with firmware IM_1.00 and ME_1.00, and DSL-2540U devices with firmware ME_1.00, allows authenticated remote attackers to execute arbitrary OS commands via shell metacharacters in the ipaddr field of an HTTP GET request.2018-01-12not yet calculatedCVE-2018-5371
MISC
dotclear -- dotclear
 
Cross-site scripting (XSS) vulnerability in admin/auth.php in Dotclear 2.12.1 allows remote authenticated users to inject arbitrary web script or HTML via the malicious user's email.2018-01-13not yet calculatedCVE-2018-5689
CONFIRM
CONFIRM
dotclear -- dotclear
 
Cross-site scripting (XSS) vulnerability in admin/users.php in Dotclear 2.12.1 allows remote authenticated users to inject arbitrary web script or HTML via the nb parameter (aka the page limit number).2018-01-13not yet calculatedCVE-2018-5690
CONFIRM
CONFIRM
dragonbyte_technologies -- vbulletin

 

Multiple cross-site scripting (XSS) vulnerabilities in the Shout Reports in the DragonByte Technologies vBShout module before 6.0.6 for vBulletin allow remote attackers to inject arbitrary web script or HTML via the (1) reportreason parameter in actions/doreport.php or (2) modnotes parameter in actions/updatereport.php.2018-01-11not yet calculatedCVE-2012-6668
SECUNIA
CONFIRM
BID
XF
dragonbyte_technologies -- vbulletin
 
Cross-site scripting (XSS) vulnerability in vbshout.php in DragonByte Technologies vBShout module for vBulletin allows remote attackers to inject arbitrary web script or HTML via the shout parameter in a shout action.2018-01-11not yet calculatedCVE-2012-6667
SECUNIA
EXPLOIT-DB
BID
dragonbyte_technologies -- vbulletin

 

Multiple cross-site scripting (XSS) vulnerabilities in the DragonByte Technologies vbActivity module before 3.0.1 for vBulletin allow remote attackers to inject arbitrary web script or HTML via the reason parameter in (1) actions/nominatemedal.php or (2) actions/requestmedal.php.2018-01-11not yet calculatedCVE-2012-6670
SECUNIA
CONFIRM
BID
XF
dragonbyte_technologies -- vbulletin
 
Cross-site scripting (XSS) vulnerability in downloads/actions/editdownload.php in the DragonByte Technologies vBDownloads module 1.3.2 and earlier for vBulletin allows remote attackers to inject arbitrary web script or HTML via the mirrors[] parameter.2018-01-11not yet calculatedCVE-2012-6682
SECUNIA
CONFIRM
BID
XF
dragonbyte_technologies -- vbulletin
 
Multiple cross-site scripting (XSS) vulnerabilities in actions/main.php in the DragonByte Technologies Forumon RPG module before 1.0.8 for vBulletin when creating a new monster, allow remote attackers to inject arbitrary web script or HTML via the (1) monster[title] or (2) monster[description] parameters.2018-01-11not yet calculatedCVE-2012-6671
SECUNIA
SECUNIA
CONFIRM
BID
emc -- avamar_server
 
An issue was discovered in EMC Avamar Server 7.1.x, 7.2.x, 7.3.x, 7.4.x, 7.5.0; EMC NetWorker Virtual Edition (NVE) 9.0.x, 9.1.x, 9.2.x; and EMC Integrated Data Protection Appliance 2.0. A remote authenticated malicious user with low privileges could potentially upload arbitrary maliciously crafted files in any location on the server file system.2018-01-05not yet calculatedCVE-2017-15549
CONFIRM
BID
SECTRACK
emc -- avamar_server
 
An issue was discovered in EMC Avamar Server 7.1.x, 7.2.x, 7.3.x, 7.4.x, 7.5.0; EMC NetWorker Virtual Edition (NVE) 9.0.x, 9.1.x, 9.2.x; and EMC Integrated Data Protection Appliance 2.0. A remote authenticated malicious user with low privileges could access arbitrary files on the server file system in the context of the running vulnerable application via Path traversal.2018-01-05not yet calculatedCVE-2017-15550
CONFIRM
BID
SECTRACK
emc -- avamar_server
 
An issue was discovered in EMC Avamar Server 7.1.x, 7.2.x, 7.3.x, 7.4.x, 7.5.0; EMC NetWorker Virtual Edition (NVE) 9.0.x, 9.1.x, 9.2.x; and EMC Integrated Data Protection Appliance 2.0. A remote unauthenticated malicious user can potentially bypass application authentication and gain unauthorized root access to the affected systems.2018-01-05not yet calculatedCVE-2017-15548
CONFIRM
BID
SECTRACK
etherpad -- etherpad
 
node/utils/ExportEtherpad.js in Etherpad 1.5.x before 1.5.2 might allow remote attackers to obtain sensitive information by leveraging an improper substring check when exporting a padID.2018-01-12not yet calculatedCVE-2015-2298
MLIST
CONFIRM
CONFIRM
family_connections -- family_connections_cms
 
Multiple cross-site request forgery (CSRF) vulnerabilities in Family Connections CMS (aka FCMS) 2.9 and earlier allow remote attackers to hijack the authentication of arbitrary users for requests that (1) add news via an add action to familynews.php or (2) add a prayer via an add action to prayers.php.2018-01-11not yet calculatedCVE-2012-0699
EXPLOIT-DB
fasterxml_jackson-databind -- fasterxml_jackson-databind
 
FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.2018-01-10not yet calculatedCVE-2017-17485
BUGTRAQ
CONFIRM
MISC
ffmpeg -- ffmpeg
 
Integer underflow in the mov_read_default function in libavformat/mov.c in FFmpeg before 2.4.6 allows remote attackers to obtain sensitive information from heap and/or stack memory via a crafted MP4 file.2018-01-09not yet calculatedCVE-2015-1208
CONFIRM
CONFIRM
CONFIRM
fiberhome -- lm53q1_vh519r05c01s38_devices
 
The portal on FiberHome Mobile WIFI Device Model LM53Q1 VH519R05C01S38 uses SOAP based web services in order to interact with the portal. Unauthorized Access to Web Services via CSRF can result in an unauthorized change of username or password of the administrator of the portal.2018-01-12not yet calculatedCVE-2017-16886
FULLDISC
EXPLOIT-DB
fiberhome -- lm53q1_vh519r05c01s38_devices
 
The portal on FiberHome Mobile WIFI Device Model LM53Q1 VH519R05C01S38 uses SOAP based web services in order to interact with the portal. Unauthorized Access to Web Services can result in disclosure of the WLAN key/password.2018-01-12not yet calculatedCVE-2017-16887
FULLDISC
EXPLOIT-DB
fiberhome -- lm53q1_vh519r05c01s38_devices
 
Improper Permissions Handling in the Portal on FiberHome LM53Q1 VH519R05C01S38 devices (intended for obtaining information about Internet Usage, Changing Passwords, etc.) allows remote attackers to look for the information without authenticating. The information includes Version of device, Firmware ID, Connected users to device along their MAC Addresses, etc.2018-01-12not yet calculatedCVE-2017-16885
FULLDISC
EXPLOIT-DB
finecms -- finecms
 
rui Li finecms 5.0.10 is vulnerable to a reflected XSS in the file Weixin.php.2018-01-09not yet calculatedCVE-2017-1000429
MISC
flatcore-cms -- flatcore-cms
 
flatCore-CMS 1.4.6 is vulnerable to reflected XSS in user_management.php due to the use of $_SERVER['PHP_SELF'] to build links and a stored XSS in the admin log panel by specifying a malformed User-Agent string.2018-01-09not yet calculatedCVE-2017-1000428
CONFIRM
flexense -- disk_pulse_enterprise
 
In Flexense Disk Pulse Enterprise v10.1.18, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9120.2018-01-10not yet calculatedCVE-2017-15663
MISC
EXPLOIT-DB
flexense -- diskboss_enterprise
 
In Flexense DiskBoss Enterprise 8.5.12, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 8094.2018-01-10not yet calculatedCVE-2017-15665
MISC
EXPLOIT-DB
flexense -- diskboss
 
A stack-based buffer overflow in Flexense DiskBoss 8.8.16 and earlier allows unauthenticated remote attackers to execute arbitrary code in the context of a highly privileged account.2018-01-12not yet calculatedCVE-2018-5262
MISC
EXPLOIT-DB
flexense -- sync_breeze_enterprise
 
In Flexense Sync Breeze Enterprise v10.1.16, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9121.2018-01-10not yet calculatedCVE-2017-15664
MISC
EXPLOIT-DB
flexense -- vx_search_enterprise
 
In Flexense VX Search Enterprise v10.1.12, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9123.2018-01-10not yet calculatedCVE-2017-15662
MISC
EXPLOIT-DB
freeipa -- freeipa
 
It was found that FreeIPA 4.2.0 and later could disclose password hashes to users having the 'System: Read Stage Users' permission. A remote, authenticated attacker could potentially use this flaw to disclose the password hashes belonging to Stage Users. This security issue does not result in disclosure of password hashes belonging to active standard users.2018-01-10not yet calculatedCVE-2017-12169
BID
CONFIRM
general_motors_shanghai -- onstar_sos_ios
 
An Improper Authentication issue was discovered in General Motors (GM) and Shanghai OnStar (SOS) SOS iOS Client 7.1. Successful exploitation of this vulnerability may allow an attacker to subvert security mechanisms and reset a user account password.2018-01-09not yet calculatedCVE-2017-12695
BID
MISC
general_motors_shanghai -- onstar_sos_ios
 
An Cleartext Storage of Sensitive Information issue was discovered in General Motors (GM) and Shanghai OnStar (SOS) SOS iOS Client 7.1. Successful exploitation of this vulnerability may allow a remote attacker to access an encryption key that is stored in cleartext in memory.2018-01-09not yet calculatedCVE-2017-9663
BID
MISC
general_motors_shanghai -- onstar_sos_ios
 
A Man-in-the-Middle issue was discovered in General Motors (GM) and Shanghai OnStar (SOS) SOS iOS Client 7.1. Successful exploitation of this vulnerability may allow an attacker to intercept sensitive information when the client connects to the server.2018-01-09not yet calculatedCVE-2017-12697
BID
MISC
gespage -- gespage
 
Multiple SQL injection vulnerabilities in Gespage before 7.4.9 allow remote attackers to execute arbitrary SQL commands via the (1) show_prn parameter to webapp/users/prnow.jsp or show_month parameter to (2) webapp/users/blhistory.jsp or (3) webapp/users/prhistory.jsp.2018-01-08not yet calculatedCVE-2017-7997
FULLDISC
MISC
EXPLOIT-DB
gespage -- gespage
 
Multiple cross-site scripting (XSS) vulnerabilities in Gespage before 7.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) printer name when adding a printer in the admin panel or (2) username parameter to webapp/users/user_reg.jsp.2018-01-08not yet calculatedCVE-2017-7998
FULLDISC
MISC
gnome/gcab -- gnome/gcab
 
A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.2018-01-11not yet calculatedCVE-2018-5345
MISC
google -- androidIn CameraDeviceClient::submitRequestList of CameraDeviceClient.cpp, there is an out-of-bounds write if metadataSize is too small. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-67782345.2018-01-12not yet calculatedCVE-2017-13210
BID
SECTRACK
CONFIRM
google -- androidAn elevation of privilege vulnerability in the Broadcom bcmdhd driver. Product: Android. Versions: Android kernel. Android ID: A-63374465. References: B-V2017081501.2018-01-12not yet calculatedCVE-2017-13213
CONFIRM
google -- androidAn information disclosure vulnerability in the Android media framework (aac). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-65280786.2018-01-12not yet calculatedCVE-2017-13188
CONFIRM
CONFIRM
google -- androidIn several places in ihevcd_decode.c, a dead loop could occur due to incomplete frames which could lead to memory leaks. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-63522067.2018-01-12not yet calculatedCVE-2017-13196
BID
SECTRACK
CONFIRM
google -- androidIn ihevcd_decode.c there is a possible infinite loop due to bytes for an sps of unsupported resolution resulting in the same sps being fed in over and over. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-65718319.2018-01-12not yet calculatedCVE-2017-13193
BID
SECTRACK
CONFIRM
google -- androidIn the hardware HEVC decoder, some media files could cause a page fault. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38495900.2018-01-12not yet calculatedCVE-2017-13214
BID
SECTRACK
CONFIRM
google -- android
 
In the ServiceManager::add function in the hardware service manager, there is an insecure permissions check based on the PID of the caller which could allow an application or service to replace a HAL service with its own service. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-68217907.2018-01-12not yet calculatedCVE-2017-13209
BID
SECTRACK
CONFIRM
EXPLOIT-DB
google -- android
 
A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.2018-01-12not yet calculatedCVE-2017-13215
BID
SECTRACK
CONFIRM
google -- android
 
An information disclosure vulnerability in the Upstream kernel kernel. Product: Android. Versions: Android kernel. Android ID: A-38159576.2018-01-12not yet calculatedCVE-2017-13222
CONFIRM
google -- android
 
In bta_scan_results_cb_impl of btif_ble_scanner.cc, there is possible resource exhaustion if a large number of repeated BLE scan results are received. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0. Android ID: A-65174158.2018-01-12not yet calculatedCVE-2017-13211
BID
SECTRACK
CONFIRM
google -- android
 
An elevation of privilege vulnerability in the Android system (systemui). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62187985.2018-01-12not yet calculatedCVE-2017-13212
CONFIRM
google -- android
 
In receive_packet of libnetutils/packet.c, there is a possible out-of-bounds write due to a missing bounds check on the DHCP response. This could lead to remote code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-67474440.2018-01-12not yet calculatedCVE-2017-13208
BID
SECTRACK
CONFIRM
google -- android
 
An information disclosure vulnerability in the Android media framework (libavc). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-63122634.2018-01-12not yet calculatedCVE-2017-13203
CONFIRM
CONFIRM
google -- android
 
In Bitmap.ccp if Bitmap.nativeCreate fails an out of memory exception is not thrown leading to a java.io.IOException later on. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-33846679.2018-01-12not yet calculatedCVE-2017-13199
BID
SECTRACK
CONFIRM
google -- android
 
An information disclosure vulnerability in the Android media framework (libavc). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64380237.2018-01-12not yet calculatedCVE-2017-13204
CONFIRM
CONFIRM
google -- android
 
A vulnerability in the Android media framework (ex) related to composition of frames lacking a color map. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68399117.2018-01-12not yet calculatedCVE-2017-13198
CONFIRM
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while performing update of FOTA partition, uninitialized data can be pushed to storage.2018-01-10not yet calculatedCVE-2017-14869
CONFIRM
google -- android
 
An information disclosure vulnerability in the Android media framework (aacdec). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-65025048.2018-01-12not yet calculatedCVE-2017-13206
CONFIRM
google -- android
 
An information disclosure vulnerability in the Android media framework (libmpeg2). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64550583.2018-01-12not yet calculatedCVE-2017-13205
CONFIRM
CONFIRM
google -- android
 
An elevation of privilege vulnerability in the Upstream kernel wifi driver. Product: Android. Versions: Android kernel. Android ID: A-64709938.2018-01-12not yet calculatedCVE-2017-13221
CONFIRM
google -- android
 
An information disclosure vulnerability in the Android media framework (stagefright mpeg4writer). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-37564426.2018-01-12not yet calculatedCVE-2017-13207
CONFIRM
google -- android
 
An information disclosure vulnerability in the Android media framework (libeffects). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-67647856.2018-01-12not yet calculatedCVE-2017-13202
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, if userspace provides a too-large IE length in wlan_hdd_cfg80211_set_ie, a buffer over-read occurs.2018-01-10not yet calculatedCVE-2017-9712
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a LayerStack can be destroyed in between Validate and Commit by the application resulting in a Use After Free condition.2018-01-10not yet calculatedCVE-2017-15849
BID
SECTRACK
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, concurrent rx notifications and read() operations in the G-Link PKT driver can result in a double free condition due to missing locking resulting in list_del() and list_add() overlapping and corrupting the next and previous pointers.2018-01-10not yet calculatedCVE-2017-9705
CONFIRM
google -- android
 
The backup mechanism in the adb tool in Android might allow attackers to inject additional applications (APKs) and execute arbitrary code by leveraging failure to filter application data streams.2018-01-12not yet calculatedCVE-2014-7952
MISC
FULLDISC
MISC
BUGTRAQ
BID
MISC
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, an invalid input of firmware size (negative value) from user space can potentially lead to the memory leak or buffer overflow during the WLAN cal data store operation.2018-01-10not yet calculatedCVE-2017-15845
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the SPCom kernel driver, a race condition exists when creating a channel.2018-01-10not yet calculatedCVE-2017-15847
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, userspace can read values from audio codec registers.2018-01-10not yet calculatedCVE-2017-15850
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the fastrpc kernel driver, a buffer overflow vulnerability from userspace may potentially exist.2018-01-10not yet calculatedCVE-2017-15848
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a specially-crafted HDMI CEC message can be used to cause stack memory corruption.2018-01-10not yet calculatedCVE-2017-9689
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, by calling an IPA ioctl and searching for routing/filer/hdr rule handle from ipa_idr pointer using ipa_idr_find() function, the wrong structure pointer can be returned resulting in a slab out of bound access in the IPA driver.2018-01-10not yet calculatedCVE-2017-14879
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the pp_pgc_get_config() graphics driver function, a kernel memory overwrite can potentially occur.2018-01-10not yet calculatedCVE-2017-14873
CONFIRM
google -- android
 
In the ihevcd_parse_slice.c function, slave threads are not joined if there is an error. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64784973.2018-01-12not yet calculatedCVE-2017-13197
BID
SECTRACK
CONFIRM
google -- android
 
A denial of service vulnerability in the Upstream kernel synaptics touchscreen controller. Product: Android. Versions: Android kernel. Android ID: A-62800865.2018-01-12not yet calculatedCVE-2017-13219
CONFIRM
google -- android
 
Access to CNTVCT_EL0 could be used for side channel attacks. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-68266545.2018-01-12not yet calculatedCVE-2017-13218
BID
SECTRACK
CONFIRM
google -- android
 
In DisplayFtmItem in the bootloader, there is an out-of-bounds write due to reading a string without verifying that it's null-terminated. This could lead to a secure boot bypass and a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-68269077.2018-01-12not yet calculatedCVE-2017-13217
BID
SECTRACK
CONFIRM
google -- android
 
An information disclosure vulnerability in the Android media framework (av) related to id3 unsynchronization. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-63100526.2018-01-12not yet calculatedCVE-2017-13200
CONFIRM
CONFIRM
google -- android
 
An information disclosure vulnerability in the Android media framework (mediadrm). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-63982768.2018-01-12not yet calculatedCVE-2017-13201
CONFIRM
google -- android
 
In libMtkOmxVdec.so there is a possible heap buffer overflow. This could lead to a remote elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38308024. References: M-ALPS03495789.2018-01-12not yet calculatedCVE-2017-13225
BID
SECTRACK
CONFIRM
google -- android
 
An elevation of privilege vulnerability in the MediaTek mtk. Product: Android. Versions: Android kernel. Android ID: A-32591194. References: M-ALPS03149184.2018-01-12not yet calculatedCVE-2017-13226
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing a user supplied sparse image, a buffer overflow vulnerability could occur if the sparse header block size is equal to 4294967296.2018-01-10not yet calculatedCVE-2017-11080
CONFIRM
google -- android
 
In ashmem_ioctl of ashmem.c, there is an out-of-bounds write due to insufficient locking when accessing asma. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-66954097.2018-01-12not yet calculatedCVE-2017-13216
BID
SECTRACK
CONFIRM
EXPLOIT-DB
google -- android
 
An elevation of privilege vulnerability in the Upstream kernel bluez. Product: Android. Versions: Android kernel. Android ID: A-63527053.2018-01-12not yet calculatedCVE-2017-13220
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, there is a potential buffer overflow vulnerability in hdd_parse_setrmcenable_command and hdd_parse_setrmcactionperiod_command APIs as buffers defined in this API can hold maximum 32 bytes but data more than 32 bytes can get copied.2018-01-10not yet calculatedCVE-2017-11081
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while updating a firmware image, data is read from flash into RAM without checking that the data fits into allotted RAM size.2018-01-10not yet calculatedCVE-2017-11003
CONFIRM
google -- android
 
In the parseURL function of URLStreamHandler, there is improper input validation of the host field. This could lead to a remote elevation of privilege that could enable bypassing user interaction requirements with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68341964.2018-01-12not yet calculatedCVE-2017-13176
BID
SECTRACK
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while flashing ubi image an uninitialized memory could be accessed.2018-01-10not yet calculatedCVE-2017-11066
CONFIRM
google -- android
 
In the initDecoder function of SoftAVCDec, there is a possible out-of-bounds write to mCodecCtx due to a use after free when buffer allocation fails. This could lead to remote code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-66969281.2018-01-12not yet calculatedCVE-2017-13178
BID
SECTRACK
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing sparse image, uninitialized heap memory can potentially be flashed due to the lack of validation of sparse image block header size.2018-01-10not yet calculatedCVE-2017-11079
CONFIRM
google -- android
 
In several functions of libhevc, NEON registers are not preserved. This could lead to remote code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68320413.2018-01-12not yet calculatedCVE-2017-13177
BID
SECTRACK
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, manipulation of SafeSwitch Image data can result in Heap overflow.2018-01-10not yet calculatedCVE-2017-11069
BID
SECTRACK
CONFIRM
google -- android
 
NVIDIA driver contains an integer overflow vulnerability which could cause a use after free and possibly lead to an elevation of privilege enabling code execution as a privileged process. This issue is rated as high. Version: N/A. Android ID: A-37776156. References: N-CVE-2017-0869.2018-01-12not yet calculatedCVE-2017-0869
BID
SECTRACK
CONFIRM
google -- android
 
In MPEG4Extractor.cpp, there are several places where functions return early without cleaning up internal buffers which could lead to memory leaks. This could lead to remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-64452857.2018-01-12not yet calculatedCVE-2017-0855
BID
SECTRACK
CONFIRM
google -- android
 
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while updating the recovery message for eMMC devices, 1088 bytes of stack memory can potentially be leaked.2018-01-10not yet calculatedCVE-2017-14870
CONFIRM
google -- android
 
An information disclosure vulnerability in the Android framework (clipboardservice). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-64934810.2018-01-12not yet calculatedCVE-2017-0846
CONFIRM
google -- android
 
In the ihevcd_allocate_static_bufs and ihevcd_create functions of SoftHEVC, there is a possible out-of-bounds write due to a use after free. Both ps_codec_obj and ps_create_op->s_ivd_create_op_t.pv_handle point to the same memory and ps_codec_obj could be freed without clearing ps_create_op->s_ivd_create_op_t.pv_handle. This could lead to remote code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-66969193.2018-01-12not yet calculatedCVE-2017-13179
BID
SECTRACK
CONFIRM
google -- android
 
In the ihevcd_parse_sps function of ihevcd_parse_headers.c, several parameter values could be negative which could lead to negative indexes which could lead to an infinite loop. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-65398821.2018-01-12not yet calculatedCVE-2017-13195
BID
SECTRACK
CONFIRM
google -- android
 
A vulnerability in the Android media framework (libavc) related to incorrect use of mmco parameters. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-65735716.2018-01-12not yet calculatedCVE-2017-13186
CONFIRM
CONFIRM
google -- android
 
In the ihevcd_parse_slice_header function of ihevcd_parse_slice_header.c a slice address of zero after the first slice could result in an infinite loop. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64380202.2018-01-12not yet calculatedCVE-2017-13192
BID
SECTRACK
CONFIRM
google -- android
 
An information disclosure vulnerability in the Android media framework (libhevc). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-65034175.2018-01-12not yet calculatedCVE-2017-13187
CONFIRM
CONFIRM
google -- android
 
A vulnerability in the Android media framework (libavc) related to handling dec_hdl memory allocation failures. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68300072.2018-01-12not yet calculatedCVE-2017-13189
CONFIRM
CONFIRM
google -- android
 
In the enableVSyncInjections function of SurfaceFlinger, there is a possible use after free of mVSyncInjector. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-65483324.2018-01-12not yet calculatedCVE-2017-13184
BID
SECTRACK
CONFIRM
google -- android
 
A vulnerability in the Android media framework (libhevc) related to handling ps_codec_obj memory allocation failures. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68299873.2018-01-12not yet calculatedCVE-2017-13190
CONFIRM
CONFIRM
google -- android
 
In the sendFormatChange function of ACodec, there is a possible integer overflow which could lead to an out-of-bounds write. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-67737022.2018-01-12not yet calculatedCVE-2017-13182
BID
SECTRACK
CONFIRM
google -- android
 
In the doGetThumb and getThumbnail functions of MtpServer, there is a possible double free due to not NULLing out a freed pointer. This could lead to an local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-67864232.2018-01-12not yet calculatedCVE-2017-13181
BID
SECTRACK
CONFIRM
google -- android
 
An information disclosure vulnerability in the Android media framework (libhevc). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-65123471.2018-01-12not yet calculatedCVE-2017-13185
CONFIRM
CONFIRM
google -- android
 
In the OMXNodeInstance::useBuffer and IOMX::freeBuffer functions, there is a possible use after free due to a race condition if the user frees the buffer while it's being used in another thread. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: 8.1. Android ID: A-38118127.2018-01-12not yet calculatedCVE-2017-13183
BID
SECTRACK
CONFIRM
google -- android
 
In the onQueueFilled function of SoftAVCDec, there is a possible out-of-bounds write due to a use after free if a bad header causes the decoder to get caught in a loop while another thread frees the memory it's accessing. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-66969349.2018-01-12not yet calculatedCVE-2017-13180
BID
SECTRACK
CONFIRM
google -- android
 
A vulnerability in the Android media framework (libvpx) related to odd frame width. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64710201.2018-01-12not yet calculatedCVE-2017-13194
CONFIRM
CONFIRM
google -- android
 
In the ihevcd_decode function of ihevcd_decode.c, there is an infinite loop due to an incomplete frame error. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64380403.2018-01-12not yet calculatedCVE-2017-13191
BID
SECTRACK
CONFIRM
google -- chrome
 
The Google V8 engine, as used in Google Chrome before 44.0.2403.89 and QtWebEngineCore in Qt before 5.5.1, allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted web site.2018-01-09not yet calculatedCVE-2015-1290
CONFIRM
CONFIRM
SUSE
MISC
CONFIRM
CONFIRM
graphicsmagick -- graphicsmagick
 
In GraphicsMagick 1.3.27, there is an infinite loop and application hang in the ReadBMPImage function (coders/bmp.c). Remote attackers could leverage this vulnerability to cause a denial of service via an image file with a crafted bit-field mask value.2018-01-13not yet calculatedCVE-2018-5685
MISC
MISC
hibernate -- validator
 
In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue().2018-01-10not yet calculatedCVE-2017-7536
BID
SECTRACK
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM
hitron -- hitron_devices
 
Hitron CVE-30360 devices use a 578A958E3DD933FC DES key that is shared across different customers' installations, which makes it easier for attackers to obtain sensitive information by decrypting a backup configuration file, as demonstrated by a password hash in the um_auth_account_password field.2018-01-07not yet calculatedCVE-2014-10069
MISC
MISC
MISC
huawei -- campus_switches
 
Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal.2018-01-08not yet calculatedCVE-2014-5394
CONFIRM
BID
XF
ibm -- curam_social_program_management
 
IBM Curam Social Program Management 6.0.5, 6.1.1, 6.2.0, and 7.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 134921.2018-01-11not yet calculatedCVE-2017-1739
CONFIRM
BID
MISC
ibm -- curam_social_program_management
 
IBM Curam Social Program Management 6.0.5, 6.1.1, 6.2.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 134922.2018-01-11not yet calculatedCVE-2017-1740
CONFIRM
BID
MISC
ibm -- qradar
 
IBM QRadar 7.2 and 7.3 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 119737.2018-01-10not yet calculatedCVE-2016-9722
CONFIRM
MISC
ibm -- qradar
 
IBM QRadar 7.2 and 7.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 133121.2018-01-10not yet calculatedCVE-2017-1623
CONFIRM
BID
MISC
ibm -- security_access_manager_appliance
 
IBM Security Access Manager Appliance 9.0.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 130675.2018-01-10not yet calculatedCVE-2017-1533
CONFIRM
BID
SECTRACK
MISC
ibm -- security_access_manager_appliance
 
IBM Security Access Manager Appliance 9.0.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 128613.2018-01-11not yet calculatedCVE-2017-1478
CONFIRM
SECTRACK
MISC
ibm -- security_access_manager_appliance
 
IBM Security Access Manager Appliance 8.0.0 and 9.0.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 130676.2018-01-10not yet calculatedCVE-2017-1534
CONFIRM
SECTRACK
MISC
ibm -- security_access_manager_appliance
 
IBM Security Access Manager Appliance 8.0.0 and 9.0.0 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 128378.2018-01-10not yet calculatedCVE-2017-1459
CONFIRM
SECTRACK
MISC
ibm -- security_identity_manager_virtual_appliance
 
IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.0 before 7.0.1-ISS-SIM-FP0001 do not properly restrict failed login attempts, which makes it easier for remote attackers to obtain access via a brute-force approach. IBM X-Force ID: 111695.2018-01-12not yet calculatedCVE-2016-0332
CONFIRM
XF
ibm -- security_identity_manager_virtual_appliance
 
Cross-site request forgery (CSRF) vulnerability in IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.0 before 7.0.1-ISS-SIM-FP0001 allows remote attackers to hijack the authentication of users for requests that have unspecified impact via unknown vectors. IBM X-Force ID: 111736.2018-01-12not yet calculatedCVE-2016-0335
CONFIRM
XF
ibm -- security_identity_manager_virtual_appliance
 
IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.0 before 7.0.1-ISS-SIM-FP0001 allows remote authenticated users to execute arbitrary code with administrator privileges via unspecified vectors. IBM X-Force ID: 111640.2018-01-12not yet calculatedCVE-2016-0324
CONFIRM
XF
ibm -- security_identity_manager_virtual_appliance
 
Cross-site scripting (XSS) vulnerability in IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.0 before 7.0.1-ISS-SIM-FP0001 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. IBM X-Force ID: 111737.2018-01-12not yet calculatedCVE-2016-0336
CONFIRM
XF
ibm -- security_identity_manager_virtual_appliance
 
IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.0 before 7.0.1-ISS-SIM-FP0001 allows local users to gain administrator privileges via unspecified vectors. IBM X-Force ID: 111643.2018-01-12not yet calculatedCVE-2016-0327
CONFIRM
XF
ibm -- tivoli_key_lifecycle_managerIBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 133638.2018-01-09not yet calculatedCVE-2017-1671
CONFIRM
BID
MISC
ibm -- tivoli_key_lifecycle_manager
 
IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 133540.2018-01-09not yet calculatedCVE-2017-1666
CONFIRM
BID
MISC
ibm -- tivoli_key_lifecycle_manager
 
IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 133562.2018-01-09not yet calculatedCVE-2017-1668
CONFIRM
BID
MISC
ibm -- tivoli_key_lifecycle_manager
 
IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 133637.2018-01-09not yet calculatedCVE-2017-1670
CONFIRM
BID
MISC
ibm -- urbancode_deploy
 
IBM UrbanCode Deploy (UCD) 6.1 and 6.2 could allow an authenticated user to edit objects that they should not have access to due to improper access controls. IBM X-Force ID: 128691.2018-01-09not yet calculatedCVE-2017-1493
CONFIRM
BID
MISC
ibm -- websphere_application_server
 
IBM WebSphere Application Server (IBM Liberty for Java for Bluemix 3.15) could allow a local attacker to obtain sensitive information, caused by improper handling of application requests, which could allow unauthorized access to read a file. IBM X-Force ID: 134003.2018-01-11not yet calculatedCVE-2017-1681
CONFIRM
MISC
ibm -- websphere_portal
 
IBM WebSphere Portal 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 137158.2018-01-11not yet calculatedCVE-2018-1361
SECTRACK
MISC
CONFIRM
ibm -- websphere
 
IBM WebSphere MQ 7.0, 7.1, 7.5, 8.0, and 9.0 service trace module could be used to execute untrusted code under 'mqm' user. IBM X-Force ID: 132953.2018-01-09not yet calculatedCVE-2017-1612
CONFIRM
BID
MISC
icy_phoenix -- icy_phoenix
 
Icy Phoenix 2.2.0.105 allows SQL injection via an unapprove request to admin_kb_art.php or the order parameter to admin_jr_admin.php, related to functions_kb.php.2018-01-13not yet calculatedCVE-2018-5697
MISC
imagemagick -- imagemagick
 
ImageMagick 7.0.7-22 Q16 has memory leaks in the EncodeImageAttributes function in coders/json.c, as demonstrated by the ReadPSDLayersInternal function in coders/psd.c.2018-01-12not yet calculatedCVE-2018-5358
CONFIRM
imagemagick -- imagemagick
 
ImageMagick 7.0.7-22 Q16 has memory leaks in the ReadDCMImage function in coders/dcm.c.2018-01-12not yet calculatedCVE-2018-5357
CONFIRM
imagemagick -- imagemagickIn ImageMagick 7.0.6-10 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allow remote attackers to cause a denial of service via a crafted file.2018-01-12not yet calculatedCVE-2017-18029
CONFIRM
imagemagick -- imagemagick
 
In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allow remote attackers to cause a denial of service via a crafted file.2018-01-12not yet calculatedCVE-2017-18027
CONFIRM
imagemagick -- imagemagick
 
In ImageMagick 7.0.7-17 Q16, there is a heap-based buffer over-read in coders/sixel.c in the ReadSIXELImage function, related to the sixel_decode function.2018-01-05not yet calculatedCVE-2018-5248
BID
CONFIRM
imagemagick -- imagemagick
 
In ImageMagick 7.0.7-12 Q16, there are memory leaks in MontageImageCommand in MagickWand/montage.c.2018-01-05not yet calculatedCVE-2017-18022
BID
CONFIRM
imagemagick -- imagemagick
 
In ImageMagick 7.0.7-1 Q16, a memory exhaustion vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allow remote attackers to cause a denial of service via a crafted file.2018-01-12not yet calculatedCVE-2017-18028
CONFIRM
imagemagick -- imagemagick
 
In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadPATTERNImage in coders/pattern.c.2018-01-05not yet calculatedCVE-2018-5246
BID
CONFIRM
innotube -- itguard-manager
 
cgi-bin/drknow.cgi in Innotube ITGuard-Manager 0.0.0.1 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the username field, as demonstrated by a username beginning with "admin|" to use the '|' metacharacter.2018-01-08not yet calculatedCVE-2017-18025
EXPLOIT-DB
intel -- driver_and_support_assistance
 
SEMA driver in Intel Driver and Support Assistant before version 3.1.1 allows a local attacker the ability to read and writing to Memory Status registers potentially allowing information disclosure or a denial of service condition.2018-01-09not yet calculatedCVE-2018-3610
CONFIRM
irssi -- irssi
 
When using incomplete escape codes, Irssi before 1.0.6 may access data beyond the end of the string.2018-01-06not yet calculatedCVE-2018-5205
CONFIRM
irssi -- irssi
 
When the channel topic is set without specifying a sender, Irssi before 1.0.6 may dereference a NULL pointer.2018-01-06not yet calculatedCVE-2018-5206
CONFIRM
irssi -- irssi
 
In Irssi before 1.0.6, a calculation error in the completion code could cause a heap buffer overflow when completing certain strings.2018-01-06not yet calculatedCVE-2018-5208
CONFIRM
irssi -- irssi
 
When using an incomplete variable argument, Irssi before 1.0.6 may access data beyond the end of the string.2018-01-06not yet calculatedCVE-2018-5207
CONFIRM
ixsystems -- freenas
 
FreeNAS before 9.3-M3 has a blank admin password, which allows remote attackers to gain root privileges by leveraging a WebGui login.2018-01-08not yet calculatedCVE-2014-5334
MLIST
BID
CONFIRM
jolla -- sailfish_os
 
Jolla Sailfish OS before 1.1.2.16 allows remote attackers to spoof phone numbers and trigger calls to arbitrary numbers via spaces in a tel: URL.2018-01-12not yet calculatedCVE-2015-3888
MISC
joomla! -- joomla!
 
The StackIdeas EasyDiscuss (aka com_easydiscuss) extension before 4.0.21 for Joomla! allows XSS.2018-01-08not yet calculatedCVE-2018-5263
CONFIRM
EXPLOIT-DB
joomla! -- joomla!
 
The iJoomla com_adagency plugin 6.0.9 for Joomla! allows SQL injection via the `advertiser_status` and `status_select` parameters to index.php.2018-01-13not yet calculatedCVE-2018-5696
MISC
jungo_connectivity -- windriver
 
Race condition in Jungo Windriver 12.5.1 allows local users to cause a denial of service (buffer overflow) or gain system privileges by flipping pool buffer size, aka a "double fetch" vulnerability.2018-01-11not yet calculatedCVE-2018-5189
EXPLOIT-DB
MISC
juniper_networks -- junos_os
 
A sustained sequence of different types of normal transit traffic can trigger a high CPU consumption denial of service condition in the Junos OS register and schedule software interrupt handler subsystem when a specific command is issued to the device. This affects one or more threads and conversely one or more running processes running on the system. Once this occurs, the high CPU event(s) affects either or both the forwarding and control plane. As a result of this condition the device can become inaccessible in either or both the control and forwarding plane and stops forwarding traffic until the device is rebooted. The issue will reoccur after reboot upon receiving further transit traffic. Score: 5.7 MEDIUM (CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) For network designs utilizing layer 3 forwarding agents or other ARP through layer 3 technologies, the score is slightly higher. Score: 6.5 MEDIUM (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) If the following entry exists in the RE message logs then this may indicate the issue is present. This entry may or may not appear when this issue occurs. /kernel: Expensive timeout(9) function: Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D50; 12.3X48 versions prior to 12.3X48-D30; 12.3R versions prior to 12.3R12-S7; 14.1 versions prior to 14.1R8-S4, 14.1R9; 14.1X53 versions prior to 14.1X53-D30, 14.1X53-D34; 14.2 versions prior to 14.2R8; 15.1 versions prior to 15.1F6, 15.1R3; 15.1X49 versions prior to 15.1X49-D40; 15.1X53 versions prior to 15.1X53-D31, 15.1X53-D33, 15.1X53-D60. No other Juniper Networks products or platforms are affected by this issue.2018-01-10not yet calculatedCVE-2018-0004
CONFIRM
juniper_networks -- junos_os
 
An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to the local segment, through a local segment broadcast, may be able to cause a Junos device to enter an improper boundary check condition allowing a memory corruption to occur, leading to a denial of service. Further crafted packets may be able to sustain the denial of service condition. Score: 6.5 MEDIUM (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Further, if the attacker is authenticated on the target device receiving and processing the malicious LLDP packet, while receiving the crafted packets, the attacker may be able to perform command or arbitrary code injection over the target device thereby elevating their permissions and privileges, and taking control of the device. Score: 7.8 HIGH (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to one or more local segments, via LLDP proxy / tunneling agents or other LLDP through Layer 3 deployments, through one or more local segment broadcasts, may be able to cause multiple Junos devices to enter an improper boundary check condition allowing a memory corruption to occur, leading to multiple distributed Denials of Services. These Denials of Services attacks may have cascading Denials of Services to adjacent connected devices, impacts network devices, servers, workstations, etc. Further crafted packets may be able to sustain these Denials of Services conditions. Score 6.8 MEDIUM (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H) Further, if the attacker is authenticated on one or more target devices receiving and processing these malicious LLDP packets, while receiving the crafted packets, the attacker may be able to perform command or arbitrary code injection over multiple target devices thereby elevating their permissions and privileges, and taking control multiple devices. Score: 7.8 HIGH (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71; 12.3 versions prior to 12.3R12-S7; 12.3X48 versions prior to 12.3X48-D55; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D46, 14.1X53-D50, 14.1X53-D107; 14.2 versions prior to 14.2R7-S9, 14.2R8; 15.1 versions prior to 15.1F2-S17, 15.1F5-S8, 15.1F6-S8, 15.1R5-S7, 15.1R7; 15.1X49 versions prior to 15.1X49-D90; 15.1X53 versions prior to 15.1X53-D65; 16.1 versions prior to 16.1R4-S6, 16.1R5; 16.1X65 versions prior to 16.1X65-D45; 16.2 versions prior to 16.2R2; 17.1 versions prior to 17.1R2. No other Juniper Networks products or platforms are affected by this issue.2018-01-10not yet calculatedCVE-2018-0007
CONFIRM
juniper_networks -- junos_os
 
An unauthenticated root login may allow upon reboot when a commit script is used. A commit script allows a device administrator to execute certain instructions during commit, which is configured under the [system scripts commit] stanza. Certain commit scripts that work without a problem during normal commit may cause unexpected behavior upon reboot which can leave the system in a state where root CLI login is allowed without a password due to the system reverting to a "safe mode" authentication state. Lastly, only logging in physically to the console port as root, with no password, will work. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71 on SRX; 12.3X48 versions prior to 12.3X48-D55 on SRX; 14.1 versions prior to 14.1R9; 14.1X53 versions prior to 14.1X53-D40 on QFX, EX; 14.2 versions prior to 14.2R7-S9, 14.2R8; 15.1 versions prior to 15.1F5-S7, 15.1F6-S8, 15.1R5-S6, 15.1R6; 15.1X49 versions prior to 15.1X49-D110 on SRX; 15.1X53 versions prior to 15.1X53-D232 on QFX5200/5110; 15.1X53 versions prior to 15.1X53-D49, 15.1X53-D470 on NFX; 15.1X53 versions prior to 15.1X53-D65 on QFX10K; 16.1 versions prior to 16.1R2. No other Juniper Networks products or platforms are affected by this issue.2018-01-10not yet calculatedCVE-2018-0008
CONFIRM
juniper_networks -- junos_os
 
QFX and EX Series switches configured to drop traffic when the MAC move limit is exceeded will forward traffic instead of dropping traffic. This can lead to denials of services or other unintended conditions. Affected releases are Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D40; 15.1X53 versions prior to 15.1X53-D55; 15.1 versions prior to 15.1R7.2018-01-10not yet calculatedCVE-2018-0005
CONFIRM
juniper_networks -- junos_os
 
On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeated crashes of the flowd daemon which results in an extended Denial of Service condition. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D60 on SRX series; 12.3X48 versions prior to 12.3X48-D35 on SRX series; 14.1 versions prior to 14.1R9 on MX series; 14.2 versions prior to 14.2R8 on MX series; 15.1X49 versions prior to 15.1X49-D60 on SRX series; 15.1 versions prior to 15.1R5-S8, 15.1F6-S9, 15.1R6-S4, 15.1R7 on MX series; 16.1 versions prior to 16.1R6 on MX series; 16.2 versions prior to 16.2R3 on MX series; 17.1 versions prior to 17.1R2-S4, 17.1R3 on MX series. No other Juniper Networks products or platforms are affected by this issue.2018-01-10not yet calculatedCVE-2018-0002
CONFIRM
juniper_networks -- junos_os
 
On Juniper Networks SRX series devices, firewall rules configured to match custom application UUIDs starting with zeros can match all TCP traffic. Due to this issue, traffic that should have been blocked by other rules is permitted to flow through the device resulting in a firewall bypass condition. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71 on SRX series; 12.3X48 versions prior to 12.3X48-D55 on SRX series; 15.1X49 versions prior to 15.1X49-D100 on SRX series.2018-01-10not yet calculatedCVE-2018-0009
BID
CONFIRM
juniper_networks -- junos_os
 
A high rate of VLAN authentication attempts sent from an adjacent host on the local broadcast domain can trigger high memory utilization by the BBE subscriber management daemon (bbe-smgd), and lead to a denial of service condition. The issue was caused by attempting to process an unbounded number of pending VLAN authentication requests, leading to excessive memory allocation. This issue only affects devices configured for DHCPv4/v6 over AE auto-sensed VLANs, utilized in Broadband Edge (BBE) deployments. Other configurations are unaffected by this issue. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R6-S2, 15.1R7; 16.1 versions prior to 16.1R5-S1, 16.1R6; 16.2 versions prior to 16.2R2-S2, 16.2R3; 17.1 versions prior to 17.1R2-S5, 17.1R3; 17.2 versions prior to 17.2R2.2018-01-10not yet calculatedCVE-2018-0006
CONFIRM
juniper_networks -- junos_os
 
A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D67; 12.3 versions prior to 12.3R12-S5; 12.3X48 versions prior to 12.3X48-D35; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D44, 14.1X53-D50; 14.2 versions prior to 14.2R7-S7, 14.2R8; 15.1 versions prior to 15.1R3; 15.1X49 versions prior to 15.1X49-D30; 15.1X53 versions prior to 15.1X53-D70.2018-01-10not yet calculatedCVE-2018-0001
CONFIRM
juniper_networks -- junos_os
 
A specially crafted MPLS packet received or processed by the system, on an interface configured with MPLS, will store information in the system memory. Subsequently, if this stored information is accessed, this may result in a kernel crash leading to a denial of service. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71; 12.3R12 versions prior to 12.3R12-S7; 12.3X48 versions prior to 12.3X48-D55; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D45, 14.1X53-D107; 14.2 versions prior to 14.2R7-S7, 14.2R8; 15.1 versions prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7; 15.1X49 versions prior to 15.1X49-D100; 15.1X53 versions prior to 15.1X53-D65, 15.1X53-D231; 16.1 versions prior to 16.1R3-S6, 16.1R4-S6, 16.1R5; 16.1X65 versions prior to 16.1X65-D45; 16.2 versions prior to 16.2R2-S1, 16.2R3; 17.1 versions prior to 17.1R2-S2, 17.1R3; 17.2 versions prior to 17.2R1-S3, 17.2R2; 17.2X75 versions prior to 17.2X75-D50. No other Juniper Networks products or platforms are affected by this issue.2018-01-10not yet calculatedCVE-2018-0003
CONFIRM
juniper_networks -- junos_space_network_management_platform
 
A local file inclusion vulnerability in Juniper Networks Junos Space Network Management Platform may allow an authenticated user to retrieve files from the system.2018-01-10not yet calculatedCVE-2018-0013
CONFIRM
juniper_networks -- junos_space_security_director
 
Junos Space is affected by a privilege escalation vulnerability that may allow a local authenticated attacker to gain root privileges.2018-01-10not yet calculatedCVE-2018-0012
CONFIRM
juniper_networks -- junos_space_security_director
 
A reflected cross site scripting (XSS) vulnerability in Junos Space may potentially allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a session, and to perform administrative actions on the Junos Space network management device.2018-01-10not yet calculatedCVE-2018-0011
CONFIRM
juniper_networks -- junos_space_security_director
 
A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was created for another user to perform SSH access. Affected releases are all versions of Junos Space Security Director prior to 17.2R1.2018-01-10not yet calculatedCVE-2018-0010
CONFIRM
juniper_networks -- screenos
 
Juniper Networks ScreenOS devices do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is often detected as CVE-2003-0001. The issue affects all versions of Juniper Networks ScreenOS prior to 6.3.0r25.2018-01-10not yet calculatedCVE-2018-0014
CONFIRM
kentico -- kentico
 
Kentico 9.0 through 11.0 has a stack-based buffer overflow via the SqlName, SqlPswd, Database, UserName, or Password field in a SilentInstall XML document.2018-01-08not yet calculatedCVE-2018-5282
MISC
ks_mobile -- cheetah_mobile_armorfly_browser_and_downloader
 
Cheetah Mobile Armorfly Browser & Downloader 1.1.05.0010, when installed on unspecified "older" Android platforms, allows Same Origin Policy Bypass.2018-01-11not yet calculatedCVE-2018-5327
MISC
ks_mobile -- cheetah_mobile_cm_browser_app
 
Cheetah Mobile CM Browser 5.22.06.0012, when installed on unspecified "older" Android platforms, allows Same Origin Policy Bypass.2018-01-11not yet calculatedCVE-2018-5326
MISC
ldaptive -- ldaptive
 
DefaultHostnameVerifier in Ldaptive (formerly vt-ldap) does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.2018-01-08not yet calculatedCVE-2014-3607
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
lenovo -- lenovo
 
In Enterprise Networking Operating System (ENOS) in Lenovo and IBM RackSwitch and BladeCenter products, an authentication bypass known as "HP Backdoor" was discovered during a Lenovo security audit in the serial console, Telnet, SSH, and Web interfaces. This bypass mechanism can be accessed when performing local authentication under specific circumstances. If exploited, admin-level access to the switch is granted.2018-01-10not yet calculatedCVE-2017-3765
CONFIRM
lhaplus --lhaplus
 
Improper verification when expanding ZIP64 archives in Lhaplus versions 1.73 and earlier may lead to unintended contents to be extracted from a specially crafted ZIP64 archive.2018-01-12not yet calculatedCVE-2017-2158
CONFIRM
JVN
libav -- libav
 
In Libav 12.1, there is an invalid memcpy call in the ff_mov_read_stsd_entries function of libavformat/mov.c. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) and program failure with a crafted avi file.2018-01-13not yet calculatedCVE-2018-5684
MISC
libming -- libming
 
In libming 0.4.8, there is an integer overflow (caused by an out-of-range left shift) in the readUInt32 function (util/read.c). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted swf file.2018-01-08not yet calculatedCVE-2018-5294
MISC
libtiff -- libtiff
 
LibTIFF 4.0.9 mishandles the reading of TIFF files, as demonstrated by a heap-based buffer over-read in the ReadTIFFImage function in coders/tiff.c in GraphicsMagick 1.3.27.2018-01-13not yet calculatedCVE-2018-5360
MISC
linuxmagic -- magicspam
 
The LinuxMagic MagicSpam extension 2.0.13 for Plesk allows local users to discover mailbox names by reading /var/log/magicspam/mslog.2018-01-13not yet calculatedCVE-2018-5693
MISC
linux -- linux_kernel
 
In the Linux kernel through 4.14.13, drivers/block/loop.c mishandles lo_release serialization, which allows attackers to cause a denial of service (__lock_acquire use-after-free) or possibly have unspecified other impact.2018-01-12not yet calculatedCVE-2018-5344
MISC
MISC
linux -- linux_kernel
 
In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.2018-01-11not yet calculatedCVE-2018-5333
CONFIRM
CONFIRM
linux -- linux_kernel
 
In the Linux kernel through 4.14.13, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).2018-01-11not yet calculatedCVE-2018-5332
CONFIRM
CONFIRM
linux -- linux_kernel
 
A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.2018-01-09not yet calculatedCVE-2017-15129
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
lrzip -- lrzip
 
In Long Range Zip (aka lrzip) 0.631, there is an infinite loop and application hang in the unzip_match function in runzip.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted lrz file.2018-01-12not yet calculatedCVE-2018-5650
MISC
magento -- magento
 
Magento Community Edition and Enterprise Edition before 2.0.10 and 2.1.x before 2.1.2 have CSRF resulting in deletion of a customer address from an address book, aka APPSEC-1433.2018-01-08not yet calculatedCVE-2018-5301
CONFIRM
malwarebytes -- malwarebytes_premiumIn Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C40E024.2018-01-08not yet calculatedCVE-2018-5274
MISC
malwarebytes -- malwarebytes_premium
 
In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C40E020.2018-01-08not yet calculatedCVE-2018-5275
MISC
malwarebytes -- malwarebytes_premium
 
In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e010.2018-01-08not yet calculatedCVE-2018-5270
MISC
malwarebytes -- malwarebytes_premium
 
In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e00c.2018-01-08not yet calculatedCVE-2018-5278
MISC
malwarebytes -- malwarebytes_premium
 
In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e014.2018-01-08not yet calculatedCVE-2018-5273
MISC
malwarebytes -- malwarebytes_premium
 
In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e000.2018-01-08not yet calculatedCVE-2018-5277
MISC
malwarebytes -- malwarebytes_premium
 
In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e004.2018-01-08not yet calculatedCVE-2018-5272
MISC
malwarebytes -- malwarebytes_premium
 
In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e02c.2018-01-08not yet calculatedCVE-2018-5279
BID
MISC
malwarebytes -- malwarebytes_premium
 
In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e018.2018-01-08not yet calculatedCVE-2018-5276
MISC
malwarebytes -- malwarebytes_premium
 
In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e008.2018-01-08not yet calculatedCVE-2018-5271
BID
MISC
matrixssl -- matrixssl
 
MatrixSSL version 3.7.2 has an incorrect UTCTime date range validation in its X.509 certificate validation process resulting in some certificates have their expiration (beginning) year extended (delayed) by 100 years.2018-01-09not yet calculatedCVE-2017-1000415
MISC
MISC
microsoft -- .net_framework_and_.net_coreMicrosoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, and 4.7 and .NET Core 1.0 and 2.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka ".NET Security Feature Bypass Vulnerability".2018-01-09not yet calculatedCVE-2018-0786
BID
SECTRACK
CONFIRM
microsoft -- .net_framework_and_.net_core
 
Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 5.7 and .NET Core 1.0. 1.1 and 2.0 allow a denial of service vulnerability due to the way XML documents are processed, aka ".NET and .NET Core Denial Of Service Vulnerability". This CVE is unique from CVE-2018-0765.2018-01-09not yet calculatedCVE-2018-0764
BID
SECTRACK
CONFIRM
microsoft -- asp.net_core
 
ASP.NET Core 1.0. 1.1, and 2.0 allow a cross site request forgery vulnerability due to the ASP.NET Core project templates, aka "ASP.NET Core Cross Site Request Forgery Vulnerability".2018-01-09not yet calculatedCVE-2018-0785
BID
SECTRACK
CONFIRM
microsoft -- asp.net_core
 
ASP.NET Core 1.0. 1.1, and 2.0 allow an elevation of privilege vulnerability due to the ASP.NET Core project templates, aka "ASP.NET Core Elevation Of Privilege Vulnerability". This CVE is unique from CVE-2018-0808.2018-01-09not yet calculatedCVE-2018-0784
BID
SECTRACK
CONFIRM
microsoft -- chakracore
 
Microsoft ChakraCore allows an attacker to bypass Control Flow Guard (CFG) in conjunction with another vulnerability to run arbitrary code on a target system, due to how the Chakra scripting engine handles accessing memory, aka "Scripting Engine Security Feature Bypass".2018-01-09not yet calculatedCVE-2018-0818
BID
CONFIRM
microsoft -- office_2016_for_mac
 
Microsoft Office 2016 for Mac allows an attacker to send a specially crafted email attachment to a user in an attempt to launch a social engineering attack, such as phishing, due to how Outlook for Mac displays encoded email addresses, aka "Spoofing Vulnerability in Microsoft Office for Mac."2018-01-09not yet calculatedCVE-2018-0819
BID
SECTRACK
CONFIRM
microsoft -- officeMicrosoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Remote Code Execution Vulnerability".2018-01-09not yet calculatedCVE-2018-0795
BID
SECTRACK
CONFIRM
microsoft -- office
 
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Memory Corruption Vulnerability".2018-01-09not yet calculatedCVE-2018-0812
BID
SECTRACK
CONFIRM
microsoft -- office
 
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807.2018-01-09not yet calculatedCVE-2018-0804
BID
SECTRACK
CONFIRM
microsoft -- office
 
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0804, CVE-2018-0806, and CVE-2018-08072018-01-09not yet calculatedCVE-2018-0805
BID
SECTRACK
CONFIRM
microsoft -- office
 
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0804, CVE-2018-0805, and CVE-2018-0806.2018-01-09not yet calculatedCVE-2018-0807
BID
SECTRACK
CONFIRM
microsoft -- office
 
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0804, CVE-2018-0805, and CVE-2018-0807.2018-01-09not yet calculatedCVE-2018-0806
BID
SECTRACK
CONFIRM
microsoft -- office
 
Microsoft Excel in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Excel Remote Code Execution Vulnerability".2018-01-09not yet calculatedCVE-2018-0796
BID
SECTRACK
CONFIRM
microsoft -- office
 
Microsoft Word 2016 in Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0794.2018-01-09not yet calculatedCVE-2018-0792
BID
SECTRACK
CONFIRM
microsoft -- office
 
Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812.2018-01-09not yet calculatedCVE-2018-0802
BID
SECTRACK
MISC
MISC
CONFIRM
microsoft -- office
 
Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability".2018-01-09not yet calculatedCVE-2018-0798
BID
SECTRACK
CONFIRM
microsoft -- office
 
Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way RTF content is handled, aka "Microsoft Word Memory Corruption Vulnerability".2018-01-09not yet calculatedCVE-2018-0797
BID
SECTRACK
CONFIRM
microsoft -- office
 
Microsoft Word in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0792.2018-01-09not yet calculatedCVE-2018-0794
BID
SECTRACK
CONFIRM
microsoft -- office
 
Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Remote Code Execution Vulnerability".2018-01-09not yet calculatedCVE-2018-0801
BID
SECTRACK
CONFIRM
microsoft -- outlook
 
Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, and Microsoft Outlook 2016 allow a remote code execution vulnerability due to the way email messages are parsed, aka "Microsoft Outlook Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0793.2018-01-09not yet calculatedCVE-2018-0791
BID
SECTRACK
CONFIRM
microsoft -- outlook
 
Microsoft Outlook 2007, Microsoft Outlook 2010 and Microsoft Outlook 2013 allow a remote code execution vulnerability due to the way email messages are parsed, aka "Microsoft Outlook Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0791.2018-01-09not yet calculatedCVE-2018-0793
BID
SECTRACK
CONFIRM
microsoft -- sharepoint_enterprise_server
 
Microsoft Access in Microsoft SharePoint Enterprise Server 2013 and Microsoft SharePoint Enterprise Server 2016 allows a cross-site-scripting (XSS) vulnerability due to the way image field values are handled, aka "Microsoft Access Tampering Vulnerability".2018-01-09not yet calculatedCVE-2018-0799
BID
SECTRACK
CONFIRM
microsoft -- sharepoint_products
 
Microsoft SharePoint Foundation 2010, Microsoft SharePoint Server 2013 and Microsoft SharePoint Server 2016 allow an elevation of privilege vulnerability due to the way web requests are handled, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0790.2018-01-09not yet calculatedCVE-2018-0789
BID
SECTRACK
CONFIRM
microsoft -- sharepoint_products
 
Microsoft SharePoint Foundation 2010, Microsoft SharePoint Server 2013 and Microsoft SharePoint Server 2016 allow an elevation of privilege vulnerability due to the way web requests are handled, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0789.2018-01-09not yet calculatedCVE-2018-0790
BID
SECTRACK
CONFIRM
milum -- office_tracker
 
Office Tracker 11.2.5 has XSS via the logincount parameter to the /otweb/OTPClientLogin URI.2018-01-10not yet calculatedCVE-2017-18023
MISC
mono -- mono
 
The TLS stack in Mono before 3.12.1 makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204.2018-01-08not yet calculatedCVE-2015-2319
CONFIRM
MLIST
BID
UBUNTU
CONFIRM
CONFIRM
MISC
DEBIAN
mono -- mono
 
The TLS stack in Mono before 3.12.1 allows remote attackers to have unspecified impact via vectors related to client-side SSLv2 fallback.2018-01-08not yet calculatedCVE-2015-2320
CONFIRM
MLIST
BID
UBUNTU
CONFIRM
CONFIRM
DEBIAN
mono -- mono
 
The TLS stack in Mono before 3.12.1 allows man-in-the-middle attackers to conduct message skipping attacks and consequently impersonate clients by leveraging missing handshake state validation, aka a "SMACK SKIP-TLS" issue.2018-01-08not yet calculatedCVE-2015-2318
CONFIRM
MLIST
BID
UBUNTU
CONFIRM
CONFIRM
MISC
DEBIAN
moxa -- moxa
 
An issue was discovered in Moxa MXview v2.8 and prior. The unquoted service path escalation vulnerability could allow an authorized user with file access to escalate privileges by inserting arbitrary code into the unquoted service path.2018-01-12not yet calculatedCVE-2017-14030
BID
MISC
newsbee_cms -- newsbee_cms
 
NewsBee allows XSS via the Company Name field in the Settings under admin/admin.php.2018-01-13not yet calculatedCVE-2018-5687
MISC
newsbee_cms -- newsbee_cms
 
SQL injection vulnerability in NewsBee CMS allow remote attackers to execute arbitrary SQL commands.2018-01-08not yet calculatedCVE-2017-5971
EXPLOIT-DB
novosoft -- handy_password
 
A buffer overflow in Handy Password 4.9.3 allows remote attackers to execute arbitrary code via a long "Title name" field in "mail box" data that is mishandled in an "Open from mail box" action.2018-01-10not yet calculatedCVE-2017-17946
MISC
MISC
numpy -- numpy
 
__init__.py in f2py in NumPy before 1.8.1 allows local users to write to arbitrary files via a symlink attack on a temporary file.2018-01-08not yet calculatedCVE-2014-1858
FEDORA
FEDORA
MLIST
BID
CONFIRM
CONFIRM
XF
CONFIRM
CONFIRM
CONFIRM
numpy -- numpy
 
(1) core/tests/test_memmap.py, (2) core/tests/test_multiarray.py, (3) f2py/f2py2e.py, and (4) lib/tests/test_io.py in NumPy before 1.8.1 allow local users to write to arbitrary files via a symlink attack on a temporary file.2018-01-08not yet calculatedCVE-2014-1859
FEDORA
FEDORA
MLIST
BID
CONFIRM
CONFIRM
XF
CONFIRM
CONFIRM
CONFIRM
opencv -- opencv
 
In OpenCV 3.3.1, an assertion failure happens in cv::RBaseStream::setPos in modules/imgcodecs/src/bitstrm.cpp because of an incorrect integer cast.2018-01-08not yet calculatedCVE-2018-5269
MISC
opencv -- opencv
 
In OpenCV 3.3.1, a heap-based buffer overflow happens in cv::Jpeg2KDecoder::readComponent8u in modules/imgcodecs/src/grfmt_jpeg2000.cpp when parsing a crafted image file.2018-01-08not yet calculatedCVE-2018-5268
MISC
palo_alto_networks -- pan-os
 
Cross-site scripting (XSS) vulnerability in the Captive Portal function in Palo Alto Networks PAN-OS before 8.0.7 allows remote attackers to inject arbitrary web script or HTML by leveraging an unspecified configuration.2018-01-10not yet calculatedCVE-2017-16878
SECTRACK
CONFIRM
palo_alto_networks -- pan-os
 
Palo Alto Networks PAN-OS 6.1, 7.1, and 8.0.x before 8.0.7, when an interface implements SSL decryption with RSA enabled or hosts a GlobalProtect portal or gateway, might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.2018-01-10not yet calculatedCVE-2017-17841
BID
SECTRACK
CONFIRM
palo_alto_networks -- pan-os
 
Cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.7, when the GlobalProtect gateway or portal is configured, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.2018-01-10not yet calculatedCVE-2017-15941
BID
SECTRACK
CONFIRM
parity -- parity_browser
 
Parity Browser 1.6.10 and earlier allows remote attackers to bypass the Same Origin Policy and obtain sensitive information by requesting other websites via the Parity web proxy engine (reusing the current website's token, which is not bound to an origin).2018-01-11not yet calculatedCVE-2017-18016
MLIST
CONFIRM
MISC
EXPLOIT-DB
perl -- perl
 
clipedit in the Clipboard module for Perl allows local users to delete arbitrary files via a symlink attack on /tmp/clipedit$$.2018-01-08not yet calculatedCVE-2014-5509
MLIST
BID
CONFIRM
MISC
phoenix_contact -- fl_switchAn Improper Authorization issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to craft special HTTP requests allowing an attacker to bypass web-service authentication allowing the attacker to obtain administrative privileges on the device.2018-01-12not yet calculatedCVE-2017-16743
MISC
phoenix_contact -- fl_switch
 
An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information.2018-01-12not yet calculatedCVE-2017-16741
MISC
phpmelody -- phpmelody
 
PHP Melody version 2.7.1 suffer from SQL Injection Time-based attack on the page ajax.php with the parameter playlist.2018-01-09not yet calculatedCVE-2018-5211
EXPLOIT-DB
piwigo -- piwigo
 
Piwigo v2.8.2 has XSS via the `tab`, `to`, `section`, `mode`, `installstatus`, and `display` parameters of the `admin.php` file.2018-01-13not yet calculatedCVE-2018-5692
MISC
podofo -- podofo
 
In PoDoFo 0.9.5, there is an uncontrolled memory allocation in the PdfParser::ReadXRefSubsection function (base/PdfParser.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted pdf file.2018-01-08not yet calculatedCVE-2018-5296
MISC
podofo -- podofo
 
In PoDoFo 0.9.5, there is an integer overflow in the PdfObjectStreamParserObject::ReadObjectsFromStream function (base/PdfObjectStreamParserObject.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted pdf file.2018-01-09not yet calculatedCVE-2018-5309
MISC
podofo -- podofo
 
PoDoFo 0.9.5 does not properly validate memcpy arguments in the PdfMemoryOutputStream::Write function (base/PdfOutputStream.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service or possibly unspecified other impact via a crafted pdf file.2018-01-09not yet calculatedCVE-2018-5308
MISC
podofo -- podofo
 
In PoDoFo 0.9.5, there is an integer overflow in the PdfXRefStreamParserObject::ParseStream function (base/PdfXRefStreamParserObject.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted pdf file.2018-01-08not yet calculatedCVE-2018-5295
MISC
prestashop -- prestashop
 
PrestaShop 1.7.2.4 allow user enumeration via the Reset Password feature, by noticing which reset attempts do not produce a "This account does not exist" error message.2018-01-13not yet calculatedCVE-2018-5682
MISC
prestashop -- prestashop
 
PrestaShop 1.7.2.4 has XSS via source-code editing on the "Pages > Edit page" screen.2018-01-13not yet calculatedCVE-2018-5681
MISC
proctor_and_gamble -- oral-b_app
 
In the Procter & Gamble "Oral-B App" (aka com.pg.oralb.oralbapp) application 5.0.0 for Android, AES encryption with static parameters is used to secure the locally stored shared preferences. An attacker can gain access to locally stored user data more easily by leveraging access to the preferences XML file.2018-01-08not yet calculatedCVE-2018-5298
MISC
progress_software -- sitefinity
 
Sitefinity 5.1, 5.2, 5.3, 5.4, 6.x, 7.x, 8.x, 9.x, and 10.x allow remote attackers to bypass authentication and consequently cause a denial of service on load balanced sites or gain privileges via vectors related to weak cryptography.2018-01-08not yet calculatedCVE-2017-15883
CONFIRM
MISC
qemu -- qemu
 
Use-after-free vulnerability in hw/pci/pcie.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU instance crash) via hotplug and hotunplug operations of Virtio block devices.2018-01-12not yet calculatedCVE-2014-3471
GENTOO
MLIST
BID
CONFIRM
MLIST
qemu -- qemu
 
VNC server implementation in Quick Emulator (QEMU) before 2.14.3 was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host.2018-01-09not yet calculatedCVE-2017-15124
CONFIRM
red_hat -- cloudforums_management_engine
 
The check_privileges method in vmdb/app/controllers/application_controller.rb in ManageIQ, as used in Red Hat CloudForms Management Engine (CFME), allows remote authenticated users to bypass authorization and gain privileges by leveraging improper RBAC checking, related to the rbac_user_edit action.2018-01-11not yet calculatedCVE-2014-0087
CONFIRM
MISC
red_hat -- enterprise_linux
 
It was found that system umask policy is not being honored when creating XDG user directories, since Xsession sources xdg-user-dirs.sh before setting umask policy. This only affects xdg-user-dirs before 0.15.5 as shipped with Red Hat Enterprise Linux.2018-01-09not yet calculatedCVE-2017-15131
CONFIRM
red_hat -- jboss_enterprise_application_platform
 
It was discovered that the jboss init script as used in Red Hat JBoss Enterprise Application Platform 7.0.7.GA performed unsafe file handling which could result in local privilege escalation. This issue is a result of an incomplete fix for CVE-2016-8656.2018-01-10not yet calculatedCVE-2017-12189
BID
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM
red_hat -- openshift_enterprise
 
(1) oo-analytics-export and (2) oo-analytics-import in the openshift-origin-broker-util package in Red Hat OpenShift Enterprise 1 and 2 allow local users to have unspecified impact via a symlink attack on an unspecified file in /tmp.2018-01-08not yet calculatedCVE-2013-4364
CONFIRM
redmine -- redmine
 
Redmine before 3.2.9, 3.3.x before 3.3.6, and 3.4.x before 3.4.4 does not block the --config and --debugger flags to the Mercurial hg program, which allows remote attackers to execute arbitrary commands (through the Mercurial adapter) via vectors involving a branch whose name begins with a --config= or --debugger= substring, a related issue to CVE-2017-17536.2018-01-10not yet calculatedCVE-2017-18026
MISC
MISC
MISC
MISC
MISC
rockwell_automation_allen-bradley -- micrologix_1400_controllers
 
A Buffer Overflow issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers, Series B and C Versions 21.002 and earlier. The stack-based buffer overflow vulnerability has been identified, which may allow remote code execution.2018-01-09not yet calculatedCVE-2017-16740
BID
MISC
ruby -- ruby
 
test/tc_database.rb in the lean-ruport gem 0.3.8 for Ruby places the mysql user password on the mysqldump command line, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-4998
MLIST
MLIST
MISC
ruby -- ruby
 
Race condition in lib/vlad/dba/mysql.rb in the VladTheEnterprising gem 0.2 for Ruby allows local users to obtain sensitive information by reading the MySQL root password from a temporary file before it is removed.2018-01-10not yet calculatedCVE-2014-4995
MLIST
MLIST
BID
MISC
XF
ruby -- ruby
 
lib/vlad/dba/mysql.rb in the VladTheEnterprising gem 0.2 for Ruby allows local users to write to arbitrary files via a symlink attack on /tmp/my.cnf.#{target_host}.2018-01-10not yet calculatedCVE-2014-4996
MLIST
MLIST
BID
MISC
XF
ruby -- ruby
 
(1) lib/backup/cli/utility.rb in the backup-agoddard gem 3.0.28 and (2) lib/backup/cli/utility.rb in the backup_checksum gem 3.0.23 for Ruby place credentials on the openssl command line, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-4993
MLIST
MLIST
MLIST
MISC
MISC
ruby -- ruby
 
lib/commands/setup.rb in the point-cli gem 0.0.1 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-4997
MLIST
MLIST
BID
MISC
ruby -- ruby
 
lib/gyazo/client.rb in the gyazo gem 1.0.0 for Ruby allows local users to write to arbitrary files via a symlink attack on a temporary file, related to time-based filenames.2018-01-10not yet calculatedCVE-2014-4994
MLIST
MLIST
MISC
ruby -- ruby
 
lib/cap-strap/helpers.rb in the cap-strap gem 0.1.5 for Ruby places credentials on the useradd command line, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-4992
MLIST
MLIST
MISC
ruby -- ruby
 
chef/travis-cookbooks/ci_environment/perlbrew/recipes/default.rb in the ciborg gem 3.0.0 for Ruby allows local users to write to arbitrary files and gain privileges via a symlink attack on /tmp/perlbrew-installer.2018-01-10not yet calculatedCVE-2014-5003
MLIST
MLIST
MISC
ruby -- ruby
 
(1) lib/dataset/database/mysql.rb and (2) lib/dataset/database/postgresql.rb in the codders-dataset gem 1.3.2.1 for Ruby place credentials on the mysqldump command line, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-4991
MLIST
MLIST
BID
MISC
ruby -- ruby
 
The login function in lib/lawn.rb in the lawn-login gem 0.0.7 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-5000
MLIST
MLIST
MISC
ruby -- ruby
 
The lynx gem 0.2.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes.2018-01-10not yet calculatedCVE-2014-5002
MLIST
MLIST
MISC
ruby -- ruby
 
lib/ksymfony1.rb in the kcapifony gem 2.1.6 for Ruby places database user passwords on the (1) mysqldump, (2) pg_dump, (3) mysql, and (4) psql command lines, which allows local users to obtain sensitive information by listing the processes.2018-01-10not yet calculatedCVE-2014-5001
MLIST
MLIST
MISC
ruby -- ruby
 
lib/brbackup.rb in the brbackup gem 0.1.1 for Ruby places the database password on the mysql command line, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-5004
MLIST
MLIST
BID
MISC
ruby -- ruby
 
vendor/plugins/dataset/lib/dataset/database/mysql.rb in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-4999
MLIST
MLIST
MISC
sap -- hana
 
A remote unauthenticated attacker, SAP HANA 1.00 and 2.00, could send specially crafted SOAP requests to the SAP Startup Service and disclose information such as the platform's hostname.2018-01-09not yet calculatedCVE-2018-2362
BID
CONFIRM
CONFIRM
sap -- netweaver_and_basis
 
SAP NetWeaver, SAP BASIS from 7.00 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.52, contains code that allows you to execute arbitrary program code of the user's choice. A malicious user can therefore control the behaviour of the system or can potentially escalate privileges by executing malicious code without legitimate credentials.2018-01-09not yet calculatedCVE-2018-2363
BID
CONFIRM
CONFIRM
CONFIRM
sap -- solution_manager
 
In SAP Solution Manager 7.20, the role SAP_BPO_CONFIG gives the Business Process Operations (BPO) configuration user more authorization than required for configuring the BPO tools.2018-01-09not yet calculatedCVE-2018-2361
BID
CONFIRM
CONFIRM
sap -- startup_service
 
SAP Startup Service, SAP KERNEL 7.45, 7.49, and 7.52, is missing an authentication check for functionalities that require user identity and cause consumption of file system storage.2018-01-09not yet calculatedCVE-2018-2360
BID
CONFIRM
CONFIRM
seagate -- personal_cloud
 
Seagate Media Server in Seagate Personal Cloud has unauthenticated command injection in the uploadTelemetry and getLogs functions in views.py because .psp URLs are handled by the fastcgi.server component and shell metacharacters are mishandled.2018-01-11not yet calculatedCVE-2018-5347
MISC
shibboleth -- shibboleth
 
Shibboleth XMLTooling-C before 1.6.3, as used in Shibboleth Service Provider before 2.6.0 on Windows and other products, mishandles digital signatures of user attribute data, which allows remote attackers to obtain sensitive information or conduct impersonation attacks via a crafted DTD.2018-01-13not yet calculatedCVE-2018-0486
MISC
MISC
skybox_security -- skybox_platform
 
An issue was discovered in Skybox Platform before 7.5.401. SQL Injection exists in /skyboxview/webservice/services/VersionWebService via a soapenv:Body element.2018-01-12not yet calculatedCVE-2015-9249
MISC
skybox_security -- skybox_platform
 
An issue was discovered in Skybox Platform before 7.5.401. Directory Traversal exists in /skyboxview/webskybox/attachmentdownload and /skyboxview/webskybox/filedownload via the tempFileName parameter.2018-01-12not yet calculatedCVE-2015-9250
MISC
skybox_security -- skybox_platform
 
An issue was discovered in Skybox Platform before 7.5.401. Reflected cross-site scripting vulnerabilities exist in /skyboxview/webservice/services/VersionRepositoryWebService via a soapenv:Body element, or in the status parameter to login.html.2018-01-12not yet calculatedCVE-2015-9247
MISC
skybox_security -- skybox_platform
 
An issue was discovered in Skybox Platform before 7.5.401. Remote Unauthenticated Code Execution exists via a WAR archive containing a JSP file. The WAR file is sent to /skyboxview-softwareupdate/services/CollectorSoftwareUpdate and the JSP file is reached at /opt/skyboxview/thirdparty/jboss/server/web/work/jboss.web/localhost.2018-01-12not yet calculatedCVE-2015-9246
MISC
skybox_security -- skybox_platform
 
An issue was discovered in Skybox Platform before 7.5.401. Stored cross-site scripting vulnerabilities exist in the title, Comments, or Description field to /skyboxview/webskybox/tickets in Change Manager.2018-01-12not yet calculatedCVE-2015-9248
MISC
sonicwall -- sonicos
 
SonicWall SonicOS on Network Security Appliance (NSA) 2016 Q4 devices has XSS via the Configure SSO screens.2018-01-08not yet calculatedCVE-2018-5280
BID
MISC
sonicwall -- sonicos
 
SonicWall SonicOS on Network Security Appliance (NSA) 2017 Q4 devices has XSS via the CFS Custom Category and Cloud AV DB Exclusion Settings screens.2018-01-08not yet calculatedCVE-2018-5281
BID
MISC
sonicwall -- global_management_system
 
SonicWall Global Management System (GMS) 8.1 has XSS via the `newName` and `Name` values of the `/sgms/TreeControl` module.2018-01-13not yet calculatedCVE-2018-5691
MISC
MISC
sophos -- xg_firewall
 
An NC-25986 issue was discovered in the Logging subsystem of Sophos XG Firewall with SFOS before 17.0.3 MR3. An unauthenticated user can trigger a persistent XSS vulnerability found in the WAF log page (Control Center -> Log Viewer -> in the filter option "Web Server Protection") in the webadmin interface, and execute any action available to the webadmin of the firewall (e.g., creating a new user, enabling SSH, or adding an SSH authorized key). The WAF log page will execute the "User-Agent" parameter in the HTTP POST request.2018-01-12not yet calculatedCVE-2017-18014
FULLDISC
MISC
CONFIRM
CONFIRM
sulu-standard -- sulu-standard
 
Sulu-standard version 1.6.6 is vulnerable to stored cross-site scripting vulnerability, within the page creation page, which can result in disruption of service and execution of javascript code.2018-01-09not yet calculatedCVE-2017-1000465
CONFIRM
symantec -- advanced_security_gateway
 
The Symantec Advanced Secure Gateway (ASG) 6.6, ASG 6.7 (prior to 6.7.2.1), ProxySG 6.5 (prior to 6.5.10.6), ProxySG 6.6, and ProxySG 6.7 (prior to 6.7.2.1) management console is susceptible to a reflected XSS vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to inject arbitrary JavaScript code into the management console web client application. This is a separate vulnerability from CVE-2016-10256.2018-01-09not yet calculatedCVE-2016-10257
BID
SECTRACK
CONFIRM
symantec -- proxysg
 
The Symantec ProxySG 6.5 (prior to 6.5.10.6), 6.6, and 6.7 (prior to 6.7.2.1) management console is susceptible to a reflected XSS vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to inject arbitrary JavaScript code into the management console web client application. This is a separate vulnerability from CVE-2016-10257.2018-01-09not yet calculatedCVE-2016-10256
BID
SECTRACK
CONFIRM
symmetricom -- s350i
 
SQL injection vulnerability in the checkPassword function in Symmetricom s350i 2.70.15 allows remote attackers to execute arbitrary SQL commands via vectors involving a username.2018-01-08not yet calculatedCVE-2014-5071
MISC
symmetricom -- s350i
 
Directory traversal vulnerability in the web application in Symmetricom s350i 2.70.15 allows remote attackers to read arbitrary files via a (1) ../ (dot dot slash) or (2) ..\ (dot dot forward slash) before a file name.2018-01-11not yet calculatedCVE-2014-5068
MISC
symmetricom -- s350i
 
Cross-site scripting (XSS) vulnerability in Symmetricom s350i 2.70.15 allows remote attackers to inject arbitrary web script or HTML via vectors involving system logs.2018-01-08not yet calculatedCVE-2014-5069
MISC
symmetricom -- s350i
 
Symmetricom s350i 2.70.15 allows remote authenticated users to gain privileges via vectors related to pushing unauthenticated users to the login page.2018-01-11not yet calculatedCVE-2014-5070
MISC
teamspeak -- clientBuffer overflow in TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab with two \\ (backslash) characters, a digit, a \ (backslash) character, and "z" in a series of nested img BBCODE tags.2018-01-08not yet calculatedCVE-2014-7222
MISC
MISC
MISC
BID
XF
teamspeak -- client
 
TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (buffer overflow and application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab containing [img]//http:// substrings.2018-01-08not yet calculatedCVE-2014-7221
MISC
MISC
BID
XF
MISC
tp-link -- multiple_devicesTP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-time variable in the webfilter.lua file.2018-01-11not yet calculatedCVE-2017-15636
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-interface variable in the cmxddns.lua file.2018-01-11not yet calculatedCVE-2017-15613
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-outif variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15614
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-workmode variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15631
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-remotesubnet variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15630
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the max_conn variable in the session_limits.lua file.2018-01-11not yet calculatedCVE-2017-15635
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-mppeencryption variable in the pptp_server.lua file.2018-01-11not yet calculatedCVE-2017-15632
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-pns variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15627
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the lcpechointerval variable in the pptp_server.lua file.2018-01-11not yet calculatedCVE-2017-15628
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the name variable in the wportal.lua file.2018-01-11not yet calculatedCVE-2017-15634
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-ipgroup variable in the session_limits.lua file.2018-01-11not yet calculatedCVE-2017-15633
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the pptphellointerval variable in the pptp_server.lua file.2018-01-11not yet calculatedCVE-2017-15637
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-tunnelname variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15629
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-olmode variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15625
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-interface variable in the phddns.lua file.2018-01-11not yet calculatedCVE-2017-15616
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-zone variable in the ipmac_import.lua file.2018-01-11not yet calculatedCVE-2017-15620
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-enable variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15618
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the iface variable in the interface_wan.lua file.2018-01-11not yet calculatedCVE-2017-15617
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the pptphellointerval variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15619
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-bindif variable in the pptp_server.lua file.2018-01-11not yet calculatedCVE-2017-15626
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-authtype variable in the pptp_server.lua file.2018-01-11not yet calculatedCVE-2017-15624
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the lcpechointerval variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15615
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-mppeencryption variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15622
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-enable variable in the pptp_server.lua file.2018-01-11not yet calculatedCVE-2017-15623
BUGTRAQ
MISC
tp-link -- multiple_devices
 
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the olmode variable in the interface_wan.lua file.2018-01-11not yet calculatedCVE-2017-15621
BUGTRAQ
MISC
undertow -- undertow
 
In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.2018-01-10not yet calculatedCVE-2017-7559
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM
CONFIRM
vmware -- v4_desktop_agents
 
The VMware V4H and V4PA desktop agents (6.x before 6.5.1) contain a privilege escalation vulnerability. Successful exploitation of this issue could result in a low privileged windows user escalating their privileges to SYSTEM.2018-01-05not yet calculatedCVE-2017-4946
BID
SECTRACK
CONFIRM
vmware -- workstation_and_fusion
 
VMware Workstation and Fusion contain a use-after-free vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may allow a guest to execute code on the host. Note: IPv6 mode for VMNAT is not enabled by default.2018-01-11not yet calculatedCVE-2017-4949
BID
SECTRACK
CONFIRM
vmware -- workstation_and_fusion
 
VMware Workstation and Fusion contain an integer overflow vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may lead to an out-of-bound read which can then be used to execute code on the host in conjunction with other issues. Note: IPv6 mode for VMNAT is not enabled by default.2018-01-11not yet calculatedCVE-2017-4950
BID
SECTRACK
CONFIRM
vmware -- workstation
 
VMware Workstation (14.x before 14.1.0 and 12.x) and Horizon View Client (4.x before 4.7.0) contain an out-of-bounds read vulnerability in TPView.dll. On Workstation, this issue in conjunction with other bugs may allow a guest to leak information from host or may allow for a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this issue in conjunction with other bugs may allow a View desktop to leak information from host or may allow for a Denial of Service on the Windows OS that runs the Horizon View Client. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View.2018-01-05not yet calculatedCVE-2017-4948
BID
SECTRACK
SECTRACK
SECTRACK
CONFIRM
vmware -- workstation
 
VMware Workstation (14.x and 12.x) and Fusion (10.x and 8.x) contain a guest access control vulnerability. This issue may allow program execution via Unity on locked Windows VMs. VMware Tools must be updated to 10.2.0 for each VM to resolve CVE-2017-4945. VMware Tools 10.2.0 is consumed by Workstation 14.1.0 and Fusion 10.1.0 by default.2018-01-05not yet calculatedCVE-2017-4945
BID
SECTRACK
SECTRACK
CONFIRM
websitebaker -- websitebaker
 
Multiple persistent stored Cross-Site-Scripting (XSS) vulnerabilities in the files /wb/admin/admintools/tool.php (Droplet Description) and /install/index.php (Site Title) in WebsiteBaker 2.10.0 allow attackers to insert persistent JavaScript code that gets reflected back to users in multiple areas in the application.2018-01-10not yet calculatedCVE-2017-16514
MISC
wecon_technology -- levi_studio_hmi_editor
 
An issue was discovered in WECON Technology LEVI Studio HMI Editor v1.8.29 and prior. A specially-crafted malicious file may be able to cause a heap-based buffer overflow vulnerability when opened by a user.2018-01-12not yet calculatedCVE-2017-16737
BID
MISC
wecon_technology -- levi_studio_hmi_editor
 
An issue was discovered in WECON Technology LEVI Studio HMI Editor v1.8.29 and prior. Specially-crafted malicious files may be able to cause stack-based buffer overflow vulnerabilities, which may allow remote code execution.2018-01-12not yet calculatedCVE-2017-16739
BID
MISC
whale -- whale
 
The Installer in Whale allows DLL hijacking.2018-01-07not yet calculatedCVE-2017-15913
CONFIRM
wireshark -- wireshark
 
In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the WCP dissector could crash. This was addressed in epan/dissectors/packet-wcp.c by validating the available buffer length.2018-01-11not yet calculatedCVE-2018-5335
BID
CONFIRM
CONFIRM
CONFIRM
wireshark -- wireshark
 
In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by correcting the signature timestamp bounds checks.2018-01-11not yet calculatedCVE-2018-5334
BID
CONFIRM
CONFIRM
CONFIRM
wireshark -- wireshark
 
In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash. This was addressed in epan/tvbparse.c by limiting the recursion depth.2018-01-11not yet calculatedCVE-2018-5336
CONFIRM
CONFIRM
CONFIRM
CONFIRM
wizardmac -- wizardmac
 
libreadstat.a in WizardMac ReadStat 0.1.1 has a heap-based buffer over-read via an unterminated string.2018-01-13not yet calculatedCVE-2018-5698
CONFIRM
wordpress -- wordpressAn issue was discovered in the weblizar-pinterest-feeds plugin 1.1.1 for WordPress. XSS exists via the wp-admin/admin-ajax.php weblizar_pffree_settings_save_get-users parameter.2018-01-12not yet calculatedCVE-2018-5653
MISC
wordpress -- wordpressThe WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[browser_redirect][redirect_by_language] parameter to wp-admin/options.php.2018-01-12not yet calculatedCVE-2018-5364
MISC
MISC
wordpress -- wordpressAn issue was discovered in the dark-mode plugin 1.6 for WordPress. XSS exists via the wp-admin/profile.php dark_mode_end parameter.2018-01-12not yet calculatedCVE-2018-5652
MISC
wordpress -- wordpressThe WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[post_type][post] parameter to wp-admin/options.php.2018-01-12not yet calculatedCVE-2018-5367
MISC
MISC
wordpress -- wordpressAn issue was discovered in the weblizar-pinterest-feeds plugin 1.1.1 for WordPress. XSS exists via the wp-admin/admin-ajax.php security parameter.2018-01-12not yet calculatedCVE-2018-5655
MISC
wordpress -- wordpressAn issue was discovered in the read-and-understood plugin 2.1 for WordPress. XSS exists via the wp-admin/options-general.php rnu_username_validation_title parameter.2018-01-12not yet calculatedCVE-2018-5668
MISC
wordpress -- wordpress
 
An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php social_icon_1 parameter.2018-01-12not yet calculatedCVE-2018-5664
MISC
wordpress -- wordpress
 
An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php button_text_link parameter.2018-01-12not yet calculatedCVE-2018-5663
MISC
wordpress -- wordpress
 
An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. CSRF exists via wp-admin/admin.php.2018-01-12not yet calculatedCVE-2018-5658
MISC
wordpress -- wordpress
 
The Jetpack plugin before 4.0.3 for WordPress has XSS via a crafted Vimeo link.2018-01-12not yet calculatedCVE-2016-10706
MISC
MISC
wordpress -- wordpress
 
An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php coming-soon_title parameter.2018-01-12not yet calculatedCVE-2018-5659
MISC
wordpress -- wordpress
 
An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php logo_height parameter.2018-01-12not yet calculatedCVE-2018-5665
MISC
wordpress -- wordpress
 
An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php coming-soon_sub_title parameter.2018-01-12not yet calculatedCVE-2018-5660
MISC
wordpress -- wordpress
 
The WpJobBoard plugin 4.4.4 for WordPress allows SQL injection via the order or sort parameter to the wpjb-job or wpjb-alerts module, with a request to wp-admin/admin.php.2018-01-13not yet calculatedCVE-2018-5695
MISC
wordpress -- wordpress
 
An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php logo_width parameter.2018-01-12not yet calculatedCVE-2018-5661
MISC
wordpress -- wordpress
 
An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. XSS exists via the wp-admin/admin.php form_field5[label] parameter.2018-01-12not yet calculatedCVE-2018-5672
MISC
wordpress -- wordpress
 
The Photos in Wifi application 1.0.1 for iOS has directory traversal via the ext parameter to assets-library://asset/asset.php.2018-01-08not yet calculatedCVE-2018-5283
MISC
wordpress -- wordpress
 
The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-transfer page.2018-01-08not yet calculatedCVE-2018-5288
MISC
MISC
MISC
wordpress -- wordpress
 
An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. XSS exists via the wp-admin/admin.php sale_conditions[count][] parameter.2018-01-12not yet calculatedCVE-2018-5670
MISC
wordpress -- wordpress
 
An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. CSRF exists via wp-admin/admin.php.2018-01-12not yet calculatedCVE-2018-5673
MISC
wordpress -- wordpress
 
An issue was discovered in the read-and-understood plugin 2.1 for WordPress. XSS exists via the wp-admin/options-general.php rnu_username_validation_pattern parameter.2018-01-12not yet calculatedCVE-2018-5667
MISC
wordpress -- wordpress
 
An issue was discovered in the read-and-understood plugin 2.1 for WordPress. CSRF exists via wp-admin/options-general.php.2018-01-12not yet calculatedCVE-2018-5669
MISC
wordpress -- wordpress
 
An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php counter_title parameter.2018-01-12not yet calculatedCVE-2018-5662
MISC
wordpress -- wordpress
 
An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php counter_title_icon parameter.2018-01-12not yet calculatedCVE-2018-5657
MISC
wordpress -- wordpress
 
An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php bg_color parameter.2018-01-12not yet calculatedCVE-2018-5666
MISC
wordpress -- wordpress
 
An issue was discovered in the weblizar-pinterest-feeds plugin 1.1.1 for WordPress. XSS exists via the wp-admin/admin-ajax.php PFFREE_Access_Token parameter.2018-01-12not yet calculatedCVE-2018-5654
MISC
wordpress -- wordpress
 
The GD Rating System plugin 2.3 for WordPress has Directory Traversal in the wp-admin/admin.php panel parameter for the gd-rating-system-information page.2018-01-08not yet calculatedCVE-2018-5289
MISC
MISC
MISC
wordpress -- wordpress
 
The GD Rating System plugin 2.3 for WordPress has Directory Traversal in the wp-admin/admin.php panel parameter for the gd-rating-system-transfer page.2018-01-08not yet calculatedCVE-2018-5290
MISC
MISC
MISC
wordpress -- wordpress
 
An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. XSS exists via the wp-admin/admin.php extra_field1[items][field_item1][price_percent] parameter.2018-01-12not yet calculatedCVE-2018-5671
MISC
wordpress -- wordpress
 
The Jetpack plugin before 4.0.4 for WordPress has XSS via the Likes module.2018-01-12not yet calculatedCVE-2016-10705
MISC
MISC
wordpress -- wordpress
 
The Easy Custom Auto Excerpt plugin 2.4.6 for WordPress has XSS via the tonjoo_ecae_options[custom_css] parameter to the wp-admin/admin.php?page=tonjoo_excerpt URI.2018-01-09not yet calculatedCVE-2018-5311
MISC
MISC
wordpress -- wordpress
 
The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-about page.2018-01-08not yet calculatedCVE-2018-5286
MISC
MISC
MISC
wordpress -- wordpress
 
An issue was discovered in the weblizar-pinterest-feeds plugin 1.1.1 for WordPress. CSRF exists via wp-admin/admin-ajax.php.2018-01-12not yet calculatedCVE-2018-5656
MISC
wordpress -- wordpress
 
The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[post_type][page] parameter to wp-admin/options.php.2018-01-12not yet calculatedCVE-2018-5362
MISC
MISC
wordpress -- wordpress
 
The GD Rating System plugin 2.3 for WordPress has Directory Traversal in the wp-admin/admin.php panel parameter for the gd-rating-system-about page.2018-01-08not yet calculatedCVE-2018-5287
MISC
MISC
MISC
wordpress -- wordpress
 
The tabs-responsive plugin 1.8.0 for WordPress has XSS via the post_title parameter to wp-admin/post.php.2018-01-09not yet calculatedCVE-2018-5312
MISC
MISC
wordpress -- wordpress
 
The Wachipi WP Events Calendar plugin 1.0 for WordPress has SQL Injection via the event_id parameter to event.php.2018-01-12not yet calculatedCVE-2018-5315
MISC
EXPLOIT-DB
wordpress -- wordpress
 
In the "Media from FTP" plugin before 9.85 for WordPress, Directory Traversal exists via the searchdir parameter to the wp-admin/admin.php?page=mediafromftp-search-register URI.2018-01-09not yet calculatedCVE-2018-5310
MISC
MISC
MISC
wordpress -- wordpress
 
The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-tools page.2018-01-08not yet calculatedCVE-2018-5293
MISC
MISC
MISC
wordpress -- wordpress
 
The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[enabled_languages][en] or wpglobus_option[enabled_languages][fr] (or any other language) parameter to wp-admin/options.php.2018-01-12not yet calculatedCVE-2018-5363
MISC
MISC
wordpress -- wordpress
 
The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[selector_wp_list_pages][show_selector] parameter to wp-admin/options.php.2018-01-12not yet calculatedCVE-2018-5365
MISC
MISC
wordpress -- wordpress
 
The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-information page.2018-01-08not yet calculatedCVE-2018-5292
MISC
MISC
MISC
wordpress -- wordpress
 
The GD Rating System plugin 2.3 for WordPress has Directory Traversal in the wp-admin/admin.php panel parameter for the gd-rating-system-tools page.2018-01-08not yet calculatedCVE-2018-5291
MISC
MISC
MISC
wordpress -- wordpress
 
The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[more_languages] parameter to wp-admin/options.php.2018-01-12not yet calculatedCVE-2018-5366
MISC
MISC
wordpress -- wordpress
 
The ImageInject plugin 1.15 for WordPress has CSRF via wp-admin/options-general.php.2018-01-08not yet calculatedCVE-2018-5285
MISC
MISC
MISC
wordpress -- wordpress
 
The ImageInject plugin 1.15 for WordPress has XSS via the flickr_appid parameter to wp-admin/options-general.php.2018-01-08not yet calculatedCVE-2018-5284
MISC
MISC
MISC
wordpress -- wordpress
 
The "SagePay Server Gateway for WooCommerce" plugin before 1.0.9 for WordPress has XSS via the includes/pages/redirect.php page parameter.2018-01-09not yet calculatedCVE-2018-5316
MISC
MISC
MISC
wordpress -- wordpress
 
An issue was discovered in the dark-mode plugin 1.6 for WordPress. XSS exists via the wp-admin/profile.php dark_mode_start parameter.2018-01-12not yet calculatedCVE-2018-5651
MISC
wordpress -- wordpress
 
The Dbox 3D Slider Lite plugin through 1.2.2 for WordPress has SQL Injection via settings\sliders.php (current_slider_id parameter).2018-01-12not yet calculatedCVE-2018-5374
MISC
wordpress -- wordpress
 
The Smooth Slider plugin through 2.8.6 for WordPress has SQL Injection via smooth-slider.php (trid parameter).2018-01-12not yet calculatedCVE-2018-5373
MISC
wordpress -- wordpress
 
The SrbTransLatin plugin 1.46 for WordPress has XSS via an srbtranslatoptions action to wp-admin/options-general.php with a lang_identificator parameter.2018-01-12not yet calculatedCVE-2018-5369
MISC
MISC
wordpress -- wordpress
 
The SrbTransLatin plugin 1.46 for WordPress has CSRF via an srbtranslatoptions action to wp-admin/options-general.php.2018-01-12not yet calculatedCVE-2018-5368
MISC
MISC
wordpress -- wordpress
 
The Testimonial Slider plugin through 1.2.4 for WordPress has SQL Injection via settings\sliders.php (current_slider_id parameter).2018-01-12not yet calculatedCVE-2018-5372
MISC
wordpress -- wordpress
 
The WPGlobus plugin 1.9.6 for WordPress has CSRF via wp-admin/options.php.2018-01-12not yet calculatedCVE-2018-5361
MISC
MISC
xen -- xen
 
In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn't freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.2018-01-05not yet calculatedCVE-2018-5244
BID
CONFIRM
xplico -- xplico
 
Xplico before 1.2.1 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the name of an uploaded PCAP file. NOTE: this issue can be exploited without authentication by leveraging the user registration feature.2018-01-05not yet calculatedCVE-2017-16666
CONFIRM
MISC
MISC
MISC
EXPLOIT-DB
CONFIRM
yawcam -- yawcam
 
Directory traversal in the HTTP server on Yawcam 0.2.6 through 0.6.0 devices allows attackers to read arbitrary files through a sequence of the form '.x./' or '....\x/' where x is a pattern composed of one or more (zero or more for the second pattern) of either \ or ..\ -- for example a '.\./', '....\/' or '...\./' sequence. For files with no extension, a single dot needs to be appended to ensure the HTTP server does not alter the request, e.g., a "GET /.\./.\./.\./.\./.\./.\./.\./windows/system32/drivers/etc/hosts." request.2018-01-10not yet calculatedCVE-2017-17662
MISC
CONFIRM
yodobashi_camera -- yodobashi_app_for_android
 
The Yodobashi App for Android 1.2.1.0 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.2018-01-12not yet calculatedCVE-2015-2981
JVN
JVNDB
BID
 wordpress -- wordpress
 
Unrestricted file upload vulnerability in the Gravity Upload Ajax plugin 1.1 and earlier for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file under wp-content/uploads/gravity_forms.2018-01-08not yet calculatedCVE-2014-4972
MISC
MISC

Back to top

Please share your thoughts

We recently updated our anonymous product survey; we’d welcome your feedback.