Weekly Vulnerabilities Reports > March 12 to 18, 2018
Overview
370 new vulnerabilities reported during this period, including 55 critical vulnerabilities and 170 high severity vulnerabilities. This weekly summary report vulnerabilities in 250 products from 123 vendors including Microsoft, Google, Debian, Redhat, and IBM. Vulnerabilities are notably categorized as "Cross-site Scripting", "Out-of-bounds Read", "Out-of-bounds Write", "Information Exposure", and "Improper Input Validation".
- 254 reported vulnerabilities are remotely exploitables.
- 98 reported vulnerabilities have public exploit available.
- 109 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 220 reported vulnerabilities are exploitable by an anonymous user.
- Microsoft has the most reported vulnerabilities, with 74 reported vulnerabilities.
- Debian has the most reported critical vulnerabilities, with 6 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
55 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2018-03-13 | CVE-2018-1000124 | I Librarian | Server-Side Request Forgery (SSRF) vulnerability in I-Librarian I, Librarian I Librarian I-librarian version 4.8 and earlier contains a XML External Entity (XXE) vulnerability in line 154 of importmetadata.php(simplexml_load_string) that can result in an attacker reading the contents of a file and SSRF. | 10.0 |
2018-03-18 | CVE-2018-8766 | Joyplus CMS Project | Unrestricted Upload of File with Dangerous Type vulnerability in Joyplus-Cms Project Joyplus-Cms 1.6.0 joyplus-cms 1.6.0 allows Remote Code Execution because of an Arbitrary File Upload issue in manager/editor/upload.php, related to manager/admin_vod.php?action=add. | 9.8 |
2018-03-18 | CVE-2017-18239 | Authentikat JWT Project | Unspecified vulnerability in Authentikat-Jwt Project Authentikat-Jwt A time-sensitive equality check on the JWT signature in the JsonWebToken.validate method in main/scala/authentikat/jwt/JsonWebToken.scala in authentikat-jwt (aka com.jason-goodwin/authentikat-jwt) version 0.4.5 and earlier allows the supplier of a JWT token to guess bit after bit of the signature by repeating validation requests. | 9.8 |
2018-03-16 | CVE-2018-1078 | Opendaylight | Unspecified vulnerability in Opendaylight Openflow Sp1/Sp2/Sp3 OpenDayLight version Carbon SR3 and earlier contain a vulnerability during node reconciliation that can result in traffic flows that should be expired or should expire shortly being re-installed and their timers reset resulting in traffic being allowed that should be expired. | 9.8 |
2018-03-16 | CVE-2017-8013 | EMC | Use of Hard-coded Credentials vulnerability in EMC Data Protection Advisor 6.3.0/6.4.0 EMC Data Protection Advisor 6.3.x before patch 67 and 6.4.x before patch 130 contains undocumented accounts with hard-coded passwords and various privileges. | 9.8 |
2018-03-16 | CVE-2016-9880 | Pivotal Software | Improper Authentication vulnerability in Pivotal Software Gemfire for Pivotal Cloud Foundry 1.7.0 The GemFire broker for Cloud Foundry 1.6.x before 1.6.5 and 1.7.x before 1.7.1 has multiple API endpoints which do not require authentication and could be used to gain access to the cluster managed by the broker. | 9.8 |
2018-03-16 | CVE-2018-8739 | Keepsolid | Unspecified vulnerability in Keepsolid VPN Unlimited VPN Unlimited 4.2.0 for macOS suffers from a root privilege escalation vulnerability in its privileged helper tool. | 9.8 |
2018-03-16 | CVE-2018-1000134 | Pingidentity | Weak Password Requirements vulnerability in Pingidentity Ldapsdk UnboundID LDAP SDK version from commit 801111d8b5c732266a5dbd4b3bb0b6c7b94d7afb up to commit 8471904a02438c03965d21367890276bc25fa5a6, where the issue was reported and fixed contains an Incorrect Access Control vulnerability in process function in SimpleBindRequest class doesn't check for empty password when running in synchronous mode. | 9.8 |
2018-03-15 | CVE-2018-7033 | Schedmd Debian | SQL Injection vulnerability in multiple products SchedMD Slurm before 17.02.10 and 17.11.x before 17.11.5 allows SQL Injection attacks against SlurmDBD. | 9.8 |
2018-03-15 | CVE-2017-18067 | Improper Input Validation vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation while processing an encrypted authentication management frame in lim_send_auth_mgmt_frame() leads to buffer overflow. | 9.8 | |
2018-03-15 | CVE-2017-17773 | Qualcomm | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Qualcomm products In Snapdragon Automobile, Snapdragon Wearable and Snapdragon Mobile MDM9206,MDM9607,MDM9650,SD 210/SD 212/SD 205,SD 400,SD 410/12,SD 425,SD 430,SD 450,SD 600,SD 602A,SD 615/16/SD 415,SD 617,SD 625,SD 650/52,SD 800,SD 808,SD 810,SD 820,SD 820Am,SD 835,SD 845,MSM8909W, improper input validation in video_fmt_mp4r_process_atom_avc1() causes a potential buffer overflow. | 9.8 |
2018-03-15 | CVE-2017-15815 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a potential buffer overflow can happen when processing any 802.11 MGMT frames like Auth frame in limProcessAuthFrame. | 9.8 | |
2018-03-15 | CVE-2016-10393 | Integer Overflow or Wraparound vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, when processing a clip with large size values, integer arithmetic overflows, and allocated buffer size will be less than intended buffer size. | 9.8 | |
2018-03-15 | CVE-2018-6231 | Trendmicro | OS Command Injection vulnerability in Trendmicro Smart Protection Server A server auth command injection authentication bypass vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.3 and below could allow remote attackers to escalate privileges on vulnerable installations. | 9.8 |
2018-03-15 | CVE-2018-6229 | Trendmicro | SQL Injection vulnerability in Trendmicro Email Encryption Gateway 5.5 A SQL injection vulnerability in an Trend Micro Email Encryption Gateway 5.5 edit policy script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system. | 9.8 |
2018-03-15 | CVE-2018-6228 | Trendmicro | SQL Injection vulnerability in Trendmicro Email Encryption Gateway 5.5 A SQL injection vulnerability in a Trend Micro Email Encryption Gateway 5.5 policy script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system. | 9.8 |
2018-03-15 | CVE-2018-6223 | Trendmicro | Missing Authentication for Critical Function vulnerability in Trendmicro Email Encryption Gateway 5.5 A missing authentication for appliance registration vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to manipulate the registration process of the product to reset configuration parameters. | 9.8 |
2018-03-15 | CVE-2018-6220 | Trendmicro | Injection vulnerability in Trendmicro Email Encryption Gateway 5.5 An arbitrary file write vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to inject arbitrary data, which may lead to gaining code execution on vulnerable systems. | 9.8 |
2018-03-15 | CVE-2018-7756 | Dewesoft | Code Injection vulnerability in Dewesoft X3 RunExeFile.exe in the installer for DEWESoft X3 SP1 (64-bit) devices does not require authentication for sessions on TCP port 1999, which allows remote attackers to execute arbitrary code or access internal commands, as demonstrated by a RUN command that launches a .EXE file located at an arbitrary external URL, or a "SETFIREWALL Off" command. | 9.8 |
2018-03-14 | CVE-2017-12194 | Spice GTK Project | Improper Input Validation vulnerability in Spice-Gtk Project Spice-Gtk A flaw was found in the way spice-client processed certain messages sent from the server. | 9.8 |
2018-03-14 | CVE-2018-8712 | Webmin | Path Traversal vulnerability in Webmin 1.840/1.880 An issue was discovered in Webmin 1.840 and 1.880 when the default Yes setting of "Can view any file as a log file" is enabled. | 9.8 |
2018-03-14 | CVE-2018-8711 | Woocommerce Filter | Improper Input Validation vulnerability in Woocommerce-Filter Woocommerce products Filter A local file inclusion issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 2.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. | 9.8 |
2018-03-14 | CVE-2018-8710 | Woocommerce Filter | Improper Authentication vulnerability in Woocommerce-Filter Woocommerce products Filter A remote code execution issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 2.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. | 9.8 |
2018-03-14 | CVE-2018-6329 | Unitrends | SQL Injection vulnerability in Unitrends Backup It was discovered that the Unitrends Backup (UB) before 10.1.0 libbpext.so authentication could be bypassed with a SQL injection, allowing a remote attacker to place a privilege escalation exploit on the target system and subsequently execute arbitrary commands. | 9.8 |
2018-03-14 | CVE-2018-6328 | Kaseya | Improper Authentication vulnerability in Kaseya Unitrends Backup It was discovered that the Unitrends Backup (UB) before 10.1.0 user interface was exposed to an authentication bypass, which then could allow an unauthenticated user to inject arbitrary commands into its /api/hosts parameters using backquotes. | 9.8 |
2018-03-14 | CVE-2018-7500 | Osisoft | Unspecified vulnerability in Osisoft PI Vision and PI web API A Permissions, Privileges, and Access Controls issue was discovered in OSIsoft PI Web API versions 2017 R2 and prior. | 9.8 |
2018-03-14 | CVE-2018-1000120 | Debian Canonical Haxx Redhat Oracle | Out-of-bounds Write vulnerability in multiple products A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse. | 9.8 |
2018-03-14 | CVE-2018-5782 | Mitel | Code Injection vulnerability in Mitel Connect Onsite and St14.2 A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to inject PHP code using specially crafted requests to the vsethost.php page. | 9.8 |
2018-03-14 | CVE-2018-5781 | Mitel | Code Injection vulnerability in Mitel Connect Onsite and St14.2 A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to inject PHP code using specially crafted requests to the vendrecording.php page. | 9.8 |
2018-03-14 | CVE-2018-5780 | Mitel | Code Injection vulnerability in Mitel Connect Onsite and St14.2 A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to inject PHP code using specially crafted requests to the vnewmeeting.php page. | 9.8 |
2018-03-14 | CVE-2018-5779 | Mitel | Code Injection vulnerability in Mitel Connect Onsite and St14.2 A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to copy a malicious script into a newly generated PHP file and then execute the generated file using specially crafted requests. | 9.8 |
2018-03-14 | CVE-2018-7474 | Textpattern | SQL Injection vulnerability in Textpattern An issue was discovered in Textpattern CMS 4.6.2 and earlier. | 9.8 |
2018-03-14 | CVE-2018-7279 | Alienvault | Unspecified vulnerability in Alienvault products A remote code execution issue was discovered in AlienVault USM and OSSIM before 5.5.1. | 9.8 |
2018-03-14 | CVE-2018-1000131 | Wpsupportplus | SQL Injection vulnerability in Wpsupportplus WP Support Plus Responsive Ticket System Pradeep Makone wordpress Support Plus Responsive Ticket System version 9.0.2 and earlier contains a SQL Injection vulnerability in the function to get tickets, the parameter email in cookie was injected that can result in filter the parameter. | 9.8 |
2018-03-14 | CVE-2018-8097 | Python EVE | Code Injection vulnerability in Python-Eve EVE io/mongo/parser.py in Eve (aka pyeve) before 0.7.5 allows remote attackers to execute arbitrary code via Code Injection in the where parameter. | 9.8 |
2018-03-14 | CVE-2018-8096 | Datalust | Improper Authentication vulnerability in Datalust SEQ Datalust Seq before 4.2.605 is vulnerable to Authentication Bypass (with the attacker obtaining admin access) via '"Name":"isauthenticationenabled","Value":false' in an api/settings/setting-isauthenticationenabled PUT request. | 9.8 |
2018-03-13 | CVE-2018-1000125 | Inversoft | Improper Input Validation vulnerability in Inversoft Prime-Jwt inversoft prime-jwt version prior to version 1.3.0 or prior to commit 0d94dcef0133d699f21d217e922564adbb83a227 contains an input validation vulnerability in JWTDecoder.decode that can result in a JWT that is decoded and thus implicitly validated even if it lacks a valid signature. | 9.8 |
2018-03-13 | CVE-2018-1000123 | Ionicframework | Information Exposure Through Log Files vulnerability in Ionicframework IOS Keychain 1.0.0/2.0.0 Ionic Team Cordova plugin iOS Keychain version before commit 18233ca25dfa92cca018b9c0935f43f78fd77fbf contains an Information Exposure Through Log Files (CWE-532) vulnerability in CDVKeychain.m that can result in login, password and other sensitive data leakage. | 9.8 |
2018-03-13 | CVE-2018-7750 | Paramiko Redhat Debian | Improper Authentication vulnerability in multiple products transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. | 9.8 |
2018-03-13 | CVE-2018-6300 | Hanwha Security | Unspecified vulnerability in Hanwha-Security Snh-V6410Pn Firmware and Snh-V6410Pnw Firmware Remote password change in Hanwha Techwin Smartcams | 9.8 |
2018-03-13 | CVE-2018-6299 | Hanwha Security | Improper Authentication vulnerability in Hanwha-Security Snh-V6410Pn Firmware and Snh-V6410Pnw Firmware Authentication bypass in Hanwha Techwin Smartcams | 9.8 |
2018-03-13 | CVE-2018-6298 | Hanwha Security | Improper Input Validation vulnerability in Hanwha-Security Snh-V6410Pn Firmware and Snh-V6410Pnw Firmware Remote code execution in Hanwha Techwin Smartcams | 9.8 |
2018-03-13 | CVE-2018-6297 | Hanwha Security | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Hanwha-Security Snh-V6410Pn Firmware and Snh-V6410Pnw Firmware Buffer overflow in Hanwha Techwin Smartcams | 9.8 |
2018-03-13 | CVE-2018-6295 | Hanwha Security | Cleartext Transmission of Sensitive Information vulnerability in Hanwha-Security Snh-V6410Pn Firmware and Snh-V6410Pnw Firmware Unencrypted way of remote control and communications in Hanwha Techwin Smartcams | 9.8 |
2018-03-13 | CVE-2018-6294 | Hanwha Security | Improper Authentication vulnerability in Hanwha-Security Snh-V6410Pn Firmware and Snh-V6410Pnw Firmware Unsecured way of firmware update in Hanwha Techwin Smartcams | 9.8 |
2018-03-13 | CVE-2018-1000076 | Rubygems Debian | Improper Verification of Cryptographic Signature vulnerability in multiple products RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Verification of Cryptographic Signature vulnerability in package.rb that can result in a mis-signed gem could be installed, as the tarball would contain multiple gem signatures.. | 9.8 |
2018-03-12 | CVE-2018-7538 | Enalean | SQL Injection vulnerability in Enalean Tuleap A SQL injection vulnerability in the tracker functionality of Enalean Tuleap software engineering platform before 9.18 allows attackers to execute arbitrary SQL commands. | 9.8 |
2018-03-12 | CVE-2016-9953 | Haxx | Out-of-bounds Read vulnerability in Haxx Curl The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly have unspecified other impact via a wildcard certificate name, which triggers an out-of-bounds read. | 9.8 |
2018-03-12 | CVE-2018-7749 | Asyncssh Project | Improper Authentication vulnerability in Asyncssh Project Asyncssh The SSH server implementation of AsyncSSH before 1.12.1 does not properly check whether authentication is completed before processing other requests. | 9.8 |
2018-03-12 | CVE-2017-2628 | Haxx | Unspecified vulnerability in Haxx Curl 7.19.7 curl, as shipped in Red Hat Enterprise Linux 6 before version 7.19.7-53, did not correctly backport the fix for CVE-2015-3148 because it did not reflect the fact that the HAVE_GSSAPI define was meanwhile substituted by USE_HTTP_NEGOTIATE. | 9.8 |
2018-03-13 | CVE-2017-1002101 | Kubernetes | Link Following vulnerability in Kubernetes In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem. | 9.6 |
2018-03-16 | CVE-2018-7544 | Openvpn | Use of Externally-Controlled Format String vulnerability in Openvpn A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. | 9.1 |
2018-03-15 | CVE-2018-7702 | Securenvoy | Missing Authorization vulnerability in Securenvoy Securmail SecurEnvoy SecurMail before 9.2.501 allows remote attackers to spoof transmission of arbitrary e-mail messages, resend e-mail messages to arbitrary recipients, or modify arbitrary message bodies and attachments by leveraging missing authentication and authorization. | 9.1 |
2018-03-14 | CVE-2018-1000122 | Debian Canonical Haxx Redhat Oracle | Out-of-bounds Read vulnerability in multiple products A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage | 9.1 |
2018-03-14 | CVE-2018-1000132 | Mercurial Debian | Incorrect Permission Assignment for Critical Resource vulnerability in multiple products Mercurial version 4.5 and earlier contains a Incorrect Access Control (CWE-285) vulnerability in Protocol server that can result in Unauthorized data access. | 9.1 |
170 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2018-03-17 | CVE-2018-8741 | Squirrelmail Debian | Path Traversal vulnerability in multiple products A directory traversal flaw in SquirrelMail 1.4.22 allows an authenticated attacker to exfiltrate (or potentially delete) files from the hosting server, related to ../ in the att_local_name field in Deliver.class.php. | 8.8 |
2018-03-15 | CVE-2018-6224 | Trendmicro | Cross-Site Request Forgery (CSRF) vulnerability in Trendmicro Email Encryption Gateway 5.5 A lack of cross-site request forgery (CSRF) protection vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to submit authenticated requests to a user browsing an attacker-controlled domain. | 8.8 |
2018-03-15 | CVE-2018-8717 | Joyplus CMS Project | Cross-Site Request Forgery (CSRF) vulnerability in Joyplus-Cms Project Joyplus-Cms 1.6.0 joyplus-cms 1.6.0 has CSRF, as demonstrated by adding an administrator account via a manager/admin_ajax.php?action=save&tab={pre}manager request. | 8.8 |
2018-03-15 | CVE-2018-8045 | Joomla | SQL Injection vulnerability in Joomla Joomla! In Joomla! 3.5.0 through 3.8.5, the lack of type casting of a variable in a SQL statement leads to a SQL injection vulnerability in the User Notes list view. | 8.8 |
2018-03-14 | CVE-2018-2401 | Redwood | XXE vulnerability in Redwood SAP Business Process Automation 9.00 SAP Business Process Automation (BPA) By Redwood does not sufficiently validate an XML document accepted from an untrusted source resulting in an XML External Entity (XXE) vulnerability. | 8.8 |
2018-03-14 | CVE-2018-0947 | Microsoft | Cross-site Scripting vulnerability in Microsoft Sharepoint Enterprise Server 2013/2016 Microsoft SharePoint Foundation 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". | 8.8 |
2018-03-14 | CVE-2018-0944 | Microsoft | Cross-site Scripting vulnerability in Microsoft Project Server and Sharepoint Enterprise Server Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allows an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". | 8.8 |
2018-03-14 | CVE-2018-0923 | Microsoft | Cross-site Scripting vulnerability in Microsoft Sharepoint Enterprise Server 2013/2016 Microsoft SharePoint Enterprise Server 2016 allows an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". | 8.8 |
2018-03-14 | CVE-2018-0921 | Microsoft | Cross-site Scripting vulnerability in Microsoft Sharepoint Enterprise Server 2016 Microsoft SharePoint Enterprise Server 2016 allows an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". | 8.8 |
2018-03-14 | CVE-2018-0917 | Microsoft | Cross-site Scripting vulnerability in Microsoft Sharepoint Enterprise Server 2016 Microsoft SharePoint Enterprise Server 2016 allows an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". | 8.8 |
2018-03-14 | CVE-2018-0916 | Microsoft | Cross-site Scripting vulnerability in Microsoft Project Server and Sharepoint Enterprise Server Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". | 8.8 |
2018-03-14 | CVE-2018-0915 | Microsoft | Cross-site Scripting vulnerability in Microsoft Project Server and Sharepoint Enterprise Server Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". | 8.8 |
2018-03-14 | CVE-2018-0914 | Microsoft | Cross-site Scripting vulnerability in Microsoft Project Server and Sharepoint Enterprise Server Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". | 8.8 |
2018-03-14 | CVE-2018-0913 | Microsoft | Cross-site Scripting vulnerability in Microsoft Project Server and Sharepoint Enterprise Server Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". | 8.8 |
2018-03-14 | CVE-2018-0912 | Microsoft | Cross-site Scripting vulnerability in Microsoft Project Server and Sharepoint Enterprise Server Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". | 8.8 |
2018-03-14 | CVE-2018-0911 | Microsoft | Cross-site Scripting vulnerability in Microsoft Project Server and Sharepoint Enterprise Server Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". | 8.8 |
2018-03-14 | CVE-2018-0910 | Microsoft | Cross-site Scripting vulnerability in Microsoft Project Server and Sharepoint Enterprise Server Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". | 8.8 |
2018-03-14 | CVE-2018-0909 | Microsoft | Cross-site Scripting vulnerability in Microsoft Project Server and Sharepoint Enterprise Server Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". | 8.8 |
2018-03-14 | CVE-2018-0787 | Microsoft | Weak Password Recovery Mechanism for Forgotten Password vulnerability in Microsoft Asp.Net Core 1.0/1.1/2.0 ASP.NET Core 1.0. | 8.8 |
2018-03-14 | CVE-2018-7677 | Netiq | Cross-Site Request Forgery (CSRF) vulnerability in Netiq Access Manager 4.4 A CSRF exposure exists in NetIQ Access Manager (NAM) 4.4 Identity Server component. | 8.8 |
2018-03-13 | CVE-2017-16251 | Mitel | Unrestricted Upload of File with Dangerous Type vulnerability in Mitel St14.2 Ga28 A vulnerability in the conferencing component of Mitel ST 14.2, release GA28 and earlier, could allow an authenticated user to upload a malicious script to the Personal Library by a crafted POST request. | 8.8 |
2018-03-13 | CVE-2018-1057 | Debian Canonical Samba | Incorrect Authorization vulnerability in multiple products On a Samba 4 AD DC the LDAP server in all versions of Samba from 4.0.0 onwards incorrectly validates permissions to modify passwords over LDAP allowing authenticated users to change any other users' passwords, including administrative users and privileged service accounts (eg Domain Controllers). | 8.8 |
2018-03-13 | CVE-2018-1000093 | Cryptonote | Cross-Site Request Forgery (CSRF) vulnerability in Cryptonote 0.8.9 CryptoNote version version 0.8.9 and possibly later contain a local RPC server which does not require authentication, as a result the walletd and the simplewallet RPC daemons will process any commands sent to them, resulting in remote command execution and a takeover of the cryptocurrency wallet if an attacker can trick an application such as a web browser into connecting and sending a command for example. | 8.8 |
2018-03-13 | CVE-2018-1000092 | Cmsmadesimple | Cross-Site Request Forgery (CSRF) vulnerability in Cmsmadesimple CMS Made Simple 2.2.5 CMS Made Simple version versions 2.2.5 contains a Cross ite Request Forgery (CSRF) vulnerability in Admin profile page that can result in Details can be found here http://dev.cmsmadesimple.org/bug/view/11715. | 8.8 |
2018-03-13 | CVE-2018-1000091 | Kadnode Project | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Kadnode Project Kadnode 2.2.0 KadNode version version 2.2.0 contains a Buffer Overflow vulnerability in Arguments when starting up the binary that can result in Control of program execution flow, leading to remote code execution. | 8.8 |
2018-03-13 | CVE-2018-1000086 | NPR | Cross-Site Request Forgery (CSRF) vulnerability in NPR Pym.Js NPR Visuals Team Pym.js version versions 0.4.2 up to 1.3.1 contains a Cross ite Request Forgery (CSRF) vulnerability in Pym.js _onNavigateToMessage function. | 8.8 |
2018-03-13 | CVE-2018-1000082 | Ajenti | Cross-Site Request Forgery (CSRF) vulnerability in Ajenti 2 Ajenti version version 2 contains a Cross ite Request Forgery (CSRF) vulnerability in the command execution panel of the tool used to manage the server. | 8.8 |
2018-03-13 | CVE-2018-1000070 | Bitmessage | Code Injection vulnerability in Bitmessage Pybitmessage 0.6.2 Bitmessage PyBitmessage version v0.6.2 (and introduced in or after commit 8ce72d8d2d25973b7064b1cf76a6b0b3d62f0ba0) contains a Eval injection vulnerability in main program, file src/messagetypes/__init__.py function constructObject that can result in Code Execution. | 8.8 |
2018-03-12 | CVE-2018-6623 | Hola | Incorrect Permission Assignment for Critical Resource vulnerability in Hola VPN 1.79.859 An issue was discovered in Hola 1.79.859. | 8.8 |
2018-03-12 | CVE-2016-5314 | Libtiff Opensuse Redhat Debian | Out-of-bounds Write vulnerability in multiple products Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr. | 8.8 |
2018-03-12 | CVE-2014-8129 | Libtiff Debian Redhat Apple | Out-of-bounds Write vulnerability in multiple products LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c. | 8.8 |
2018-03-14 | CVE-2018-2402 | SAP | Information Exposure vulnerability in SAP Hana 1.00/2.00 In systems using the optional capture & replay functionality of SAP HANA, 1.00 and 2.00, (see SAP Note 2362820 for more information about capture & replay), user credentials may be stored in clear text in the indexserver trace files of the control system. | 8.4 |
2018-03-12 | CVE-2016-0235 | IBM | Use of Hard-coded Credentials vulnerability in IBM Security Guardium Database Activity Monitor 10.0 IBM Security Guardium Database Activity Monitor 10 allows local users to have unspecified impact by leveraging administrator access to a hardcoded password, related to use on GRUB systems. | 8.2 |
2018-03-15 | CVE-2018-6221 | Trendmicro | Improper Certificate Validation vulnerability in Trendmicro Email Encryption Gateway 5.5 An unvalidated software update vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow a man-in-the-middle attacker to tamper with an update file and inject their own. | 8.1 |
2018-03-15 | CVE-2018-8715 | Embedthis | Improper Authentication vulnerability in Embedthis Appweb The Embedthis HTTP library, and Appweb versions before 7.0.3, have a logic flaw related to the authCondition function in http/httpLib.c. | 8.1 |
2018-03-15 | CVE-2018-7705 | Securenvoy | Path Traversal vulnerability in Securenvoy Securmail Directory traversal vulnerability in SecurEnvoy SecurMail before 9.2.501 allows remote authenticated users to read e-mail messages to arbitrary recipients via a .. | 8.1 |
2018-03-14 | CVE-2018-1000130 | Jolokia | Injection vulnerability in Jolokia Webarchive Agent 1.3.7 A JNDI Injection vulnerability exists in Jolokia agent version 1.3.7 in the proxy mode that allows a remote attacker to run arbitrary Java code on the server. | 8.1 |
2018-03-13 | CVE-2018-1000096 | Tiny Json Http Project | Improper Certificate Validation vulnerability in Tiny-Json-Http Project Tiny-Json-Http brianleroux tiny-json-http version all versions since commit 9b8e74a232bba4701844e07bcba794173b0238a8 (Oct 29 2016) contains a Missing SSL certificate validation vulnerability in The libraries core functionality is affected. | 8.1 |
2018-03-12 | CVE-2016-9952 | Haxx | Improper Certificate Validation vulnerability in Haxx Curl The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by "*.com." | 8.1 |
2018-03-12 | CVE-2017-2667 | Theforeman Redhat | Improper Certificate Validation vulnerability in multiple products Hammer CLI, a CLI utility for Foreman, before version 0.10.0, did not explicitly set the verify_ssl flag for apipie-bindings that disable it by default. | 8.1 |
2018-03-18 | CVE-2018-8769 | Elfutils Project | Out-of-bounds Read vulnerability in Elfutils Project Elfutils 0.170 elfutils 0.170 has a buffer over-read in the ebl_dynamic_tag_name function of libebl/ebldynamictagname.c because SYMTAB_SHNDX is unsupported. | 7.8 |
2018-03-18 | CVE-2018-8768 | Jupyter | Unspecified vulnerability in Jupyter Notebook In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. | 7.8 |
2018-03-18 | CVE-2018-8765 | 2345 Security Guard Project | Improper Input Validation vulnerability in 2345 Security Guard Project 2345 Security Guard 3.6 In 2345 Security Guard 3.6, the driver file (2345NetFirewall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x00222018. | 7.8 |
2018-03-16 | CVE-2018-3560 | Double Free vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a Double Free vulnerability exists in Audio Driver while opening a sound compression device. | 7.8 | |
2018-03-16 | CVE-2017-18066 | Use After Free vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper controls in MSM CORE leads to use memory after it is freed in msm_core_ioctl(). | 7.8 | |
2018-03-16 | CVE-2017-18065 | Improper Input Validation vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for vent->vdev_id in wma_action_frame_filter_mac_event_handler(), which is received from firmware, leads to arbitrary code execution. | 7.8 | |
2018-03-16 | CVE-2017-18062 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, potential buffer overflow can happen when processing UTF event in wma_process_utf_event(). | 7.8 | |
2018-03-16 | CVE-2017-18061 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, potential buffer overflow can happen when processing AOA measurement event from WIGIG firmware in wil_aoa_evt_meas(). | 7.8 | |
2018-03-16 | CVE-2017-18055 | Improper Input Validation vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for wmi_event->num_vdev_mac_entries in wma_pdev_set_hw_mode_resp_evt_handler(), which is received from firmware, leads to potential buffer overflow. | 7.8 | |
2018-03-16 | CVE-2017-18054 | Improper Input Validation vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for num_vdev_mac_entries in wma_pdev_hw_mode_transition_evt_handler(), which is received from firmware, leads to potential buffer overflow. | 7.8 | |
2018-03-16 | CVE-2017-18050 | Out-of-bounds Read vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for vdev_map in wma_tbttoffset_update_event_handler(), which is received from firmware, leads to potential buffer overwrite and out of bounds memory read. | 7.8 | |
2018-03-16 | CVE-2017-15833 | NULL Pointer Dereference vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, untrusted pointer dereference in update_userspace_power() function in power leads to information exposure. | 7.8 | |
2018-03-16 | CVE-2017-15831 | Integer Overflow or Wraparound vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the function wma_ndp_end_indication_event_handler(), there is no input validation check on a event_info value coming from firmware, which can cause an integer overflow and then leads to potential heap overwrite. | 7.8 | |
2018-03-16 | CVE-2017-15830 | Improper Validation of Array Index vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper ch_list array index initialization in function sme_set_plm_request() causes potential buffer overflow. | 7.8 | |
2018-03-16 | CVE-2017-14889 | Improper Validation of Array Index vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, due to the lack of a range check on the array index into the WMI descriptor pool, arbitrary address execution may potentially occur in the process mgmt completion handler. | 7.8 | |
2018-03-16 | CVE-2017-14887 | Integer Overflow or Wraparound vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the processing of messages of type eWNI_SME_MODIFY_ADDITIONAL_IES, an integer overflow leading to heap buffer overflow may potentially occur. | 7.8 | |
2018-03-16 | CVE-2017-11074 | Unspecified vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, there is an obsolete set/reset ssid hotlist API. | 7.8 | |
2018-03-15 | CVE-2018-5476 | Deltaww | Out-of-bounds Write vulnerability in Deltaww Delta Industrial Automation Dopsoft A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial Automation DOPSoft, Version 4.00.01 or prior. | 7.8 |
2018-03-15 | CVE-2017-16751 | Deltaww | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Deltaww Delta Industrial Automation Screen Editor 2.00.23.00 A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor, Version 2.00.23.00 or prior. | 7.8 |
2018-03-15 | CVE-2017-16749 | Deltaww | Use After Free vulnerability in Deltaww Delta Industrial Automation Screen Editor 2.00.23.00 A Use-after-Free issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor, Version 2.00.23.00 or prior. | 7.8 |
2018-03-15 | CVE-2017-16747 | Deltaww | Out-of-bounds Write vulnerability in Deltaww Delta Industrial Automation Screen Editor 2.00.23.00 An Out-of-bounds Write issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor, Version 2.00.23.00 or prior. | 7.8 |
2018-03-15 | CVE-2017-16745 | Deltaww | Incorrect Type Conversion or Cast vulnerability in Deltaww Delta Industrial Automation Screen Editor 2.00.23.00 A Type Confusion issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor, Version 2.00.23.00 or prior. | 7.8 |
2018-03-15 | CVE-2015-7440 | IBM | Permissions, Privileges, and Access Controls vulnerability in IBM products IBM Rational Collaborative Lifecycle Management (CLM) 3.0.1 before 3.0.1.6 iFix7 Interim Fix 1, 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Quality Manager (RQM) 3.0.x before 3.0.1.6 iFix7 Interim Fix 1, 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Team Concert (RTC) 3.0.x before 3.0.1.6 iFix7 Interim Fix 1, 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Requirements Composer (RRC) 3.0.x before 3.0.1.6 iFix7 Interim Fix 1 and 4.0.x before 4.0.7 iFix10; Rational DOORS Next Generation (RDNG) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Engineering Lifecycle Manager (RELM) 4.0.3, 4.0.4, 4.0.5, 4.0.6, and 4.0.7 before iFix10, 5.0.x before 5.0.2 iFix1, and 6.0.x before 6.0.2; Rational Rhapsody Design Manager (Rhapsody DM) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; and Rational Software Architect Design Manager (RSA DM) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4 might allow local users to gain privileges via unspecified vectors. | 7.8 |
2018-03-15 | CVE-2017-18068 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper buffer length calculation in wma_roam_scan_filter() leads to buffer overflow. | 7.8 | |
2018-03-15 | CVE-2017-18064 | Improper Input Validation vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for p2p_noa_info in wma_send_bcn_buf_ll() which is received from firmware leads to potential buffer overflow. | 7.8 | |
2018-03-15 | CVE-2017-18063 | Improper Input Validation vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for nlo_event in wma_nlo_match_evt_handler(), which is received from firmware, leads to potential out of bound memory access. | 7.8 | |
2018-03-15 | CVE-2017-18056 | Out-of-bounds Read vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for vdev_id in wma_unified_bcntx_status_event_handler() which is received from firmware leads to potential out of bounds memory read. | 7.8 | |
2018-03-15 | CVE-2017-15821 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the function wma_p2p_noa_event_handler(), there is no bound check on a value coming from firmware which can potentially lead to a buffer overwrite. | 7.8 | |
2018-03-15 | CVE-2017-14885 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, wma_unified_link_peer_stats_event_handler function has a variable num_rates which represents the sum of all the peer_stats->num_rates. | 7.8 | |
2018-03-15 | CVE-2018-6222 | Trendmicro | OS Command Injection vulnerability in Trendmicro Email Encryption Gateway 5.5 Arbitrary logs location in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to change location of log files and be manipulated to execute arbitrary commands and attain command execution on a vulnerable system. | 7.8 |
2018-03-15 | CVE-2017-18234 | Exempi Project Debian Canonical | Use After Free vulnerability in multiple products An issue was discovered in Exempi before 2.4.3. | 7.8 |
2018-03-15 | CVE-2018-7886 | Cloudme | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Cloudme Sync 1.11.0 An issue was discovered in CloudMe 1.11.0. | 7.8 |
2018-03-14 | CVE-2018-7533 | Osisoft | Incorrect Default Permissions vulnerability in Osisoft PI Data Archive 2017/3.4.430.460 An Incorrect Default Permissions issue was discovered in OSIsoft PI Data Archive versions 2017 and prior. | 7.8 |
2018-03-14 | CVE-2018-0922 | Microsoft | Out-of-bounds Write vulnerability in Microsoft products Microsoft Office 2010 SP2, 2013 SP1, and 2016, Microsoft Office 2016 Click-to-Run Microsoft Office 2016 for Mac, Microsoft Office Compatibility Pack SP2, Microsoft Office Web Apps 2010 SP2, Microsoft Office Web Apps 2013 SP1, Microsoft Office Word Viewer, Microsoft SharePoint Enterprise Server 2013 SP1, Microsoft SharePoint Enterprise Server 2016, Microsoft Office Compatibility Pack SP2, Microsoft Online Server 2016, Microsoft SharePoint Server 2010 SP2, Microsoft Word 2007 SP3, Microsoft Word 2010 SP2, Word 2013 and Microsoft Word 2016 allow a remote code execution vulnerability due to how objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". | 7.8 |
2018-03-14 | CVE-2018-0907 | Microsoft | Unspecified vulnerability in Microsoft Excel and Office Microsoft Excel 2007 SP3, Microsoft Excel 2010 SP2, Microsoft Excel 2013 SP1, Microsoft Excel 2016, Microsoft Office 2016 Click-to-Run and Microsoft Office 2016 for Mac allow a security feature bypass vulnerability due to how macro settings are enforced, aka "Microsoft Office Excel Security Feature Bypass". | 7.8 |
2018-03-14 | CVE-2018-0903 | Microsoft | Unspecified vulnerability in Microsoft Access and Office Microsoft Access 2010 SP2, Microsoft Access 2013 SP1, Microsoft Access 2016, and Microsoft Office 2016 Click-to-Run allow a remote code execution vulnerability due to how objects are handled in memory, aka "Microsoft Access Remote Code Execution Vulnerability". | 7.8 |
2018-03-14 | CVE-2018-0902 | Microsoft | Unspecified vulnerability in Microsoft Windows 10, Windows Server and Windows Server 2016 The Cryptography Next Generation (CNG) kernel-mode driver (cng.sys) in Windows 10 Gold, 1511, 1607, 1703, and 1709. | 7.8 |
2018-03-14 | CVE-2018-0884 | Microsoft | Unspecified vulnerability in Microsoft Windows 10, Windows Server and Windows Server 2016 Windows Scripting Host (WSH) in Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows a security feature bypass vulnerability due to how objects are handled in memory, aka "Windows Security Feature Bypass Vulnerability". | 7.8 |
2018-03-14 | CVE-2018-0877 | Microsoft | Unspecified vulnerability in Microsoft Windows 10, Windows Server and Windows Server 2016 The Desktop Bridge Virtual File System (VFS) in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how file paths are managed, aka "Windows Desktop Bridge VFS Elevation of Privilege Vulnerability". | 7.8 |
2018-03-14 | CVE-2018-8100 | Xpdfreader | Out-of-bounds Write vulnerability in Xpdfreader Xpdf 4.00 The JPXStream::readTilePart function in JPXStream.cc in xpdf 4.00 allows attackers to launch denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a specific pdf file, as demonstrated by pdftohtml. | 7.8 |
2018-03-14 | CVE-2018-1437 | IBM | Untrusted Search Path vulnerability in IBM Notes IBM Notes 8.5 and 9.0 could allow an attacker to execute arbitrary code on the system, caused by an error related to multiple untrusted search path. | 7.8 |
2018-03-14 | CVE-2018-1435 | IBM | Untrusted Search Path vulnerability in IBM Notes IBM Notes 8.5 and 9.0 is vulnerable to a DLL hijacking attack. | 7.8 |
2018-03-14 | CVE-2018-1386 | IBM | Incorrect Permission Assignment for Critical Resource vulnerability in IBM Tivoli Workload Scheduler IBM Tivoli Workload Automation for AIX (IBM Workload Scheduler 8.6, 9.1, 9.2, 9.3, and 9.4) contains directories with improper permissions that could allow a local user to with special access to gain root privileges. | 7.8 |
2018-03-13 | CVE-2018-1000074 | Rubygems | Deserialization of Untrusted Data vulnerability in Rubygems RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. | 7.8 |
2018-03-13 | CVE-2018-1000104 | Jenkins | Insufficiently Protected Credentials vulnerability in Jenkins Coverity A plaintext storage of a password vulnerability exists in Jenkins Coverity Plugin 1.10.0 and earlier in CIMInstance.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. | 7.8 |
2018-03-13 | CVE-2018-1000097 | Debian Canonical GNU | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Sharutils sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. | 7.8 |
2018-03-12 | CVE-2018-6400 | Kingsoftstore | Unspecified vulnerability in Kingsoftstore WPS Office Free 10.2.0.5978 Kingsoft WPS Office Free 10.2.0.5978 allows local users to gain privileges or cause a denial of service by impersonating all the pipes through a use of \\.\pipe\WPSCloudSvr\WpsCloudSvr -- an "insecurely created named pipe." Ensures full access to Everyone users group. | 7.8 |
2018-03-12 | CVE-2018-6322 | Pandasecurity | Unspecified vulnerability in Pandasecurity Panda Global Protection 17.0.1 Panda Global Protection 17.0.1 allows local users to gain privileges or cause a denial of service by impersonating all the pipes through a use of \.\pipe\PSANMSrvcPpal -- an "insecurely created named pipe." Ensures full access to Everyone users group. | 7.8 |
2018-03-12 | CVE-2018-6321 | Pandasecurity | Unquoted Search Path or Element vulnerability in Pandasecurity Panda Global Protection 17.0.1 Unquoted Windows search path vulnerability in the panda_url_filtering service in Panda Global Protection 17.0.1 allows local users to gain privileges via a malicious artefact. | 7.8 |
2018-03-12 | CVE-2018-6183 | Bitdefender | Unspecified vulnerability in Bitdefender Total Security 2018 BitDefender Total Security 2018 allows local users to gain privileges or cause a denial of service by impersonating all the pipes through a use of an "insecurely created named pipe". | 7.8 |
2018-03-12 | CVE-2018-6016 | 10 Strike | Unquoted Search Path or Element vulnerability in 10-Strike Network Monitor 5.4 Unquoted Windows search path vulnerability in the srvInventoryWebServer service in 10-Strike Network Monitor 5.4 allows local users to gain privileges via a malicious artefact. | 7.8 |
2018-03-12 | CVE-2018-1206 | EMC | Use of Hard-coded Credentials vulnerability in EMC Data Protection Advisor 6.3.0/6.4.0 Dell EMC Data Protection Advisor versions prior to 6.3 Patch 159 and Dell EMC Data Protection Advisor versions prior to 6.4 Patch 110 contain a hardcoded database account with administrative privileges. | 7.8 |
2018-03-12 | CVE-2017-6286 | Out-of-bounds Write vulnerability in Google Android NVIDIA libnvomx contains a possible out of bounds write due to a missing bounds check which could lead to local escalation of privilege. | 7.8 | |
2018-03-12 | CVE-2017-6281 | Out-of-bounds Write vulnerability in Google Android NVIDIA libnvomx contains a possible out of bounds write due to a improper input validation which could lead to local escalation of privilege. | 7.8 | |
2018-03-12 | CVE-2017-18225 | Jabberd2 | Incorrect Permission Assignment for Critical Resource vulnerability in Jabberd2 The Gentoo net-im/jabberd2 package through 2.6.1 installs jabberd, jabberd2-c2s, jabberd2-router, jabberd2-s2s, and jabberd2-sm in /usr/bin owned by the jabber account, which might allow local users to gain privileges by leveraging access to this account and then waiting for root to execute one of these programs. | 7.8 |
2018-03-17 | CVE-2018-8740 | Sqlite Debian | NULL Pointer Dereference vulnerability in multiple products In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c. | 7.5 |
2018-03-16 | CVE-2017-18060 | Out-of-bounds Read vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for resp_event->vdev_id in wma_unified_bcntx_status_event_handler(), which is received from firmware, leads to potential out of bounds memory read. | 7.5 | |
2018-03-16 | CVE-2017-18059 | Out-of-bounds Read vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for vdev id in wma_scan_event_callback(), which is received from firmware, leads to potential out of bounds memory read. | 7.5 | |
2018-03-16 | CVE-2017-18058 | Out-of-bounds Read vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for wow_buf_pkt_len in wma_wow_wakeup_host_event() which is received from firmware leads to potential out of bounds memory read. | 7.5 | |
2018-03-16 | CVE-2017-18057 | Out-of-bounds Read vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for vdev id in wma_nlo_scan_cmp_evt_handler(), which is received from firmware, leads to potential out of bounds memory read. | 7.5 | |
2018-03-16 | CVE-2017-18053 | Out-of-bounds Read vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for fix_param->vdev_id in wma_p2p_lo_event_handler(), which is received from firmware, leads to potential out of bounds memory read. | 7.5 | |
2018-03-16 | CVE-2017-18052 | Out-of-bounds Read vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for cmpl_params->num_reports, param_buf->desc_ids and param_buf->status in wma_mgmt_tx_bundle_completion_handler(), which is received from firmware, leads to potential out of bounds memory read. | 7.5 | |
2018-03-16 | CVE-2017-18051 | Out-of-bounds Read vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for event->vdev_id in wma_rcpi_event_handler(), which is received from firmware, leads to potential out of bounds memory read. | 7.5 | |
2018-03-16 | CVE-2018-1000133 | Secluded | Improper Privilege Management vulnerability in Secluded Trident 1.4.6 Pitchfork version 1.4.6 RC1 contains an Improper Privilege Management vulnerability in Trident Pitchfork components that can result in A standard unprivileged user could gain system administrator permissions within the web portal.. | 7.5 |
2018-03-15 | CVE-2017-18069 | Out-of-bounds Read vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper message length calculation in oem_cmd_handler() while processing a WLAN_NL_MSG_OEM netlink message leads to buffer overread. | 7.5 | |
2018-03-15 | CVE-2017-14882 | Information Exposure vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing VENDOR specific action frame in the function lim_process_action_vendor_specific(), a comparison is performed with the incoming action frame body without validating if the action frame body received is of valid length, potentially leading to an out-of-bounds access. | 7.5 | |
2018-03-15 | CVE-2017-14878 | Improper Input Validation vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a length variable which is used to copy data has a size of only 8 bits and can be exceeded resulting in a denial of service. | 7.5 | |
2018-03-15 | CVE-2018-8076 | Zenmate | Incorrect Type Conversion or Cast vulnerability in Zenmate 1.5.4 ZenMate 1.5.4 for macOS suffers from a type confusion vulnerability within the com.zenmate.chron-xpc LaunchDaemon component. | 7.5 |
2018-03-14 | CVE-2018-2400 | Redwood | Unspecified vulnerability in Redwood SAP Business Process Automation 9.00/9.10 Under certain conditions SAP Business Process Automation (BPA) By Redwood, 9.00, 9.10, allows an attacker to access information which would otherwise be restricted. | 7.5 |
2018-03-14 | CVE-2018-2398 | SAP | Unspecified vulnerability in SAP Business Client 6.5 Under certain conditions SAP Business Client 6.5 allows an attacker to access information which would otherwise be restricted. | 7.5 |
2018-03-14 | CVE-2018-7529 | Osisoft | Deserialization of Untrusted Data vulnerability in Osisoft PI Data Archive 3.4.430.460 A Deserialization of Untrusted Data issue was discovered in OSIsoft PI Data Archive versions 2017 and prior. | 7.5 |
2018-03-14 | CVE-2018-1077 | Redhat | XXE vulnerability in Redhat Satellite and Spacewalk Spacewalk 2.6 contains an API which has an XXE flaw allowing for the disclosure of potentially sensitive information from the server. | 7.5 |
2018-03-14 | CVE-2018-1000121 | Debian Canonical Haxx Redhat Oracle | NULL Pointer Dereference vulnerability in multiple products A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service | 7.5 |
2018-03-14 | CVE-2018-0937 | Microsoft | Out-of-bounds Write vulnerability in Microsoft Edge ChakraCore and Microsoft Windows 10 1703 and 1709 allow remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0936 | Microsoft | Out-of-bounds Write vulnerability in Microsoft Edge ChakraCore and Microsoft Windows 10 1709 allow remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0935 | Microsoft | Use After Free vulnerability in Microsoft Internet Explorer 10/11/9 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0934 | Microsoft | Improper Handling of Exceptional Conditions vulnerability in Microsoft Chakracore and Edge ChakraCore and Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0933 | Microsoft | Out-of-bounds Write vulnerability in Microsoft Chakracore and Edge ChakraCore and Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0931 | Microsoft | Out-of-bounds Write vulnerability in Microsoft Edge ChakraCore and Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0930 | Microsoft | Out-of-bounds Write vulnerability in Microsoft Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 1709 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0925 | Microsoft | Out-of-bounds Write vulnerability in Microsoft Chakracore ChakraCore allows remote code execution, due to how the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0893 | Microsoft | Out-of-bounds Write vulnerability in Microsoft Edge Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0889 | Microsoft | Out-of-bounds Write vulnerability in Microsoft Internet Explorer 10/11/9 Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0883 | Microsoft | Unspecified vulnerability in Microsoft products Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how file copy destinations are validated, aka "Windows Shell Remote Code Execution Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0879 | Microsoft | Information Exposure vulnerability in Microsoft Edge Microsoft Edge in Windows 10 1709 allows information disclosure, due to how Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0876 | Microsoft | Out-of-bounds Write vulnerability in Microsoft Edge Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0875 | Microsoft | Unspecified vulnerability in Microsoft Asp.Net Core and Powershell Core .NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka ".NET Core Denial of Service Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0874 | Microsoft | Out-of-bounds Write vulnerability in Microsoft Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0873 | Microsoft | Out-of-bounds Write vulnerability in Microsoft Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0872 | Microsoft | Out-of-bounds Write vulnerability in Microsoft Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2018-03-14 | CVE-2018-0808 | Microsoft | Unspecified vulnerability in Microsoft Asp.Net Core 1.0/1.1/2.0 ASP.NET Core 1.0. | 7.5 |
2018-03-14 | CVE-2018-6875 | Shapeshift | Use of Externally-Controlled Format String vulnerability in Shapeshift Keepkey Firmware 4.0.0 Format String vulnerability in KeepKey version 4.0.0 allows attackers to trigger information display (of information that should not be accessible), related to text containing characters that the device's font lacks. | 7.5 |
2018-03-13 | CVE-2018-1000127 | Memcached Debian Canonical Redhat | Improper Locking vulnerability in multiple products memcached version prior to 1.4.37 contains an Integer Overflow vulnerability in items.c:item_free() that can result in data corruption and deadlocks due to items existing in hash table being reused from free list. | 7.5 |
2018-03-13 | CVE-2018-1000126 | Ajenti | Information Exposure vulnerability in Ajenti 2 Ajenti version 2 contains an Information Disclosure vulnerability in Line 176 of the code source that can result in user and system enumeration as well as data from the /etc/ajenti/config.yml file. | 7.5 |
2018-03-13 | CVE-2018-1227 | Pivotal Software | Unspecified vulnerability in Pivotal Software Concourse Pivotal Concourse after 2018-03-05 might allow remote attackers to have an unspecified impact, if a customer obtained the Concourse software from a DNS domain that is no longer controlled by Pivotal. | 7.5 |
2018-03-13 | CVE-2018-6305 | Gemalto | Unspecified vulnerability in Gemalto Sentinel LDK RTE Denial of service in Gemalto's Sentinel LDK RTE version before 7.65 | 7.5 |
2018-03-13 | CVE-2018-6304 | Gemalto | Out-of-bounds Write vulnerability in Gemalto Sentinel LDK RTE Stack overflow in custom XML-parser in Gemalto's Sentinel LDK RTE version before 7.65 leads to remote denial of service | 7.5 |
2018-03-13 | CVE-2018-6303 | Hanwha Security | Unspecified vulnerability in Hanwha-Security Snh-V6410Pn Firmware and Snh-V6410Pnw Firmware Denial of service by uploading malformed firmware in Hanwha Techwin Smartcams | 7.5 |
2018-03-13 | CVE-2018-6302 | Hanwha Security | Unspecified vulnerability in Hanwha-Security Snh-V6410Pn Firmware and Snh-V6410Pnw Firmware Denial of service by blocking of new camera registration on the cloud server in Hanwha Techwin Smartcams | 7.5 |
2018-03-13 | CVE-2018-6301 | Hanwha Security | Unspecified vulnerability in Hanwha-Security Snh-V6410Pn Firmware and Snh-V6410Pnw Firmware Arbitrary camera access and monitoring via cloud in Hanwha Techwin Smartcams | 7.5 |
2018-03-13 | CVE-2018-1000090 | Textpattern | XXE vulnerability in Textpattern 4.6.2 textpattern version version 4.6.2 contains a XML Injection vulnerability in Import XML feature that can result in Denial of service in context to the web server by exhausting server memory resources. | 7.5 |
2018-03-13 | CVE-2018-1000081 | Ajenti | Improper Input Validation vulnerability in Ajenti 2 Ajenti version version 2 contains a Input Validation vulnerability in ID string on Get-values POST request that can result in Server Crashing. | 7.5 |
2018-03-13 | CVE-2018-1000075 | Rubygems Debian | Infinite Loop vulnerability in multiple products RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a infinite loop caused by negative size vulnerability in ruby gem package tar header that can result in a negative size could cause an infinite loop.. | 7.5 |
2018-03-13 | CVE-2018-1000073 | Rubygems | Link Following vulnerability in Rubygems RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in install_location function of package.rb that can result in path traversal when writing to a symlinked basedir outside of the root. | 7.5 |
2018-03-13 | CVE-2018-1000072 | Iredmail | Incorrect Permission Assignment for Critical Resource vulnerability in Iredmail iRedMail version prior to commit f04b8ef contains a Insecure Permissions vulnerability in Roundcube Webmail that can result in Exfiltrate a user's password protected secret GPG key file and other important configuration files.. | 7.5 |
2018-03-13 | CVE-2018-1000071 | Roundcube | Incorrect Permission Assignment for Critical Resource vulnerability in Roundcube Webmail roundcube version 1.3.4 and earlier contains an Insecure Permissions vulnerability in enigma plugin that can result in exfiltration of gpg private key. | 7.5 |
2018-03-13 | CVE-2018-1000099 | Teluu Debian | Access of Uninitialized Pointer vulnerability in multiple products Teluu PJSIP version 2.7.1 and earlier contains a Access of Null/Uninitialized Pointer vulnerability in pjmedia SDP parsing that can result in Crash. | 7.5 |
2018-03-13 | CVE-2018-1000098 | Teluu Debian | Integer Overflow or Wraparound vulnerability in multiple products Teluu PJSIP version 2.7.1 and earlier contains a Integer Overflow vulnerability in pjmedia SDP parsing that can result in Crash. | 7.5 |
2018-03-12 | CVE-2018-7562 | Glpi Project | Unrestricted Upload of File with Dangerous Type vulnerability in Glpi-Project Glpi A remote code execution issue was discovered in GLPI through 9.2.1. | 7.5 |
2018-03-12 | CVE-2018-1323 | Apache | Information Exposure vulnerability in Apache Tomcat JK Connector The IIS/ISAPI specific code in the Apache Tomcat JK ISAPI Connector 1.2.0 to 1.2.42 that normalised the requested path before matching it to the URI-worker map did not handle some edge cases correctly. | 7.5 |
2018-03-12 | CVE-2017-2619 | Samba Redhat Debian | Link Following vulnerability in multiple products Samba before versions 4.6.1, 4.5.7 and 4.4.11 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition. | 7.5 |
2018-03-12 | CVE-2016-9589 | Redhat | Resource Exhaustion vulnerability in Redhat Jboss Wildfly Application Server Undertow in Red Hat wildfly before version 11.0.0.Beta1 is vulnerable to a resource exhaustion resulting in a denial of service. | 7.5 |
2018-03-12 | CVE-2018-8065 | Flexense | Improper Input Validation vulnerability in Flexense Syncbreeze 10.6.24 An issue was discovered in the web server in Flexense SyncBreeze Enterprise 10.6.24. | 7.5 |
2018-03-12 | CVE-2017-18227 | Titanhq | Improper Certificate Validation vulnerability in Titanhq Webtitan Gateway TitanHQ WebTitan Gateway has incorrect certificate validation for the TLS interception feature. | 7.5 |
2018-03-13 | CVE-2018-1000089 | Django Anymail Project | Information Exposure Through Log Files vulnerability in Django-Anymail Project Django-Anymail Anymail django-anymail version version 0.2 through 1.3 contains a CWE-532, CWE-209 vulnerability in WEBHOOK_AUTHORIZATION setting value that can result in An attacker with access to error logs could fabricate email tracking events. | 7.4 |
2018-03-18 | CVE-2018-8756 | Yzmcms | Code Injection vulnerability in Yzmcms 3.7.1 Eval injection in yzmphp/core/function/global.func.php in YzmCMS v3.7.1 allows remote attackers to achieve arbitrary code execution via PHP code in the POST data of an index.php?m=member&c=member_content&a=init request. | 7.2 |
2018-03-13 | CVE-2018-1000094 | Cmsmadesimple | Unrestricted Upload of File with Dangerous Type vulnerability in Cmsmadesimple CMS Made Simple 2.2.5 CMS Made Simple version 2.2.5 contains a Remote Code Execution vulnerability in File Manager that can result in Allows an authenticated admin that has access to the file manager to execute code on the server. | 7.2 |
2018-03-16 | CVE-2018-3561 | Use After Free vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a race condition in diag_ioctl_lsm_deinit() leads to a Use After Free condition. | 7.0 | |
2018-03-16 | CVE-2017-15834 | Race Condition vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, race condition in diag_dbgfs_read_dcistats(), while accessing diag_dbgfs_dci_data_index, causes potential heap overflow. | 7.0 | |
2018-03-16 | CVE-2017-11082 | Race Condition vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, due to a race condition in a firmware loading routine, a buffer overflow could potentially occur if multiple user space threads try to update the WLAN firmware file through sysfs. | 7.0 | |
2018-03-14 | CVE-2018-0983 | Microsoft | Unspecified vulnerability in Microsoft Windows 10 and Windows Server 2016 Windows Storage Services in Windows 10 versions 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows Storage Services Elevation of Privilege Vulnerability". | 7.0 |
2018-03-14 | CVE-2018-0977 | Microsoft | Unspecified vulnerability in Microsoft Windows 10 and Windows Server 2016 The Windows kernel mode driver in Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how objects are handled in memory, aka "Win32k Elevation of Privilege Vulnerability". | 7.0 |
2018-03-14 | CVE-2018-0886 | Microsoft | Improper Authentication vulnerability in Microsoft products The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709 Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how CredSSP validates request during the authentication process, aka "CredSSP Remote Code Execution Vulnerability". | 7.0 |
2018-03-14 | CVE-2018-0882 | Microsoft | Unspecified vulnerability in Microsoft Windows 10, Windows Server and Windows Server 2016 The Desktop Bridge in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how the virtual registry is managed, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability". | 7.0 |
2018-03-14 | CVE-2018-0881 | Microsoft | Unspecified vulnerability in Microsoft products The Microsoft Video Control in Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege due to how objects are handled in memory, aka "Microsoft Video Control Elevation of Privilege Vulnerability". | 7.0 |
2018-03-14 | CVE-2018-0880 | Microsoft | Unspecified vulnerability in Microsoft Windows 10, Windows Server and Windows Server 2016 The Desktop Bridge in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how the virtual registry is managed, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability". | 7.0 |
2018-03-14 | CVE-2018-0868 | Microsoft | Improper Input Validation vulnerability in Microsoft products Windows Installer in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how input is sanitized, aka "Windows Installer Elevation of Privilege Vulnerability". | 7.0 |
2018-03-14 | CVE-2018-0817 | Microsoft | Unspecified vulnerability in Microsoft products The Windows Graphics Device Interface (GDI) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows GDI Elevation of Privilege Vulnerability". | 7.0 |
2018-03-14 | CVE-2018-0816 | Microsoft | Unspecified vulnerability in Microsoft products The Windows Graphics Device Interface (GDI) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows GDI Elevation of Privilege Vulnerability". | 7.0 |
2018-03-14 | CVE-2018-0815 | Microsoft | Unspecified vulnerability in Microsoft Windows 7 and Windows Server 2008 The Windows Graphics Device Interface (GDI) in Microsoft Windows Server 2008 SP2 and R2 SP1 and Windows 7 SP1 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows GDI Elevation of Privilege Vulnerability". | 7.0 |
142 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2018-03-15 | CVE-2018-6230 | Trendmicro | SQL Injection vulnerability in Trendmicro Email Encryption Gateway 5.5 A SQL injection vulnerability in an Trend Micro Email Encryption Gateway 5.5 search configuration script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system. | 6.8 |
2018-03-16 | CVE-2018-1068 | Linux Canonical Debian Redhat | Out-of-bounds Write vulnerability in multiple products A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. | 6.7 |
2018-03-16 | CVE-2018-1200 | Pivotal Software | Information Exposure vulnerability in Pivotal Software Pivotal Application Service Apps Manager for PCF (Pivotal Application Service 1.11.x before 1.11.26, 1.12.x before 1.12.14, and 2.0.x before 2.0.5) allows unprivileged remote file read in its container via specially-crafted links. | 6.5 |
2018-03-16 | CVE-2017-14384 | Dell | Path Traversal vulnerability in Dell Storage Manager In Dell Storage Manager versions earlier than 16.3.20, the EMConfigMigration service is affected by a directory traversal vulnerability. | 6.5 |
2018-03-16 | CVE-2014-4613 | Piwigo | Cross-Site Request Forgery (CSRF) vulnerability in Piwigo Cross-site request forgery (CSRF) vulnerability in the administration panel in Piwigo before 2.6.2 allows remote attackers to hijack the authentication of administrators for requests that add users via a pwg.users.add action in a request to ws.php. | 6.5 |
2018-03-15 | CVE-2018-6219 | Trendmicro | Improper Certificate Validation vulnerability in Trendmicro Email Encryption Gateway 5.5 An Insecure Update via HTTP vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to eavesdrop and tamper with certain types of update data. | 6.5 |
2018-03-15 | CVE-2018-7706 | Securenvoy | Path Traversal vulnerability in Securenvoy Securmail Directory traversal vulnerability in SecurEnvoy SecurMail before 9.2.501 allows remote authenticated users to read arbitrary e-mail messages via a .. | 6.5 |
2018-03-15 | CVE-2018-7704 | Securenvoy | Information Exposure vulnerability in Securenvoy Securmail SecurEnvoy SecurMail before 9.2.501 allows remote authenticated users to read arbitrary e-mail messages via the option1 parameter in a reply action to secmail/getmessage.exe. | 6.5 |
2018-03-15 | CVE-2018-7701 | Securenvoy | Cross-Site Request Forgery (CSRF) vulnerability in Securenvoy Securmail Multiple cross-site request forgery (CSRF) vulnerabilities in SecurEnvoy SecurMail before 9.2.501 allow remote attackers to hijack the authentication of arbitrary users for requests that (1) delete e-mail messages via a delete action in a request to secmail/getmessage.exe or (2) spoof arbitrary users and reply to their messages via a request to secserver/securectrl.exe. | 6.5 |
2018-03-14 | CVE-2018-0940 | Microsoft | Unspecified vulnerability in Microsoft Exchange Server 2010/2013/2016 Microsoft Exchange Outlook Web Access (OWA) in Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 20, Microsoft Exchange Server 2013 Cumulative Update 18, Microsoft Exchange Server 2013 Cumulative Update 19, Microsoft Exchange Server 2013 Service Pack 1, Microsoft Exchange Server 2016 Cumulative Update 7, and Microsoft Exchange Server 2016 Cumulative Update 8 allows an elevation of privilege vulnerability due to how links in the body of an email message are rewritten, aka "Microsoft Exchange Elevation of Privilege Vulnerability". | 6.5 |
2018-03-14 | CVE-2018-0924 | Microsoft | Open Redirect vulnerability in Microsoft Exchange Server 2010/2013/2016 Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 20, Microsoft Exchange Server 2013 Cumulative Update 18, Microsoft Exchange Server 2013 Cumulative Update 19, Microsoft Exchange Server 2013 Service Pack 1, Microsoft Exchange Server 2016 Cumulative Update 7, and Microsoft Exchange Server 2016 Cumulative Update 8 allow an information disclosure vulnerability due to how URL redirects are handled, aka "Microsoft Exchange Information Disclosure Vulnerability". | 6.5 |
2018-03-14 | CVE-2017-18231 | Graphicsmagick Debian | NULL Pointer Dereference vulnerability in multiple products An issue was discovered in GraphicsMagick 1.3.26. | 6.5 |
2018-03-14 | CVE-2017-18230 | Graphicsmagick Debian | NULL Pointer Dereference vulnerability in multiple products An issue was discovered in GraphicsMagick 1.3.26. | 6.5 |
2018-03-14 | CVE-2017-18229 | Graphicsmagick Debian | Allocation of Resources Without Limits or Throttling vulnerability in multiple products An issue was discovered in GraphicsMagick 1.3.26. | 6.5 |
2018-03-14 | CVE-2018-8099 | Libgit2 Debian | Double Free vulnerability in multiple products Incorrect returning of an error code in the index.c:read_entry() function leads to a double free in libgit2 before v0.26.2, which allows an attacker to cause a denial of service via a crafted repository index file. | 6.5 |
2018-03-14 | CVE-2018-8098 | Libgit2 Debian | Integer Overflow or Wraparound vulnerability in multiple products Integer overflow in the index.c:read_entry() function while decompressing a compressed prefix length in libgit2 before v0.26.2 allows an attacker to cause a denial of service (out-of-bounds read) via a crafted repository index file. | 6.5 |
2018-03-13 | CVE-2018-1000080 | Ajenti | Incorrect Permission Assignment for Critical Resource vulnerability in Ajenti 2 Ajenti version version 2 contains a Insecure Permissions vulnerability in Plugins download that can result in The download of any plugins as being a normal user. | 6.5 |
2018-03-13 | CVE-2018-1000107 | Jenkins | Incorrect Authorization vulnerability in Jenkins JOB and Node Ownership An improper authorization vulnerability exists in Jenkins Job and Node Ownership Plugin 0.11.0 and earlier in OwnershipDescription.java, JobOwnerJobProperty.java, and OwnerNodeProperty.java that allow an attacker with Job/Configure or Computer/Configure permission and without Ownership related permissions to override ownership metadata. | 6.5 |
2018-03-12 | CVE-2018-5758 | Aurea | XXE vulnerability in Aurea Jive-N 9.0.2.1 The Upload File functionality in upload.jspa in Aurea Jive Jive-n 9.0.2.1 On-Premises allows for an XML External Entity attack through a crafted file, allowing attackers to read arbitrary files. | 6.5 |
2018-03-12 | CVE-2016-9600 | Jasper Project Canonical Redhat | NULL Pointer Dereference vulnerability in multiple products JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded creation of JPEG 2000 image files. | 6.5 |
2018-03-12 | CVE-2016-8629 | Redhat | Permissions, Privileges, and Access Controls vulnerability in Redhat Keycloak Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. | 6.5 |
2018-03-12 | CVE-2014-8130 | Libtiff Redhat Apple | Divide By Zero vulnerability in multiple products The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither. | 6.5 |
2018-03-13 | CVE-2016-9575 | Freeipa | Improper Authorization vulnerability in Freeipa Ipa versions 4.2.x, 4.3.x before 4.3.3 and 4.4.x before 4.4.3 did not properly check the user's permissions while modifying certificate profiles in IdM's certprofile-mod command. | 6.3 |
2018-03-16 | CVE-2014-4612 | Coppermine Gallery | Cross-site Scripting vulnerability in Coppermine-Gallery Coppermine Photo Gallery Cross-site scripting (XSS) vulnerability in the keywords manager (keywordmgr.php) in Coppermine Photo Gallery before 1.5.27 and 1.6.x before 1.6.01 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 6.1 |
2018-03-16 | CVE-2017-12590 | Asus | Cross-site Scripting vulnerability in Asus Rt-N14Uhp Firmware ASUS RT-N14UHP devices before 3.0.0.4.380.8015 have a reflected XSS vulnerability in the "flag" parameter. | 6.1 |
2018-03-15 | CVE-2016-0223 | IBM | Cross-site Scripting vulnerability in IBM Forms Server Cross-site scripting (XSS) vulnerability in the Webform Framework API in IBM Forms Server 4.0.x, 8.0.x, 8.1, and 8.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 6.1 |
2018-03-15 | CVE-2015-7453 | IBM | Cross-site Scripting vulnerability in IBM products Cross-site scripting (XSS) vulnerability in IBM Rational Collaborative Lifecycle Management (CLM) 3.0.1 before 3.0.1.6 iFix7 Interim Fix 1, 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Quality Manager (RQM) 3.0.x before 3.0.1.6 iFix7 Interim Fix 1, 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Team Concert (RTC) 3.0.x before 3.0.1.6 iFix7 Interim Fix 1, 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Requirements Composer (RRC) 3.0.x before 3.0.1.6 iFix7 Interim Fix 1 and 4.0.x before 4.0.7 iFix10; Rational DOORS Next Generation (RDNG) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Engineering Lifecycle Manager (RELM) 4.0.3, 4.0.4, 4.0.5, 4.0.6, and 4.0.7 before iFix10, 5.0.x before 5.0.2 iFix1, and 6.0.x before 6.0.2; Rational Rhapsody Design Manager (Rhapsody DM) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; and Rational Software Architect Design Manager (RSA DM) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 6.1 |
2018-03-15 | CVE-2018-1319 | Apache | Injection vulnerability in Apache Allura In Apache Allura prior to 1.8.1, attackers may craft URLs that cause HTTP response splitting. | 6.1 |
2018-03-15 | CVE-2018-8729 | Pojo | Cross-site Scripting vulnerability in Pojo Activity LOG Multiple cross-site scripting (XSS) vulnerabilities in the Activity Log plugin before 2.4.1 for WordPress allow remote attackers to inject arbitrary JavaScript or HTML via a title that is not escaped. | 6.1 |
2018-03-15 | CVE-2018-8728 | Kontena | Cross-site Scripting vulnerability in Kontena server/app/views/static/code.html in Kontena before 1.5.0 allows XSS in "kontena master login --remote" code display, as demonstrated by /code#code= in a URI. | 6.1 |
2018-03-15 | CVE-2018-8722 | Zohocorp | Cross-site Scripting vulnerability in Zohocorp Manageengine Desktop Central 9.1.0 Zoho ManageEngine Desktop Central version 9.1.0 build 91099 has multiple XSS issues that were fixed in build 92026. | 6.1 |
2018-03-15 | CVE-2018-8721 | Zohocorp | Cross-site Scripting vulnerability in Zohocorp Manageengine Eventlog Analyzer 11.0 Zoho ManageEngine EventLog Analyzer version 11.0 build 11000 has Stored XSS related to the index2.do?url=editAlertForm&tab=alert&alert=profile URI and the Edit Alert Profile screen | 6.1 |
2018-03-15 | CVE-2018-7707 | Securenvoy | Cross-site Scripting vulnerability in Securenvoy Securmail Cross-site scripting (XSS) vulnerability in SecurEnvoy SecurMail before 9.2.501 allows remote attackers to inject arbitrary web script or HTML via an HTML-formatted e-mail message. | 6.1 |
2018-03-15 | CVE-2018-7703 | Securenvoy | Cross-site Scripting vulnerability in Securenvoy Securmail Cross-site scripting (XSS) vulnerability in SecurEnvoy SecurMail before 9.2.501 allows remote attackers to inject arbitrary web script or HTML via the mailboxid parameter to secmail/getmessage.exe. | 6.1 |
2018-03-14 | CVE-2018-2399 | SAP | Cross-site Scripting vulnerability in SAP Process Monitoring Infrastructure Cross-Site Scripting in Process Monitoring Infrastructure, from 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, due to inefficient encoding of user controlled inputs. | 6.1 |
2018-03-14 | CVE-2018-7508 | Osisoft | Cross-site Scripting vulnerability in Osisoft PI Vision and PI web API A Cross-site Scripting issue was discovered in OSIsoft PI Web API versions 2017 R2 and prior. | 6.1 |
2018-03-14 | CVE-2018-7504 | Osisoft | Cross-site Scripting vulnerability in Osisoft PI Vision 2017 A Protection Mechanism Failure issue was discovered in OSIsoft PI Vision versions 2017 and prior. | 6.1 |
2018-03-14 | CVE-2018-1000129 | Jolokia | Cross-site Scripting vulnerability in Jolokia 1.3.7 An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser. | 6.1 |
2018-03-14 | CVE-2018-8108 | BUI Project | Cross-site Scripting vulnerability in BUI Project BUI The select component in bui through 2018-03-13 has XSS because it performs an escape operation on already-escaped text, as demonstrated by workGroupList text. | 6.1 |
2018-03-14 | CVE-2018-1441 | IBM | Cross-site Scripting vulnerability in IBM Monitoring 8.1.3/8.1.4 IBM Application Performance Management - Response Time Monitoring Agent (IBM Monitoring 8.1.3 and 8.1.4) is vulnerable to cross-site scripting. | 6.1 |
2018-03-13 | CVE-2018-7405 | Zohocorp | Cross-site Scripting vulnerability in Zohocorp Manageengine Eventlog Analyzer Cross-site scripting (XSS) in Zoho ManageEngine EventLog Analyzer before 11.12 Build 11120 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 6.1 |
2018-03-13 | CVE-2017-17442 | Blackberry | Cross-site Scripting vulnerability in Blackberry Unified Endpoint Manager In BlackBerry UEM Management Console version 12.7.1 and earlier, a reflected cross-site scripting vulnerability that could allow an attacker to execute script commands in the context of the affected UEM Management Console account by crafting a malicious link and then persuading a user with legitimate access to the Management Console to click on the malicious link. | 6.1 |
2018-03-13 | CVE-2018-1000088 | Doorkeeper Project | Cross-site Scripting vulnerability in Doorkeeper Project Doorkeeper Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. | 6.1 |
2018-03-13 | CVE-2018-1000078 | Rubygems Debian | Cross-site Scripting vulnerability in multiple products RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. | 6.1 |
2018-03-13 | CVE-2018-1000108 | Jenkins | Cross-site Scripting vulnerability in Jenkins Cppncss 1.0/1.1 A cross-site scripting vulnerability exists in Jenkins CppNCSS Plugin 1.1 and earlier in AbstractProjectAction/index.jelly that allow an attacker to craft links to Jenkins URLs that run arbitrary JavaScript in the user's browser when accessed. | 6.1 |
2018-03-12 | CVE-2018-7563 | Glpi Project | Cross-site Scripting vulnerability in Glpi-Project Glpi An issue was discovered in GLPI through 9.2.1. | 6.1 |
2018-03-12 | CVE-2017-2661 | Clusterlabs | Cross-site Scripting vulnerability in Clusterlabs PCS ClusterLabs pcs before version 0.9.157 is vulnerable to a cross-site scripting vulnerability due to improper validation of Node name field when creating new cluster or adding existing cluster. | 6.1 |
2018-03-12 | CVE-2017-15719 | Wicket Jquery UI Project | Cross-site Scripting vulnerability in Wicket-Jquery-Ui Project Wicket-Jquery-Ui In Wicket jQuery UI 6.28.0 and earlier, 7.9.1 and earlier, and 8.0.0-M8 and earlier, a security issue has been discovered in the WYSIWYG editor that allows an attacker to submit arbitrary JS code to WYSIWYG editor. | 6.1 |
2018-03-14 | CVE-2018-7531 | Osisoft | Improper Input Validation vulnerability in Osisoft PI Data Archive 2017/3.4.430.460 An Improper Input Validation issue was discovered in OSIsoft PI Data Archive versions 2017 and prior. | 5.9 |
2018-03-12 | CVE-2017-2585 | Redhat | Information Exposure vulnerability in Redhat Keycloak Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks. | 5.9 |
2018-03-14 | CVE-2018-0885 | Microsoft | Improper Input Validation vulnerability in Microsoft products The Microsoft Hyper-V Network Switch in 64-bit versions of Microsoft Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows a denial of service vulnerability due to how input from a privileged user on a guest operating system is validated, aka "Hyper-V Denial of Service Vulnerability". | 5.8 |
2018-03-14 | CVE-2018-0888 | Microsoft | Improper Input Validation vulnerability in Microsoft products The Microsoft Hyper-V Network Switch in 64-bit versions of Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to how guest operating system input is validated, aka "Hyper-V Information Disclosure Vulnerability". | 5.6 |
2018-03-13 | CVE-2017-1002102 | Kubernetes | Unspecified vulnerability in Kubernetes In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using a secret, configMap, projected or downwardAPI volume can trigger deletion of arbitrary files/directories from the nodes where they are running. | 5.6 |
2018-03-18 | CVE-2018-8754 | Libevt Project Debian | Out-of-bounds Read vulnerability in multiple products The libevt_record_values_read_event() function in libevt_record_values.c in libevt before 2018-03-17 does not properly check for out-of-bounds values of user SID data size, strings size, or data size. | 5.5 |
2018-03-16 | CVE-2018-1324 | Apache Oracle | Infinite Loop vulnerability in multiple products A specially crafted ZIP archive can be used to cause an infinite loop inside of Apache Commons Compress' extra field parser used by the ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15. | 5.5 |
2018-03-15 | CVE-2017-18238 | Exempi Project Debian | Infinite Loop vulnerability in multiple products An issue was discovered in Exempi before 2.4.4. | 5.5 |
2018-03-15 | CVE-2017-18237 | Exempi Project | NULL Pointer Dereference vulnerability in Exempi Project Exempi An issue was discovered in Exempi before 2.4.3. | 5.5 |
2018-03-15 | CVE-2017-18236 | Exempi Project Debian Canonical | Infinite Loop vulnerability in multiple products An issue was discovered in Exempi before 2.4.4. | 5.5 |
2018-03-15 | CVE-2017-18235 | Exempi Project | Improper Input Validation vulnerability in Exempi Project Exempi An issue was discovered in Exempi before 2.4.3. | 5.5 |
2018-03-15 | CVE-2017-18233 | Exempi Project Debian Canonical | Infinite Loop vulnerability in multiple products An issue was discovered in Exempi before 2.4.4. | 5.5 |
2018-03-15 | CVE-2017-18232 | Linux | Unspecified vulnerability in Linux Kernel The Serial Attached SCSI (SAS) implementation in the Linux kernel through 4.15.9 mishandles a mutex within libsas, which allows local users to cause a denial of service (deadlock) by triggering certain error-handling code. | 5.5 |
2018-03-14 | CVE-2018-0941 | Microsoft | Unspecified vulnerability in Microsoft Exchange Server 2016 Microsoft Exchange Server 2016 Cumulative Update 7 and Microsoft Exchange Server 2016 Cumulative Update 8 allow an information disclosure vulnerability due to how data is imported, aka "Microsoft Exchange Information Disclosure Vulnerability". | 5.5 |
2018-03-14 | CVE-2018-0926 | Microsoft | Improper Initialization vulnerability in Microsoft products The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". | 5.5 |
2018-03-14 | CVE-2018-0814 | Microsoft | Improper Initialization vulnerability in Microsoft products The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way objects are initialized in memory, aka "Windows Kernel Information Disclosure Vulnerability". | 5.5 |
2018-03-14 | CVE-2018-0813 | Microsoft | Improper Initialization vulnerability in Microsoft products The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way objects are initialized in memory, aka "Windows Kernel Information Disclosure Vulnerability". | 5.5 |
2018-03-14 | CVE-2018-0811 | Microsoft | Improper Initialization vulnerability in Microsoft products The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way objects are initialized in memory, aka "Windows Kernel Information Disclosure Vulnerability". | 5.5 |
2018-03-14 | CVE-2018-8107 | Xpdfreader | Out-of-bounds Read vulnerability in Xpdfreader Xpdf 4.00 The JPXStream::close function in JPXStream.cc in xpdf 4.00 allows attackers to launch denial of service (heap-based buffer over-read and application crash) via a specific pdf file, as demonstrated by pdftohtml. | 5.5 |
2018-03-14 | CVE-2018-8106 | Xpdfreader | Out-of-bounds Read vulnerability in Xpdfreader Xpdf 4.00 The JPXStream::readTilePartData function in JPXStream.cc in xpdf 4.00 allows attackers to launch denial of service (heap-based buffer over-read and application crash) via a specific pdf file, as demonstrated by pdftohtml. | 5.5 |
2018-03-14 | CVE-2018-8105 | Xpdfreader | Out-of-bounds Read vulnerability in Xpdfreader Xpdf 4.00 The JPXStream::fillReadBuf function in JPXStream.cc in xpdf 4.00 allows attackers to launch denial of service (heap-based buffer over-read and application crash) via a specific pdf file, as demonstrated by pdftohtml. | 5.5 |
2018-03-14 | CVE-2018-8104 | Xpdfreader | Out-of-bounds Read vulnerability in Xpdfreader Xpdf 4.00 The BufStream::lookChar function in Stream.cc in xpdf 4.00 allows attackers to launch denial of service (heap-based buffer over-read and application crash) via a specific pdf file, as demonstrated by pdftohtml. | 5.5 |
2018-03-14 | CVE-2018-8103 | Xpdfreader | Out-of-bounds Read vulnerability in Xpdfreader Xpdf 4.00 The JBIG2Stream::readGenericBitmap function in JBIG2Stream.cc in xpdf 4.00 allows attackers to launch denial of service (heap-based buffer over-read and application crash) via a specific pdf file, as demonstrated by pdftohtml. | 5.5 |
2018-03-14 | CVE-2018-8102 | Xpdfreader | Out-of-bounds Read vulnerability in Xpdfreader Xpdf 4.00 The JBIG2MMRDecoder::getBlackCode function in JBIG2Stream.cc in xpdf 4.00 allows attackers to launch denial of service (buffer over-read and application crash) via a specific pdf file, as demonstrated by pdftohtml. | 5.5 |
2018-03-14 | CVE-2018-8101 | Xpdfreader | Out-of-bounds Read vulnerability in Xpdfreader Xpdf 4.00 The JPXStream::inverseTransformLevel function in JPXStream.cc in xpdf 4.00 allows attackers to launch denial of service (heap-based buffer over-read and application crash) via a specific pdf file, as demonstrated by pdftohtml. | 5.5 |
2018-03-13 | CVE-2018-1000085 | Clamav Debian Canonical | Out-of-bounds Read vulnerability in multiple products ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. | 5.5 |
2018-03-13 | CVE-2018-1000079 | Rubygems | Path Traversal vulnerability in Rubygems RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in gem installation that can result in the gem could write to arbitrary filesystem locations during installation. | 5.5 |
2018-03-13 | CVE-2018-1000069 | Freeplane Debian | XXE vulnerability in multiple products FreePlane version 1.5.9 and earlier contains a XML External Entity (XXE) vulnerability in XML Parser in mindmap loader that can result in stealing data from victim's machine. | 5.5 |
2018-03-13 | CVE-2018-8087 | Linux Debian Canonical | Missing Release of Resource after Effective Lifetime vulnerability in multiple products Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case. | 5.5 |
2018-03-12 | CVE-2018-7858 | Qemu Opensuse Redhat Canonical | Out-of-bounds Read vulnerability in multiple products Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display. | 5.5 |
2018-03-12 | CVE-2016-0237 | IBM | Information Exposure vulnerability in IBM Security Guardium Database Activity Monitor 10.0 IBM Security Guardium Database Activity Monitor 10 allows local users to obtain sensitive information by reading cached browser data. | 5.5 |
2018-03-12 | CVE-2017-6288 | Out-of-bounds Read vulnerability in Google Android NVIDIA libnvrm contains a possible out of bounds read due to a missing bounds check which could lead to local information disclosure. | 5.5 | |
2018-03-12 | CVE-2017-6287 | Out-of-bounds Read vulnerability in Google Android NVIDIA libnvrm contains a possible out of bounds read due to a missing bounds check which could lead to local information disclosure. | 5.5 | |
2018-03-12 | CVE-2017-6285 | Out-of-bounds Read vulnerability in Google Android NVIDIA libnvrm contains a possible out of bounds read due to a missing bounds check which could lead to local information disclosure. | 5.5 | |
2018-03-12 | CVE-2017-18226 | Jabberd2 | Incorrect Permission Assignment for Critical Resource vulnerability in Jabberd2 The Gentoo net-im/jabberd2 package through 2.6.1 sets the ownership of /var/run/jabber to the jabber account, which might allow local users to kill arbitrary processes by leveraging access to this account for PID file modification before a root script executes a "kill -TERM `cat /var/run/jabber/filename.pid`" command. | 5.5 |
2018-03-17 | CVE-2018-8737 | Bylancer | Cross-site Scripting vulnerability in Bylancer Bookme 2.0 Bookme Control Panel 2.0 Application is vulnerable to stored XSS within the Customers "Book Me" function. | 5.4 |
2018-03-16 | CVE-2016-10716 | Mail RU | Cross-site Scripting vulnerability in Mail.Ru Calendar The Mail.ru Calendar plugin before 2.5.0.61 for Atlassian Jira has XSS via the Name field in a Create Calender action, related to a MailRuCalendar.jspa#period/month URI. | 5.4 |
2018-03-16 | CVE-2016-10715 | Artezio | Cross-site Scripting vulnerability in Artezio Kanban Board 1.4 The Artezio Kanban Board plugin 1.4 revision 1914 for Atlassian Jira has XSS via the Board Name in a Create New Board action, related to an artezioboard/mainPage.jspa?kanbanId=7#/kanban-view URI. | 5.4 |
2018-03-15 | CVE-2018-6227 | Trendmicro | Cross-site Scripting vulnerability in Trendmicro Email Encryption Gateway 5.5 A stored cross-site scripting (XSS) vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to inject client-side scripts into vulnerable systems. | 5.4 |
2018-03-15 | CVE-2018-6226 | Trendmicro | Cross-site Scripting vulnerability in Trendmicro Email Encryption Gateway 5.5 Reflected cross-site scripting (XSS) vulnerabilities in two Trend Micro Email Encryption Gateway 5.5 configuration files could allow an attacker to inject client-side scripts into vulnerable systems. | 5.4 |
2018-03-15 | CVE-2018-8720 | Servicenow | Cross-site Scripting vulnerability in Servicenow IT Service Management ServiceNow ITSM 2016-06-02 has XSS via the First Name or Last Name field of My Profile (aka navpage.do), or the Search bar of My Portal (aka search_results.do). | 5.4 |
2018-03-14 | CVE-2018-2397 | SAP | Cross-site Scripting vulnerability in SAP Businessobjects Business Intelligence Platform In SAP Business Objects Business Intelligence Platform, 4.00, 4.10, 4.20, 4.30, the Central Management Console (CMC) does not sufficiently encode user controlled inputs which results in Cross-Site Scripting. | 5.4 |
2018-03-14 | CVE-2018-1444 | IBM | Cross-site Scripting vulnerability in IBM Websphere Portal 8.5.0.0/9.0.0.0 IBM WebSphere Portal 8.5 and 9.0 is vulnerable to cross-site scripting. | 5.4 |
2018-03-13 | CVE-2018-1000084 | Wolfcms | Cross-site Scripting vulnerability in Wolfcms Wolf CMS 0.8.3.1 WOlfCMS WolfCMS version version 0.8.3.1 contains a Stored Cross-Site Scripting vulnerability in Layout Name (from Layout tab) that can result in low privilege user can steal the cookie of admin user and compromise the admin account. | 5.4 |
2018-03-13 | CVE-2018-1000113 | Jenkins | Cross-site Scripting vulnerability in Jenkins Testlink A cross-site scripting vulnerability exists in Jenkins TestLink Plugin 2.12 and earlier in TestLinkBuildAction/summary.jelly and others that allow an attacker who can control e.g. | 5.4 |
2018-03-13 | CVE-2018-1000106 | Jenkins | Incorrect Authorization vulnerability in Jenkins Gerrit Trigger An improper authorization vulnerability exists in Jenkins Gerrit Trigger Plugin 2.27.4 and earlier in GerritManagement.java, GerritServer.java, and PluginImpl.java that allows an attacker with Overall/Read access to modify the Gerrit configuration in Jenkins. | 5.4 |
2018-03-13 | CVE-2018-8078 | Yzmcms | Cross-site Scripting vulnerability in Yzmcms 3.7 YzmCMS 3.7 has Stored XSS via the title parameter to advertisement/adver/edit.html. | 5.4 |
2018-03-12 | CVE-2017-18228 | BMC | Cross-site Scripting vulnerability in BMC Remedy Action Request System Remedy Mid Tier in BMC Remedy AR System 9.1 allows XSS via the ATTKey parameter in an arsys/servlet/AttachServlet request. | 5.4 |
2018-03-12 | CVE-2016-0261 | IBM | Cross-site Scripting vulnerability in IBM Care Management and Curam Social Program Management Cross-site scripting (XSS) vulnerability in IBM Curam Social Program Management 6.0.0 before SP2 EP29, 6.0.4 before 6.0.4.6 iFix3, 6.0.5 before 6.0.5.9 iFix2, 6.1.0 before 6.1.0.1 iFix1, and 6.1.1 before 6.1.1.1 iFix1; and IBM Care Management 6.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 5.4 |
2018-03-12 | CVE-2016-0250 | IBM | XXE vulnerability in IBM Infosphere Information Server XML external entity (XXE) vulnerability in IBM InfoSphere Information Governance Catalog 11.3 before 11.3.1.2 and 11.5 before 11.5.0.1 allows remote authenticated users to read arbitrary files or cause a denial of service via crafted XML data. | 5.4 |
2018-03-12 | CVE-2018-8070 | Qcms | Cross-site Scripting vulnerability in Qcms 3.0 QCMS version 3.0 has XSS via the title parameter to the /guest/index.html URI. | 5.4 |
2018-03-12 | CVE-2018-8069 | Qcms | Cross-site Scripting vulnerability in Qcms 3.0 QCMS version 3.0 has XSS via the webname parameter to the /backend/system.html URI. | 5.4 |
2018-03-18 | CVE-2018-8770 | Cobub | Information Exposure vulnerability in Cobub Razor 0.8.0 Physical path Leakage exists in Western Bridge Cobub Razor 0.8.0 via generate.php, controllers/getConfigTest.php, controllers/getUpdateTest.php, controllers/postclientdataTest.php, controllers/posterrorTest.php, controllers/posteventTest.php, controllers/posttagTest.php, controllers/postusinglogTest.php, fixtures/Controller_fixt.php, fixtures/Controller_fixt2.php, fixtures/view_fixt2.php, libs/ipTest.php, or models/commonDbfix.php in tests/. | 5.3 |
2018-03-16 | CVE-2018-1199 | Vmware Redhat Oracle | Improper Input Validation vulnerability in multiple products Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. | 5.3 |
2018-03-15 | CVE-2018-6957 | Vmware | Missing Release of Resource after Effective Lifetime vulnerability in VMWare Fusion, Workstation Player and Workstation PRO VMware Workstation (14.x before 14.1.1, 12.x) and Fusion (10.x before 10.1.1 and 8.x) contain a denial-of-service vulnerability which can be triggered by opening a large number of VNC sessions. | 5.3 |
2018-03-14 | CVE-2018-7496 | Osisoft | Information Exposure vulnerability in Osisoft PI Vision 2017 An Information Exposure issue was discovered in OSIsoft PI Vision versions 2017 and prior. | 5.3 |
2018-03-13 | CVE-2017-16250 | Mitel | Information Exposure vulnerability in Mitel St14.2 Ga28 A vulnerability in Mitel ST 14.2, release GA28 and earlier, could allow an attacker to use the API function to enumerate through user-ids which could be used to identify valid user ids and associated user names. | 5.3 |
2018-03-13 | CVE-2018-6296 | Hanwha Security | Unspecified vulnerability in Hanwha-Security Snh-V6410Pn Firmware and Snh-V6410Pnw Firmware An undocumented (hidden) capability for switching the web interface in Hanwha Techwin Smartcams | 5.3 |
2018-03-13 | CVE-2018-1000083 | Ajenti | Path Traversal vulnerability in Ajenti 2 Ajenti version version 2 contains a Improper Error Handling vulnerability in Login JSON request that can result in The requisition leaks a path of the server. | 5.3 |
2018-03-13 | CVE-2018-1000077 | Rubygems Debian | Improper Input Validation vulnerability in multiple products RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious gem could set an invalid homepage URL. | 5.3 |
2018-03-13 | CVE-2018-1000112 | Jenkins | Incorrect Authorization vulnerability in Jenkins Mercurial An improper authorization vulnerability exists in Jenkins Mercurial Plugin version 2.2 and earlier in MercurialStatus.java that allows an attacker with network access to obtain a list of nodes and users. | 5.3 |
2018-03-13 | CVE-2018-1000111 | Jenkins | Incorrect Authorization vulnerability in Jenkins Subversion An improper authorization vulnerability exists in Jenkins Subversion Plugin version 2.10.2 and earlier in SubversionStatus.java and SubversionRepositoryStatus.java that allows an attacker with network access to obtain a list of nodes and users. | 5.3 |
2018-03-13 | CVE-2018-1000110 | Jenkins | Incorrect Authorization vulnerability in Jenkins GIT An improper authorization vulnerability exists in Jenkins Git Plugin version 3.7.0 and earlier in GitStatus.java that allows an attacker with network access to obtain a list of nodes and users. | 5.3 |
2018-03-18 | CVE-2018-8767 | Joyplus CMS Project | Cross-site Scripting vulnerability in Joyplus-Cms Project Joyplus-Cms 1.6.0 joyplus-cms 1.6.0 has XSS in manager/admin_ajax.php?action=save&tab={pre}vod_type via the t_name parameter. | 4.8 |
2018-03-15 | CVE-2015-7471 | IBM | Cross-site Scripting vulnerability in IBM products Cross-site scripting (XSS) vulnerability in IBM Rational Collaborative Lifecycle Management (CLM) 3.0.1 before 3.0.1.6 iFix7 Interim Fix 1, 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Quality Manager (RQM) 3.0.x before 3.0.1.6 iFix7 Interim Fix 1, 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Team Concert (RTC) 3.0.x before 3.0.1.6 iFix7 Interim Fix 1, 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Requirements Composer (RRC) 3.0.x before 3.0.1.6 iFix7 Interim Fix 1 and 4.0.x before 4.0.7 iFix10; Rational DOORS Next Generation (RDNG) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Engineering Lifecycle Manager (RELM) 4.0.3, 4.0.4, 4.0.5, 4.0.6, and 4.0.7 before iFix10, 5.0.x before 5.0.2 iFix1, and 6.0.x before 6.0.2; Rational Rhapsody Design Manager (Rhapsody DM) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; and Rational Software Architect Design Manager (RSA DM) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4 allows remote authenticated users with project administrator privileges to inject arbitrary web script or HTML via a crafted project. | 4.8 |
2018-03-14 | CVE-2018-7678 | Netiq | Cross-site Scripting vulnerability in Netiq Access Manager 4.3/4.4 A cross site scripting vulnerability exist in the Administration Console in NetIQ Access Manager (NAM) 4.3 and 4.4. | 4.8 |
2018-03-13 | CVE-2018-1000087 | Wolfcms | Cross-site Scripting vulnerability in Wolfcms Wolf CMS 0.8.3.1 WolfCMS version version 0.8.3.1 contains a Reflected Cross Site Scripting vulnerability in "Create New File" and "Create New Directory" input box from 'files' Tab that can result in Session Hijacking, Spread Worms,Control the browser remotely. | 4.8 |
2018-03-13 | CVE-2018-1000095 | Redhat | Cross-site Scripting vulnerability in Redhat Ovirt-Engine oVirt version 4.2.0 to 4.2.2 contains a Cross Site Scripting (XSS) vulnerability in the name/description of VMs portion of the web admin application. | 4.8 |
2018-03-12 | CVE-2018-8058 | Cmsmadesimple | Cross-site Scripting vulnerability in Cmsmadesimple CMS Made Simple 2.2.6 CMS Made Simple (CMSMS) 2.2.6 has XSS in admin/moduleinterface.php via the pagedata parameter. | 4.8 |
2018-03-12 | CVE-2018-7893 | Cmsmadesimple | Cross-site Scripting vulnerability in Cmsmadesimple CMS Made Simple 2.2.6 CMS Made Simple (CMSMS) 2.2.6 has stored XSS in admin/moduleinterface.php via the metadata parameter. | 4.8 |
2018-03-14 | CVE-2018-0904 | Microsoft | Information Exposure vulnerability in Microsoft products The Windows kernel in Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows information disclosure vulnerability due to how memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". | 4.7 |
2018-03-14 | CVE-2018-0901 | Microsoft | Memory Leak vulnerability in Microsoft products The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". | 4.7 |
2018-03-14 | CVE-2018-0900 | Microsoft | Information Exposure vulnerability in Microsoft products The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". | 4.7 |
2018-03-14 | CVE-2018-0899 | Microsoft | Information Exposure vulnerability in Microsoft products The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". | 4.7 |
2018-03-14 | CVE-2018-0898 | Microsoft | Information Exposure vulnerability in Microsoft products The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". | 4.7 |
2018-03-14 | CVE-2018-0897 | Microsoft | Improper Initialization vulnerability in Microsoft products The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". | 4.7 |
2018-03-14 | CVE-2018-0896 | Microsoft | Information Exposure vulnerability in Microsoft products The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". | 4.7 |
2018-03-14 | CVE-2018-0895 | Microsoft | Memory Leak vulnerability in Microsoft products The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". | 4.7 |
2018-03-14 | CVE-2018-0894 | Microsoft | Out-of-bounds Read vulnerability in Microsoft products The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". | 4.7 |
2018-03-12 | CVE-2017-18224 | Linux | Race Condition vulnerability in Linux Kernel In the Linux kernel before 4.15, fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allows local users to cause a denial of service (BUG) by modifying a certain e_cpos field. | 4.7 |
2018-03-16 | CVE-2017-15814 | Out-of-bounds Read vulnerability in Google Android In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in msm_flash_subdev_do_ioctl of drivers/media/platform/msm/camera_v2/sensor/flash/msm_flash.c, there is a possible out of bounds read if flash_data.cfg_type is CFG_FLASH_INIT due to improper input validation. | 4.4 | |
2018-03-15 | CVE-2015-7463 | IBM | Improper Authorization vulnerability in IBM Business Process Manager IBM Business Process Manager 7.5.x, 8.0.x, 8.5.0, 8.5.5, and 8.5.6.0 through cumulative fix 2 allow remote authenticated users to delete process and task data by leveraging incorrect authorization checks. | 4.3 |
2018-03-15 | CVE-2018-6225 | Trendmicro | XXE vulnerability in Trendmicro Email Encryption Gateway 5.5 An XML external entity injection (XXE) vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an authenticated user to expose a normally protected configuration script. | 4.3 |
2018-03-14 | CVE-2018-2366 | Redwood | Path Traversal vulnerability in Redwood SAP Business Process Automation 9.0/9.1 SAP Business Process Automation (BPA) By Redwood, 9.0, 9.1, allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs. | 4.3 |
2018-03-14 | CVE-2018-0939 | Microsoft | Out-of-bounds Write vulnerability in Microsoft Edge ChakraCore and Microsoft Edge in Windows 10 1703 and 1709 allow information disclosure, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". | 4.3 |
2018-03-14 | CVE-2018-0932 | Microsoft | Information Exposure vulnerability in Microsoft Edge and Internet Explorer Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows information disclosure, due to how Microsoft browsers handle objects in memory, aka "Microsoft Browser Information Disclosure Vulnerability". | 4.3 |
2018-03-14 | CVE-2018-0929 | Microsoft | Information Exposure vulnerability in Microsoft Internet Explorer 10/11/9 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow information disclosure, due to how Internet Explorer handles objects in memory, aka "Internet Explorer Information Disclosure Vulnerability". | 4.3 |
2018-03-14 | CVE-2018-0927 | Microsoft | Information Exposure vulnerability in Microsoft Edge and Internet Explorer Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows information disclosure, due to how Microsoft browsers handle objects in memory, aka "Microsoft Browser Information Disclosure Vulnerability". | 4.3 |
2018-03-14 | CVE-2018-0891 | Microsoft | Memory Leak vulnerability in Microsoft Edge and Internet Explorer ChakraCore, and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Internet Explorer and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow information disclosure, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". | 4.3 |
2018-03-14 | CVE-2017-1741 | IBM | Information Exposure vulnerability in IBM Websphere Application Server IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to obtain sensitive information caused by improper handling of Administrative Console panel fields. | 4.3 |
2018-03-13 | CVE-2018-1050 | Canonical Samba Debian Redhat | NULL Pointer Dereference vulnerability in multiple products All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. | 4.3 |
2018-03-13 | CVE-2018-1000114 | Jenkins | Incorrect Authorization vulnerability in Jenkins Promoted Builds An improper authorization vulnerability exists in Jenkins Promoted Builds Plugin 2.31.1 and earlier in Status.java and ManualCondition.java that allow an attacker with read access to jobs to perform promotions. | 4.3 |
2018-03-13 | CVE-2018-1000109 | Jenkins | Incorrect Authorization vulnerability in Jenkins Google-Play-Android-Publisher An improper authorization vulnerability exists in Jenkins Google Play Android Publisher Plugin version 1.6 and earlier in GooglePlayBuildStepDescriptor.java that allow an attacker to obtain credential IDs. | 4.3 |
2018-03-13 | CVE-2018-1000105 | Jenkins | Incorrect Authorization vulnerability in Jenkins Gerrit Trigger An improper authorization vulnerability exists in Jenkins Gerrit Trigger Plugin 2.27.4 and earlier in GerritManagement.java, GerritServer.java, and PluginImpl.java that allows an attacker with Overall/Read access to retrieve some configuration information about Gerrit in Jenkins. | 4.3 |
3 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2018-03-14 | CVE-2018-0919 | Microsoft | Use of Uninitialized Resource vulnerability in Microsoft products Microsoft Office 2010 SP2, 2013 SP1, and 2016, Microsoft Office 2016 Click-to-Run Microsoft Office 2016 for Mac, Microsoft Office Web Apps 2010 SP2, Microsoft Office Web Apps 2013 SP1, Microsoft SharePoint Enterprise Server 2013 SP1, Microsoft SharePoint Enterprise Server 2016, Microsoft SharePoint Server 2010 SP2, Microsoft Word 2010 SP2, Word 2013 SP1 and Microsoft Word 2016 allow an information disclosure vulnerability due to how variables are initialized, aka "Microsoft Office Information Disclosure Vulnerability". | 3.3 |
2018-03-14 | CVE-2018-0878 | Microsoft | XXE vulnerability in Microsoft products Windows Remote Assistance in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to how XML External Entities (XXE) are processed, aka "Windows Remote Assistance Information Disclosure Vulnerability". | 3.1 |
2018-03-14 | CVE-2018-0942 | Microsoft | Unspecified vulnerability in Microsoft Internet Explorer 11 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow elevation of privilege, due to how Internet Explorer handles zone and integrity settings, aka "Internet Explorer Elevation of Privilege Vulnerability". | 2.6 |