Weekly Vulnerabilities Reports > May 14 to 20, 2018

Overview

327 new vulnerabilities reported during this period, including 27 critical vulnerabilities and 41 high severity vulnerabilities. This weekly summary report vulnerabilities in 295 products from 110 vendors including Foxitsoftware, Adobe, Moxa, Cisco, and Advantech. Vulnerabilities are notably categorized as "Out-of-bounds Read", "Cross-site Scripting", "Use After Free", "Improper Restriction of Operations within the Bounds of a Memory Buffer", and "Information Exposure".

  • 297 reported vulnerabilities are remotely exploitables.
  • 16 reported vulnerabilities have public exploit available.
  • 89 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
  • 268 reported vulnerabilities are exploitable by an anonymous user.
  • Foxitsoftware has the most reported vulnerabilities, with 81 reported vulnerabilities.
  • Adobe has the most reported critical vulnerabilities, with 12 reported vulnerabilities.

TOTAL
VULNERABILITIES
CRITICAL RISK
VULNERABILITIES
HIGH RISK
VULNERABILITIES
MEDIUM RISK
VULNERABILITIES
LOW RISK
VULNERABILITIES
REMOTELY
EXPLOITABLE
LOCALLY
EXPLOITABLE
EXPLOIT
AVAILABLE
EXPLOITABLE
ANONYMOUSLY
AFFECTING
WEB APPLICATION

Vulnerability Details

The following table list reported vulnerabilities for the period covered by this report:

Expand/Hide

27 Critical Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2018-05-19 CVE-2018-4944 Adobe
Redhat
Incorrect Type Conversion or Cast vulnerability in multiple products

Adobe Flash Player versions 29.0.0.140 and earlier have an exploitable type confusion vulnerability.

10.0
2018-05-19 CVE-2018-4939 Adobe Deserialization of Untrusted Data vulnerability in Adobe Coldfusion 11.0/2016

Adobe ColdFusion Update 5 and earlier versions, ColdFusion 11 Update 13 and earlier versions have an exploitable Deserialization of Untrusted Data vulnerability.

10.0
2018-05-19 CVE-2018-4924 Adobe
Microsoft
OS Command Injection vulnerability in Adobe Dreamweaver

Adobe Dreamweaver CC versions 18.0 and earlier have an OS Command Injection vulnerability.

10.0
2018-05-19 CVE-2018-4918 Adobe Out-of-bounds Write vulnerability in Adobe products

Adobe Acrobat and Reader versions 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier have an exploitable out-of-bounds write vulnerability.

10.0
2018-05-19 CVE-2018-4917 Adobe Out-of-bounds Write vulnerability in Adobe products

Adobe Acrobat and Reader versions 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier have an exploitable heap overflow vulnerability.

10.0
2018-05-19 CVE-2017-11308 Adobe Out-of-bounds Write vulnerability in Adobe products

Adobe Acrobat and Reader versions 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, 11.0.22 and earlier have an exploitable heap overflow vulnerability.

10.0
2018-05-19 CVE-2017-11307 Adobe Out-of-bounds Read vulnerability in Adobe products

Adobe Acrobat and Reader versions 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, 11.0.22 and earlier have an exploitable out-of-bounds read vulnerability.

10.0
2018-05-19 CVE-2017-11306 Adobe Out-of-bounds Read vulnerability in Adobe products

Adobe Acrobat and Reader versions 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, 11.0.22 and earlier have an exploitable out-of-bounds read vulnerability.

10.0
2018-05-19 CVE-2017-11253 Adobe Out-of-bounds Read vulnerability in Adobe products

Adobe Acrobat and Reader versions 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, 11.0.22 and earlier have an exploitable out-of-bounds read vulnerability.

10.0
2018-05-19 CVE-2017-11250 Adobe Out-of-bounds Read vulnerability in Adobe products

Adobe Acrobat and Reader versions 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, 11.0.22 and earlier have an exploitable out-of-bounds read vulnerability.

10.0
2018-05-19 CVE-2017-11240 Adobe Out-of-bounds Read vulnerability in Adobe products

Adobe Acrobat and Reader versions 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, 11.0.22 and earlier have an exploitable out-of-bounds read vulnerability.

10.0
2018-05-17 CVE-2018-7218 Citrix Unspecified vulnerability in Citrix products

The AppFirewall functionality in Citrix NetScaler Application Delivery Controller and NetScaler Gateway 10.5 before Build 68.7, 11.0 before Build 71.24, 11.1 before Build 58.13, and 12.0 before Build 57.24 allows remote attackers to execute arbitrary code via unspecified vectors.

10.0
2018-05-17 CVE-2018-0268 Cisco Improperly Implemented Security Check for Standard vulnerability in Cisco Digital Network Architecture Center 1.1.2/1.1.3

A vulnerability in the container management subsystem of Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and gain elevated privileges.

10.0
2018-05-17 CVE-2018-0222 Cisco Use of Hard-coded Credentials vulnerability in Cisco Digital Network Architecture Center 1.1.2

A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to log in to an affected system by using an administrative account that has default, static user credentials.

10.0
2018-05-15 CVE-2018-11094 Intelbras Use of Hard-coded Credentials vulnerability in Intelbras Ncloud 300 Firmware 1.0

An issue was discovered on Intelbras NCLOUD 300 1.0 devices.

10.0
2018-05-14 CVE-2018-11031 Gouguoyin Server-Side Request Forgery (SSRF) vulnerability in Gouguoyin PHPrap

application/home/controller/debug.php in PHPRAP 1.0.4 through 1.0.8 has SSRF via the /debug URI, as demonstrated by an api[url]=file:////etc/passwd&api[method]=get POST request.

10.0
2018-05-18 CVE-2018-11236 GNU
Redhat
Oracle
Netapp
Integer Overflow or Wraparound vulnerability in multiple products

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

9.8
2018-05-18 CVE-2017-18269 GNU Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Glibc

An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation.

9.8
2018-05-18 CVE-2018-10968 D Link Insecure Default Initialization of Resource vulnerability in D-Link Dir-550A Firmware and Dir-604M Firmware

On D-Link DIR-550A and DIR-604M devices through v2.10KR, a malicious user can use a default TELNET account to get unauthorized access to vulnerable devices, aka a backdoor access vulnerability.

9.8
2018-05-16 CVE-2018-8014 Apache
Canonical
Debian
Netapp
Insecure Default Initialization of Resource vulnerability in multiple products

The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins.

9.8
2018-05-16 CVE-2018-11210 Tinyxml2 Project Out-of-bounds Read vulnerability in Tinyxml2 Project Tinyxml2 6.2.0

TinyXML2 6.2.0 has a heap-based buffer over-read in the XMLDocument::Parse function in libtinyxml2.so.

9.8
2018-05-19 CVE-2018-4928 Adobe
Apple
Microsoft
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe Indesign

Adobe InDesign versions 13.0 and below have an exploitable Memory corruption vulnerability.

9.3
2018-05-17 CVE-2018-10731 Phoenixcontact Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Phoenixcontact products

All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows when handling very large cookies (a different vulnerability than CVE-2018-10728).

9.3
2018-05-17 CVE-2018-10730 Phoenixcontact OS Command Injection vulnerability in Phoenixcontact products

All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection.

9.0
2018-05-17 CVE-2018-0279 Cisco OS Command Injection vulnerability in Cisco Enterprise NFV Infrastructure Software 3.7.1

A vulnerability in the Secure Copy Protocol (SCP) server of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to access the shell of the underlying Linux operating system on the affected device.

9.0
2018-05-16 CVE-2018-10123 Intenogroup Unspecified vulnerability in Intenogroup Iopsys Firmware

p910nd on Inteno IOPSYS 2.0 through 4.2.0 allows remote attackers to read, or append data to, arbitrary files via requests on TCP port 9100.

9.0
2018-05-14 CVE-2018-11091 Mybiz Unrestricted Upload of File with Dangerous Type vulnerability in Mybiz Myprocurenet 5.0.0

An issue was discovered in MyBiz MyProcureNet 5.0.0.

9.0

41 High Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2018-05-19 CVE-2018-4937 Adobe Out-of-bounds Write vulnerability in Adobe Flash Player and Flash Player Desktop Runtime

Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability.

8.8
2018-05-19 CVE-2018-4935 Adobe Out-of-bounds Write vulnerability in Adobe Flash Player and Flash Player Desktop Runtime

Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability.

8.8
2018-05-19 CVE-2018-4932 Adobe Use After Free vulnerability in Adobe Flash Player

Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Use-After-Free vulnerability.

8.8
2018-05-19 CVE-2018-4920 Adobe Type Confusion vulnerability in Adobe Flash Player and Flash Player Desktop Runtime

Adobe Flash Player versions 28.0.0.161 and earlier have an exploitable type confusion vulnerability.

8.8
2018-05-19 CVE-2018-4919 Adobe Use After Free vulnerability in Adobe Flash Player and Flash Player Desktop Runtime

Adobe Flash Player versions 28.0.0.161 and earlier have an exploitable use after free vulnerability.

8.8
2018-05-18 CVE-2018-10967 D Link OS Command Injection vulnerability in D-Link Dir-550A Firmware and Dir-604M Firmware

On D-Link DIR-550A and DIR-604M devices through v2.10KR, a malicious user can forge an HTTP request to inject operating system commands that can be executed on the device with higher privileges, aka remote code execution.

8.8
2018-05-17 CVE-2018-7160 Nodejs Authentication Bypass by Spoofing vulnerability in Nodejs Node.Js

The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution.

8.8
2018-05-14 CVE-2017-14434 Moxa OS Command Injection vulnerability in Moxa Edr-810 Firmware 4.1

An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317.

8.8
2018-05-14 CVE-2017-14433 Moxa OS Command Injection vulnerability in Moxa Edr-810 Firmware 4.1

An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317.

8.8
2018-05-14 CVE-2017-14432 Moxa OS Command Injection vulnerability in Moxa Edr-810 Firmware 4.1

An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317.

8.8
2018-05-14 CVE-2017-12126 Moxa Cross-Site Request Forgery (CSRF) vulnerability in Moxa Edr-810 Firmware 4.1

An exploitable cross-site request forgery vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317.

8.8
2018-05-14 CVE-2017-12125 Moxa OS Command Injection vulnerability in Moxa Edr-810 Firmware 4.1

An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317.

8.8
2018-05-14 CVE-2017-12123 Moxa Insufficiently Protected Credentials vulnerability in Moxa Edr-810 Firmware 4.1

An exploitable clear text transmission of password vulnerability exists in the web server and telnet functionality of Moxa EDR-810 V4.1 build 17030317.

8.8
2018-05-14 CVE-2017-12121 Moxa OS Command Injection vulnerability in Moxa Edr-810 Firmware 4.1

An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317.

8.8
2018-05-14 CVE-2017-12120 Moxa OS Command Injection vulnerability in Moxa Edr-810 Firmware 4.1

An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317.

8.8
2018-05-20 CVE-2018-11319 Syntastic Project
Debian
Path Traversal vulnerability in multiple products

Syntastic (aka vim-syntastic) through 3.9.0 does not properly handle searches for configuration files (it searches the current directory up to potentially the root).

8.5
2018-05-16 CVE-2018-11206 Hdfgroup Out-of-bounds Read vulnerability in Hdfgroup Hdf5 1.10.2

An out of bounds read was discovered in H5O_fill_new_decode and H5O_fill_old_decode in H5Ofill.c in the HDF HDF5 1.10.2 library.

8.1
2018-05-14 CVE-2017-12129 Moxa Use of a Broken or Risky Cryptographic Algorithm vulnerability in Moxa Edr-810 Firmware 4.1

An exploitable Weak Cryptography for Passwords vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317.

8.0
2018-05-14 CVE-2018-10990 Commscope Insufficient Session Expiration vulnerability in Commscope Arris Tg1682G Firmware 9.1.103J6

On Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices, a logout action does not immediately destroy all state on the device related to the validity of the "credential" cookie, which might make it easier for attackers to obtain access at a later time (e.g., "at least for a few minutes").

8.0
2018-05-18 CVE-2018-8867 GE Improper Input Validation vulnerability in GE products

In GE PACSystems RX3i CPE305/310 version 9.20 and prior, RX3i CPE330 version 9.21 and prior, RX3i CPE 400 version 9.30 and prior, PACSystems RSTi-EP CPE 100 all versions, and PACSystems CPU320/CRU320 RXi all versions, the device does not properly validate input, which could allow a remote attacker to send specially crafted packets causing the device to become unavailable.

7.8
2018-05-18 CVE-2018-11243 UPX Project Double Free vulnerability in UPX Project UPX 3.95

PackLinuxElf64::unpack in p_lx_elf.cpp in UPX 3.95 allows remote attackers to cause a denial of service (double free), limit the ability of a malware scanner to operate on the entire original data, or possibly have unspecified other impact via a crafted file.

7.8
2018-05-19 CVE-2018-4991 Adobe Improper Certificate Validation vulnerability in Adobe Creative Cloud

Adobe Creative Cloud Desktop Application versions 4.4.1.298 and earlier have an exploitable Improper certificate validation vulnerability.

7.5
2018-05-18 CVE-2018-11248 Liulishuo Path Traversal vulnerability in Liulishuo Filedownloader 1.7.3

util/FileDownloadUtils.java in FileDownloader 1.7.3 does not check an attachment's name.

7.5
2018-05-17 CVE-2018-1111 Fedoraproject
Redhat
Command Injection vulnerability in multiple products

DHCP packages in Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier are vulnerable to a command injection flaw in the NetworkManager integration script included in the DHCP client.

7.5
2018-05-17 CVE-2018-0271 Cisco Improper Authentication vulnerability in Cisco Digital Network Architecture Center

A vulnerability in the API gateway of the Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and access critical services.

7.5
2018-05-16 CVE-2018-10759 Projectpier SQL Injection vulnerability in Projectpier

PHP remote file inclusion vulnerability in public/patch/patch.php in Project Pier 0.8.8 and earlier allows remote attackers to execute arbitrary commands or SQL statements via the id parameter.

7.5
2018-05-15 CVE-2018-8845 Advantech Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Advantech products

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, a heap-based buffer overflow vulnerability has been identified, which may allow an attacker to execute arbitrary code.

7.5
2018-05-15 CVE-2018-7505 Advantech Unrestricted Upload of File with Dangerous Type vulnerability in Advantech products

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, a TFTP application has unrestricted file uploads to the web application without authorization, which may allow an attacker to execute arbitrary code.

7.5
2018-05-15 CVE-2018-7499 Advantech Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Advantech products

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, several stack-based buffer overflow vulnerabilities have been identified, which may allow an attacker to execute arbitrary code.

7.5
2018-05-15 CVE-2018-7497 Advantech NULL Pointer Dereference vulnerability in Advantech products

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, several untrusted pointer dereference vulnerabilities have been identified, which may allow an attacker to execute arbitrary code.

7.5
2018-05-15 CVE-2018-10589 Advantech Path Traversal vulnerability in Advantech products

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, a path transversal vulnerability has been identified, which may allow an attacker to execute arbitrary code.

7.5
2018-05-14 CVE-2017-14439 Moxa Improper Input Validation vulnerability in Moxa Edr-810 Firmware 4.1

Exploitable denial of service vulnerabilities exists in the Service Agent functionality of Moxa EDR-810 V4.1 build 17030317.

7.5
2018-05-14 CVE-2017-14438 Moxa Improper Input Validation vulnerability in Moxa Edr-810 Firmware 4.1

Exploitable denial of service vulnerabilities exists in the Service Agent functionality of Moxa EDR-810 V4.1 build 17030317.

7.5
2018-05-14 CVE-2017-14437 Moxa NULL Pointer Dereference vulnerability in Moxa Edr-810 Firmware 4.1

An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317.

7.5
2018-05-14 CVE-2017-14436 Moxa NULL Pointer Dereference vulnerability in Moxa Edr-810 Firmware 4.1

An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317.

7.5
2018-05-14 CVE-2017-14435 Moxa NULL Pointer Dereference vulnerability in Moxa Edr-810 Firmware 4.1

An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317.

7.5
2018-05-14 CVE-2017-12128 Moxa Information Exposure vulnerability in Moxa Edr-810 Firmware 4.1

An exploitable information disclosure vulnerability exists in the Server Agent functionality of Moxa EDR-810 V4.1 build 17030317.

7.5
2018-05-14 CVE-2018-11032 Gouguoyin SQL Injection vulnerability in Gouguoyin PHPrap

PHPRAP 1.0.4 through 1.0.8 has SQL Injection via the application/home/controller/project.php search() function.

7.5
2018-05-16 CVE-2018-11209 Zblogcn Use of a Broken or Risky Cryptographic Algorithm vulnerability in Zblogcn Z-Blogphp 2.0.0

An issue was discovered in Z-BlogPHP 2.0.0.

7.2
2018-05-18 CVE-2017-18273 Imagemagick
Debian
Canonical
Infinite Loop vulnerability in multiple products

In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-22, an infinite loop vulnerability was found in the function ReadTXTImage in coders/txt.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted image file that is mishandled in a GetImageIndexInList call.

7.1
2018-05-18 CVE-2017-18271 Imagemagick
Canonical
Debian
Infinite Loop vulnerability in multiple products

In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-22, an infinite loop vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted MIFF image file.

7.1

241 Medium Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2018-05-19 CVE-2018-4943 Adobe Improper Input Validation vulnerability in Adobe Push Notifications

Adobe PhoneGap Push Plugin versions 1.8.0 and earlier have an exploitable Same-Origin Method Execution vulnerability.

6.8
2018-05-19 CVE-2018-4927 Adobe
Apple
Microsoft
Untrusted Search Path vulnerability in Adobe Indesign

Adobe InDesign versions 13.0 and below have an exploitable Untrusted Search Path vulnerability.

6.8
2018-05-17 CVE-2018-1434 IBM Cross-Site Request Forgery (CSRF) vulnerability in IBM products

IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) are vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.

6.8
2018-05-17 CVE-2018-11130 Vcftools Project Use After Free vulnerability in Vcftools Project Vcftools 0.1.15

The header::add_FORMAT_descriptor function in header.cpp in VCFtools 0.1.15 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted vcf file.

6.8
2018-05-17 CVE-2018-11129 Vcftools Project Use After Free vulnerability in Vcftools Project Vcftools 0.1.15

The header::add_INFO_descriptor function in header.cpp in VCFtools 0.1.15 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted vcf file.

6.8
2018-05-17 CVE-2018-11128 Pdfparser Out-of-bounds Write vulnerability in Pdfparser

The ObjReader::ReadObj() function in ObjReader.cpp in vincent0629 PDFParser allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly execute arbitrary code via a crafted pdf file.

6.8
2018-05-17 CVE-2018-10728 Phoenixcontact Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Phoenixcontact products

All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731).

6.8
2018-05-17 CVE-2018-9982 Foxitsoftware Out-of-bounds Write vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9981 Foxitsoftware Access of Uninitialized Pointer vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9977 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9975 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9974 Foxitsoftware Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9970 Foxitsoftware Improper Input Validation vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9969 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9968 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9967 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9966 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9965 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9964 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9962 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9961 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9960 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9959 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9958 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9957 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9956 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9955 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9954 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9953 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9952 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-9951 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9949 Foxitsoftware Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9947 Foxitsoftware Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9945 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9944 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9943 Foxitsoftware Incorrect Type Conversion or Cast vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9942 Foxitsoftware Incorrect Type Conversion or Cast vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9941 Foxitsoftware Incorrect Type Conversion or Cast vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9940 Foxitsoftware Incorrect Type Conversion or Cast vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9939 Foxitsoftware Incorrect Type Conversion or Cast vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9938 Foxitsoftware Incorrect Type Conversion or Cast vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9937 Foxitsoftware Incorrect Type Conversion or Cast vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9936 Foxitsoftware Incorrect Type Conversion or Cast vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-9935 Foxitsoftware Improper Input Validation vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013.

6.8
2018-05-17 CVE-2018-1180 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-1178 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-1177 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-1176 Foxitsoftware Out-of-bounds Write vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-1173 Foxitsoftware Use After Free vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-10495 Foxitsoftware Incorrect Type Conversion or Cast vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-10494 Foxitsoftware Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049.

6.8
2018-05-17 CVE-2018-10491 Foxitsoftware Out-of-bounds Write vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-10490 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-10489 Foxitsoftware Out-of-bounds Write vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-10488 Foxitsoftware Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-10484 Foxitsoftware Access of Uninitialized Pointer vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-10483 Foxitsoftware Out-of-bounds Write vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-10477 Foxitsoftware Out-of-bounds Write vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-10474 Foxitsoftware Out-of-bounds Write vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-10473 Foxitsoftware Out-of-bounds Write vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935.

6.8
2018-05-17 CVE-2018-11230 Jbig2Enc Project Use After Free vulnerability in Jbig2Enc Project Jbig2Enc 0.29

jbig2_add_page in jbig2enc.cc in libjbig2enc.a in jbig2enc 0.29 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted file.

6.8
2018-05-17 CVE-2018-11226 Libming Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Libming

The getString function in decompile.c in libming through 0.4.8 mishandles cases where the header indicates a file size greater than the actual size, which allows remote attackers to cause a denial of service (Segmentation fault and application crash) or possibly have unspecified other impact.

6.8
2018-05-17 CVE-2018-11225 Libming Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Libming

The dcputs function in decompile.c in libming through 0.4.8 mishandles cases where the header indicates a file size greater than the actual size, which allows remote attackers to cause a denial of service (Segmentation fault and application crash) or possibly have unspecified other impact.

6.8
2018-05-17 CVE-2018-0270 Cisco Cross-Site Request Forgery (CSRF) vulnerability in Cisco IOT Field Network Director 4.2(0.4)

A vulnerability in the web-based management interface of Cisco IoT Field Network Director (IoT-FND) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and alter the data of existing users and groups on an affected device.

6.8
2018-05-15 CVE-2018-11126 Doorgets Cross-Site Request Forgery (CSRF) vulnerability in Doorgets 7.0

dg-user/?controller=users&action=add in doorGets 7.0 has CSRF that results in adding an administrator account.

6.8
2018-05-15 CVE-2018-11100 Libming Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Libming

The decompileSETTARGET function in decompile.c in libming through 0.4.8 mishandles cases where the header indicates a file size greater than the actual size, which allows remote attackers to cause a denial of service (Segmentation fault and application crash) or possibly have unspecified other impact.

6.8
2018-05-15 CVE-2018-11095 Libming Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Libming

The decompileJUMP function in decompile.c in libming through 0.4.8 mishandles cases where the header indicates a file size greater than the actual size, which allows remote attackers to cause a denial of service (Segmentation fault and application crash) or possibly have unspecified other impact.

6.8
2018-05-14 CVE-2018-10252 Actiontec Session Fixation vulnerability in Actiontec Wcb6200Q Firmware

An issue was discovered on Actiontec WCB6200Q before 1.1.10.20a devices.

6.8
2018-05-14 CVE-2018-0580 Celsys Untrusted Search Path vulnerability in Celsys products

Untrusted search path vulnerability in CELSYS, Inc CLIP STUDIO series (CLIP STUDIO PAINT (for Windows) EX/PRO/DEBUT Ver.1.7.3 and earlier, CLIP STUDIO ACTION (for Windows) Ver.1.5.5 and earlier, with its timestamp prior to April 25, 2018, 12:11:31, and CLIP STUDIO MODELER (for Windows) Ver.1.6.3 and earlier, with its timestamp prior to April 25, 2018, 17:02:49) allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.

6.8
2018-05-14 CVE-2018-11033 Xpdfreader Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Xpdfreader Xpdf 4.00

The DCTStream::readHuffSym function in Stream.cc in the DCT decoder in xpdf before 4.00 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JPEG data.

6.8
2018-05-14 CVE-2018-10989 Commscope Insecure Default Initialization of Resource vulnerability in Commscope Arris Tg1682G Firmware 9.1.103J6

Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices are distributed by some ISPs with a default password of "password" for the admin account that is used over an unencrypted http://192.168.0.1 connection, which might allow remote attackers to bypass intended access restrictions by leveraging access to the local network.

6.6
2018-05-20 CVE-2018-11315 Radiothermostat Improper Input Validation vulnerability in Radiothermostat Ct50 Firmware and Ct80 Firmware

The Local HTTP API in Radio Thermostat CT50 and CT80 1.04.84 and below products allows unauthorized access via a DNS rebinding attack.

6.5
2018-05-19 CVE-2018-4936 Adobe Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe Flash Player and Flash Player Desktop Runtime

Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Heap Overflow vulnerability.

6.5
2018-05-19 CVE-2018-4934 Adobe Out-of-bounds Read vulnerability in Adobe Flash Player and Flash Player Desktop Runtime

Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability.

6.5
2018-05-19 CVE-2018-4933 Adobe Out-of-bounds Read vulnerability in Adobe Flash Player

Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability.

6.5
2018-05-18 CVE-2018-1000400 Kubernetes Improper Privilege Management vulnerability in Kubernetes Cri-O

Kubernetes CRI-O version prior to 1.9 contains a Privilege Context Switching Error (CWE-270) vulnerability in the handling of ambient capabilities that can result in containers running with elevated privileges, allowing users abilities they should not have.

6.5
2018-05-18 CVE-2018-9250 Open EMR SQL Injection vulnerability in Open-Emr Openemr

interface\super\edit_list.php in OpenEMR before v5_0_1_1 allows remote authenticated users to execute arbitrary SQL commands via the newlistname parameter.

6.5
2018-05-17 CVE-2018-1462 IBM Incorrect Authorization vulnerability in IBM products

IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) could allow an authenticated user to access system files they should not have access to including deleting files or causing a denial of service.

6.5
2018-05-16 CVE-2018-10760 Projectpier Unrestricted Upload of File with Dangerous Type vulnerability in Projectpier

Unrestricted file upload vulnerability in the Files plugin in ProjectPier 0.88 and earlier allows remote authenticated users to execute arbitrary PHP code by uploading a file with an executable extension, then accessing it via a direct request to the file in the tmp directory under the document root.

6.5
2018-05-16 CVE-2018-10738 Nagios SQL Injection vulnerability in Nagios XI

A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/menuaccess.php chbKey1 parameter.

6.5
2018-05-16 CVE-2018-10737 Nagios SQL Injection vulnerability in Nagios XI

A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/logbook.php txtSearch parameter.

6.5
2018-05-16 CVE-2018-10736 Nagios SQL Injection vulnerability in Nagios XI

A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/info.php key1 parameter.

6.5
2018-05-16 CVE-2018-10735 Nagios SQL Injection vulnerability in Nagios XI

A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/commandline.php cname parameter.

6.5
2018-05-15 CVE-2018-1262 Pivotal Software
Cloudfoundry
Cloud Foundry Foundation UAA, versions 4.12.X and 4.13.X, introduced a feature which could allow privilege escalation across identity zones for clients performing offline validation.
6.5
2018-05-15 CVE-2017-2608 Jenkins Deserialization of Untrusted Data vulnerability in Jenkins

Jenkins before versions 2.44, 2.32.2 is vulnerable to a remote code execution vulnerability involving the deserialization of various types in javax.imageio in XStream-based APIs (SECURITY-383).

6.5
2018-05-15 CVE-2018-1131 Infinispan
Redhat
Deserialization of Untrusted Data vulnerability in multiple products

Infinispan permits improper deserialization of trusted data via XML and JSON transcoders under certain server configurations.

6.5
2018-05-15 CVE-2018-11098 Frog CMS Project Unrestricted Upload of File with Dangerous Type vulnerability in Frog CMS Project Frog CMS 0.9.5

An issue was discovered in Frog CMS 0.9.5.

6.5
2018-05-14 CVE-2017-12124 Moxa NULL Pointer Dereference vulnerability in Moxa Edr-810 Firmware 4.1

An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317.

6.5
2018-05-14 CVE-2018-0568 Sitebridge Unrestricted Upload of File with Dangerous Type vulnerability in Sitebridge Joruri GW

Unrestricted file upload vulnerability in SiteBridge Inc.

6.5
2018-05-20 CVE-2018-11311 Myscada Use of Hard-coded Credentials vulnerability in Myscada Mypro 7.0

A hardcoded FTP username of myscada and password of Vikuk63 in 'myscadagate.exe' in mySCADA myPRO 7 allows remote attackers to access the FTP server on port 2121, and upload files or list directories, by entering these credentials.

6.4
2018-05-19 CVE-2018-4923 Adobe OS Command Injection vulnerability in Adobe Connect

Adobe Connect versions 9.7 and earlier have an exploitable OS Command Injection.

6.4
2018-05-15 CVE-2018-7495 Advantech Path Traversal vulnerability in Advantech products

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an external control of file name or path vulnerability has been identified, which may allow an attacker to delete files.

6.4
2018-05-14 CVE-2018-0588 Ultimatemember Path Traversal vulnerability in Ultimatemember User Profile & Membership

Directory traversal vulnerability in the AJAX function of Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote attackers to read arbitrary files via unspecified vectors.

6.4
2018-05-18 CVE-2018-11245 Misp Project Cross-site Scripting vulnerability in Misp-Project Misp 2.4.91

app/webroot/js/misp.js in MISP 2.4.91 has a DOM based XSS with cortex type attributes.

6.1
2018-05-15 CVE-2018-11105 3CX Cross-site Scripting vulnerability in 3CX Live Chat

There is stored cross site scripting in the wp-live-chat-support plugin before 8.0.08 for WordPress via the "name" (aka wplc_name) and "email" (aka wplc_email) input fields to wp-json/wp_live_chat_support/v1/start_chat whenever a malicious attacker would initiate a new chat with an administrator.

6.1
2018-05-14 CVE-2018-11035 2345 CC Improper Input Validation vulnerability in 2345.Cc Security Guard 3.7

In 2345 Security Guard 3.7, the driver file (2345NsProtect.sys, X64 version) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCTL 0x80002019.

6.1
2018-05-14 CVE-2018-11034 2345 CC Improper Input Validation vulnerability in 2345.Cc Security Guard 3.7

In 2345 Security Guard 3.7, the driver file (2345NsProtect.sys, X64 version) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCTL 0x8000200D.

6.1
2018-05-16 CVE-2017-17688 Microsoft
Horde
Flipdogsolutions
R2Mail2
Apple
Bloop
Freron
Mozilla
Emclient
Postbox INC
Roundcube
The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.
5.9
2018-05-14 CVE-2018-10944 Rasputinonline Unspecified vulnerability in Rasputinonline Rasputin Online Coin

The request_dividend function of a smart contract implementation for ROC (aka Rasputin Online Coin), an Ethereum ERC20 token, allows attackers to steal all of the contract's Ether.

5.9
2018-05-17 CVE-2018-11119 Ilias Open Redirect vulnerability in Ilias

ILIAS 5.1.x, 5.2.x, and 5.3.x before 5.3.5 redirects a logged-in user to a third-party site via the return_to_url parameter.

5.8
2018-05-16 CVE-2018-11205 Hdfgroup Out-of-bounds Read vulnerability in Hdfgroup Hdf5 1.10.2

A out of bounds read was discovered in H5VM_memcpyvv in H5VM.c in the HDF HDF5 1.10.2 library.

5.8
2018-05-15 CVE-2017-2613 Jenkins Cross-Site Request Forgery (CSRF) vulnerability in Jenkins

jenkins before versions 2.44, 2.32.2 is vulnerable to a user creation CSRF using GET by admins.

5.8
2018-05-15 CVE-2017-2612 Jenkins Incorrect Permission Assignment for Critical Resource vulnerability in Jenkins

In Jenkins before versions 2.44, 2.32.2 low privilege users were able to override JDK download credentials (SECURITY-392), resulting in future builds possibly failing to download a JDK.

5.5
2018-05-15 CVE-2017-2815 Igniterealtime XXE vulnerability in Igniterealtime User Import Export 2.6.0

An exploitable XML entity injection vulnerability exists in OpenFire User Import Export Plugin 2.6.0.

5.5
2018-05-15 CVE-2018-3634 Intel Improper Input Validation vulnerability in Intel Online Connect Access 1.9.22.0

Parameter corruption in NDIS filter driver in Intel Online Connect Access 1.9.22.0 allows an attacker to cause a denial of service via local access.

5.5
2018-05-14 CVE-2018-0577 Flippercode Cross-site Scripting vulnerability in Flippercode WP Google MAP

Cross-site scripting vulnerability in WP Google Map Plugin prior to version 4.0.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

5.4
2018-05-17 CVE-2018-7159 Nodejs Improper Input Validation vulnerability in Nodejs Node.Js

The HTTP parser in all current versions of Node.js ignores spaces in the `Content-Length` header, allowing input such as `Content-Length: 1 2` to be interpreted as having a value of `12`.

5.3
2018-05-15 CVE-2018-10825 Mimobaby Missing Encryption of Sensitive Data vulnerability in Mimobaby Mimo Baby 2 Firmware

Mimo Baby 2 devices do not use authentication or encryption for the Bluetooth Low Energy (BLE) communication from a Turtle to a Lilypad, which allows attackers to inject fake information about the position and temperature of a baby via a replay or spoofing attack.

5.3
2018-05-19 CVE-2018-11239 Hexagontoken Integer Overflow or Wraparound vulnerability in Hexagontoken Hexagon

An integer overflow in the _transfer function of a smart contract implementation for Hexagon (HXG), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital assets by providing a _to argument in conjunction with a large _value argument, as exploited in the wild in May 2018, aka the "burnOverflow" issue.

5.0
2018-05-19 CVE-2018-4994 Adobe Unspecified vulnerability in Adobe Connect

Adobe Connect versions 9.7.5 and earlier have an exploitable Authentication Bypass vulnerability.

5.0
2018-05-19 CVE-2018-4942 Adobe XXE vulnerability in Adobe Coldfusion 11.0/2016

Adobe ColdFusion Update 5 and earlier versions, ColdFusion 11 Update 13 and earlier versions have an exploitable Unsafe XML External Entity Processing vulnerability.

5.0
2018-05-19 CVE-2018-4925 Adobe
Apple
Google
Microsoft
Information Exposure vulnerability in Adobe Digital Editions

Adobe Digital Editions versions 4.5.7 and below have an exploitable Out-of-bounds read vulnerability.

5.0
2018-05-18 CVE-2018-6562 Totemo Insufficient Verification of Data Authenticity vulnerability in Totemo Totemomail Encryption Gateway

totemomail Encryption Gateway before 6.0_b567 allows remote attackers to obtain sensitive information about user sessions and encryption key material via a JSONP hijacking attack.

5.0
2018-05-18 CVE-2018-8015 Apache Uncontrolled Recursion vulnerability in Apache ORC

In Apache ORC 1.0.0 to 1.4.3 a malformed ORC file can trigger an endlessly recursive function call in the C++ or Java parser.

5.0
2018-05-18 CVE-2018-11244 Dopewp Unspecified vulnerability in Dopewp BBE Theme

The BBE theme before 1.53 for WordPress allows a direct launch of an HTML editor.

5.0
2018-05-18 CVE-2018-5256 Redhat Information Exposure vulnerability in Redhat Tectonic

CoreOS Tectonic 1.7.x before 1.7.9-tectonic.4 and 1.8.x before 1.8.4-tectonic.3 mounts a direct proxy to the kubernetes cluster at /api/kubernetes/ which is accessible without authentication to Tectonic and allows an attacker to directly connect to the kubernetes API server.

5.0
2018-05-17 CVE-2018-1438 IBM Information Exposure vulnerability in IBM products

IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) web handler /DLSnap could allow an unauthenticated attacker to read arbitrary files on the system.

5.0
2018-05-17 CVE-2018-1433 IBM Information Exposure vulnerability in IBM products

IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) web handler /DownloadFile does not require authentication to read arbitrary files from the system.

5.0
2018-05-17 CVE-2018-10729 Phoenixcontact Information Exposure vulnerability in Phoenixcontact products

All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 allow reading the configuration file by an unauthenticated user.

5.0
2018-05-17 CVE-2018-7158 Nodejs Unspecified vulnerability in Nodejs Node.Js

The `'path'` module in the Node.js 4.x release line contains a potential regular expression denial of service (ReDoS) vector.

5.0
2018-05-17 CVE-2018-0325 Cisco Improper Input Validation vulnerability in Cisco IP Phone 7800 Firmware and IP Phone 8800 Firmware

A vulnerability in the Session Initiation Protocol (SIP) call-handling functionality of Cisco IP Phone 7800 Series phones and Cisco IP Phone 8800 Series phones could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected phone.

5.0
2018-05-17 CVE-2018-0297 Cisco Protection Mechanism Failure vulnerability in Cisco Firepower Threat Defense

A vulnerability in the detection engine of Cisco Firepower Threat Defense software could allow an unauthenticated, remote attacker to bypass a configured Secure Sockets Layer (SSL) Access Control (AC) policy to block SSL traffic.

5.0
2018-05-17 CVE-2018-0290 Cisco Unspecified vulnerability in Cisco Socialminer 11.6(1)

A vulnerability in the TCP stack of Cisco SocialMiner could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition in the notification system.

5.0
2018-05-17 CVE-2018-0280 Cisco Improper Input Validation vulnerability in Cisco Meeting Server

A vulnerability in the Real-Time Transport Protocol (RTP) bitstream processing of the Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.

5.0
2018-05-17 CVE-2018-0277 Cisco Improper Certificate Validation vulnerability in Cisco Identity Services Engine

A vulnerability in the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) certificate validation during EAP authentication for the Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause the ISE application server to restart unexpectedly, causing a denial of service (DoS) condition on an affected system.

5.0
2018-05-16 CVE-2018-4850 Siemens Unspecified vulnerability in Siemens Simatic S7-400 Firmware and Simatic S7-400H Firmware

A vulnerability has been identified in SIMATIC S7-400 (incl.

5.0
2018-05-16 CVE-2018-10240 Solarwinds Insufficient Entropy vulnerability in Solarwinds Serv-U 15.1.6

SolarWinds Serv-U MFT before 15.1.6 HFv1 assigns authenticated users a low-entropy session token that can be included in requests to the application as a URL parameter in lieu of a session cookie.

5.0
2018-05-16 CVE-2018-5231 Atlassian Unspecified vulnerability in Atlassian Jira and Jira Server

The ForgotLoginDetails resource in Atlassian Jira before version 7.6.6, from version 7.7.0 before version 7.7.4, from version 7.8.0 before version 7.8.4 and from version 7.9.0 before version 7.9.2 allows remote attackers to perform a denial of service attack via sending requests to it.

5.0
2018-05-15 CVE-2018-7503 Advantech Path Traversal vulnerability in Advantech products

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, a path transversal vulnerability has been identified, which may allow an attacker to disclose sensitive information on the target.

5.0
2018-05-15 CVE-2018-7501 Advantech SQL Injection vulnerability in Advantech products

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, several SQL injection vulnerabilities have been identified, which may allow an attacker to disclose sensitive information from the host.

5.0
2018-05-15 CVE-2018-10590 Advantech File and Directory Information Exposure vulnerability in Advantech products

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an information exposure vulnerability through directory listing has been identified, which may allow an attacker to find important files that are not normally visible.

5.0
2018-05-15 CVE-2018-11102 Libav Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Libav 12.3

An issue was discovered in Libav 12.3.

5.0
2018-05-15 CVE-2018-11097 Cstring Project Missing Release of Resource after Effective Lifetime vulnerability in Cstring Project Cstring 20161109

An issue was discovered in cloudwu/cstring through 2016-11-09.

5.0
2018-05-14 CVE-2017-6021 Aveva
Schneider Electric
Improper Input Validation vulnerability in multiple products

In Schneider Electric ClearSCADA 2014 R1 (build 75.5210) and prior, 2014 R1.1 (build 75.5387) and prior, 2015 R1 (build 76.5648) and prior, and 2015 R2 (build 77.5882) and prior, an attacker with network access to the ClearSCADA server can send specially crafted sequences of commands and data packets to the ClearSCADA server that can cause the ClearSCADA server process and ClearSCADA communications driver processes to terminate.

5.0
2018-05-18 CVE-2018-11232 Linux Improper Input Validation vulnerability in Linux Kernel

The etm_setup_aux function in drivers/hwtracing/coresight/coresight-etm-perf.c in the Linux kernel before 4.10.2 allows attackers to cause a denial of service (panic) because a parameter is incorrectly used as a local variable.

4.9
2018-05-16 CVE-2018-11208 Zblogcn Cross-site Scripting vulnerability in Zblogcn Z-Blogphp 2.0.0

An issue was discovered in Z-BlogPHP 2.0.0.

4.8
2018-05-19 CVE-2018-4992 Adobe Improper Input Validation vulnerability in Adobe Creative Cloud

Adobe Creative Cloud Desktop Application versions 4.4.1.298 and earlier have an exploitable Improper input validation vulnerability.

4.6
2018-05-19 CVE-2018-4938 Adobe Uncontrolled Search Path Element vulnerability in Adobe Coldfusion 11.0/2016

Adobe ColdFusion Update 5 and earlier versions, ColdFusion 11 Update 13 and earlier versions have an exploitable Insecure Library Loading vulnerability.

4.6
2018-05-19 CVE-2018-4873 Adobe Unquoted Search Path or Element vulnerability in Adobe Creative Cloud

Adobe Creative Cloud Desktop Application versions 4.4.1.298 and earlier have an exploitable Unquoted Search Path vulnerability.

4.6
2018-05-18 CVE-2018-11237 GNU
Redhat
Oracle
Netapp
Canonical
Out-of-bounds Write vulnerability in multiple products

An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.

4.6
2018-05-17 CVE-2018-5827 Google Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android

In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, a buffer overflow vulnerability exists in WLAN while processing an extscan hotlist event.

4.6
2018-05-17 CVE-2018-3568 Google Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android

In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, in __wlan_hdd_cfg80211_vendor_scan(), a buffer overwrite can potentially occur.

4.6
2018-05-17 CVE-2018-3567 Google Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android

In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, a buffer overflow vulnerability exists in WLAN while processing the HTT_T2H_MSG_TYPE_PEER_MAP or HTT_T2H_MSG_TYPE_PEER_UNMAP messages.

4.6
2018-05-17 CVE-2017-15855 Google Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android

In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, the camera application triggers "user-memory-access" issue as the Camera CPP module Linux driver directly accesses the application provided buffer, which resides in user space.

4.6
2018-05-17 CVE-2018-10027 Estsoft Untrusted Search Path vulnerability in Estsoft Alzip 8.0/8.12/8.21

ESTsoft ALZip before 10.76 allows local users to execute arbitrary code via creating a malicious .DLL file and installing it in a specific directory: %PROGRAMFILES%\ESTsoft\ALZip\Formats, %PROGRAMFILES%\ESTsoft\ALZip\Coders, %PROGRAMFILES(X86)%\ESTsoft\ALZip\Formats, or %PROGRAMFILES(X86)%\ESTsoft\ALZip\Coders.

4.6
2018-05-17 CVE-2018-0324 Cisco OS Command Injection vulnerability in Cisco Network Functions Virtualization Infrastructure 3.6.1/3.6.2/3.7.1

A vulnerability in the CLI of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, high-privileged, local attacker to perform a command injection attack.

4.6
2018-05-15 CVE-2018-8841 Advantech Improper Privilege Management vulnerability in Advantech products

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an improper privilege management vulnerability may allow an authenticated user to modify files when read access should only be given to the user.

4.6
2018-05-15 CVE-2018-1087 Linux
Canonical
Debian
Redhat
kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions.
4.6
2018-05-14 CVE-2017-12127 Moxa Insufficiently Protected Credentials vulnerability in Moxa Edr-810 Firmware 4.1

A password storage vulnerability exists in the operating system functionality of Moxa EDR-810 V4.1 build 17030317.

4.4
2018-05-19 CVE-2018-4941 Adobe Cross-site Scripting vulnerability in Adobe Coldfusion 11.0/2016

Adobe ColdFusion Update 5 and earlier versions, ColdFusion 11 Update 13 and earlier versions have an exploitable Cross-Site Scripting vulnerability.

4.3
2018-05-19 CVE-2018-4940 Adobe Cross-site Scripting vulnerability in Adobe Coldfusion 11.0/2016

Adobe ColdFusion Update 5 and earlier versions, ColdFusion 11 Update 13 and earlier versions have an exploitable Cross-Site Scripting vulnerability.

4.3
2018-05-19 CVE-2018-4931 Adobe Cross-site Scripting vulnerability in Adobe Experience Manager

Adobe Experience Manager versions 6.1 and earlier have an exploitable stored cross-site scripting vulnerability.

4.3
2018-05-19 CVE-2018-4930 Adobe Cross-site Scripting vulnerability in Adobe Experience Manager

Adobe Experience Manager versions 6.3 and earlier have an exploitable Cross-site scripting vulnerability.

4.3
2018-05-19 CVE-2018-4929 Adobe Cross-site Scripting vulnerability in Adobe Experience Manager

Adobe Experience Manager versions 6.2 and earlier have an exploitable stored cross-site scripting vulnerability.

4.3
2018-05-19 CVE-2018-4926 Adobe
Apple
Google
Microsoft
Out-of-bounds Write vulnerability in Adobe Digital Editions

Adobe Digital Editions versions 4.5.7 and below have an exploitable Stack Overflow vulnerability.

4.3
2018-05-19 CVE-2018-4921 Adobe Unrestricted Upload of File with Dangerous Type vulnerability in Adobe Connect

Adobe Connect versions 9.7 and earlier have an exploitable unrestricted SWF file upload vulnerability.

4.3
2018-05-18 CVE-2018-11256 Podofo Project NULL Pointer Dereference vulnerability in Podofo Project Podofo 0.9.5

An issue was discovered in PoDoFo 0.9.5.

4.3
2018-05-18 CVE-2018-11255 Podofo Project NULL Pointer Dereference vulnerability in Podofo Project Podofo 0.9.5

An issue was discovered in PoDoFo 0.9.5.

4.3
2018-05-18 CVE-2018-11254 Podofo Project Uncontrolled Recursion vulnerability in Podofo Project Podofo 0.9.5

An issue was discovered in PoDoFo 0.9.5.

4.3
2018-05-18 CVE-2018-11251 Imagemagick Out-of-bounds Read vulnerability in Imagemagick

In ImageMagick 7.0.7-23 Q16 x86_64 2018-01-24, there is a heap-based buffer over-read in ReadSUNImage in coders/sun.c, which allows attackers to cause a denial of service (application crash in SetGrayscaleImage in MagickCore/quantize.c) via a crafted SUN image file.

4.3
2018-05-18 CVE-2017-18272 Imagemagick Use After Free vulnerability in Imagemagick

In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-25, there is a use-after-free in ReadOneMNGImage in coders/png.c, which allows attackers to cause a denial of service via a crafted MNG image file that is mishandled in an MngInfoDiscardObject call.

4.3
2018-05-18 CVE-2018-10307 Ilias Cross-site Scripting vulnerability in Ilias

error.php in ILIAS 5.2.x through 5.3.x before 5.3.4 allows XSS via the text of a PDO exception.

4.3
2018-05-18 CVE-2018-10306 Ilias Cross-site Scripting vulnerability in Ilias

Services/Form/classes/class.ilDateDurationInputGUI.php and Services/Form/classes/class.ilDateTimeInputGUI.php in ILIAS 5.1.x through 5.3.x before 5.3.4 allow XSS via an invalid date.

4.3
2018-05-17 CVE-2018-11101 Signal Cross-site Scripting vulnerability in Signal Signal-Desktop

Open Whisper Signal (aka Signal-Desktop) through 1.10.1 allows XSS via a resource location specified in an attribute of a SCRIPT, IFRAME, or IMG element, leading to JavaScript execution after a reply, a different vulnerability than CVE-2018-10994.

4.3
2018-05-17 CVE-2018-11099 Vcftools Project Out-of-bounds Read vulnerability in Vcftools Project Vcftools 0.1.15

The header::add_INFO_descriptor function in header.cpp in VCFtools 0.1.15 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted vcf file.

4.3
2018-05-17 CVE-2018-9984 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-9983 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader 9.0.0.29935

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-9980 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-9979 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-9978 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-9976 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-9973 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.1.1049.

4.3
2018-05-17 CVE-2018-9972 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.1.1049.

4.3
2018-05-17 CVE-2018-9971 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader 9.0.1.104

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.1.104.

4.3
2018-05-17 CVE-2018-9963 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.1.1049.

4.3
2018-05-17 CVE-2018-9950 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-9948 Foxitsoftware Information Exposure vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-9946 Foxitsoftware Information Exposure vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-1179 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-1175 Foxitsoftware Information Exposure vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-1174 Foxitsoftware Information Exposure vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-10493 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.1.1049.

4.3
2018-05-17 CVE-2018-10492 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-10487 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-10486 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-10485 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-10482 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-10481 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-10480 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-10479 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-10478 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-10476 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-10475 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader and Phantompdf

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935.

4.3
2018-05-17 CVE-2018-11120 Ilias Cross-site Scripting vulnerability in Ilias

Services/COPage/classes/class.ilPCSourceCode.php in ILIAS 5.1.x, 5.2.x, and 5.3.x before 5.3.5 has XSS.

4.3
2018-05-17 CVE-2018-11118 Ilias Cross-site Scripting vulnerability in Ilias

The RSS subsystem in ILIAS 5.1.x, 5.2.x, and 5.3.x before 5.3.5 has XSS via a URI to Services/Feeds/classes/class.ilExternalFeedItem.php.

4.3
2018-05-17 CVE-2018-11117 Ilias Cross-site Scripting vulnerability in Ilias

Services/Feeds/classes/class.ilExternalFeedItem.php in ILIAS 5.1.x, 5.2.x, and 5.3.x before 5.3.5 has XSS via a link attribute.

4.3
2018-05-17 CVE-2017-18268 Broadcom Information Exposure Through Discrepancy vulnerability in Broadcom Symantec Intelligencecenter 3.3

Symantec IntelligenceCenter 3.3 is vulnerable to the Return of the Bleichenbacher Oracle Threat (ROBOT) attack.

4.3
2018-05-17 CVE-2017-15533 Broadcom Information Exposure Through Discrepancy vulnerability in Broadcom SSL Visibility Appliance

Symantec SSL Visibility (SSLV) 3.8.4FC, 3.10 prior to 3.10.4.1, 3.11, and 3.12 prior to 3.12.2.1 are vulnerable to the Return of the Bleichenbacher Oracle Threat (ROBOT) attack.

4.3
2018-05-17 CVE-2018-11224 Libav Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Libav 12.3

An issue was discovered in Libav 12.3.

4.3
2018-05-17 CVE-2018-0328 Cisco Cross-site Scripting vulnerability in Cisco Unified Communications Manager

A vulnerability in the web framework of Cisco Unified Communications Manager and Cisco Unified Presence could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of an affected system.

4.3
2018-05-17 CVE-2018-0327 Cisco Cross-site Scripting vulnerability in Cisco Identity Services Engine Software 2.1(0.905)

A vulnerability in the web framework of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of an affected system.

4.3
2018-05-17 CVE-2018-0326 Cisco Protection Mechanism Failure vulnerability in Cisco Telepresence Tx9000 Firmware 10.0(2.98000.99)

A vulnerability in the web UI of Cisco TelePresence Server Software could allow an unauthenticated, remote attacker to conduct a cross-frame scripting (XFS) attack against a user of the web UI of the affected software.

4.3
2018-05-17 CVE-2018-0289 Cisco Cross-site Scripting vulnerability in Cisco Identity Services Engine Software 2.3(0.298)/2.4(0.223)

A vulnerability in the logs component of Cisco Identity Services Engine could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks.

4.3
2018-05-16 CVE-2018-1172 Squid Cache NULL Pointer Dereference vulnerability in Squid-Cache Squid 3.5.27

This vulnerability allows remote attackers to deny service on vulnerable installations of The Squid Software Foundation Squid 3.5.27-20180318.

4.3
2018-05-16 CVE-2017-17689 9Folders
Apple
Bloop
Emclient
Flipdogsolutions
Freron
Gnome
Google
Horde
IBM
KDE
Microsoft
Mozilla
Postbox INC
R2Mail2
Ritlabs
The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.
4.3
2018-05-16 CVE-2018-11214 IJG
Debian
Canonical
An issue was discovered in libjpeg 9a.
4.3
2018-05-16 CVE-2018-11213 IJG
Debian
Canonical
An issue was discovered in libjpeg 9a.
4.3
2018-05-16 CVE-2018-11212 IJG
Debian
Canonical
Netapp
Oracle
Redhat
Opensuse
Divide By Zero vulnerability in multiple products

An issue was discovered in libjpeg 9a and 9d.

4.3
2018-05-16 CVE-2018-11207 Hdfgroup Divide By Zero vulnerability in Hdfgroup Hdf5 1.10.2

A division by zero was discovered in H5D__chunk_init in H5Dchunk.c in the HDF HDF5 1.10.2 library.

4.3
2018-05-16 CVE-2018-11204 Hdfgroup NULL Pointer Dereference vulnerability in Hdfgroup Hdf5 1.10.2

A NULL pointer dereference was discovered in H5O__chunk_deserialize in H5Ocache.c in the HDF HDF5 1.10.2 library.

4.3
2018-05-16 CVE-2018-11203 Hdfgroup Divide By Zero vulnerability in Hdfgroup Hdf5 1.10.2

A division by zero was discovered in H5D__btree_decode_key in H5Dbtree.c in the HDF HDF5 1.10.2 library.

4.3
2018-05-16 CVE-2018-11202 Hdfgroup NULL Pointer Dereference vulnerability in Hdfgroup Hdf5 1.10.2

A NULL pointer dereference was discovered in H5S_hyper_make_spans in H5Shyper.c in the HDF HDF5 1.10.2 library.

4.3
2018-05-16 CVE-2018-10810 Livezilla Cross-site Scripting vulnerability in Livezilla

chat/mobile/index.php in LiveZilla Live Chat 7.0.9.5 and prior is affected by Cross-Site Scripting via the Accept-Language HTTP header.

4.3
2018-05-15 CVE-2018-11127 E107 Cross-Site Request Forgery (CSRF) vulnerability in E107 2.1.7

e107 2.1.7 has CSRF resulting in arbitrary user deletion.

4.3
2018-05-14 CVE-2018-11090 Mybiz Cross-site Scripting vulnerability in Mybiz Myprocurenet 5.0.0

An XSS issue was discovered in MyBiz MyProcureNet 5.0.0.

4.3
2018-05-14 CVE-2018-10994 Signal Cross-site Scripting vulnerability in Signal Signal-Desktop

js/views/message_view.js in Open Whisper Signal (aka Signal-Desktop) before 1.10.1 allows XSS via a URL.

4.3
2018-05-14 CVE-2018-8843 Rockwellautomation Use After Free vulnerability in Rockwellautomation Arena

Rockwell Automation Arena versions 15.10.00 and prior contains a use after free vulnerability caused by processing specially crafted Arena Simulation Software files that may cause the software application to crash, potentially losing any unsaved data..

4.3
2018-05-14 CVE-2018-5230 Atlassian Cross-site Scripting vulnerability in Atlassian Jira

The issue collector in Atlassian Jira before version 7.6.6, from version 7.7.0 before version 7.7.4, from version 7.8.0 before version 7.8.4 and from version 7.9.0 before version 7.9.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the error message of custom fields when an invalid value is specified.

4.3
2018-05-14 CVE-2018-0591 T JOY Improper Certificate Validation vulnerability in T-Joy Kinepass

The KINEPASS App for Android Ver 3.1.1 and earlier, and for iOS Ver 3.1.2 and earlier do not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

4.3
2018-05-14 CVE-2018-0583 Asus Cross-site Scripting vulnerability in Asus Rt-Ac1200Hp Firmware

Cross-site scripting vulnerability in ASUS RT-AC1200HP Firmware version prior to 3.0.0.4.380.4180 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

4.3
2018-05-14 CVE-2018-0582 Asus Cross-site Scripting vulnerability in Asus Rt-Ac68U Firmware

Cross-site scripting vulnerability in ASUS RT-AC68U Firmware version prior to 3.0.0.4.380.1031 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

4.3
2018-05-14 CVE-2018-0581 Asus Cross-site Scripting vulnerability in Asus Rt-Ac87U Firmware 3.0.0.4.378.3754

Cross-site scripting vulnerability in ASUS RT-AC87U Firmware version prior to 3.0.0.4.378.9383 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

4.3
2018-05-14 CVE-2018-0579 Webdados Cross-site Scripting vulnerability in Webdados Open Graph FOR Facebook, Google+ and Twitter Card Tags

Cross-site scripting vulnerability in Open Graph for Facebook, Google+ and Twitter Card Tags plugin prior to version 2.2.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

4.3
2018-05-14 CVE-2017-16860 Atlassian Cross-site Scripting vulnerability in Atlassian Application Links

The invalidRedirectUrl template in Atlassian Application Links before version 5.2.7, from version 5.3.0 before version 5.3.4 and from version 5.4.0 before version 5.4.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the redirectUrl parameter link in the redirect warning message.

4.3
2018-05-14 CVE-2018-11037 Exiv2 Information Exposure vulnerability in Exiv2 0.26

In Exiv2 0.26, the Exiv2::PngImage::printStructure function in pngimage.cpp allows remote attackers to cause an information leak via a crafted file.

4.3
2018-05-20 CVE-2018-11242 Makemytrip Cleartext Storage of Sensitive Information vulnerability in Makemytrip 7.2.4

An issue was discovered in the MakeMyTrip application 7.2.4 for Android.

4.0
2018-05-18 CVE-2018-1148 Tenable Session Fixation vulnerability in Tenable Nessus

In Nessus before 7.1.0, Session Fixation exists due to insufficient session management within the application.

4.0
2018-05-17 CVE-2018-1464 IBM Information Exposure vulnerability in IBM products

IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) could allow an authenticated user to obtain sensitive information that they should not have authorization to read.

4.0
2018-05-17 CVE-2018-1463 IBM Incorrect Authorization vulnerability in IBM products

IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) could allow an authenticated user to access system files they should not have access to some of which could contain account credentials.

4.0
2018-05-17 CVE-2018-1276 Pivotal Software Information Exposure vulnerability in Pivotal Software Windows Stemcells

Windows 2012R2 stemcells, versions prior to 1200.17, contain an information exposure vulnerability on vSphere.

4.0
2018-05-17 CVE-2018-0323 Cisco Path Traversal vulnerability in Cisco Network Functions Virtualization Infrastructure 3.6.1/3.7.1

A vulnerability in the web management interface of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to conduct a path traversal attack on a targeted system.

4.0
2018-05-16 CVE-2018-10241 Solarwinds NULL Pointer Dereference vulnerability in Solarwinds Serv-U 15.1.6

A denial of service vulnerability in SolarWinds Serv-U before 15.1.6 HFv1 allows an authenticated user to crash the application (with a NULL pointer dereference) via a specially crafted URL beginning with the /Web%20Client/ substring.

4.0
2018-05-15 CVE-2017-2604 Jenkins Improper Authentication vulnerability in Jenkins

In Jenkins before versions 2.44, 2.32.2 low privilege users were able to act on administrative monitors due to them not being consistently protected by permission checks (SECURITY-371).

4.0
2018-05-15 CVE-2017-2602 Jenkins Security Bypass vulnerability in Jenkins

jenkins before versions 2.44, 2.32.2 is vulnerable to an improper blacklisting of the Pipeline metadata files in the agent-to-master security subsystem.

4.0
2018-05-15 CVE-2018-1263 Vmware Path Traversal vulnerability in VMWare Spring Integration ZIP 1.0.0/1.0.1

Addresses partial fix in CVE-2018-1261.

4.0
2018-05-15 CVE-2017-2600 Jenkins Information Exposure vulnerability in Jenkins

In jenkins before versions 2.44, 2.32.2 node monitor data could be viewed by low privilege users via the remote API.

4.0
2018-05-15 CVE-2018-3611 Intel Improper Input Validation vulnerability in Intel Graphics Driver

Bounds check vulnerability in User Mode Driver in Intel Graphics Driver 15.40.x.4 and 21.20.x.x allows unprivileged user to cause a denial of service via local access.

4.0
2018-05-14 CVE-2018-0590 Ultimatemember Unspecified vulnerability in Ultimatemember User Profile & Membership

Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote authenticated attackers to bypass access restriction to modify the other users profiles via unspecified vectors.

4.0
2018-05-14 CVE-2018-0589 Ultimatemember Unspecified vulnerability in Ultimatemember User Profile & Membership

Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote authenticated attackers to bypass access restriction to add a new form in the 'Forms' page via unspecified vectors.

4.0
2018-05-14 CVE-2018-0587 Ultimatemember Unrestricted Upload of File with Dangerous Type vulnerability in Ultimatemember User Profile & Membership

Unrestricted file upload vulnerability in Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote authenticated users to upload arbitrary image files via unspecified vectors.

4.0
2018-05-14 CVE-2018-0586 Ultimatemember Path Traversal vulnerability in Ultimatemember User Profile & Membership

Directory traversal vulnerability in the shortcodes function of Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote authenticated attackers to read arbitrary files via unspecified vectors.

4.0

18 Low Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2018-05-18 CVE-2017-18270 Linux Unspecified vulnerability in Linux Kernel

In the Linux kernel before 4.13.5, a local user could create keyrings for other users via keyctl commands, setting unwanted defaults or causing a denial of service.

3.6
2018-05-17 CVE-2018-8714 Honeywell Information Exposure vulnerability in Honeywell Matrikonopc Explorer

Honeywell MatrikonOPC OPC Controller before 5.1.0.0 allows local users to transfer arbitrary files from a host computer and consequently obtain sensitive information via vectors related to MSXML libraries.

3.6
2018-05-18 CVE-2018-1147 Tenable Cross-site Scripting vulnerability in Tenable Nessus

In Nessus before 7.1.0, a XSS vulnerability exists due to improper input validation.

3.5
2018-05-17 CVE-2018-1466 IBM Inadequate Encryption Strength vulnerability in IBM products

IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products (6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) use weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.

3.5
2018-05-17 CVE-2018-1465 IBM Information Exposure vulnerability in IBM products

IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) could allow an authenticated user to obtain the private key which could make intercepting GUI communications possible.

3.5
2018-05-17 CVE-2018-1461 IBM Cross-site Scripting vulnerability in IBM products

IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) are vulnerable to cross-site scripting.

3.5
2018-05-17 CVE-2018-10326 Printeron Cross-site Scripting vulnerability in Printeron 4.1.3

PrinterOn Enterprise 4.1.3 suffers from multiple authenticated stored XSS vulnerabilities via the (1) department field in the printer configuration, (2) description field in the print server configuration, and (3) username field for authentication to print as guest.

3.5
2018-05-15 CVE-2017-2610 Jenkins Cross-site Scripting vulnerability in Jenkins

jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting in search suggestions due to improperly escaping users with less-than and greater-than characters in their names (SECURITY-388).

3.5
2018-05-15 CVE-2017-2603 Jenkins Information Exposure vulnerability in Jenkins

Jenkins before versions 2.44, 2.32.2 is vulnerable to a user data leak in disconnected agents' config.xml API.

3.5
2018-05-14 CVE-2018-0585 Ultimatemember Cross-site Scripting vulnerability in Ultimatemember Ultimate Member

Cross-site scripting vulnerability in Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

3.5
2018-05-14 CVE-2018-0578 Pixelyoursite Cross-site Scripting vulnerability in Pixelyoursite

Cross-site scripting vulnerability in PixelYourSite plugin prior to version 5.3.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

3.5
2018-05-14 CVE-2018-0576 WP Events Plugin Cross-site Scripting vulnerability in Wp-Events-Plugin Events Manager

Cross-site scripting vulnerability in Events Manager plugin prior to version 5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

3.5
2018-05-15 CVE-2018-10591 Advantech Session Fixation vulnerability in Advantech products

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an origin validation error vulnerability has been identified, which may allow an attacker can create a malicious web site, steal session cookies, and access data of authenticated users.

2.6
2018-05-18 CVE-2018-8849 Medtronic Missing Encryption of Sensitive Data vulnerability in Medtronic N'Vision 8840 Firmware and N'Vision 8870 Firmware

Medtronic N'Vision Clinician Programmer 8840 N'Vision Clinician Programmer, all versions, and 8870 N'Vision removable Application Card, all versions does not encrypt PII and PHI while at rest.

2.1
2018-05-15 CVE-2018-3661 Intel Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Intel Selview and Syscfg

Buffer overflow in Intel system Configuration utilities selview.exe and syscfg.exe before version 14 build 11 allows a local user to crash these services potentially resulting in a denial of service.

2.1
2018-05-18 CVE-2017-9637 Schneider Electric Insufficiently Protected Credentials vulnerability in Schneider-Electric Ampla Manufacturing Execution System

Schneider Electric Ampla MES 6.4 provides capability to interact with data from third party databases.

1.9
2018-05-18 CVE-2017-9635 Schneider Electric Inadequate Encryption Strength vulnerability in Schneider-Electric Ampla Manufacturing Execution System

Schneider Electric Ampla MES 6.4 provides capability to configure users and their privileges.

1.9
2018-05-17 CVE-2018-10327 Printeron Insufficiently Protected Credentials vulnerability in Printeron 4.1.3

PrinterOn Enterprise 4.1.3 stores the Active Directory bind credentials using base64 encoding, which allows local users to obtain credentials for a domain user by reading the cps_config.xml file.

1.9