Weekly Vulnerabilities Reports > August 13 to 19, 2018

Overview

231 new vulnerabilities reported during this period, including 33 critical vulnerabilities and 116 high severity vulnerabilities. This weekly summary report vulnerabilities in 545 products from 88 vendors including Microsoft, Open EMR, Cisco, SAP, and HP. Vulnerabilities are notably categorized as "Out-of-bounds Write", "Cross-site Scripting", "Information Exposure", "SQL Injection", and "Improper Input Validation".

  • 176 reported vulnerabilities are remotely exploitables.
  • 42 reported vulnerabilities have public exploit available.
  • 69 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
  • 146 reported vulnerabilities are exploitable by an anonymous user.
  • Microsoft has the most reported vulnerabilities, with 60 reported vulnerabilities.
  • Google has the most reported critical vulnerabilities, with 3 reported vulnerabilities.

TOTAL
VULNERABILITIES
CRITICAL RISK
VULNERABILITIES
HIGH RISK
VULNERABILITIES
MEDIUM RISK
VULNERABILITIES
LOW RISK
VULNERABILITIES
REMOTELY
EXPLOITABLE
LOCALLY
EXPLOITABLE
EXPLOIT
AVAILABLE
EXPLOITABLE
ANONYMOUSLY
AFFECTING
WEB APPLICATION

Vulnerability Details

The following table list reported vulnerabilities for the period covered by this report:

Expand/Hide

33 Critical Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2018-08-15 CVE-2018-10511 Trendmicro Server-Side Request Forgery (SSRF) vulnerability in Trendmicro Control Manager 6.0/7.0

A vulnerability in Trend Micro Control Manager (versions 6.0 and 7.0) could allow an attacker to conduct a server-side request forgery (SSRF) attack on vulnerable installations.

10.0
2018-08-14 CVE-2018-3938 Sony Out-of-bounds Write vulnerability in Sony products

An exploitable stack-based buffer overflow vulnerability exists in the 802dot1xclientcert.cgi functionality of Sony IPELA E Series Camera G5 firmware 1.87.00.

10.0
2018-08-16 CVE-2018-1712 IBM Cross-Site Request Forgery (CSRF) vulnerability in IBM API Connect

IBM API Connect's Developer Portal 5.0.0.0 through 5.0.8.3 is vulnerable to Server Side Request Forgery.

9.9
2018-08-18 CVE-2018-15494 Dojotoolkit
Debian
Improper Encoding or Escaping of Output vulnerability in multiple products

In Dojo Toolkit before 1.14, there is unescaped string injection in dojox/Grid/DataGrid.

9.8
2018-08-17 CVE-2018-15482 Google Incorrect Permission Assignment for Critical Resource vulnerability in Google Android

Certain LG devices based on Android 6.0 through 8.1 have incorrect access control for MLT application intents.

9.8
2018-08-17 CVE-2018-14982 Google Incorrect Permission Assignment for Critical Resource vulnerability in Google Android

Certain LG devices based on Android 6.0 through 8.1 have incorrect access control in the GNSS application.

9.8
2018-08-17 CVE-2018-14981 Google Incorrect Permission Assignment for Critical Resource vulnerability in Google Android

Certain LG devices based on Android 6.0 through 8.1 have incorrect access control for SystemUI application intents.

9.8
2018-08-17 CVE-2018-15353 Kraftway Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Kraftway 24F2Xg Router Firmware 3.5.30.1118

A Buffer Overflow exploited through web interface by remote attacker can cause remote code execution in Kraftway 24F2XG Router firmware 3.5.30.1118.

9.8
2018-08-17 CVE-2018-15350 Kraftway Insecure Default Initialization of Resource vulnerability in Kraftway 24F2Xg Router Firmware 3.5.30.1118

Router Default Credentials in Kraftway 24F2XG Router firmware version 3.5.30.1118 allow remote attackers to get privileged access to the router.

9.8
2018-08-17 CVE-2018-3785 GIT Dummy Commit Project OS Command Injection vulnerability in Git-Dummy-Commit Project Git-Dummy-Commit 1.3.0

A command injection in git-dummy-commit v1.3.0 allows os level commands to be executed due to an unescaped parameter.

9.8
2018-08-17 CVE-2018-3784 Cryo Project Deserialization of Untrusted Data vulnerability in Cryo Project Cryo 0.0.6

A code injection in cryo 0.0.6 allows an attacker to arbitrarily execute code due to insecure implementation of deserialization.

9.8
2018-08-17 CVE-2018-3783 Flintcms SQL Injection vulnerability in Flintcms

A privilege escalation detected in flintcms versions <= 1.1.9 allows account takeover due to blind MongoDB injection in password reset.

9.8
2018-08-16 CVE-2018-11511 Asustor SQL Injection vulnerability in Asustor Data Master 3.1.0

The tree list functionality in the photo gallery application in ASUSTOR ADM 3.1.0.RFQ3 has a SQL injection vulnerability that affects the 'album_id' or 'scope' parameter via a photo-gallery/api/album/tree_lists/ URI.

9.8
2018-08-16 CVE-2018-11509 Asustor Use of Hard-coded Credentials vulnerability in Asustor Data Master 3.1.0

ASUSTOR ADM 3.1.0.RFQ3 uses the same default root:admin username and password as it does for the NAS itself for applications that are installed from the online repository.

9.8
2018-08-15 CVE-2018-10510 Trendmicro Path Traversal vulnerability in Trendmicro Control Manager 6.0/7.0

A Directory Traversal Remote Code Execution vulnerability in Trend Micro Control Manager (versions 6.0 and 7.0) could allow an attacker to execute arbitrary code on vulnerable installations.

9.8
2018-08-15 CVE-2018-14007 Citrix Path Traversal vulnerability in Citrix Xenserver 7.1/7.4/7.5

Citrix XenServer 7.1 and newer allows Directory Traversal.

9.8
2018-08-15 CVE-2018-11247 Nasdaq Missing Authentication for Critical Function vulnerability in Nasdaq Bwise 5.0

The JMX/RMI interface in Nasdaq BWise 5.0 does not require authentication for an SAP BO Component, which allows remote attackers to execute arbitrary code via a session on port 81.

9.8
2018-08-15 CVE-2018-8302 Microsoft Out-of-bounds Write vulnerability in Microsoft Exchange Server 2010/2013/2016

A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka "Microsoft Exchange Memory Corruption Vulnerability." This affects Microsoft Exchange Server.

9.8
2018-08-15 CVE-2018-8273 Microsoft Out-of-bounds Write vulnerability in Microsoft SQL Server 2016/2017

A buffer overflow vulnerability exists in the Microsoft SQL Server that could allow remote code execution on an affected system, aka "Microsoft SQL Server Remote Code Execution Vulnerability." This affects Microsoft SQL Server.

9.8
2018-08-15 CVE-2018-10369 Intelbras Cross-site Scripting vulnerability in Intelbras WIN 240 Firmware 1.1.0

A Cross-site scripting (XSS) vulnerability was discovered on Intelbras Win 240 V1.1.0 devices.

9.8
2018-08-14 CVE-2018-7096 HP Unspecified vulnerability in HP 3Par Service Provider Sp4.2.0/Sp4.3.0/Sp4.4.0

A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7).

9.8
2018-08-14 CVE-2018-7095 HP Unspecified vulnerability in HP 3Par Service Provider Sp4.2.0/Sp4.3.0/Sp4.4.0

A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7).

9.8
2018-08-13 CVE-2018-15124 Zipato Inadequate Encryption Strength vulnerability in Zipato Zipabox Firmware 118

Weak hashing algorithm in Zipato Zipabox Smart Home Controller BOARD REV - 1 with System Version -118 allows unauthenticated attacker extract clear text passwords and get root access on the device.

9.8
2018-08-13 CVE-2018-15123 Zipato Unspecified vulnerability in Zipato Zipabox Firmware 118

Insecure configuration storage in Zipato Zipabox Smart Home Controller BOARD REV - 1 with System Version -118 allows remote attacker perform new attack vectors and take under control device and smart home.

9.8
2018-08-13 CVE-2018-15145 Open EMR SQL Injection vulnerability in Open-Emr Openemr

Multiple SQL injection vulnerabilities in portal/add_edit_event_user.php in versions of OpenEMR before 5.0.1.4 allow a remote attacker to execute arbitrary SQL commands via the (1) eid, (2) userid, or (3) pid parameter.

9.8
2018-08-13 CVE-2018-15143 Open EMR SQL Injection vulnerability in Open-Emr Openemr

Multiple SQL injection vulnerabilities in portal/find_appt_popup_user.php in versions of OpenEMR before 5.0.1.4 allow a remote attacker to execute arbitrary SQL commands via the (1) catid or (2) providerid parameter.

9.8
2018-08-13 CVE-2018-13417 Vuze XXE vulnerability in Vuze Bittorrent Client 5.7.6.0

In Vuze Bittorrent Client 5.7.6.0, the XML parsing engine for SSDP/UPnP functionality is vulnerable to an XML External Entity Processing (XXE) attack.

9.8
2018-08-13 CVE-2018-13415 Plex XXE vulnerability in Plex Media Server 1.13.2.5154

In Plex Media Server 1.13.2.5154, the XML parsing engine for SSDP/UPnP functionality is vulnerable to an XML External Entity Processing (XXE) attack.

9.8
2018-08-13 CVE-2018-6414 Hikvision Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Hikvision IP Cameras

A buffer overflow vulnerability in the web server of some Hikvision IP Cameras allows an attacker to send a specially crafted message to affected devices.

9.8
2018-08-13 CVE-2018-5924 HP Out-of-bounds Write vulnerability in HP products

A security vulnerability has been identified with certain HP Inkjet printers.

9.8
2018-08-13 CVE-2018-0714 Qnap Command Injection vulnerability in Qnap Helpdesk

Command injection vulnerability in Helpdesk versions 1.1.21 and earlier in QNAP QTS 4.2.6 build 20180531, QTS 4.3.3 build 20180528, QTS 4.3.4 build 20180528 and their earlier versions could allow remote attackers to run arbitrary commands in the compromised application.

9.8
2018-08-14 CVE-2018-2445 SAP Server-Side Request Forgery (SSRF) vulnerability in SAP Businessobjects Business Intelligence 4.1/4.2

AdminTools in SAP BusinessObjects Business Intelligence, versions 4.1, 4.2, allows an attacker to manipulate the vulnerable application to send crafted requests on behalf of the application, resulting in a Server-Side Request Forgery (SSRF) vulnerability.

9.6
2018-08-15 CVE-2018-15152 Open EMR Improper Authentication vulnerability in Open-Emr Openemr

Authentication bypass vulnerability in portal/account/register.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker to access (1) portal/add_edit_event_user.php, (2) portal/find_appt_popup_user.php, (3) portal/get_allergies.php, (4) portal/get_amendments.php, (5) portal/get_lab_results.php, (6) portal/get_medications.php, (7) portal/get_patient_documents.php, (8) portal/get_problems.php, (9) portal/get_profile.php, (10) portal/portal_payment.php, (11) portal/messaging/messages.php, (12) portal/messaging/secure_chat.php, (13) portal/report/pat_ledger.php, (14) portal/report/portal_custom_report.php, or (15) portal/report/portal_patient_report.php without authenticating as a patient.

9.1

116 High Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2018-08-17 CVE-2018-14057 Pimcore Cross-Site Request Forgery (CSRF) vulnerability in Pimcore

Pimcore before 5.3.0 allows remote attackers to conduct cross-site request forgery (CSRF) attacks by leveraging validation of the X-pimcore-csrf-token anti-CSRF token only in the "Settings > Users / Roles" function.

8.8
2018-08-17 CVE-2018-15359 Eltex Unspecified vulnerability in Eltex Esp-200 Firmware 1.2.0

An authenticated attacker with low privileges can use insecure sudo configuration to expand attack surface in Eltex ESP-200 firmware version 1.2.0.

8.8
2018-08-17 CVE-2018-15358 Eltex Improper Input Validation vulnerability in Eltex Esp-200 Firmware 1.2.0

An authenticated attacker with low privileges can activate high privileged user and use it to expand attack surface in Eltex ESP-200 firmware version 1.2.0.

8.8
2018-08-17 CVE-2018-15356 Eltex Command Injection vulnerability in Eltex Esp-200 Firmware 1.2.0

An authenticated attacker can execute arbitrary code using command ejection in Eltex ESP-200 firmware version 1.2.0.

8.8
2018-08-17 CVE-2018-10873 Spice Project
Debian
Canonical
Redhat
Improper Input Validation vulnerability in multiple products

A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks.

8.8
2018-08-16 CVE-2018-12256 Litecart Unrestricted Upload of File with Dangerous Type vulnerability in Litecart

admin/vqmods.app/vqmods.inc.php in LiteCart before 2.1.3 allows remote authenticated attackers to upload a malicious file (resulting in remote code execution) by using the text/xml or application/xml Content-Type in a public_html/admin/?app=vqmods&doc=vqmods request.

8.8
2018-08-15 CVE-2018-0427 Cisco OS Command Injection vulnerability in Cisco Application Policy Infrastructure Controller Enterprise Module Dnac1.1

A vulnerability in the CronJob scheduler API of Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to perform a command injection attack.

8.8
2018-08-15 CVE-2018-8414 Microsoft Improper Input Validation vulnerability in Microsoft Windows 10 and Windows Server

A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths, aka "Windows Shell Remote Code Execution Vulnerability." This affects Windows 10 Servers, Windows 10.

8.8
2018-08-15 CVE-2018-8397 Microsoft Unspecified vulnerability in Microsoft Windows 7 and Windows Server 2008

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka "GDI+ Remote Code Execution Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2.

8.8
2018-08-15 CVE-2018-8376 Microsoft Unspecified vulnerability in Microsoft Powerpoint 2010

A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory, aka "Microsoft PowerPoint Remote Code Execution Vulnerability." This affects Microsoft PowerPoint.

8.8
2018-08-15 CVE-2018-8350 Microsoft Unspecified vulnerability in Microsoft Windows 10 and Windows Server

A remote code execution vulnerability exists when Microsoft Windows PDF Library improperly handles objects in memory, aka "Windows PDF Remote Code Execution Vulnerability." This affects Windows 10 Servers, Windows 10.

8.8
2018-08-15 CVE-2018-8349 Microsoft Deserialization of Untrusted Data vulnerability in Microsoft products

A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects, aka "Microsoft COM for Windows Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

8.8
2018-08-15 CVE-2018-8346 Microsoft Code Injection vulnerability in Microsoft Windows 7 and Windows Server 2008

A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed, aka "LNK Remote Code Execution Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2.

8.8
2018-08-15 CVE-2018-8344 Microsoft Code Injection vulnerability in Microsoft products

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka "Microsoft Graphics Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

8.8
2018-08-15 CVE-2018-15156 Open EMR OS Command Injection vulnerability in Open-Emr Openemr

OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/fax/faxq.php after modifying the "hylafax_server" global variable in interface/super/edit_globals.php.

8.8
2018-08-15 CVE-2018-15155 Open EMR OS Command Injection vulnerability in Open-Emr Openemr

OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/fax/fax_dispatch.php after modifying the "hylafax_enscript" global variable in interface/super/edit_globals.php.

8.8
2018-08-15 CVE-2018-15154 Open EMR OS Command Injection vulnerability in Open-Emr Openemr

OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/billing/sl_eob_search.php after modifying the "print_command" global variable in interface/super/edit_globals.php.

8.8
2018-08-15 CVE-2018-15153 Open EMR OS Command Injection vulnerability in Open-Emr Openemr

OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/main/daemon_frame.php after modifying the "hylafax_server" global variable in interface/super/edit_globals.php.

8.8
2018-08-15 CVE-2018-15151 Open EMR SQL Injection vulnerability in Open-Emr Openemr

SQL injection vulnerability in interface/de_identification_forms/find_code_popup.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'search_term' parameter.

8.8
2018-08-15 CVE-2018-15150 Open EMR SQL Injection vulnerability in Open-Emr Openemr

SQL injection vulnerability in interface/de_identification_forms/de_identification_screen2.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'temporary_files_dir' variable in interface/super/edit_globals.php.

8.8
2018-08-15 CVE-2018-15149 Open EMR SQL Injection vulnerability in Open-Emr Openemr

SQL injection vulnerability in interface/forms/eye_mag/php/Anything_simple.php from library/forms.inc in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'encounter' parameter.

8.8
2018-08-15 CVE-2018-15148 Open EMR SQL Injection vulnerability in Open-Emr Openemr

SQL injection vulnerability in interface/patient_file/encounter/search_code.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'text' parameter.

8.8
2018-08-15 CVE-2018-15147 Open EMR SQL Injection vulnerability in Open-Emr Openemr

SQL injection vulnerability in interface/forms_admin/forms_admin.php from library/registry.inc in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'id' parameter.

8.8
2018-08-15 CVE-2018-15146 Open EMR SQL Injection vulnerability in Open-Emr Openemr

SQL injection vulnerability in interface/de_identification_forms/find_immunization_popup.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'search_term' parameter.

8.8
2018-08-15 CVE-2018-1455 IBM Cross-Site Request Forgery (CSRF) vulnerability in IBM Tivoli Application Dependency Discovery Manager 7.2.2/7.3.0

IBM Tivoli Application Dependency Discovery Manager 7.2.2 and 7.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.

8.8
2018-08-15 CVE-2018-6973 Vmware Out-of-bounds Write vulnerability in VMWare Fusion and Workstation

VMware Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) contain an out-of-bounds write vulnerability in the e1000 device.

8.8
2018-08-14 CVE-2018-2442 SAP Cross-Site Request Forgery (CSRF) vulnerability in SAP products

In SAP BusinessObjects Business Intelligence, versions 4.0, 4.1 and 4.2, while viewing a Web Intelligence report from BI Launchpad, the user session details captured by an HTTP analysis tool could be reused in a HTML page while the user session is still valid.

8.8
2018-08-14 CVE-2018-7097 HP Cross-Site Request Forgery (CSRF) vulnerability in HP 3Par Service Provider Sp4.2.0/Sp4.3.0/Sp4.4.0

A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7).

8.8
2018-08-13 CVE-2018-10636 Deltaww Out-of-bounds Write vulnerability in Deltaww Cncsoft and Screeneditor

CNCSoft Version 1.00.83 and prior with ScreenEditor Version 1.00.54 has multiple stack-based buffer overflow vulnerabilities that could cause the software to crash due to lacking user input validation before copying data from project files onto the stack.

8.8
2018-08-13 CVE-2018-15144 Open EMR SQL Injection vulnerability in Open-Emr Openemr

SQL injection vulnerability in interface/de_identification_forms/find_drug_popup.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the search_term parameter.

8.8
2018-08-13 CVE-2018-15142 Open EMR Path Traversal vulnerability in Open-Emr Openemr

Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to execute arbitrary PHP code by writing a file with a PHP extension via the "docid" and "content" parameters and accessing it in the traversed directory.

8.8
2018-08-13 CVE-2018-15139 Open EMR Unrestricted Upload of File with Dangerous Type vulnerability in Open-Emr Openemr

Unrestricted file upload in interface/super/manage_site_files.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary PHP code by uploading a file with a PHP extension via the images upload form and accessing it in the images directory.

8.8
2018-08-15 CVE-2018-0418 Cisco Improper Input Validation vulnerability in Cisco IOS XR

A vulnerability in the Local Packet Transport Services (LPTS) feature set of Cisco ASR 9000 Series Aggregation Services Router Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

8.6
2018-08-15 CVE-2018-0410 Cisco Resource Exhaustion vulnerability in Cisco web Security Appliance

A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliances could allow an unauthenticated, remote attacker to exhaust system memory and cause a denial of service (DoS) condition on an affected system.

8.6
2018-08-14 CVE-2018-2449 SAP Improper Authentication vulnerability in SAP Supplier Relationship Management MDM Catalog 3.73/7.31/7.32

SAP SRM MDM Catalog versions 3.73, 7.31, 7.32 in (SAP NetWeaver 7.3) - import functionality does not perform authentication checks for valid repository user.

8.6
2018-08-14 CVE-2018-7093 HP Unspecified vulnerability in HP products

A security vulnerability in HPE Integrated Lights-Out 3 prior to v1.90, iLO 4 prior to v2.60, iLO 5 prior to v1.30, Moonshot Chassis Manager firmware prior to v1.58, and Moonshot Component Pack prior to v2.55 could be remotely exploited to create a denial of service.

8.6
2018-08-14 CVE-2018-7098 HP Path Traversal vulnerability in HP 3Par Service Provider Sp4.2.0/Sp4.3.0/Sp4.4.0

A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7).

8.4
2018-08-15 CVE-2018-8357 Microsoft Unspecified vulnerability in Microsoft Edge and Internet Explorer

An elevation of privilege vulnerability exists in Microsoft browsers allowing sandbox escape, aka "Microsoft Browser Elevation of Privilege Vulnerability." This affects Internet Explorer 11, Microsoft Edge.

8.3
2018-08-15 CVE-2018-14722 Btrfsmaintenance Project Unspecified vulnerability in Btrfsmaintenance Project Btrfsmaintenance

An issue was discovered in evaluate_auto_mountpoint in btrfsmaintenance-functions in btrfsmaintenance through 0.4.1.

8.1
2018-08-14 CVE-2018-14348 Libcgroup Project
Debian
Fedoraproject
Information Exposure vulnerability in multiple products

libcgroup up to and including 0.41 creates /var/log/cgred with mode 0666 regardless of the configured umask, leading to disclosure of information.

8.1
2018-08-13 CVE-2018-10598 Deltaww Out-of-bounds Read vulnerability in Deltaww Cncsoft and Screeneditor

CNCSoft Version 1.00.83 and prior with ScreenEditor Version 1.00.54 has two out-of-bounds read vulnerabilities could cause the software to crash due to lacking user input validation for processing project files.

8.1
2018-08-17 CVE-2018-15471 XEN
Linux
Canonical
Out-of-bounds Read vulnerability in multiple products

An issue was discovered in xenvif_set_hash_mapping in drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used in Xen through 4.11.x and other products.

7.8
2018-08-17 CVE-2018-5547 F5 Missing Authorization vulnerability in F5 Big-Ip Access Policy Manager Client 7.1.6/7.1.6.1/7.1.7

Windows Logon Integration feature of F5 BIG-IP APM client prior to version 7.1.7.1 for Windows by default uses Legacy logon mode which uses a SYSTEM account to establish network access.

7.8
2018-08-17 CVE-2018-5546 F5 Incorrect Permission Assignment for Critical Resource vulnerability in F5 products

The svpn and policyserver components of the F5 BIG-IP APM client prior to version 7.1.7.1 for Linux and macOS runs as a privileged process and can allow an unprivileged user to get ownership of files owned by root on the local client host.

7.8
2018-08-16 CVE-2018-15122 Telerik Improper Input Validation vulnerability in Telerik Justassembly and Justdecompile

An issue found in Progress Telerik JustAssembly through 2018.1.323.2 and JustDecompile through 2018.2.605.0 makes it possible to execute code by decompiling a compiled .NET object (such as DLL or EXE) with an embedded resource file by clicking on the resource.

7.8
2018-08-15 CVE-2018-8412 Microsoft Improper Input Validation vulnerability in Microsoft Office for mac 2016

An elevation of privilege vulnerability exists when the Microsoft AutoUpdate (MAU) application for Mac improperly validates updates before executing them, aka "Microsoft (MAU) Office Elevation of Privilege Vulnerability." This affects Microsoft Office.

7.8
2018-08-15 CVE-2018-8406 Microsoft Improper Resource Shutdown or Release vulnerability in Microsoft Windows 10 and Windows Server 2016

An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka "DirectX Graphics Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.

7.8
2018-08-15 CVE-2018-8405 Microsoft Improper Resource Shutdown or Release vulnerability in Microsoft products

An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka "DirectX Graphics Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.

7.8
2018-08-15 CVE-2018-8401 Microsoft Improper Resource Shutdown or Release vulnerability in Microsoft Windows 10 and Windows Server 2016

An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka "DirectX Graphics Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.

7.8
2018-08-15 CVE-2018-8400 Microsoft Improper Resource Shutdown or Release vulnerability in Microsoft Windows 10 and Windows Server 2016

An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka "DirectX Graphics Kernel Elevation of Privilege Vulnerability." This affects Windows 10 Servers, Windows 10.

7.8
2018-08-15 CVE-2018-8379 Microsoft Unspecified vulnerability in Microsoft Excel and Excel 2013 RT

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Excel.

7.8
2018-08-15 CVE-2018-8375 Microsoft Unspecified vulnerability in Microsoft products

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Excel Viewer, Microsoft Office, Microsoft Excel.

7.8
2018-08-15 CVE-2018-8347 Microsoft Unspecified vulnerability in Microsoft Windows 10 and Windows Server 2016

An elevation of privilege vulnerability exists in Microsoft Windows when the Windows kernel fails to properly handle parsing of certain symbolic links, aka "Windows Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.

7.8
2018-08-15 CVE-2018-8343 Microsoft Classic Buffer Overflow vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the Network Driver Interface Specification (NDIS) when ndis.sys fails to check the length of a buffer prior to copying memory to it, aka "Windows NDIS Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

7.8
2018-08-15 CVE-2018-8342 Microsoft Classic Buffer Overflow vulnerability in Microsoft Windows 7 and Windows Server 2008

An elevation of privilege vulnerability exists in the Network Driver Interface Specification (NDIS) when ndis.sys fails to check the length of a buffer prior to copying memory to it, aka "Windows NDIS Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2008 R2.

7.8
2018-08-15 CVE-2018-0952 Microsoft Unspecified vulnerability in Microsoft products

An Elevation of Privilege vulnerability exists when Diagnostics Hub Standard Collector allows file creation in arbitrary locations, aka "Diagnostic Hub Standard Collector Elevation Of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Microsoft Visual Studio, Windows 10 Servers.

7.8
2018-08-14 CVE-2018-12539 Eclipse
Oracle
Deserialization of Untrusted Data vulnerability in multiple products

In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code.

7.8
2018-08-14 CVE-2018-14424 Gnome Use After Free vulnerability in Gnome Display Manager

The daemon in GDM through 3.29.1 does not properly unexport display objects from its D-Bus interface when they are destroyed, which allows a local attacker to trigger a use-after-free via a specially crafted sequence of D-Bus method calls, resulting in a denial of service or potential code execution.

7.8
2018-08-13 CVE-2018-14878 Jetbrains Deserialization of Untrusted Data vulnerability in Jetbrains Dotpeek and Resharper Ultimate

JetBrains dotPeek before 2018.2 and ReSharper Ultimate before 2018.1.4 allow attackers to execute code by decompiling a compiled .NET object (such as a DLL or EXE file) with a specific file, because of Deserialization of Untrusted Data.

7.8
2018-08-13 CVE-2017-7500 RPM Link Following vulnerability in RPM 4.13.0.1/4.14.0.0

It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination.

7.8
2018-08-13 CVE-2018-5925 HP Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in HP products

A security vulnerability has been identified with certain HP Inkjet printers.

7.8
2018-08-18 CVE-2018-15505 Embedthis
Juniper
NULL Pointer Dereference vulnerability in multiple products

An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2.

7.5
2018-08-18 CVE-2018-15504 Embedthis
Juniper
NULL Pointer Dereference vulnerability in multiple products

An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2.

7.5
2018-08-18 CVE-2018-15503 Swoole Deserialization of Untrusted Data vulnerability in Swoole 4.0.4

The unpack implementation in Swoole version 4.0.4 lacks correct size checks in the deserialization process.

7.5
2018-08-18 CVE-2018-15501 Debian
Libgit2
Out-of-bounds Read vulnerability in multiple products

In ng_pkt in transports/smart_pkt.c in libgit2 before 0.26.6 and 0.27.x before 0.27.4, a remote attacker can send a crafted smart-protocol "ng" packet that lacks a '\0' byte to trigger an out-of-bounds read that leads to DoS.

7.5
2018-08-18 CVE-2018-15495 Tecrail Path Traversal vulnerability in Tecrail Responsive Filemanager

/filemanager/upload.php in Responsive FileManager before 9.13.3 allows Directory Traversal and SSRF because the url parameter is used directly in a curl_exec call, as demonstrated by a file:///etc/passwd value.

7.5
2018-08-18 CVE-2018-15492 Gemalto Asymmetric Resource Consumption (Amplification) vulnerability in Gemalto Sentinel License Manager 8.5.3.2403/8.5.3.35

A vulnerability in the lservnt.exe component of Sentinel License Manager version 8.5.3.35 (fixed in 8.5.3.2403) causes UDP amplification.

7.5
2018-08-18 CVE-2018-15491 Zemana Incorrect Permission Assignment for Critical Resource vulnerability in Zemana Antilogger

A vulnerability in the permission and encryption implementation of Zemana Anti-Logger 1.9.3.527 and prior (fixed in 1.9.3.602) allows an attacker to take control of the whitelisting feature (MyRules2.ini under %LOCALAPPDATA%\Zemana\ZALSDK) to permit execution of unauthorized applications (such as ones that record keystrokes).

7.5
2018-08-17 CVE-2018-15354 Kraftway Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Kraftway 24F2Xg Router Firmware 3.5.30.1118

A Buffer Overflow exploited through web interface by remote attacker can cause denial of service in Kraftway 24F2XG Router firmware 3.5.30.1118.

7.5
2018-08-15 CVE-2017-13108 Psafe Use of Hard-coded Credentials vulnerability in Psafe Dfndr Security 5.0.9

DFNDR Security Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android application uses a hard-coded key for encryption.

7.5
2018-08-15 CVE-2017-13107 Liveme Use of Hard-coded Credentials vulnerability in Liveme 3.7.20

Live.me - live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption.

7.5
2018-08-15 CVE-2017-13106 Cmcm Use of Hard-coded Credentials vulnerability in Cmcm CM Launcher 3D 5.0.3

Cheetahmobile CM Launcher 3D - Theme, wallpaper, Secure, Efficient, 5.0.3, 2017-09-19, Android application uses a hard-coded key for encryption.

7.5
2018-08-15 CVE-2017-13104 Uber Use of Hard-coded Credentials vulnerability in Uber Ubereats 1.108.10001

Uber Technologies, Inc.

7.5
2018-08-15 CVE-2017-13102 Gameloft Use of Hard-coded Credentials vulnerability in Gameloft Asphalt Xtreme 1.6.0

Gameloft Asphalt Xtreme: Offroad Rally Racing, 1.6.0, 2017-08-13, iOS application uses a hard-coded key for encryption.

7.5
2018-08-15 CVE-2017-13101 Tiktok Use of Hard-coded Credentials vulnerability in Tiktok Musical.Ly 6.1.6

Musical.ly Inc., musical.ly - your video social network, 6.1.6, 2017-10-03, iOS application uses a hard-coded key for encryption.

7.5
2018-08-15 CVE-2017-13100 Distinctdev Use of Hard-coded Credentials vulnerability in Distinctdev the Moron Test 6.3.1

DistinctDev, Inc., The Moron Test, 6.3.1, 2017-05-04, iOS application uses a hard-coded key for encryption.

7.5
2018-08-15 CVE-2018-0419 Cisco Improper Input Validation vulnerability in Cisco Email Security Appliance

A vulnerability in certain attachment detection mechanisms of Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass the filtering functionality of an affected system.

7.5
2018-08-15 CVE-2018-0409 Cisco Out-of-bounds Read vulnerability in Cisco products

A vulnerability in the XCP Router service of the Cisco Unified Communications Manager IM & Presence Service (CUCM IM&P) and the Cisco TelePresence Video Communication Server (VCS) and Expressway could allow an unauthenticated, remote attacker to cause a temporary service outage for all IM&P users, resulting in a denial of service (DoS) condition.

7.5
2018-08-15 CVE-2018-10512 Trendmicro Unspecified vulnerability in Trendmicro Control Manager 6.0/7.0

A vulnerability in Trend Micro Control Manager (versions 6.0 and 7.0) could allow an attacker to manipulate a reverse proxy .dll on vulnerable installations, which may lead to a denial of server (DoS).

7.5
2018-08-15 CVE-2018-8403 Microsoft Out-of-bounds Write vulnerability in Microsoft Edge and Internet Explorer

A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka "Microsoft Browser Memory Corruption Vulnerability." This affects Internet Explorer 11, Microsoft Edge, Internet Explorer 10.

7.5
2018-08-15 CVE-2018-8390 Microsoft Out-of-bounds Write vulnerability in Microsoft Chakracore and Edge

A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore.

7.5
2018-08-15 CVE-2018-8389 Microsoft Out-of-bounds Write vulnerability in Microsoft Internet Explorer 10/11/9

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10.

7.5
2018-08-15 CVE-2018-8387 Microsoft Out-of-bounds Write vulnerability in Microsoft Edge

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge.

7.5
2018-08-15 CVE-2018-8385 Microsoft Out-of-bounds Write vulnerability in Microsoft Chakracore, Edge and Internet Explorer

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10.

7.5
2018-08-15 CVE-2018-8384 Microsoft Type Confusion vulnerability in Microsoft Chakracore

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore.

7.5
2018-08-15 CVE-2018-8381 Microsoft Out-of-bounds Write vulnerability in Microsoft Chakracore and Edge

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore.

7.5
2018-08-15 CVE-2018-8380 Microsoft Out-of-bounds Write vulnerability in Microsoft Chakracore and Edge

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore.

7.5
2018-08-15 CVE-2018-8377 Microsoft Out-of-bounds Write vulnerability in Microsoft Edge

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge.

7.5
2018-08-15 CVE-2018-8373 Microsoft Out-of-bounds Write vulnerability in Microsoft Internet Explorer 10/11/9

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10.

7.5
2018-08-15 CVE-2018-8372 Microsoft Out-of-bounds Write vulnerability in Microsoft Chakracore, Edge and Internet Explorer

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge.

7.5
2018-08-15 CVE-2018-8371 Microsoft Out-of-bounds Write vulnerability in Microsoft Internet Explorer 10/11/9

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10.

7.5
2018-08-15 CVE-2018-8360 Microsoft Information Exposure vulnerability in Microsoft .Net Framework

An information disclosure vulnerability exists in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments, aka ".NET Framework Information Disclosure Vulnerability." This affects Microsoft .NET Framework 4.7/4.7.1/4.7.2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.0, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.1/4.7.2, Microsoft .NET Framework 4.7.1/4.7.2, Microsoft .NET Framework 4.7.2, Microsoft .NET Framework 2.0, Microsoft .NET Framework 4.6/4.6.1/4.6.2.

7.5
2018-08-15 CVE-2018-8359 Microsoft Out-of-bounds Write vulnerability in Microsoft Chakracore

A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore.

7.5
2018-08-15 CVE-2018-8355 Microsoft Out-of-bounds Write vulnerability in Microsoft Chakracore, Edge and Internet Explorer

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge.

7.5
2018-08-15 CVE-2018-8353 Microsoft Use After Free vulnerability in Microsoft Internet Explorer 10/11/9

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10.

7.5
2018-08-15 CVE-2018-8345 Microsoft Code Injection vulnerability in Microsoft products

A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed, aka "LNK Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

7.5
2018-08-15 CVE-2018-8316 Microsoft Improper Input Validation vulnerability in Microsoft Internet Explorer 10/11

A remote code execution vulnerability exists when Internet Explorer improperly validates hyperlinks before loading executable libraries, aka "Internet Explorer Remote Code Execution Vulnerability." This affects Internet Explorer 11, Internet Explorer 10.

7.5
2018-08-15 CVE-2018-8266 Microsoft Out-of-bounds Write vulnerability in Microsoft Chakracore and Edge

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore.

7.5
2018-08-15 CVE-2018-15172 TP Link Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Tp-Link Tl-Wr840N Firmware 0.9.1

TP-Link WR840N devices have a buffer overflow via a long Authorization HTTP header.

7.5
2018-08-15 CVE-2018-15138 Ericssonlg Path Traversal vulnerability in Ericssonlg Ipecs NMS 30M2.3Gn/30Mb.2Ia

Ericsson-LG iPECS NMS 30M allows directory traversal via ipecs-cm/download?filename=../ URIs.

7.5
2018-08-15 CVE-2018-12056 ALL FOR ONE Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in All-For-One ALL for ONE

The maxRandom function of a smart contract implementation for All For One, an Ethereum gambling game, generates a random value with publicly readable variables because the _seed value can be retrieved with a getStorageAt call.

7.5
2018-08-15 CVE-2018-11687 Bitcoin RED Project Integer Overflow or Wraparound vulnerability in Bitcoin RED Project Bitcoin RED

An integer overflow in the distributeBTR function of a smart contract implementation for Bitcoin Red (BTCR), an Ethereum ERC20 token, allows the owner to accomplish an unauthorized increase of digital assets by providing a large address[] array, as exploited in the wild in May 2018, aka the "ownerUnderflow" issue.

7.5
2018-08-14 CVE-2018-14429 MAN CGI Project Path Traversal vulnerability in Man-Cgi Project Man-Cgi

man-cgi before 1.16 allows Local File Inclusion via absolute path traversal, as demonstrated by a cgi-bin/man-cgi?/etc/passwd URI.

7.5
2018-08-14 CVE-2018-5392 Mingw Unspecified vulnerability in Mingw Mingw-W64 5.0.4

mingw-w64 version 5.0.4 by default produces executables that opt in to ASLR, but are not compatible with ASLR.

7.5
2018-08-14 CVE-2018-2446 SAP Unspecified vulnerability in SAP Businessobjects Business Intelligence 4.1/4.2

Admin tools in SAP BusinessObjects Business Intelligence, versions 4.1, 4.2, allow an unauthenticated user to read sensitive information (server name), hence leading to an information disclosure.

7.5
2018-08-14 CVE-2018-7077 HP Unspecified vulnerability in HP products

A security vulnerability in HPE XP P9000 Command View Advanced Edition (CVAE) Device Manager (DevMgr 8.5.0-00 and prior to 8.6.0-00), Configuration Manager (CM 8.5.0-00 and prior to 8.6.0-00) could be exploited to allow local and remote unauthorized access to sensitive information.

7.5
2018-08-13 CVE-2018-15125 Zipato Information Exposure vulnerability in Zipato Zipabox Firmware 118

Sensitive Information Disclosure in Zipato Zipabox Smart Home Controller allows remote attacker get sensitive information that expands attack surface.

7.5
2018-08-17 CVE-2018-15360 Eltex Use of Hard-coded Credentials vulnerability in Eltex Esp-200 Firmware 1.2.0

An attacker without authentication can login with default credentials for privileged users in Eltex ESP-200 firmware version 1.2.0.

7.3
2018-08-14 CVE-2018-3937 Sony OS Command Injection vulnerability in Sony products

An exploitable command injection vulnerability exists in the measurementBitrateExec functionality of Sony IPELA E Series Network Camera G5 firmware 1.87.00.

7.2
2018-08-14 CVE-2018-2450 SAP SQL Injection vulnerability in SAP Maxdb 7.8/7.9

SAP MaxDB (liveCache), versions 7.8 and 7.9, allows an attacker who gets DBM operator privileges to execute crafted database queries and therefore read, modify or delete sensitive data from database.

7.2
2018-08-17 CVE-2018-6622 Trustedcomputinggroup Unspecified vulnerability in Trustedcomputinggroup Trusted Platform Module 2.0

An issue was discovered that affects all producers of BIOS firmware who make a certain realistic interpretation of an obscure portion of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2.0 specification.

7.1
2018-08-16 CVE-2018-13446 Linecorp Improper Authentication vulnerability in Linecorp Line 8.8.1

An issue was discovered in the LINE jp.naver.line application 8.8.1 for Android.

7.0
2018-08-16 CVE-2018-13435 Linecorp Improper Authentication vulnerability in Linecorp Line 8.8.0

An issue was discovered in the LINE jp.naver.line application 8.8.0 for iOS.

7.0
2018-08-15 CVE-2018-8404 Microsoft Improper Resource Shutdown or Release vulnerability in Microsoft products

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

7.0
2018-08-15 CVE-2018-8399 Microsoft Improper Resource Shutdown or Release vulnerability in Microsoft Windows 10 and Windows Server

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 10 Servers, Windows 10.

7.0
2018-08-15 CVE-2018-8339 Microsoft Improper Input Validation vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior, aka "Windows Installer Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

7.0

81 Medium Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2018-08-15 CVE-2018-0415 Cisco 7PK - Errors vulnerability in Cisco products

A vulnerability in the implementation of Extensible Authentication Protocol over LAN (EAPOL) functionality in Cisco Small Business 100 Series Wireless Access Points and Cisco Small Business 300 Series Wireless Access Points could allow an authenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.

6.8
2018-08-15 CVE-2018-14779 Yubico Out-of-bounds Write vulnerability in Yubico PIV Manager, PIV Tool and Smart Card Minidriver

A buffer overflow issue was discovered in the Yubico-Piv 1.5.0 smartcard driver.

6.8
2018-08-15 CVE-2018-0428 Cisco Improper Privilege Management vulnerability in Cisco web Security Appliance

A vulnerability in the account management subsystem of Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to elevate privileges to root.

6.7
2018-08-14 CVE-2018-2451 SAP Insufficient Session Expiration vulnerability in SAP Hana Extended Application Services 1.0

XS Command-Line Interface (CLI) user sessions with the SAP HANA Extended Application Services (XS), version 1, advanced server may have an unintentional prolonged period of validity.

6.6
2018-08-17 CVE-2018-15470 XEN Resource Exhaustion vulnerability in XEN

An issue was discovered in Xen through 4.11.x.

6.5
2018-08-17 CVE-2018-15469 XEN
Debian
Resource Exhaustion vulnerability in multiple products

An issue was discovered in Xen through 4.11.x.

6.5
2018-08-17 CVE-2018-14058 Pimcore SQL Injection vulnerability in Pimcore

Pimcore before 5.3.0 allows SQL Injection via the REST web service API.

6.5
2018-08-17 CVE-2018-15357 Eltex Information Exposure vulnerability in Eltex Esp-200 Firmware 1.2.0

An authenticated attacker with low privileges can extract password hash information for all users in Eltex ESP-200 firmware version 1.2.0.

6.5
2018-08-17 CVE-2018-15352 Kraftway Unspecified vulnerability in Kraftway 24F2Xg Router Firmware 3.5.30.1118

An attacker with low privileges can cause denial of service in Kraftway 24F2XG Router firmware version 3.5.30.1118.

6.5
2018-08-17 CVE-2018-15351 Kraftway Link Following vulnerability in Kraftway 24F2Xg Router Firmware 3.5.30.1118

Denial of service via crafting malicious link and sending it to a privileged user can cause Denial of Service in Kraftway 24F2XG Router firmware version 3.5.30.1118.

6.5
2018-08-16 CVE-2018-14567 Xmlsoft
Debian
Canonical
Infinite Loop vulnerability in multiple products

libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.

6.5
2018-08-16 CVE-2016-9598 Redhat
Xmlsoft
Out-of-bounds Read vulnerability in multiple products

libxml2, as used in Red Hat JBoss Core Services, allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted XML document.

6.5
2018-08-16 CVE-2016-9596 Redhat
Xmlsoft
Resource Exhaustion vulnerability in multiple products

libxml2, as used in Red Hat JBoss Core Services and when in recovery mode, allows context-dependent attackers to cause a denial of service (stack consumption) via a crafted XML document.

6.5
2018-08-15 CVE-2018-8398 Microsoft Information Exposure vulnerability in Microsoft products

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka "Windows GDI Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

6.5
2018-08-15 CVE-2018-8394 Microsoft Information Exposure vulnerability in Microsoft products

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka "Windows GDI Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

6.5
2018-08-15 CVE-2018-8351 Microsoft Inclusion of Functionality from Untrusted Control Sphere vulnerability in Microsoft Edge and Internet Explorer

An information disclosure vulnerability exists when affected Microsoft browsers improperly allow cross-frame interaction, aka "Microsoft Browser Information Disclosure Vulnerability." This affects Internet Explorer 11, Microsoft Edge, Internet Explorer 10.

6.5
2018-08-15 CVE-2018-8340 Microsoft Unspecified vulnerability in Microsoft Windows Server 2012 and Windows Server 2016

A security feature bypass vulnerability exists when Active Directory Federation Services (AD FS) improperly handles multi-factor authentication requests, aka "AD FS Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows Server 2012 R2, Windows 10 Servers.

6.5
2018-08-15 CVE-2018-10917 Pulpproject Unspecified vulnerability in Pulpproject Pulp

pulp 2.16.x and possibly older is vulnerable to an improper path parsing.

6.5
2018-08-15 CVE-2018-13394 Atlassian Cross-Site Request Forgery (CSRF) vulnerability in Atlassian Questions for Confluence

The acceptAnswer resource in Atlassian Confluence Questions before version 2.6.6, the bundled version of Confluence Questions was updated to a fixed version in Confluence version 6.9.0, allows remote attackers to modify a comment into an answer via a Cross-site request forgery (CSRF) vulnerability.

6.5
2018-08-15 CVE-2018-13393 Atlassian Cross-Site Request Forgery (CSRF) vulnerability in Atlassian Questions for Confluence

The convertCommentToAnswer resource in Atlassian Confluence Questions before version 2.6.6, the bundled version of Confluence Questions was updated to a fixed version in Confluence version 6.9.0, allows remote attackers to modify a comment into an answer via a Cross-site request forgery (CSRF) vulnerability.

6.5
2018-08-14 CVE-2018-2447 SAP SQL Injection vulnerability in SAP Businessobjects Business Intelligence 4.2

SAP BusinessObjects Business Intelligence (Launchpad Web Intelligence), version 4.2, allows an attacker to execute crafted InfoObject queries, exposing the CMS InfoObjects database.

6.5
2018-08-13 CVE-2018-6970 Vmware Out-of-bounds Read vulnerability in VMWare Horizon Client and Horizon View

VMware Horizon 6 (6.x.x before 6.2.7), Horizon 7 (7.x.x before 7.5.1), and Horizon Client (4.x.x and prior before 4.8.1) contain an out-of-bounds read vulnerability in the Message Framework library.

6.5
2018-08-13 CVE-2018-15141 Open EMR Path Traversal vulnerability in Open-Emr Openemr

Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to delete arbitrary files via the "docid" parameter when the mode is set to delete.

6.5
2018-08-13 CVE-2018-15140 Open EMR Path Traversal vulnerability in Open-Emr Openemr

Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to read arbitrary files via the "docid" parameter when the mode is set to get.

6.5
2018-08-13 CVE-2017-1286 IBM Information Exposure vulnerability in IBM Urbancode Deploy

Sensitive information about the configuration of the IBM UrbanCode Deploy 6.1 through 6.9.6.0 server and database can be obtained by a user who has been given elevated permissions in the UI, even after those elevated permissions have been revoked.

6.5
2018-08-14 CVE-2018-3615 Intel Information Exposure Through Discrepancy vulnerability in Intel products

Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.

6.4
2018-08-16 CVE-2018-13434 Linecorp Improper Authentication vulnerability in Linecorp Line 8.8.0

An issue was discovered in the LINE jp.naver.line application 8.8.0 for iOS.

6.3
2018-08-13 CVE-2018-10864 Redhat Unspecified vulnerability in Redhat Certification

An uncontrolled resource consumption flaw has been discovered in redhat-certification in the way documents are loaded.

6.2
2018-08-16 CVE-2018-10139 Paloaltonetworks Cross-site Scripting vulnerability in Paloaltonetworks Pan-Os

The PAN-OS response for GlobalProtect Gateway in Palo Alto Networks PAN-OS 6.1.21 and earlier, PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11 and earlier may allow an unauthenticated attacker to inject arbitrary JavaScript or HTML.

6.1
2018-08-15 CVE-2018-0386 Cisco Cross-site Scripting vulnerability in Cisco products

A vulnerability in Cisco Unified Communications Domain Manager Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on an affected system.

6.1
2018-08-14 CVE-2018-14922 Monstra Cross-site Scripting vulnerability in Monstra 3.0.4

Multiple cross-site scripting (XSS) vulnerabilities in Monstra CMS 3.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) first name or (2) last name field in the edit profile page.

6.1
2018-08-14 CVE-2018-14888 Thank YOU Like Project Cross-site Scripting vulnerability in Thank You/Like Project Thank You/Like

inc/plugins/thankyoulike.php in the Eldenroot Thank You/Like plugin before 3.1.0 for MyBB allows XSS via a post or thread subject.

6.1
2018-08-14 CVE-2018-2444 SAP Cross-site Scripting vulnerability in SAP Businessobjects Financial Consolidation 10.0/10.1

SAP BusinessObjects Financial Consolidation, versions 10.0, 10.1, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.

6.1
2018-08-14 CVE-2016-4975 Apache CRLF Injection vulnerability in Apache Http Server

Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir.

6.1
2018-08-13 CVE-2018-12587 German Spelling Dictionary Project Cross-site Scripting vulnerability in German Spelling Dictionary Project German Spelling Dictionary 1.3

A cross-site scripting (XSS) vulnerability was found in valeuraddons German Spelling Dictionary v1.3 (an Opera Browser add-on).

6.1
2018-08-13 CVE-2018-10569 Edimax Cross-site Scripting vulnerability in Edimax Ew-7438Rpn V2 Firmware 1.22/1.23

An issue was discovered in Edimax EW-7438RPn Mini v2 before version 1.26.

6.1
2018-08-13 CVE-2018-13392 Atlassian Cross-site Scripting vulnerability in Atlassian Fisheye

Several resources in Atlassian Fisheye and Crucible before version 4.6.0 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in linked issue keys.

6.1
2018-08-17 CVE-2018-15468 XEN Incorrect Authorization vulnerability in XEN

An issue was discovered in Xen through 4.11.x.

6.0
2018-08-17 CVE-2018-15355 Kraftway Use of a Broken or Risky Cryptographic Algorithm vulnerability in Kraftway 24F2Xg Router Firmware 3.5.30.1118

Usage of SSLv2 and SSLv3 leads to transmitted data decryption in Kraftway 24F2XG Router firmware 3.5.30.1118.

5.9
2018-08-15 CVE-2017-13105 Hisecuritylab Improper Certificate Validation vulnerability in Hisecuritylab Virus Cleaner 3.7.1.1329

Hi Security Virus Cleaner - Antivirus, Booster, 3.7.1.1329, 2017-09-13, Android application accepts all SSL certificates during SSL communication.

5.9
2018-08-15 CVE-2018-9129 Zyxel Unspecified vulnerability in Zyxel products

ZyXEL ZyWALL/USG series devices have a Bleichenbacher vulnerability in their Internet Key Exchange (IKE) handshake implementation used for IPsec based VPN connections.

5.9
2018-08-15 CVE-2018-8753 Clavister Unspecified vulnerability in Clavister COS Core

The IKEv1 implementation in Clavister cOS Core before 11.00.11, 11.20.xx before 11.20.06, and 12.00.xx before 12.00.09 allows remote attackers to decrypt RSA-encrypted nonces by leveraging a Bleichenbacher attack.

5.9
2018-08-14 CVE-2018-0131 Cisco Inadequate Encryption Strength vulnerability in Cisco IOS and IOS XE

A vulnerability in the implementation of RSA-encrypted nonces in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to obtain the encrypted nonces of an Internet Key Exchange Version 1 (IKEv1) session.

5.9
2018-08-13 CVE-2016-2922 IBM Improper Certificate Validation vulnerability in IBM Rational Clearquest

IBM Rational ClearQuest 8.0 through 8.0.1.9 and 9.0 through 9.0.1.3 (CQ OSLC linkages, EmailRelay) fails to check the SSL certificate against the requested hostname.

5.9
2018-08-14 CVE-2018-3646 Intel Unspecified vulnerability in Intel products

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.

5.6
2018-08-14 CVE-2018-3620 Intel Information Exposure Through Discrepancy vulnerability in Intel products

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.

5.6
2018-08-16 CVE-2018-11771 Apache
Oracle
Infinite Loop vulnerability in multiple products

When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17's ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached.

5.5
2018-08-15 CVE-2018-8382 Microsoft Information Exposure vulnerability in Microsoft products

An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory, aka "Microsoft Excel Information Disclosure Vulnerability." This affects Microsoft Excel Viewer, Microsoft Office, Microsoft Excel.

5.5
2018-08-15 CVE-2018-8378 Microsoft Use of Uninitialized Resource vulnerability in Microsoft products

An information disclosure vulnerability exists when Microsoft Office software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory, aka "Microsoft Office Information Disclosure Vulnerability." This affects Word, Microsoft SharePoint Server, Microsoft Office Word Viewer, Microsoft Excel Viewer, Microsoft SharePoint, Microsoft Office.

5.5
2018-08-14 CVE-2018-2441 SAP Unspecified vulnerability in SAP Kernel

Under certain conditions the SAP Change and Transport System (ABAP), SAP KERNEL 32 NUC, SAP KERNEL 32 Unicode, SAP KERNEL 64 NUC, SAP KERNEL 64 Unicode 7.21, 7.21EXT, 7.22 and 7.22EXT; SAP KERNEL 7.21, 7.22, 7.45, 7.49, 7.53 and 7.73, allows an attacker to transport information which would otherwise be restricted.

5.5
2018-08-14 CVE-2018-7100 HP Unspecified vulnerability in HP products

A potential security vulnerability has been identified in HPE OfficeConnect 1810 Switch Series (HP 1810-24G - P.2.22 and previous versions, HP 1810-48G PK.1.34 and previous versions, HP 1810-8 v2 P.2.22 and previous versions).

5.5
2018-08-14 CVE-2018-7099 HP Unspecified vulnerability in HP 3Par Service Provider Sp4.2.0/Sp4.3.0/Sp4.4.0

A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7).

5.5
2018-08-14 CVE-2018-7094 HPE Unspecified vulnerability in HPE 3Par Service Provider

A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-5.0.0.0-22913(GA).

5.5
2018-08-16 CVE-2018-1715 IBM Cross-site Scripting vulnerability in IBM Maximo Asset Management

IBM Maximo Asset Management 7.6 through 7.6.3 is vulnerable to cross-site scripting.

5.4
2018-08-15 CVE-2018-0367 Cisco Cross-site Scripting vulnerability in Cisco Registered Envelope Service

A vulnerability in the web-based management interface of the Cisco Registered Envelope Service could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected service.

5.4
2018-08-13 CVE-2018-3781 Nextcloud Cross-site Scripting vulnerability in Nextcloud Talk

A missing sanitization of search results for an autocomplete field in NextCloud Talk <3.2.5 could lead to a stored XSS requiring user-interaction.

5.4
2018-08-13 CVE-2018-3780 Nextcloud Cross-site Scripting vulnerability in Nextcloud Server

A missing sanitization of search results for an autocomplete field in NextCloud Server <13.0.5 could lead to a stored XSS requiring user-interaction.

5.4
2018-08-13 CVE-2018-14850 Tiki Cross-site Scripting vulnerability in Tiki Tikiwiki Cms/Groupware

Stored XSS vulnerabilities in Tiki before 18.2, 15.7 and 12.14 allow an authenticated user injecting JavaScript to gain administrator privileges if an administrator opens a wiki page and moves the mouse pointer over a modified link or thumb image.

5.4
2018-08-13 CVE-2018-14849 Tiki Cross-site Scripting vulnerability in Tiki Tikiwiki Cms/Groupware

Tiki before 18.2, 15.7 and 12.14 has XSS via link attributes, related to lib/core/WikiParser/OutputLink.php and lib/parser/parserlib.php.

5.4
2018-08-17 CVE-2018-15473 Openbsd
Debian
Redhat
Canonical
Netapp
Oracle
Siemens
Race Condition vulnerability in multiple products

OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.

5.3
2018-08-17 CVE-2017-1732 IBM Information Exposure vulnerability in IBM Security Access Manager for Enterprise Single Sign-On 8.2.2

IBM Security Access Manager for Enterprise Single Sign-On 8.2.2 does not set the secure attribute on authorization tokens or session cookies.

5.3
2018-08-15 CVE-2018-0412 Cisco Unspecified vulnerability in Cisco products

A vulnerability in the implementation of Extensible Authentication Protocol over LAN (EAPOL) functionality in Cisco Small Business 100 Series Wireless Access Points and Cisco Small Business 300 Series Wireless Access Points could allow an unauthenticated, adjacent attacker to force the downgrade of the encryption algorithm that is used between an authenticator (access point) and a supplicant (Wi-Fi client).

5.3
2018-08-15 CVE-2018-8204 Microsoft Unspecified vulnerability in Microsoft Windows 10 and Windows Server 2016

A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.

5.3
2018-08-15 CVE-2018-8200 Microsoft Unspecified vulnerability in Microsoft Windows 10 and Windows Server 2016

A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.

5.3
2018-08-14 CVE-2018-12537 Eclipse Improper Input Validation vulnerability in Eclipse Vert.X

In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value.

5.3
2018-08-14 CVE-2018-2448 SAP Unspecified vulnerability in SAP Supplier Relationship Management MDM Catalog 3.0/7.01/7.02

Under certain conditions SAP SRM-MDM (CATALOG versions 3.0, 7.01, 7.02) utilities functionality allows an attacker to access information of user existence which would otherwise be restricted.

5.3
2018-08-13 CVE-2018-14781 Medtronicdiabetes Improper Authentication vulnerability in Medtronicdiabetes products

Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, when paired with a remote controller and having the "easy bolus" and "remote bolus" options enabled (non-default), are vulnerable to a capture-replay attack.

5.3
2018-08-13 CVE-2018-10634 Medtronic Cleartext Transmission of Sensitive Information vulnerability in Medtronic products

Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G communications between the pump and wireless accessories are transmitted in cleartext.

5.3
2018-08-13 CVE-2017-1749 IBM Path Traversal vulnerability in IBM Urbancode Deploy

IBM UrbanCode Deploy 6.1 through 6.9.6.0 could allow a remote attacker to traverse directories on the system.

5.3
2018-08-13 CVE-2017-15138 Redhat Information Exposure vulnerability in Redhat Openshift Container Platform 3.9

The OpenShift Enterprise cluster-read can access webhook tokens which would allow an attacker with sufficient privileges to view confidential webhook tokens.

5.0
2018-08-15 CVE-2018-8396 Microsoft Information Exposure vulnerability in Microsoft Windows 7 and Windows Server 2008

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka "Windows GDI Information Disclosure Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2.

4.7
2018-08-15 CVE-2018-8348 Microsoft Information Exposure vulnerability in Microsoft products

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

4.7
2018-08-15 CVE-2018-8341 Microsoft Information Exposure vulnerability in Microsoft products

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

4.7
2018-08-15 CVE-2018-14780 Yubico Out-of-bounds Read vulnerability in Yubico PIV Manager, PIV Tool and Smart Card Minidriver

An out-of-bounds read issue was discovered in the Yubico-Piv 1.5.0 smartcard driver.

4.6
2018-08-15 CVE-2018-8253 Microsoft Unspecified vulnerability in Microsoft Windows 10 and Windows Server 2016

An elevation of privilege vulnerability exists when Microsoft Cortana allows arbitrary website browsing on the lockscreen, aka "Microsoft Cortana Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10.

4.6
2018-08-16 CVE-2018-10140 Paloaltonetworks Improper Input Validation vulnerability in Paloaltonetworks Pan-Os 8.1.0/8.1.1/8.1.2

The PAN-OS Management Web Interface in Palo Alto Networks PAN-OS 8.1.2 and earlier may allow an authenticated user to shut down all management sessions, resulting in all logged in users to be redirected to the login page.

4.3
2018-08-15 CVE-2018-8388 Microsoft Authentication Bypass by Spoofing vulnerability in Microsoft Edge

A spoofing vulnerability exists when Microsoft Edge improperly handles specific HTML content, aka "Microsoft Edge Spoofing Vulnerability." This affects Microsoft Edge.

4.3
2018-08-15 CVE-2018-8383 Microsoft Authentication Bypass by Spoofing vulnerability in Microsoft Edge

A spoofing vulnerability exists when Microsoft Edge does not properly parse HTTP content, aka "Microsoft Edge Spoofing Vulnerability." This affects Microsoft Edge.

4.3
2018-08-15 CVE-2018-8374 Microsoft Unspecified vulnerability in Microsoft Exchange Server 2016

A tampering vulnerability exists when Microsoft Exchange Server fails to properly handle profile data, aka "Microsoft Exchange Server Tampering Vulnerability." This affects Microsoft Exchange Server.

4.3
2018-08-15 CVE-2018-8358 Microsoft Unspecified vulnerability in Microsoft Edge

A security feature bypass vulnerability exists when Microsoft Edge improperly handles redirect requests, aka "Microsoft Edge Security Feature Bypass Vulnerability." This affects Microsoft Edge.

4.3
2018-08-13 CVE-2018-11770 Apache Improper Authentication vulnerability in Apache Spark

From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit.

4.2

1 Low Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2018-08-15 CVE-2018-8370 Microsoft Information Exposure vulnerability in Microsoft Edge

A information disclosure vulnerability exists when WebAudio Library improperly handles audio requests, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge.

3.1