Weekly Vulnerabilities Reports > October 1 to 7, 2018
Overview
340 new vulnerabilities reported during this period, including 38 critical vulnerabilities and 139 high severity vulnerabilities. This weekly summary report vulnerabilities in 537 products from 95 vendors including Cisco, IBM, Google, Foxitsoftware, and Debian. Vulnerabilities are notably categorized as "Cross-site Scripting", "Improper Input Validation", "Use After Free", "Out-of-bounds Read", and "Out-of-bounds Write".
- 233 reported vulnerabilities are remotely exploitables.
- 36 reported vulnerabilities have public exploit available.
- 123 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 229 reported vulnerabilities are exploitable by an anonymous user.
- Cisco has the most reported vulnerabilities, with 111 reported vulnerabilities.
- Cisco has the most reported critical vulnerabilities, with 9 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
38 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2018-10-07 | CVE-2012-6710 | Extplorer | Improper Authentication vulnerability in Extplorer ext_find_user in eXtplorer through 2.1.2 allows remote attackers to bypass authentication via a password[]= (aka an empty array) in an action=login request to index.php. | 9.8 |
2018-10-06 | CVE-2018-17456 | GIT SCM Redhat Canonical Debian | Argument Injection or Modification vulnerability in multiple products Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character. | 9.8 |
2018-10-05 | CVE-2018-1264 | Pivotal Software | Information Exposure Through Log Files vulnerability in Pivotal Software Cloud Foundry LOG Cache 0.1/1.0.0 Cloud Foundry Log Cache, versions prior to 1.1.1, logs its UAA client secret on startup as part of its envstruct report. | 9.8 |
2018-10-05 | CVE-2018-11082 | Pivotal Software | Improper Restriction of Excessive Authentication Attempts vulnerability in Pivotal Software Cloudfoundry UAA Release Cloud Foundry UAA, all versions prior to 4.20.0 and Cloud Foundry UAA Release, all versions prior to 61.0, allows brute forcing of MFA codes. | 9.8 |
2018-10-05 | CVE-2018-15427 | Cisco | Use of Hard-coded Credentials vulnerability in Cisco Video Surveillance Manager 7.10/7.11/7.11.1 A vulnerability in Cisco Video Surveillance Manager (VSM) Software running on certain Cisco Connected Safety and Security Unified Computing System (UCS) platforms could allow an unauthenticated, remote attacker to log in to an affected system by using the root account, which has default, static user credentials. | 9.8 |
2018-10-05 | CVE-2018-15389 | Cisco | Use of Hard-coded Credentials vulnerability in Cisco Prime Collaboration 12.1 A vulnerability in the install function of Cisco Prime Collaboration Provisioning (PCP) could allow an unauthenticated, remote attacker to access the administrative web interface using a default hard-coded username and password that are used during install. | 9.8 |
2018-10-05 | CVE-2018-15387 | Cisco | Improper Certificate Validation vulnerability in Cisco Sd-Wan A vulnerability in the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypass certificate validation on an affected device. | 9.8 |
2018-10-05 | CVE-2018-15386 | Cisco | Unspecified vulnerability in Cisco Digital Network Architecture Center A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and have direct unauthorized access to critical management functions. | 9.8 |
2018-10-05 | CVE-2018-15379 | Cisco | Incorrect Permission Assignment for Critical Resource vulnerability in Cisco Prime Infrastructure A vulnerability in which the HTTP web server for Cisco Prime Infrastructure (PI) has unrestricted directory permissions could allow an unauthenticated, remote attacker to upload an arbitrary file. | 9.8 |
2018-10-05 | CVE-2018-0448 | Cisco | Inadequate Encryption Strength vulnerability in Cisco Digital Network Architecture Center A vulnerability in the identity management service of Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and take complete control of identity management functions. | 9.8 |
2018-10-05 | CVE-2018-0426 | Cisco | Path Traversal vulnerability in Cisco Rv110W Firmware, Rv130W Firmware and Rv215W Firmware A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to gain access to sensitive information. | 9.8 |
2018-10-05 | CVE-2018-0425 | Cisco | Improper Privilege Management vulnerability in Cisco Rv110W Firmware, Rv130W Firmware and Rv215W Firmware A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to gain access to sensitive information. | 9.8 |
2018-10-05 | CVE-2015-9272 | Videowhisper | Code Injection vulnerability in Videowhisper Video Presentation 3.31.17 The videowhisper-video-presentation plugin 3.31.17 for WordPress allows remote attackers to execute arbitrary code because vp/vw_upload.php considers a file safe when "html" are the last four characters, as demonstrated by a .phtml file containing PHP code. | 9.8 |
2018-10-05 | CVE-2014-10075 | Karo Project | Command Injection vulnerability in Karo Project Karo 2.3.8 The karo gem 2.3.8 for Ruby allows Remote command injection via the host field. | 9.8 |
2018-10-05 | CVE-2013-7465 | Icecoldapps | Improper Authentication vulnerability in Icecoldapps Servers Ultimate 6.0.2 Ice Cold Apps Servers Ultimate 6.0.2(12) does not require authentication for TELNET, SSH, or FTP, which allows remote attackers to execute arbitrary code by uploading PHP scripts. | 9.8 |
2018-10-04 | CVE-2015-9271 | Videowhisper | Unrestricted Upload of File with Dangerous Type vulnerability in Videowhisper Video Conference 4.91.8 The VideoWhisper videowhisper-video-conference-integration plugin 4.91.8 for WordPress allows remote attackers to execute arbitrary code because vc/vw_upload.php considers a file safe when "html" are the last four characters, as demonstrated by a .phtml file containing PHP code, a different vulnerability than CVE-2014-1905. | 9.8 |
2018-10-04 | CVE-2018-12470 | Suse | SQL Injection vulnerability in Suse Subscription Management Tool A SQL Injection in the RegistrationSharing module of SUSE Linux SMT allows remote attackers to cause execute arbitrary SQL statements. | 9.8 |
2018-10-04 | CVE-2018-5492 | Netapp | Improper Input Validation vulnerability in Netapp E-Series Santricity OS Controller NetApp E-Series SANtricity OS Controller Software 11.30 and later version 11.30.5 is susceptible to unauthenticated remote code execution. | 9.8 |
2018-10-03 | CVE-2018-17881 | D Link | Weak Password Recovery Mechanism for Forgotten Password vulnerability in D-Link Dir-823G Firmware On D-Link DIR-823G 2018-09-19 devices, the GoAhead configuration allows /HNAP1 SetPasswdSettings commands without authentication to trigger an admin password change. | 9.8 |
2018-10-03 | CVE-2018-17552 | Naviwebs | SQL Injection vulnerability in Naviwebs Navigate CMS 2.8 SQL Injection in login.php in Naviwebs Navigate CMS 2.8 allows remote attackers to bypass authentication via the navigate-user cookie. | 9.8 |
2018-10-03 | CVE-2018-17428 | Nexusfi | SQL Injection vulnerability in Nexusfi Opac Easyweb Five 5.7 An issue was discovered in OPAC EasyWeb Five 5.7. | 9.8 |
2018-10-03 | CVE-2018-17969 | Samsung | Insufficiently Protected Credentials vulnerability in Samsung Scx-6545X Firmware 2.00.03.01 Samsung SCX-6545X V2.00.03.01 03-23-2012 devices allows remote attackers to discover cleartext credentials via iso.3.6.1.4.1.236.11.5.11.81.10.1.5.0 and iso.3.6.1.4.1.236.11.5.11.81.10.1.6.0 SNMP requests. | 9.8 |
2018-10-03 | CVE-2018-16049 | Gitlab | Information Exposure Through Log Files vulnerability in Gitlab An issue was discovered in GitLab Community and Enterprise Edition before 11.0.6, 11.1.x before 11.1.5, and 11.2.x before 11.2.2. | 9.8 |
2018-10-02 | CVE-2018-14826 | Entes | Improper Input Validation vulnerability in Entes Emg-12 Firmware 2.57 Entes EMG12 versions 2.57 and prior The application uses a web interface where it is possible for an attacker to bypass authentication with a specially crafted URL. | 9.8 |
2018-10-02 | CVE-2018-14822 | Entes | Information Exposure vulnerability in Entes Emg-12 Firmware 2.57 Entes EMG12 versions 2.57 and prior an information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user and execute arbitrary code. | 9.8 |
2018-10-02 | CVE-2018-9476 | Use After Free vulnerability in Google Android 8.0/8.1 In avrc_pars_browsing_cmd of avrc_pars_tg.cc, there is a possible use-after-free due to improper locking. | 9.8 | |
2018-10-02 | CVE-2018-17787 | D Link | OS Command Injection vulnerability in D-Link Dir-823G Firmware On D-Link DIR-823G devices, the GoAhead configuration allows /HNAP1 Command Injection via shell metacharacters in the POST data, because this data is sent directly to the "system" library function. | 9.8 |
2018-10-02 | CVE-2018-17786 | D Link | Improper Authentication vulnerability in D-Link Dir-823G Firmware On D-Link DIR-823G devices, ExportSettings.sh, upload_settings.cgi, GetDownLoadSyslog.sh, and upload_firmware.cgi do not require authentication, which allows remote attackers to execute arbitrary code. | 9.8 |
2018-10-01 | CVE-2018-14804 | Emerson | Code Injection vulnerability in Emerson AMS Device Manager Emerson AMS Device Manager v12.0 to v13.5. | 9.8 |
2018-10-01 | CVE-2018-14802 | Fujielectric | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Fujielectric Frenic Loader 3.3 Firmware 7.3.4.1A Fuji Electric FRENIC LOADER v3.3 v7.3.4.1a of FRENIC-Mini (C1), FRENIC-Mini (C2), FRENIC-Eco, FRENIC-Multi, FRENIC-MEGA, FRENIC-Ace. | 9.8 |
2018-10-01 | CVE-2018-14794 | Fujielectric | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Fujielectric Alpha5 Smart Loader Firmware Fuji Electric Alpha5 Smart Loader Versions 3.7 and prior. | 9.8 |
2018-10-01 | CVE-2018-14790 | Fujielectric | Out-of-bounds Read vulnerability in Fujielectric Frenic Loader 3.3 Firmware 7.3.4.1A Fuji Electric FRENIC LOADER v3.3 v7.3.4.1a of FRENIC-Mini (C1), FRENIC-Mini (C2), FRENIC-Eco, FRENIC-Multi, FRENIC-MEGA, FRENIC-Ace. | 9.8 |
2018-10-01 | CVE-2018-17852 | Wuzhi CMS Project | SQL Injection vulnerability in Wuzhi CMS Project Wuzhi CMS 4.1.0 A SQL injection was discovered in WUZHI CMS 4.1.0 in coreframe/app/coupon/admin/card.php via the groupname parameter to the /index.php?m=coupon&f=card&v=detail_listing URI. | 9.8 |
2018-10-01 | CVE-2018-17831 | Redaxo | SQL Injection vulnerability in Redaxo In REDAXO before 5.6.3, a critical SQL injection vulnerability has been discovered in the rex_list class because of the prepareQuery function in core/lib/list.php, via the index.php?page=users/users sort parameter. | 9.8 |
2018-10-01 | CVE-2018-17825 | Adplug Project Fedoraproject | Double Free vulnerability in multiple products An issue was discovered in AdPlug 2.3.1. | 9.8 |
2018-10-05 | CVE-2018-0435 | Cisco | Improper Authentication vulnerability in Cisco Umbrella A vulnerability in the Cisco Umbrella API could allow an authenticated, remote attacker to view and modify data across their organization and other organizations. | 9.1 |
2018-10-04 | CVE-2018-17983 | Mercurial | Out-of-bounds Read vulnerability in Mercurial cext/manifest.c in Mercurial before 4.7.2 has an out-of-bounds read during parsing of a malformed manifest entry. | 9.1 |
2018-10-04 | CVE-2018-12472 | Suse | Improper Authentication vulnerability in Suse Subscription Management Tool A improper authentication using the HOST header in SUSE Linux SMT allows remote attackers to spoof a sibling server. | 9.1 |
139 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2018-10-05 | CVE-2018-15763 | Pivotal Software | Information Exposure Through Log Files vulnerability in Pivotal Software Pivotal Container Service Pivotal Container Service, versions prior to 1.2.0, contains an information disclosure vulnerability which exposes IaaS credentials to application logs. | 8.8 |
2018-10-05 | CVE-2018-11081 | Pivotal Software | Unspecified vulnerability in Pivotal Software Operations Manager Pivotal Operations Manager, versions 2.2.x prior to 2.2.1, 2.1.x prior to 2.1.11, 2.0.x prior to 2.0.16, and 1.11.x prior to 2, fails to write the Operations Manager UAA config onto the temp RAM disk, thus exposing the configs directly onto disk. | 8.8 |
2018-10-05 | CVE-2018-11778 | Apache | Out-of-bounds Write vulnerability in Apache Ranger UnixAuthenticationService in Apache Ranger 1.2.0 was updated to correctly handle user input to avoid Stack-based buffer overflow. | 8.8 |
2018-10-05 | CVE-2018-0454 | Cisco | Command Injection vulnerability in Cisco Cloud Services Platform 2100 Firmware 2.2(4) A vulnerability in the web-based management interface of Cisco Cloud Services Platform 2100 could allow an authenticated, remote attacker to perform command injection. | 8.8 |
2018-10-05 | CVE-2018-0451 | Cisco | Cross-Site Request Forgery (CSRF) vulnerability in Cisco Tetration Analytics 2.0(2.20)/2.1(1.31) A vulnerability in the web-based management interface of Cisco Tetration Analytics could allow an authenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. | 8.8 |
2018-10-05 | CVE-2018-0446 | Cisco | Cross-Site Request Forgery (CSRF) vulnerability in Cisco Network Level Service 1.5(0.128) A vulnerability in the web-based management interface of Cisco Industrial Network Director could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. | 8.8 |
2018-10-05 | CVE-2018-0445 | Cisco | Cross-Site Request Forgery (CSRF) vulnerability in Cisco Packaged Contact Center Enterprise 11.6(1) A vulnerability in the web-based management interface of Cisco Packaged Contact Center Enterprise could allow an unauthenticated, remote attacker to conduct a CSRF attack and perform arbitrary actions on an affected device. | 8.8 |
2018-10-05 | CVE-2018-0439 | Cisco | Cross-Site Request Forgery (CSRF) vulnerability in Cisco Meeting Server A vulnerability in the web-based management interface of Cisco Meeting Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. | 8.8 |
2018-10-05 | CVE-2018-0432 | Cisco | OS Command Injection vulnerability in Cisco products A vulnerability in the error reporting feature of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to gain elevated privileges on an affected device. | 8.8 |
2018-10-05 | CVE-2018-0431 | Cisco | Command Injection vulnerability in Cisco Unified Computing System 2.0Base/3.0(3A)/3.1(3) A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject and execute arbitrary commands with root privileges on an affected device. | 8.8 |
2018-10-05 | CVE-2018-0430 | Cisco | Command Injection vulnerability in Cisco Unified Computing System 2.0Base/3.0(3A)/3.1(3) A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject and execute arbitrary commands with root privileges on an affected device. | 8.8 |
2018-10-05 | CVE-2018-0424 | Cisco | OS Command Injection vulnerability in Cisco Rv110W Firmware, Rv130W Firmware and Rv215W Firmware A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an authenticated, remote attacker to execute arbitrary commands. | 8.8 |
2018-10-05 | CVE-2018-17986 | Razorcms | Cross-Site Request Forgery (CSRF) vulnerability in Razorcms 3.4.8 rars/user/data in razorCMS 3.4.8 allows CSRF for changing the password of an admin user. | 8.8 |
2018-10-04 | CVE-2018-17872 | Verint | Incorrect Permission Assignment for Critical Resource vulnerability in Verint products Verba Collaboration Compliance and Quality Management Platform before 9.2.1.5545 has Insecure Permissions. | 8.8 |
2018-10-04 | CVE-2018-1819 | IBM | SQL Injection vulnerability in IBM Financial Transaction Manager IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.0.2, 3.0.4, 3.0.6, and 3.2.0 is vulnerable to SQL injection. | 8.8 |
2018-10-03 | CVE-2018-5921 | HP | Cross-Site Request Forgery (CSRF) vulnerability in HP products A potential security vulnerability has been identified with certain HP printers and MFPs in 2405129_000052 and other firmware versions. | 8.8 |
2018-10-03 | CVE-2018-17553 | Naviwebs | Unrestricted Upload of File with Dangerous Type vulnerability in Naviwebs Navigate CMS 2.8 An "Unrestricted Upload of File with Dangerous Type" issue with directory traversal in navigate_upload.php in Naviwebs Navigate CMS 2.8 allows authenticated attackers to achieve remote code execution via a POST request with engine=picnik and id=../../../navigate_info.php. | 8.8 |
2018-10-03 | CVE-2018-3995 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.2.0.9297. | 8.8 |
2018-10-03 | CVE-2018-3994 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.2.0.9297. | 8.8 |
2018-10-03 | CVE-2018-3993 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.2.0.9297. | 8.8 |
2018-10-03 | CVE-2018-3946 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader version 9.1.0.5096. | 8.8 |
2018-10-03 | CVE-2018-17942 | GNU | Out-of-bounds Write vulnerability in GNU Gnulib The convert_to_decimal function in vasnprintf.c in Gnulib before 2018-09-23 has a heap-based buffer overflow because memory is not allocated for a trailing '\0' character during %f processing. | 8.8 |
2018-10-02 | CVE-2018-3944 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.1.0.5096. | 8.8 |
2018-10-02 | CVE-2018-3943 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.1.0.5096. | 8.8 |
2018-10-02 | CVE-2018-9504 | Out-of-bounds Write vulnerability in Google Android In sdp_copy_raw_data of sdp_discovery.cc, there is a possible out of bounds write due to an incorrect bounds check. | 8.8 | |
2018-10-01 | CVE-2018-17869 | Dasan | Cross-Site Request Forgery (CSRF) vulnerability in Dasan H660Gw Firmware DASAN H660GW devices do not implement any CSRF protection mechanism. | 8.8 |
2018-10-01 | CVE-2018-15702 | TP Link | Cross-Site Request Forgery (CSRF) vulnerability in Tp-Link Tl-Wrn841N Firmware 0.9.14.16V0348.0 The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to CSRF due to insufficient validation of the referer field. | 8.8 |
2018-10-01 | CVE-2018-10605 | Martem | Insecure Default Initialization of Resource vulnerability in Martem Telem-Gw6 Firmware and Telem-Gwm Firmware Martem TELEM GW6/GWM versions prior to 2.0.87-4018403-k4 may allow unprivileged users to modify/upload a new system configuration or take the full control over the RTU using default credentials to connect to the RTU. | 8.8 |
2018-10-01 | CVE-2018-17836 | Jtbc | Path Traversal vulnerability in Jtbc PHP 3.0.1.6 An issue was discovered in JTBC(PHP) 3.0.1.6. | 8.8 |
2018-10-01 | CVE-2018-17826 | Hisiphp | Cross-Site Request Forgery (CSRF) vulnerability in Hisiphp 1.0.8 HisiPHP 1.0.8 allows CSRF via admin.php/admin/user/adduser.html to add an administrator account. | 8.8 |
2018-10-05 | CVE-2018-0436 | Cisco | Improper Privilege Management vulnerability in Cisco Webex Teams A vulnerability in Cisco Webex Teams, formerly Cisco Spark, could allow an authenticated, remote attacker to view and modify data for an organization other than their own organization. | 8.7 |
2018-10-05 | CVE-2018-15382 | Cisco | External Control of Critical State Data vulnerability in Cisco Hyperflex HX Data Platform 3.0(1A) A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to generate valid, signed session tokens. | 8.6 |
2018-10-05 | CVE-2018-15377 | Cisco | Memory Leak vulnerability in Cisco IOS 15.7(3.1S)M/Denali16.3.6/Everest16.5.1 A vulnerability in the Cisco Network Plug and Play agent, also referred to as the Cisco Open Plug-n-Play agent, of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a memory leak on an affected device. | 8.6 |
2018-10-05 | CVE-2018-0485 | Cisco | Improper Input Validation vulnerability in Cisco IOS and IOS XE A vulnerability in the SM-1T3/E3 firmware on Cisco Second Generation Integrated Services Routers (ISR G2) and the Cisco 4451-X Integrated Services Router (ISR4451-X) could allow an unauthenticated, remote attacker to cause the ISR G2 Router or the SM-1T3/E3 module on the ISR4451-X to reload, resulting in a denial of service (DoS) condition on an affected device. | 8.6 |
2018-10-05 | CVE-2018-0473 | Cisco | Unspecified vulnerability in Cisco IOS 15.2(4)E/15.2(5) A vulnerability in the Precision Time Protocol (PTP) subsystem of Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of the Precision Time Protocol. | 8.6 |
2018-10-05 | CVE-2018-0472 | Cisco | Improper Input Validation vulnerability in Cisco IOS XE 15.5(3)S5.36/16.8.1 A vulnerability in the IPsec driver code of multiple Cisco IOS XE Software platforms and the Cisco ASA 5500-X Series Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause the device to reload. | 8.6 |
2018-10-05 | CVE-2018-0470 | Cisco | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Cisco IOS XE 16.2.0/16.3(1) A vulnerability in the web framework of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a buffer overflow condition on an affected device, resulting in a denial of service (DoS) condition. | 8.6 |
2018-10-05 | CVE-2018-0467 | Cisco | Improper Input Validation vulnerability in Cisco IOS XE 15.6(2)Sp/16.6.1/Everest16.6.1 A vulnerability in the IPv6 processing code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload. | 8.6 |
2018-10-05 | CVE-2018-0421 | Cisco | Missing Release of Resource after Effective Lifetime vulnerability in Cisco products A vulnerability in TCP connection management in Cisco Prime Access Registrar could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition when the application unexpectedly restarts. | 8.6 |
2018-10-05 | CVE-2018-0453 | Cisco | OS Command Injection vulnerability in Cisco Firepower Threat Defense A vulnerability in the Sourcefire tunnel control channel protocol in Cisco Firepower System Software running on Cisco Firepower Threat Defense (FTD) sensors could allow an authenticated, local attacker to execute specific CLI commands with root privileges on the Cisco Firepower Management Center (FMC), or through Cisco FMC on other Firepower sensors and devices that are controlled by the same Cisco FMC. | 8.2 |
2018-10-05 | CVE-2018-11083 | Cloud Foundry | Unspecified vulnerability in Cloud Foundry Bosh Cloud Foundry BOSH, versions v264 prior to v264.14.0 and v265 prior to v265.7.0 and v266 prior to v266.8.0 and v267 prior to v267.2.0, allows refresh tokens to be as access tokens when using UAA for authentication. | 8.1 |
2018-10-05 | CVE-2018-0464 | Cisco | Path Traversal vulnerability in Cisco Prime Data Center Network Manager A vulnerability in Cisco Data Center Network Manager software could allow an authenticated, remote attacker to conduct directory traversal attacks and gain access to sensitive files on the targeted system. | 8.1 |
2018-10-05 | CVE-2018-15372 | Cisco | Unspecified vulnerability in Cisco IOS XE 16.8.1/16.9.1 A vulnerability in the MACsec Key Agreement (MKA) using Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) functionality of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic through a Layer 3 interface of an affected device. | 8.1 |
2018-10-05 | CVE-2018-0423 | Cisco | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Cisco Rv110W Firmware, Rv130W Firmware and Rv215W Firmware A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to cause a denial of service condition or to execute arbitrary code. | 8.1 |
2018-10-04 | CVE-2018-12471 | Suse | XXE vulnerability in Suse Subscription Management Tool A External Entity Reference ('XXE') vulnerability in SUSE Linux SMT allows remote attackers to read data from the server or cause DoS by referencing blocking elements. | 8.1 |
2018-10-02 | CVE-2018-15752 | Mensamax | Cleartext Transmission of Sensitive Information vulnerability in Mensamax 4.3 An issue was discovered in the MensaMax (aka com.breustedt.mensamax) application 4.3 for Android. | 8.1 |
2018-10-05 | CVE-2018-11064 | Dell | Incorrect Permission Assignment for Critical Resource vulnerability in Dell products Dell EMC Unity OE versions 4.3.0.x and 4.3.1.x and UnityVSA OE versions 4.3.0.x and 4.3.1.x contains an Incorrect File Permissions vulnerability. | 7.8 |
2018-10-05 | CVE-2018-15422 | Cisco | Out-of-bounds Write vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.8 |
2018-10-05 | CVE-2018-15421 | Cisco | Out-of-bounds Write vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.8 |
2018-10-05 | CVE-2018-15420 | Cisco | Improper Input Validation vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.8 |
2018-10-05 | CVE-2018-15419 | Cisco | Out-of-bounds Write vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.8 |
2018-10-05 | CVE-2018-15418 | Cisco | Integer Underflow (Wrap or Wraparound) vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.8 |
2018-10-05 | CVE-2018-15417 | Cisco | Improper Input Validation vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.8 |
2018-10-05 | CVE-2018-15416 | Cisco | Improper Input Validation vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.8 |
2018-10-05 | CVE-2018-15415 | Cisco | Improper Input Validation vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.8 |
2018-10-05 | CVE-2018-15414 | Cisco | Improper Input Validation vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.8 |
2018-10-05 | CVE-2018-15413 | Cisco | Improper Input Validation vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.8 |
2018-10-05 | CVE-2018-15412 | Cisco | Improper Input Validation vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.8 |
2018-10-05 | CVE-2018-15411 | Cisco | Improper Input Validation vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.8 |
2018-10-05 | CVE-2018-15410 | Cisco | Improper Input Validation vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.8 |
2018-10-05 | CVE-2018-15409 | Cisco | Improper Input Validation vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.8 |
2018-10-05 | CVE-2018-15408 | Cisco | Improper Input Validation vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.8 |
2018-10-05 | CVE-2018-0438 | Cisco | Improper Privilege Management vulnerability in Cisco Umbrella Enterprise Roaming Client A vulnerability in the Cisco Umbrella Enterprise Roaming Client (ERC) could allow an authenticated, local attacker to elevate privileges to Administrator. | 7.8 |
2018-10-05 | CVE-2018-0437 | Cisco | Improper Privilege Management vulnerability in Cisco products A vulnerability in the Cisco Umbrella Enterprise Roaming Client (ERC) could allow an authenticated, local attacker to elevate privileges to Administrator. | 7.8 |
2018-10-05 | CVE-2018-0433 | Cisco | OS Command Injection vulnerability in Cisco products A vulnerability in the command-line interface (CLI) in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. | 7.8 |
2018-10-04 | CVE-2018-17984 | Ispconfig | Incorrect Regular Expression vulnerability in Ispconfig An unanchored /[a-z]{2}/ regular expression in ISPConfig before 3.1.13 makes it possible to include arbitrary files, leading to code execution. | 7.8 |
2018-10-03 | CVE-2018-17408 | Zahiraccounting | Out-of-bounds Write vulnerability in Zahiraccounting Zahir Enterprise Plus 6 Stack-based buffer overflows in Zahir Accounting Enterprise Plus 6 through build 10b allow remote attackers to execute arbitrary code via a crafted CSV file that is accessed through the Import CSV File menu. | 7.8 |
2018-10-03 | CVE-2018-3967 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. | 7.8 |
2018-10-03 | CVE-2018-3966 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. | 7.8 |
2018-10-03 | CVE-2018-3965 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. | 7.8 |
2018-10-03 | CVE-2018-3964 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. | 7.8 |
2018-10-03 | CVE-2018-14800 | Deltaww | Out-of-bounds Read vulnerability in Deltaww Ispsoft 3.0.5 Delta Electronics ISPSoft version 3.0.5 and prior allow an attacker, by opening a crafted file, to cause the application to read past the boundary allocated to a stack object, which could allow execution of code under the context of the application. | 7.8 |
2018-10-03 | CVE-2018-6689 | Mcafee | Improper Authentication vulnerability in Mcafee Data Loss Prevention Endpoint Authentication Bypass vulnerability in McAfee Data Loss Prevention Endpoint (DLPe) 10.0.x earlier than 10.0.510, and 11.0.x earlier than 11.0.600 allows attackers to bypass local security protection via specific conditions. | 7.8 |
2018-10-02 | CVE-2018-3961 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. | 7.8 |
2018-10-02 | CVE-2018-3960 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. | 7.8 |
2018-10-02 | CVE-2018-3959 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. | 7.8 |
2018-10-02 | CVE-2018-3958 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. | 7.8 |
2018-10-02 | CVE-2018-3957 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. | 7.8 |
2018-10-02 | CVE-2018-9515 | Unspecified vulnerability in Google Android In sdcardfs_create and sdcardfs_mkdir of inode.c, there is a possible memory corruption due to improper locking. | 7.8 | |
2018-10-02 | CVE-2018-9514 | Use After Free vulnerability in Google Android In sdcardfs_open of file.c, there is a possible Use After Free due to an unusual root cause. | 7.8 | |
2018-10-02 | CVE-2018-9513 | Double Free vulnerability in Google Android In copy_process of fork.c, there is possible memory corruption due to a double free. | 7.8 | |
2018-10-02 | CVE-2018-9501 | Unspecified vulnerability in Google Android In the SetupWizard, there is a possible Factory Reset Protection bypass due to a permissions bypass. | 7.8 | |
2018-10-02 | CVE-2018-9498 | Integer Overflow or Wraparound vulnerability in Google Android In SkSampler::Fill of SkSampler.cpp, there is a possible out of bounds write due to an integer overflow. | 7.8 | |
2018-10-02 | CVE-2018-9497 | Out-of-bounds Write vulnerability in Google Android In impeg2_fmt_conv_yuv420p_to_yuv420sp_uv_av8 of impeg2_format_conv.s there is a possible out of bounds write due to missing bounds check. | 7.8 | |
2018-10-02 | CVE-2018-9496 | Out-of-bounds Write vulnerability in Google Android 9.0 In ixheaacd_real_synth_fft_p3 of ixheaacd_esbr_fft.c there is a possible out of bounds write due to a missing bounds check. | 7.8 | |
2018-10-02 | CVE-2018-9492 | Incorrect Authorization vulnerability in Google Android 8.0/8.1/9.0 In checkGrantUriPermissionLocked of ActivityManagerService.java, there is a possible permissions bypass. | 7.8 | |
2018-10-02 | CVE-2018-9491 | Integer Overflow or Wraparound vulnerability in Google Android In AMediaCodecCryptoInfo_new of NdkMediaCodec.cpp, there is a possible out-of-bounds write due to an integer overflow. | 7.8 | |
2018-10-02 | CVE-2018-9490 | Incorrect Type Conversion or Cast vulnerability in Google Android In CollectValuesOrEntriesImpl of elements.cc, there is possible remote code execution due to type confusion. | 7.8 | |
2018-10-02 | CVE-2018-9473 | Integer Overflow or Wraparound vulnerability in Google Android 8.0 In ihevcd_parse_sei_payload of ihevcd_parse_headers.c, there is a possible out-of-bounds write due to an integer overflow. | 7.8 | |
2018-10-02 | CVE-2018-11748 | Puppet | Insufficiently Protected Credentials vulnerability in Puppet Device Manager Previous releases of the Puppet device_manager module creates configuration files containing credentials that are world readable. | 7.8 |
2018-10-02 | CVE-2018-1498 | IBM | Insufficiently Protected Credentials vulnerability in IBM Security Guardium 10.5 IBM Security Guardium EcoSystem 10.5 stores user credentials in plain in clear text which can be read by a local user. | 7.8 |
2018-10-02 | CVE-2018-11072 | Dell | Uncontrolled Search Path Element vulnerability in Dell Digital Delivery Dell Digital Delivery versions prior to 3.5.1 contain a DLL Injection Vulnerability. | 7.8 |
2018-10-01 | CVE-2018-4001 | Atlantiswordprocessor | Access of Uninitialized Pointer vulnerability in Atlantiswordprocessor Atlantis Word Processor 3.2.5 An exploitable uninitialized pointer vulnerability exists in the Office Open XML parser of Atlantis Word Processor, version 3.2.5.0. | 7.8 |
2018-10-01 | CVE-2018-4000 | Atlantiswordprocessor | Double Free vulnerability in Atlantiswordprocessor Atlantis Word Processor 3.2.5.0 An exploitable double-free vulnerability exists in the Office Open XML parser of Atlantis Word Processor, version 3.2.5.0. | 7.8 |
2018-10-01 | CVE-2018-3999 | Atlantiswordprocessor | Incorrect Conversion between Numeric Types vulnerability in Atlantiswordprocessor Atlantis Word Processor 3.2.5.0 An exploitable stack-based buffer overflow vulnerability exists in the JPEG parser of Atlantis Word Processor, version 3.2.5.0. | 7.8 |
2018-10-01 | CVE-2018-3998 | Atlantiswordprocessor | Out-of-bounds Write vulnerability in Atlantiswordprocessor Atlantis Word Processor 3.2.5.0 An exploitable heap-based buffer overflow vulnerability exists in the Windows enhanced metafile parser of Atlantis Word Processor, version 3.2.5.0. | 7.8 |
2018-10-01 | CVE-2018-3984 | Atlantiswordprocessor | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Atlantiswordprocessor Atlantis Word Processor 3.0.2.3/3.0.2.5 An exploitable uninitialized length vulnerability exists within the Word document-parser of the Atlantis Word Processor 3.0.2.3 and 3.0.2.5. | 7.8 |
2018-10-01 | CVE-2018-3982 | Atlantiswordprocessor | Out-of-bounds Write vulnerability in Atlantiswordprocessor Atlantis Word Processor 3.0.2.3/3.0.2.5 An exploitable arbitrary write vulnerability exists in the Word document parser of the Atlantis Word Processor 3.0.2.3 and 3.0.2.5. | 7.8 |
2018-10-01 | CVE-2018-3981 | Canvasgfx | Out-of-bounds Write vulnerability in Canvasgfx Canvas Draw 5.0.0 An exploitable out-of-bounds write exists in the TIFF-parsing functionality of Canvas Draw version 5.0.0. | 7.8 |
2018-10-01 | CVE-2018-3978 | Atlantiswordprocessor | Out-of-bounds Write vulnerability in Atlantiswordprocessor Atlantis Word Processor 3.0.2.3/3.0.2.5 An exploitable out-of-bounds write vulnerability exists in the Word Document parser of the Atlantis Word Processor 3.0.2.3, 3.0.2.5. | 7.8 |
2018-10-01 | CVE-2018-3975 | Atlantiswordprocessor | Use of Uninitialized Resource vulnerability in Atlantiswordprocessor Atlantis Word Processor 3.2.6 An exploitable uninitialized variable vulnerability exists in the RTF-parsing functionality of Atlantis Word Processor 3.2.6 version. | 7.8 |
2018-10-01 | CVE-2015-9268 | Nullsoft Debian | Improper Input Validation vulnerability in multiple products Nullsoft Scriptable Install System (NSIS) before 2.49 has unsafe implicit linking against Version.dll. | 7.8 |
2018-10-02 | CVE-2017-7908 | Gigasoft GE | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products A heap-based buffer overflow exists in the third-party product Gigasoft, v5 and prior, included in GE Communicator 3.15 and prior. | 7.6 |
2018-10-05 | CVE-2018-0405 | Cisco | Path Traversal vulnerability in Cisco Rv180W Firmware and Rv220W Firmware A vulnerability in the web framework code for Cisco RV180W Wireless-N Multifunction VPN Router and Small Business RV Series RV220W Wireless Network Security Firewall could allow an unauthenticated, remote attacker to conduct a directory path traversal attack on a targeted device. | 7.5 |
2018-10-05 | CVE-2018-0404 | Cisco | SQL Injection vulnerability in Cisco products A vulnerability in the web framework code for Cisco RV180W Wireless-N Multifunction VPN Router and Small Business RV Series RV220W Wireless Network Security Firewall could allow an unauthenticated, remote attacker to execute arbitrary SQL queries. | 7.5 |
2018-10-05 | CVE-2018-15391 | Cisco | Incorrect Calculation vulnerability in Cisco Remote PHY A vulnerability in certain IPv4 fragment-processing functions of Cisco Remote PHY Software could allow an unauthenticated, remote attacker to impact traffic passing through a device, potentially causing a denial of service (DoS) condition. | 7.5 |
2018-10-05 | CVE-2018-15383 | Cisco | Allocation of Resources Without Limits or Throttling vulnerability in Cisco products A vulnerability in the cryptographic hardware accelerator driver of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a temporary denial of service (DoS) condition. | 7.5 |
2018-10-05 | CVE-2018-0463 | Cisco | Unspecified vulnerability in Cisco Network Services Orchestrator 1.2.0 A vulnerability in the Cisco Network Plug and Play server component of Cisco Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to gain unauthorized access to configuration data that is stored on an affected NSO system. | 7.5 |
2018-10-05 | CVE-2018-0455 | Cisco | Unspecified vulnerability in Cisco Firepower System Software A vulnerability in the Server Message Block Version 2 (SMBv2) and Version 3 (SMBv3) protocol implementation for the Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause the device to run low on system memory, possibly preventing the device from forwarding traffic. | 7.5 |
2018-10-05 | CVE-2018-1647 | IBM | Allocation of Resources Without Limits or Throttling vulnerability in IBM Qradar Incident Forensics IBM QRadar Incident Forensics 7.2 and 7.3 does not properly restrict the size or amount of resources requested which could allow an unauthenticated user to cause a denial of service. | 7.5 |
2018-10-05 | CVE-2014-10076 | WP DB Backup Project | Information Exposure vulnerability in Wp-Db-Backup Project Wp-Db-Backup 2.2.4 The wp-db-backup plugin 2.2.4 for WordPress relies on a five-character string for access control, which makes it easier for remote attackers to read backup archives via a brute-force attack. | 7.5 |
2018-10-03 | CVE-2018-17880 | D Link | Missing Authentication for Critical Function vulnerability in D-Link Dir-823G Firmware On D-Link DIR-823G 2018-09-19 devices, the GoAhead configuration allows /HNAP1 RunReboot commands without authentication to trigger a reboot. | 7.5 |
2018-10-03 | CVE-2018-17562 | Multitech | SQL Injection vulnerability in Multitech Faxfinder Multi-Tech FaxFinder before 5.1.6 has SQL Injection via a status/call_details?oid= URI, allowing an attacker to extract the underlying database schema to further disclose other fax server information through different injection points. | 7.5 |
2018-10-03 | CVE-2018-17540 | Strongswan Debian Canonical | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products The gmp plugin in strongSwan before 5.7.1 has a Buffer Overflow via a crafted certificate. | 7.5 |
2018-10-02 | CVE-2018-9503 | Out-of-bounds Read vulnerability in Google Android In rfc_process_mx_message of rfc_ts_frames.cc, there is a possible out of bounds read due to a missing bounds check. | 7.5 | |
2018-10-02 | CVE-2018-15753 | Mensamax | Use of Hard-coded Credentials vulnerability in Mensamax 4.3 An issue was discovered in the MensaMax (aka com.breustedt.mensamax) application 4.3 for Android. | 7.5 |
2018-10-02 | CVE-2018-12473 | Opensuse | Path Traversal vulnerability in Opensuse Open Build Service A path traversal traversal vulnerability in obs-service-tar_scm of Open Build Service allows remote attackers to cause access files not in the current build. | 7.5 |
2018-10-01 | CVE-2015-9269 | Wpmobilepack | Information Exposure vulnerability in Wpmobilepack Wordpress Mobile Pack The export/content.php exportarticle feature in the wordpress-mobile-pack plugin before 2.1.3 2015-06-03 for WordPress allows remote attackers to obtain sensitive information because the content of a privately published post is sent in JSON format. | 7.5 |
2018-10-01 | CVE-2018-17848 | Golang Fedoraproject | Improper Validation of Array Index vulnerability in multiple products The html package (aka x/net/html) through 2018-09-25 in Go mishandles <math><template><mn><b></template>, leading to a "panic: runtime error" (index out of range) in (*insertionModeStack).pop in node.go, called from inHeadIM, during an html.Parse call. | 7.5 |
2018-10-01 | CVE-2018-17847 | Golang Fedoraproject | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products The html package (aka x/net/html) through 2018-09-25 in Go mishandles <svg><template><desc><t><svg></template>, leading to a "panic: runtime error" (index out of range) in (*nodeStack).pop in node.go, called from (*parser).clearActiveFormattingElements, during an html.Parse call. | 7.5 |
2018-10-01 | CVE-2018-17846 | Golang Fedoraproject | Infinite Loop vulnerability in multiple products The html package (aka x/net/html) through 2018-09-25 in Go mishandles <table><math><select><mi><select></table>, leading to an infinite loop during an html.Parse call because inSelectIM and inSelectInTableIM do not comply with a specification. | 7.5 |
2018-10-01 | CVE-2018-17838 | Jtbc | Path Traversal vulnerability in Jtbc PHP 3.0.1.6 An issue was discovered in JTBC(PHP) 3.0.1.6. | 7.5 |
2018-10-01 | CVE-2018-17837 | Jtbc | Path Traversal vulnerability in Jtbc PHP 3.0.1.6 An issue was discovered in JTBC(PHP) 3.0.1.6. | 7.5 |
2018-10-01 | CVE-2018-17217 | PTC | Use of Hard-coded Credentials vulnerability in PTC Thingworx Platform An issue was discovered in PTC ThingWorx Platform 6.5 through 8.2. | 7.5 |
2018-10-05 | CVE-2018-15373 | Cisco | Allocation of Resources Without Limits or Throttling vulnerability in Cisco IOS and IOS XE A vulnerability in the implementation of Cisco Discovery Protocol functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to exhaust memory on an affected device, resulting in a denial of service (DoS) condition. | 7.4 |
2018-10-05 | CVE-2018-0475 | Cisco | Improper Input Validation vulnerability in Cisco IOS and IOS XE A vulnerability in the implementation of the cluster feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. | 7.4 |
2018-10-05 | CVE-2018-0471 | Cisco | Missing Release of Resource after Effective Lifetime vulnerability in Cisco IOS XE 16.6.1/16.6.2 A vulnerability in the Cisco Discovery Protocol (CDP) module of Cisco IOS XE Software Releases 16.6.1 and 16.6.2 could allow an unauthenticated, adjacent attacker to cause a memory leak that may lead to a denial of service (DoS) condition. | 7.4 |
2018-10-05 | CVE-2018-0434 | Cisco | Improper Certificate Validation vulnerability in Cisco products A vulnerability in the Zero Touch Provisioning feature of the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive data by using an invalid certificate. | 7.4 |
2018-10-05 | CVE-2018-6979 | Vmware | Unspecified vulnerability in VMWare Airwatch Console The VMware Workspace ONE Unified Endpoint Management Console (A/W Console) 9.7.x prior to 9.7.0.3, 9.6.x prior to 9.6.0.7, 9.5.x prior to 9.5.0.16, 9.4.x prior to 9.4.0.22, 9.3.x prior to 9.3.0.25, 9.2.x prior to 9.2.3.27, and 9.1.x prior to 9.1.5.6 contains a SAML authentication bypass vulnerability which can be leveraged during device enrollment. | 7.4 |
2018-10-02 | CVE-2018-1509 | IBM | Improper Certificate Validation vulnerability in IBM Security Guardium 10.5 IBM Security Guardium EcoSystem 10.5 does not validate, or incorrectly validates, a certificate.This weakness might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. | 7.4 |
2018-10-05 | CVE-2018-15431 | Cisco | Out-of-bounds Write vulnerability in Cisco products A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. | 7.3 |
2018-10-05 | CVE-2018-0422 | Cisco | Incorrect Permission Assignment for Critical Resource vulnerability in Cisco products A vulnerability in the folder permissions of Cisco Webex Meetings client for Windows could allow an authenticated, local attacker to modify locally stored files and execute code on a targeted device with the privilege level of the user. | 7.3 |
2018-10-02 | CVE-2018-3962 | Foxitsoftware | Use After Free vulnerability in Foxitsoftware Phantompdf A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. | 7.3 |
2018-10-05 | CVE-2018-15430 | Cisco | Improper Input Validation vulnerability in Cisco Telepresence Video Communication Server X7.2.4/X8.10.4/X8.9.2 A vulnerability in the administrative web interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to execute code with user-level privileges on the underlying operating system. | 7.2 |
2018-10-05 | CVE-2018-0440 | Cisco | Improper Input Validation vulnerability in Cisco Data Center Network Manager A vulnerability in the web interface of Cisco Data Center Network Manager could allow an authenticated application administrator to execute commands on the underlying operating system with root-level privileges. | 7.2 |
2018-10-01 | CVE-2018-17867 | Dasannetworks | OS Command Injection vulnerability in Dasannetworks H660Gw Firmware The Port Forwarding functionality on DASAN H660GW devices allows remote attackers to execute arbitrary code via shell metacharacters in the cgi-bin/adv_nat_virsvr.asp Addr parameter (aka the Local IP Address field). | 7.2 |
2018-10-01 | CVE-2018-17827 | Hisiphp | Code Injection vulnerability in Hisiphp 1.0.8 HisiPHP 1.0.8 allows remote attackers to execute arbitrary PHP code by editing a plugin's name to contain that code. | 7.2 |
2018-10-07 | CVE-2018-18021 | Linux Debian Canonical | Improper Input Validation vulnerability in multiple products arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. | 7.1 |
2018-10-02 | CVE-2018-6261 | Nvidia | Incorrect Permission Assignment for Critical Resource vulnerability in Nvidia Geforce Experience NVIDIA GeForce Experience prior to 3.15 contains a vulnerability when GameStream is enabled which sets incorrect permissions on a file, which may to code execution, denial of service, or escalation of privileges by users with system access. | 7.0 |
160 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2018-10-05 | CVE-2018-15428 | Cisco | Improper Input Validation vulnerability in Cisco IOS XR A vulnerability in the implementation of Border Gateway Protocol (BGP) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. | 6.8 |
2018-10-05 | CVE-2018-15399 | Cisco | Allocation of Resources Without Limits or Throttling vulnerability in Cisco products A vulnerability in the TCP syslog module of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to exhaust the 1550-byte buffers on an affected device, resulting in a denial of service (DoS) condition. | 6.8 |
2018-10-05 | CVE-2018-15397 | Cisco | Unspecified vulnerability in Cisco products A vulnerability in the implementation of Traffic Flow Confidentiality (TFC) over IPsec functionality in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. | 6.8 |
2018-10-05 | CVE-2018-15396 | Cisco | Resource Exhaustion vulnerability in Cisco Unity Connection 12.5 A vulnerability in the Bulk Administration Tool (BAT) for Cisco Unity Connection could allow an authenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. | 6.8 |
2018-10-05 | CVE-2018-15390 | Cisco | Improper Locking vulnerability in Cisco Firepower Threat Defense A vulnerability in the FTP inspection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. | 6.8 |
2018-10-05 | CVE-2018-15370 | Cisco | Unspecified vulnerability in Cisco IOS ROM Monitor 15.1(2)Sy3 A vulnerability in Cisco IOS ROM Monitor (ROMMON) Software for Cisco Catalyst 6800 Series Switches could allow an unauthenticated, local attacker to bypass Cisco Secure Boot validation checks and load a compromised software image on an affected device. | 6.8 |
2018-10-05 | CVE-2018-15369 | Cisco | Improper Input Validation vulnerability in Cisco IOS and IOS XE A vulnerability in the TACACS+ client subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. | 6.8 |
2018-10-05 | CVE-2018-0469 | Cisco | Double Free vulnerability in Cisco IOS XE 16.5.1 A vulnerability in the web user interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. | 6.8 |
2018-10-05 | CVE-2018-15376 | Cisco | Write-what-where Condition vulnerability in Cisco IOS 15.5(2.21)T/15.6(3)M A vulnerability in the embedded test subsystem of Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers could allow an authenticated, local attacker to write arbitrary values to arbitrary locations in the memory space of an affected device. | 6.7 |
2018-10-05 | CVE-2018-15375 | Cisco | Write-what-where Condition vulnerability in Cisco IOS 15.5(2.21)T/15.6(3)M A vulnerability in the embedded test subsystem of Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers could allow an authenticated, local attacker to write arbitrary values to arbitrary locations in the memory space of an affected device. | 6.7 |
2018-10-05 | CVE-2018-15374 | Cisco | Improper Verification of Cryptographic Signature vulnerability in Cisco IOS XE 16.6.1 A vulnerability in the Image Verification feature of Cisco IOS XE Software could allow an authenticated, local attacker to install a malicious software image or file on an affected device. | 6.7 |
2018-10-05 | CVE-2018-15371 | Cisco | Improper Authentication vulnerability in Cisco IOS XE 16.3(1) A vulnerability in the shell access request mechanism of Cisco IOS XE Software could allow an authenticated, local attacker to bypass authentication and gain unrestricted access to the root shell of an affected device. | 6.7 |
2018-10-05 | CVE-2018-15368 | Cisco | OS Command Injection vulnerability in Cisco IOS XE 15.4(3)S A vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to gain access to the underlying Linux shell of an affected device and execute arbitrary commands with root privileges on the device. | 6.7 |
2018-10-05 | CVE-2018-0481 | Cisco | OS Command Injection vulnerability in Cisco IOS XE 15.3(3)S3.16/16.7.1/16.7(1) A vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to execute commands on the underlying Linux shell of an affected device with root privileges. | 6.7 |
2018-10-05 | CVE-2018-0477 | Cisco | OS Command Injection vulnerability in Cisco IOS XE 15.3(3)S3.16/16.7.1/16.7(1) A vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to execute commands on the underlying Linux shell of an affected device with root privileges. | 6.7 |
2018-10-07 | CVE-2018-18025 | Imagemagick Debian | Out-of-bounds Read vulnerability in multiple products In ImageMagick 7.0.8-13 Q16, there is a heap-based buffer over-read in the EncodeImage function of coders/pict.c, which allows attackers to cause a denial of service via a crafted SVG image file. | 6.5 |
2018-10-07 | CVE-2018-18024 | Imagemagick | Infinite Loop vulnerability in Imagemagick 7.0.813 In ImageMagick 7.0.8-13 Q16, there is an infinite loop in the ReadBMPImage function of the coders/bmp.c file. | 6.5 |
2018-10-07 | CVE-2018-18023 | Imagemagick | Out-of-bounds Read vulnerability in Imagemagick 7.0.813 In ImageMagick 7.0.8-13 Q16, there is a heap-based buffer over-read in the SVGStripString function of coders/svg.c, which allows attackers to cause a denial of service via a crafted SVG image file. | 6.5 |
2018-10-05 | CVE-2018-18016 | Imagemagick | Missing Release of Resource after Effective Lifetime vulnerability in Imagemagick 7.0.728 ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePCXImage in coders/pcx.c. | 6.5 |
2018-10-05 | CVE-2018-15405 | Cisco | Incorrect Authorization vulnerability in Cisco UCS Director 2.1(0.0)/6.6(1.0) A vulnerability in the web interface for specific feature sets of Cisco Integrated Management Controller (IMC) Supervisor and Cisco UCS Director could allow an authenticated, remote attacker to access sensitive information. | 6.5 |
2018-10-05 | CVE-2018-15404 | Cisco | Allocation of Resources Without Limits or Throttling vulnerability in Cisco products A vulnerability in the web interface of Cisco Integrated Management Controller (IMC) Supervisor and Cisco UCS Director could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected system. | 6.5 |
2018-10-05 | CVE-2018-15401 | Cisco | Cross-Site Request Forgery (CSRF) vulnerability in Cisco Hosted Collaboration Mediation Fulfillment 11.5(2)/11.5(3)/12.5(1) A vulnerability in the web-based management interface of Cisco Hosted Collaboration Mediation Fulfillment could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. | 6.5 |
2018-10-05 | CVE-2018-0466 | Cisco | Unspecified vulnerability in Cisco IOS and IOS XE A vulnerability in the Open Shortest Path First version 3 (OSPFv3) implementation in Cisco IOS and IOS XE Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload. | 6.5 |
2018-10-05 | CVE-2018-0460 | Cisco | Incorrect Authorization vulnerability in Cisco Network Functions Virtualization Infrastructure A vulnerability in the REST API of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to read any file on an affected system. | 6.5 |
2018-10-05 | CVE-2018-0459 | Cisco | Incorrect Authorization vulnerability in Cisco Network Functions Virtualization Infrastructure A vulnerability in the web-based management interface of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to cause an affected system to reboot or shut down. | 6.5 |
2018-10-05 | CVE-2018-0197 | Cisco | Improper Input Validation vulnerability in Cisco IOS and IOS XE A vulnerability in the VLAN Trunking Protocol (VTP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to corrupt the internal VTP database on an affected device and cause a denial of service (DoS) condition. | 6.5 |
2018-10-05 | CVE-2018-1649 | IBM | Path Traversal vulnerability in IBM Qradar Incident Forensics IBM QRadar Incident Forensics 7.2 and 7.3 could allow a remote attacker to traverse directories on the system. | 6.5 |
2018-10-04 | CVE-2018-0505 | Mediawiki Debian | Improper Authentication vulnerability in multiple products Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth's account lock | 6.5 |
2018-10-04 | CVE-2018-0504 | Mediawiki Debian | Information Exposure Through Log Files vulnerability in multiple products Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains an information disclosure flaw in the Special:Redirect/logid | 6.5 |
2018-10-04 | CVE-2018-17871 | Verint | Insufficiently Protected Credentials vulnerability in Verint Verba Collaboration Compliance and Quality Management Platform Verba Collaboration Compliance and Quality Management Platform before 9.2.1.5545 has Incorrect Access Control. | 6.5 |
2018-10-03 | CVE-2018-17967 | Imagemagick | Missing Release of Resource after Effective Lifetime vulnerability in Imagemagick 7.0.728 ImageMagick 7.0.7-28 has a memory leak vulnerability in ReadBGRImage in coders/bgr.c. | 6.5 |
2018-10-03 | CVE-2018-17966 | Imagemagick | Missing Release of Resource after Effective Lifetime vulnerability in Imagemagick 7.0.728 ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePDBImage in coders/pdb.c. | 6.5 |
2018-10-03 | CVE-2018-17965 | Imagemagick | Missing Release of Resource after Effective Lifetime vulnerability in Imagemagick 7.0.728 ImageMagick 7.0.7-28 has a memory leak vulnerability in WriteSGIImage in coders/sgi.c. | 6.5 |
2018-10-03 | CVE-2018-16051 | Gitlab | Information Exposure vulnerability in Gitlab An issue was discovered in GitLab Community and Enterprise Edition before 11.0.6, 11.1.x before 11.1.5, and 11.2.x before 11.2.2. | 6.5 |
2018-10-03 | CVE-2018-16048 | Gitlab | Missing Authorization vulnerability in Gitlab An issue was discovered in GitLab Community and Enterprise Edition before 11.0.6, 11.1.x before 11.1.5, and 11.2.x before 11.2.2. | 6.5 |
2018-10-02 | CVE-2018-9510 | Out-of-bounds Read vulnerability in Google Android In smp_proc_enc_info of smp_act.cc, there is a possible out of bounds read due to a missing bounds check. | 6.5 | |
2018-10-02 | CVE-2018-9509 | Out-of-bounds Read vulnerability in Google Android In smp_proc_master_id of smp_act.cc, there is a possible out of bounds read due to a missing bounds check. | 6.5 | |
2018-10-02 | CVE-2018-9508 | Out-of-bounds Read vulnerability in Google Android In smp_process_keypress_notification of smp_act.cc, there is a possible out of bounds read due to an incorrect bounds check. | 6.5 | |
2018-10-02 | CVE-2018-9507 | Out-of-bounds Read vulnerability in Google Android In bta_av_proc_meta_cmd of bta_av_act.cc, there is a possible out of bounds read due to an incorrect bounds check. | 6.5 | |
2018-10-02 | CVE-2018-9506 | Out-of-bounds Read vulnerability in Google Android In avrc_msg_cback of avrc_api.cc, there is a possible out-of-bound read due to a missing bounds check. | 6.5 | |
2018-10-02 | CVE-2018-9505 | Out-of-bounds Read vulnerability in Google Android In mca_ccb_hdl_req of mca_cact.cc, there is a possible out of bounds read due to a missing bounds check. | 6.5 | |
2018-10-02 | CVE-2018-9502 | Out-of-bounds Read vulnerability in Google Android In rfc_process_mx_message of rfc_ts_frames.cc, there is a possible out-of-bounds read due to a missing bounds check. | 6.5 | |
2018-10-02 | CVE-2018-11750 | Puppet | Improper Input Validation vulnerability in Puppet Cisco IOS Module Previous releases of the Puppet cisco_ios module did not validate a host's identity before starting a SSH connection. | 6.5 |
2018-10-01 | CVE-2018-15701 | TP Link | Improper Input Validation vulnerability in Tp-Link Tl-Wrn841N Firmware 0.9.14.16V0348.0 The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to a denial of service when an unauthenticated LAN user sends a crafted HTTP header containing an unexpected Cookie field. | 6.5 |
2018-10-01 | CVE-2018-15700 | TP Link | Improper Input Validation vulnerability in Tp-Link Tl-Wrn841N Firmware 0.9.14.16V0348.0 The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to a denial of service when an unauthenticated LAN user sends a crafted HTTP header containing an unexpected Referer field. | 6.5 |
2018-10-01 | CVE-2018-14808 | Emerson | Improper Privilege Management vulnerability in Emerson AMS Device Manager Emerson AMS Device Manager v12.0 to v13.5. | 6.5 |
2018-10-01 | CVE-2018-1420 | IBM | Incorrect Permission Assignment for Critical Resource vulnerability in IBM Websphere Portal IBM WebSphere Portal 7.0, 8.0, 8.5, and 9.0 resets access control settings to the out of the box configuration during Combined Cumulative Fix (CF) installation. | 6.5 |
2018-10-01 | CVE-2018-17854 | Simdcomp Project | Out-of-bounds Read vulnerability in Simdcomp Project Simdcomp SIMDComp before 0.1.1 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) because it can read (and then discard) extra bytes. | 6.5 |
2018-10-01 | CVE-2018-17427 | Simdcomp Project | Out-of-bounds Read vulnerability in Simdcomp Project Simdcomp 0.0.1/0.0.2/0.0.3 SIMDComp before 0.1.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) because it can read (and then discard) extra bytes. | 6.5 |
2018-10-01 | CVE-2018-17216 | PTC | Information Exposure vulnerability in PTC Thingworx Platform An issue was discovered in PTC ThingWorx Platform 6.5 through 8.2. | 6.5 |
2018-10-01 | CVE-2018-1672 | IBM | Improper Authentication vulnerability in IBM Websphere Portal IBM WebSphere Portal 7.0, 8.0, 8.5, and 9.0 may fail to set the correct user context in certain impersonation scenarios, which can allow a user to act with the identity of a different user. | 6.3 |
2018-10-07 | CVE-2015-9273 | WP Slimstat | Cross-site Scripting vulnerability in Wp-Slimstat Slimstat Analytics The wp-slimstat (aka Slimstat Analytics) plugin before 4.1.6.1 for WordPress has XSS via an HTTP Referer header, or via a field associated with JavaScript-based Referer tracking. | 6.1 |
2018-10-05 | CVE-2018-15436 | Cisco | Cross-site Scripting vulnerability in Cisco products A vulnerability in the web-based management interface of Cisco Webex Events Center, Cisco Webex Meeting Center, Cisco Webex Support Center, and Cisco Webex Training Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected service. | 6.1 |
2018-10-05 | CVE-2018-15434 | Cisco | Cross-site Scripting vulnerability in Cisco Skinny Client Control Protocol Software 9.4(2) A vulnerability in the web-based management interface of Cisco Unified IP Phone 7900 Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. | 6.1 |
2018-10-05 | CVE-2018-15406 | Cisco | Cross-site Scripting vulnerability in Cisco UCS Director 6.6 A vulnerability in the web-based management interface of Cisco UCS Director could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. | 6.1 |
2018-10-05 | CVE-2018-15400 | Cisco | Cross-site Scripting vulnerability in Cisco Cloud Services Platform 2100 Firmware 2.3(0) A vulnerability in the web-based management interface of Cisco Cloud Services Platform 2100 could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. | 6.1 |
2018-10-05 | CVE-2018-0480 | Cisco | Race Condition vulnerability in Cisco IOS XE 3.6(5) A vulnerability in the errdisable per VLAN feature of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause the device to crash, leading to a denial of service (DoS) condition. | 6.1 |
2018-10-05 | CVE-2018-0465 | Cisco | Cross-site Scripting vulnerability in Cisco products A vulnerability in the web-based management interface of Cisco Small Business 300 Series Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected system. | 6.1 |
2018-10-05 | CVE-2018-0458 | Cisco | Cross-site Scripting vulnerability in Cisco Prime Collaboration Assurance 11.6.0 A vulnerability in the web-based management interface of Cisco Prime Collaboration Assurance could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. | 6.1 |
2018-10-05 | CVE-2018-0452 | Cisco | Cross-site Scripting vulnerability in Cisco Tetration Analytics 2.1 A vulnerability in the web-based management interface of Cisco Tetration Analytics could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. | 6.1 |
2018-10-05 | CVE-2018-0450 | Cisco | Cross-site Scripting vulnerability in Cisco Data Center Network Manager 10.4(2) A vulnerability in the web-based management interface of Cisco Data Center Network Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the management interface on an affected device. | 6.1 |
2018-10-05 | CVE-2018-0444 | Cisco | Cross-site Scripting vulnerability in Cisco Packaged Contact Center Enterprise 11.6(1) A vulnerability in the web-based management interface of Cisco Packaged Contact Center Enterprise could allow an unauthenticated, remote attacker to conduct a stored XSS attack against a user of the interface. | 6.1 |
2018-10-05 | CVE-2018-1795 | IBM | Cross-site Scripting vulnerability in IBM Robotic Process Automation With Automation Anywhere 10.0 IBM Robotic Process Automation with Automation Anywhere Enterprise 10 is vulnerable to cross-site scripting. | 6.1 |
2018-10-04 | CVE-2018-16456 | Phpscriptsmall | Cross-site Scripting vulnerability in PHPscriptsmall Website Seller Script 2.0.5 PHP Scripts Mall Website Seller Script 2.0.5 has XSS via a keyword. | 6.1 |
2018-10-04 | CVE-2018-16455 | Marketplace Script Project | Cross-site Scripting vulnerability in Marketplace Script Project Marketplace Script 1.0.1 PHP Scripts Mall Market Place Script 1.0.1 allows XSS via a keyword. | 6.1 |
2018-10-04 | CVE-2018-16453 | Domain Lookup Script Project | Cross-site Scripting vulnerability in Domain Lookup Script Project Domain Lookup Script 3.0.5 PHP Scripts Mall Domain Lookup Script 3.0.5 allows XSS in the search bar. | 6.1 |
2018-10-04 | CVE-2018-16326 | Phpscriptsmall | Cross-site Scripting vulnerability in PHPscriptsmall OLX Clone 3.42 PHP Scripts Mall Olx Clone 3.4.2 has XSS. | 6.1 |
2018-10-04 | CVE-2018-17876 | WEB Feet | Cross-site Scripting vulnerability in Web-Feet Coaster CMS 5.5.0 A Stored XSS vulnerability has been discovered in the v5.5.0 version of the Coaster CMS product. | 6.1 |
2018-10-03 | CVE-2018-17054 | Progress | Cross-site Scripting vulnerability in Progress Sitefinity CMS Cross-site scripting (XSS) vulnerability in Identity Server in Progress Sitefinity CMS versions 10.0 through 11.0 allows remote attackers to inject arbitrary web script or HTML via vectors related to login request parameters, a different vulnerability than CVE-2018-17053. | 6.1 |
2018-10-03 | CVE-2018-17053 | Progress | Cross-site Scripting vulnerability in Progress Sitefinity CMS Cross-site scripting (XSS) vulnerability in Identity Server in Progress Sitefinity CMS versions 10.0 through 11.0 allows remote attackers to inject arbitrary web script or HTML via vectors related to login request parameters, a different vulnerability than CVE-2018-17054. | 6.1 |
2018-10-03 | CVE-2018-16050 | Gitlab | Cross-site Scripting vulnerability in Gitlab An issue was discovered in GitLab Community and Enterprise Edition 11.1.x before 11.1.5 and 11.2.x before 11.2.2. | 6.1 |
2018-10-03 | CVE-2018-1794 | IBM | Cross-site Scripting vulnerability in IBM Websphere Application Server IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 using OAuth ear is vulnerable to cross-site scripting. | 6.1 |
2018-10-03 | CVE-2018-1793 | IBM | Cross-site Scripting vulnerability in IBM Websphere Application Server IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 using SAML ear is vulnerable to cross-site scripting. | 6.1 |
2018-10-03 | CVE-2018-17947 | Atmist | Cross-site Scripting vulnerability in Atmist Snazzy Maps The Snazzy Maps plugin before 1.1.5 for WordPress has XSS via the text or tab parameter. | 6.1 |
2018-10-03 | CVE-2018-17946 | Tribulant | Cross-site Scripting vulnerability in Tribulant Slideshow Gallery The Tribulant Slideshow Gallery plugin before 1.6.6.1 for WordPress has XSS via the id, method, Gallerymessage, Galleryerror, or Galleryupdated parameter. | 6.1 |
2018-10-02 | CVE-2018-17884 | Gwolle Guestbook Project | Cross-site Scripting vulnerability in Gwolle Guestbook Project Gwolle Guestbook XSS exists in admin/gb-dashboard-widget.php in the Gwolle Guestbook (gwolle-gb) plugin before 2.5.4 for WordPress via the PATH_INFO to wp-admin/index.php | 6.1 |
2018-10-02 | CVE-2018-17596 | Zohocorp | Cross-site Scripting vulnerability in Zohocorp Manageengine Assetexplorer 6.2.0 In Zoho ManageEngine AssetExplorer, a Stored XSS vulnerability was discovered in the 6.2.0 version via the /AssetDef.do ciName or assetName parameter. | 6.1 |
2018-10-02 | CVE-2018-17595 | Fork CMS | Cross-site Scripting vulnerability in Fork-Cms Fork CMS 5.4.0 In the 5.4.0 version of the Fork CMS software, HTML Injection and Stored XSS vulnerabilities were discovered via the /backend/ajax URI. | 6.1 |
2018-10-02 | CVE-2018-17594 | Airties | Cross-site Scripting vulnerability in Airties AIR 5443V2 Firmware 1.0.0.18 AirTies Air 5443v2 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter. | 6.1 |
2018-10-02 | CVE-2018-17593 | Airties | Cross-site Scripting vulnerability in Airties AIR 5453 Firmware 1.0.0.18 AirTies Air 5453 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter. | 6.1 |
2018-10-02 | CVE-2018-17591 | Airties | Cross-site Scripting vulnerability in Airties AIR 5343V2 Firmware 1.0.0.18 AirTies Air 5343v2 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter. | 6.1 |
2018-10-02 | CVE-2018-17590 | Airties | Cross-site Scripting vulnerability in Airties AIR 5442 Firmware 1.0.0.18 AirTies Air 5442 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter. | 6.1 |
2018-10-02 | CVE-2018-17589 | Airties | Cross-site Scripting vulnerability in Airties AIR 5650 Firmware 1.0.0.18 AirTies Air 5650 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter. | 6.1 |
2018-10-02 | CVE-2018-17588 | Airties | Cross-site Scripting vulnerability in Airties AIR 5021 Firmware 1.0.0.18 AirTies Air 5021 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter. | 6.1 |
2018-10-02 | CVE-2018-17587 | Airties | Cross-site Scripting vulnerability in Airties AIR 5750 Firmware 1.0.0.18 AirTies Air 5750 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter. | 6.1 |
2018-10-02 | CVE-2018-15563 | Intelliants | Cross-site Scripting vulnerability in Intelliants Subrion 4.2.1 _core/admin/pages/add/ in Subrion CMS 4.2.1 has XSS via the titles[en] parameter. | 6.1 |
2018-10-01 | CVE-2018-17874 | Expressionengine | Cross-site Scripting vulnerability in Expressionengine ExpressionEngine before 4.3.5 has reflected XSS. | 6.1 |
2018-10-01 | CVE-2018-17870 | Btiteam | Open Redirect vulnerability in Btiteam Xbtit 2.54 An issue was discovered in BTITeam XBTIT 2.5.4. | 6.1 |
2018-10-01 | CVE-2015-9270 | Theholidaycalendar | Cross-site Scripting vulnerability in Theholidaycalendar Holiday Calendar XSS exists in the the-holiday-calendar plugin before 1.11.3 for WordPress via the thc-month parameter. | 6.1 |
2018-10-01 | CVE-2018-17832 | Wuzhicms | Cross-site Scripting vulnerability in Wuzhicms Wuzhi CMS 2.0 XSS exists in WUZHI CMS 2.0 via the index.php v or f parameter. | 6.1 |
2018-10-05 | CVE-2018-13042 | 1Password | Improper Input Validation vulnerability in 1Password 6.8 The 1Password application 6.8 for Android is affected by a Denial Of Service vulnerability. | 5.9 |
2018-10-05 | CVE-2018-0476 | Cisco | Unspecified vulnerability in Cisco IOS XE 15.5(3)S5.1/15.5(3)S6.1/16.6.2 A vulnerability in the Network Address Translation (NAT) Session Initiation Protocol (SIP) Application Layer Gateway (ALG) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. | 5.9 |
2018-10-03 | CVE-2018-6695 | Mcafee | Unspecified vulnerability in Mcafee Threat Intelligence Exchange Server SSH host keys generation vulnerability in the server in McAfee Threat Intelligence Exchange Server (TIE Server) 1.3.0, 2.0.x, 2.1.x, 2.2.0 allows man-in-the-middle attackers to spoof servers via acquiring keys from another environment. | 5.9 |
2018-10-02 | CVE-2018-9069 | HP Lenovo | Race Condition vulnerability in multiple products In some Lenovo IdeaPad consumer notebook models, a race condition in the BIOS flash device locking mechanism is not adequately protected against, potentially allowing an attacker with administrator access to alter the contents of BIOS. | 5.9 |
2018-10-05 | CVE-2018-0414 | Cisco | XXE vulnerability in Cisco Secure Access Control Server Solution Engine A vulnerability in the web-based UI of Cisco Secure Access Control Server could allow an authenticated, remote attacker to gain read access to certain information in an affected system. | 5.7 |
2018-10-05 | CVE-2018-11797 | Apache Fedoraproject Oracle | In Apache PDFBox 1.8.0 to 1.8.15 and 2.0.0RC1 to 2.0.11, a carefully crafted PDF file can trigger an extremely long running computation when parsing the page tree. | 5.5 |
2018-10-05 | CVE-2018-15407 | Cisco | Incomplete Cleanup vulnerability in Cisco Hyperflex HX Data Platform 3.0(1A) A vulnerability in the installation process of Cisco HyperFlex Software could allow an authenticated, local attacker to read sensitive information. | 5.5 |
2018-10-05 | CVE-2018-0457 | Cisco | Unspecified vulnerability in Cisco Webex Meetings Online T31/T32 A vulnerability in the Cisco Webex Player for Webex Recording Format (WRF) files could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. | 5.5 |
2018-10-05 | CVE-2018-1783 | IBM | Unspecified vulnerability in IBM Spectrum Scale IBM GPFS (IBM Spectrum Scale 4.1.1.0, 4.1.1.20, 4.2.0.0, 4.2.3.10, 5.0.0 and 5.0.1.2) command line utility allows an unprivileged, authenticated user with access to a GPFS node to forcefully terminate GPFS and deny access to data available through GPFS. | 5.5 |
2018-10-05 | CVE-2018-1723 | IBM | Information Exposure vulnerability in IBM Spectrum Scale IBM Spectrum Scale 4.1.1.0, 4.1.1.20, 4.2.0.0, 4.2.3.10, 5.0.0 and 5.0.1.2 could allow an unprivileged, authenticated user with access to a GPFS node to read arbitrary files available on this node. | 5.5 |
2018-10-04 | CVE-2018-17985 | GNU | Resource Exhaustion vulnerability in GNU Binutils 2.31 An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. | 5.5 |
2018-10-03 | CVE-2018-17974 | Broadcom | Out-of-bounds Read vulnerability in Broadcom Tcpreplay 4.3.0 An issue was discovered in Tcpreplay 4.3.0 beta1. | 5.5 |
2018-10-03 | CVE-2018-17972 | Linux Canonical Redhat Debian | Race Condition vulnerability in multiple products An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. | 5.5 |
2018-10-02 | CVE-2018-9511 | Missing Initialization of Resource vulnerability in Google Android 9.0 In ipSecSetEncapSocketOwner of XfrmController.cpp, there is a possible failure to initialize a security feature due to uninitialized data. | 5.5 | |
2018-10-02 | CVE-2018-9499 | Use of Uninitialized Resource vulnerability in Google Android In readVector of iCrypto.cpp, there is a possible invalid read due to uninitialized data. | 5.5 | |
2018-10-02 | CVE-2018-9493 | SQL Injection vulnerability in Google Android In the content provider of the download manager, there is a possible SQL injection due to improper input validation. | 5.5 | |
2018-10-02 | CVE-2018-9452 | Improper Input Validation vulnerability in Google Android In getOffsetForHorizontal of Layout.java, there is a possible application hang due to a slow width calculation. | 5.5 | |
2018-10-02 | CVE-2018-11752 | Puppet | Insufficiently Protected Credentials vulnerability in Puppet Cisco IOS 0.1.0/0.2.0/0.3.0 Previous releases of the Puppet cisco_ios module output SSH session debug information including login credentials to a world readable file on every run. | 5.5 |
2018-10-01 | CVE-2018-17828 | Zziplib Project | Path Traversal vulnerability in Zziplib Project Zziplib 0.13.69 Directory traversal vulnerability in ZZIPlib 0.13.69 allows attackers to overwrite arbitrary files via a .. | 5.5 |
2018-10-01 | CVE-2015-9267 | Nullsoft Debian | Improper Privilege Management vulnerability in multiple products Nullsoft Scriptable Install System (NSIS) before 2.49 uses temporary folder locations that allow unprivileged local users to overwrite files. | 5.5 |
2018-10-05 | CVE-2018-15403 | Cisco | Open Redirect vulnerability in Cisco products A vulnerability in the web interface of Cisco Emergency Responder, Cisco Unified Communications Manager, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an authenticated, remote attacker to redirect a user to a malicious web page. | 5.4 |
2018-10-05 | CVE-2018-1812 | IBM | Cross-site Scripting vulnerability in IBM Robotic Process Automation With Automation Anywhere 10.0 IBM Robotic Process Automation with Automation Anywhere Enterprise 10 is vulnerable to persistent cross-site scripting, caused by missing escaping of a database field. | 5.4 |
2018-10-05 | CVE-2018-1686 | IBM | Cross-site Scripting vulnerability in IBM Maximo Asset Management IBM Maximo Asset Management 7.6 through 7.6.3 is vulnerable to cross-site scripting. | 5.4 |
2018-10-04 | CVE-2018-17849 | Naviwebs | Cross-site Scripting vulnerability in Naviwebs Navigate CMS 2.8 Navigate CMS 2.8 has Stored XSS via a navigate_upload.php (aka File Upload) request with a multipart/form-data JavaScript payload. | 5.4 |
2018-10-04 | CVE-2018-1604 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-04 | CVE-2018-1603 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-04 | CVE-2018-1602 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-02 | CVE-2018-17886 | Jeesns | Cross-site Scripting vulnerability in Jeesns 1.3 An issue was discovered in JEESNS 1.3. | 5.4 |
2018-10-02 | CVE-2018-1692 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-02 | CVE-2018-1691 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-02 | CVE-2018-1605 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-02 | CVE-2018-1601 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-02 | CVE-2018-1558 | IBM | Cross-site Scripting vulnerability in IBM products IBM Rational Collaborative Lifecycle Management 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-02 | CVE-2018-1557 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-02 | CVE-2018-1522 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-02 | CVE-2018-1440 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-02 | CVE-2018-1439 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-02 | CVE-2018-1405 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-02 | CVE-2018-1404 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-02 | CVE-2018-1403 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-02 | CVE-2018-1395 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-02 | CVE-2017-1649 | IBM | Cross-site Scripting vulnerability in IBM Rational Quality Manager IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. | 5.4 |
2018-10-01 | CVE-2018-17830 | Redaxo | Cross-site Scripting vulnerability in Redaxo 5.6.2 The $args variable in addons/mediapool/pages/index.php in REDAXO 5.6.2 is not effectively filtered, because names are not restricted (only values are restricted). | 5.4 |
2018-10-01 | CVE-2018-17218 | PTC | Cross-site Scripting vulnerability in PTC Thingworx Platform An issue was discovered in PTC ThingWorx Platform 6.5 through 8.2. | 5.4 |
2018-10-05 | CVE-2018-15429 | Cisco | Missing Authorization vulnerability in Cisco Hyperflex HX Data Platform 2.6(1D)/3.0(1A) A vulnerability in the web-based UI of Cisco HyperFlex HX Data Platform Software could allow an unauthenticated, remote attacker to access sensitive information on an affected system. | 5.3 |
2018-10-05 | CVE-2018-0447 | Cisco | Improper Input Validation vulnerability in Cisco Email Security Appliance A vulnerability in the anti-spam protection mechanisms of Cisco AsyncOS Software for the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass certain content filters on an affected device. | 5.3 |
2018-10-04 | CVE-2018-16457 | Open Source Real Estate Script Project | Path Traversal vulnerability in Open Source Real-Estate Script Project Open Source Real-Estate Script 3.6.2 PHP Scripts Mall Open Source Real-estate Script 3.6.2 allows remote attackers to list the wp-content/themes/template_dp_dec2015/img directory. | 5.3 |
2018-10-04 | CVE-2018-13258 | Mediawiki | Information Exposure vulnerability in Mediawiki 1.31.0 Mediawiki 1.31 before 1.31.1 misses .htaccess files in the provided tarball used to protect some directories that shouldn't be web accessible. | 5.3 |
2018-10-04 | CVE-2017-5658 | Apache | Information Exposure vulnerability in Apache Pony Mail The statistics generator in Apache Pony Mail 0.7 to 0.9 was found to be returning timestamp data without proper authorization checks. | 5.3 |
2018-10-03 | CVE-2018-12087 | Opcfoundation | Improper Certificate Validation vulnerability in Opcfoundation Ua-.Net-Legacy and Ua-.Netstandard Failure to validate certificates in OPC Foundation UA Client Applications communicating without security allows attackers with control over a piece of network infrastructure to decrypt passwords. | 5.3 |
2018-10-03 | CVE-2018-17938 | Synacor | Insufficient Verification of Data Authenticity vulnerability in Synacor Zimbra Collaboration Suite Zimbra Collaboration before 8.8.10 GA allows text content spoofing via a loginErrorCode value. | 5.3 |
2018-10-02 | CVE-2018-1593 | IBM | Inadequate Encryption Strength vulnerability in IBM Multi-Cloud Data Encryption 2.1/2.1.0.1 IBM Multi-Cloud Data Encryption (MDE) 2.1 could allow an unauthorized user to manipulate data due to missing file checksums. | 5.3 |
2018-10-01 | CVE-2018-14798 | Fujielectric | Out-of-bounds Read vulnerability in Fujielectric Frenic Loader 3.3 Firmware 7.3.4.1A Fuji Electric FRENIC LOADER v3.3 v7.3.4.1a of FRENIC-Mini (C1), FRENIC-Mini (C2), FRENIC-Eco, FRENIC-Multi, FRENIC-MEGA, FRENIC-Ace. | 5.3 |
2018-10-01 | CVE-2018-14788 | Fujielectric | Classic Buffer Overflow vulnerability in Fujielectric Alpha5 Smart Loader Firmware 3.7 Fuji Electric Alpha5 Smart Loader Versions 3.7 and prior. | 5.3 |
2018-10-05 | CVE-2018-0462 | Cisco | Improper Input Validation vulnerability in Cisco Enterprise Network Virtualization Software Nfvis6.0/Nfvis8.0 A vulnerability in the user management functionality of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to perform a denial of service (DoS) attack against an affected system. | 4.9 |
2018-10-02 | CVE-2018-16984 | Djangoproject | Insufficiently Protected Credentials vulnerability in Djangoproject Django 2.1/2.1.1 An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. | 4.9 |
2018-10-05 | CVE-2018-15426 | Cisco | Cross-site Scripting vulnerability in Cisco Unity Connection Vmo11.5(1) A vulnerability in the web-based interface of Cisco Unity Connection could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based interface of the affected software. | 4.8 |
2018-10-01 | CVE-2018-17868 | Dasan | Cross-site Scripting vulnerability in Dasan H660Gw Firmware DASAN H660GW devices have Stored XSS in the Port Forwarding functionality. | 4.8 |
2018-10-01 | CVE-2018-17835 | GET Simple | Cross-site Scripting vulnerability in Get-Simple Getsimple CMS 3.3.15 An issue was discovered in GetSimple CMS 3.3.15. | 4.8 |
2018-10-05 | CVE-2018-15425 | Cisco | Deserialization of Untrusted Data vulnerability in Cisco Identity Services Engine A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device with the privileges of the web server. | 4.7 |
2018-10-05 | CVE-2018-15424 | Cisco | Unrestricted Upload of File with Dangerous Type vulnerability in Cisco Identity Services Engine 2.2(0.470) A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device with the privileges of the web server. | 4.7 |
2018-10-05 | CVE-2018-15423 | Cisco | Improper Restriction of Rendered UI Layers or Frames vulnerability in Cisco Hyperflex HX Data Platform 2.6(1D)/3.0(1A) A vulnerability in the web UI of Cisco HyperFlex Software could allow an unauthenticated, remote attacker to affect the integrity of a device via a clickjacking attack. | 4.7 |
2018-10-03 | CVE-2017-2751 | HP | Insufficiently Protected Credentials vulnerability in HP products A BIOS password extraction vulnerability has been reported on certain consumer notebooks with firmware F.22 and others. | 4.6 |
2018-10-05 | CVE-2018-15433 | Cisco | Information Exposure vulnerability in Cisco Prime Infrastructure 3.2 A vulnerability in the server backup function of Cisco Prime Infrastructure could allow an authenticated, remote attacker to view sensitive information. | 4.3 |
2018-10-05 | CVE-2018-15432 | Cisco | Information Exposure vulnerability in Cisco Prime Infrastructure 3.2 A vulnerability in the server backup function of Cisco Prime Infrastructure could allow an authenticated, remote attacker to view sensitive information. | 4.3 |
2018-10-05 | CVE-2018-15392 | Cisco | Unspecified vulnerability in Cisco Industrial Network Director A vulnerability in the DHCP service of Cisco Industrial Network Director could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. | 4.3 |
2018-10-04 | CVE-2018-0503 | Mediawiki Debian | Improper Privilege Management vulnerability in multiple products Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where contrary to the documentation, $wgRateLimits entry for 'user' overrides that for 'newbie'. | 4.3 |
2018-10-04 | CVE-2018-1670 | IBM | Information Exposure vulnerability in IBM Financial Transaction Manager 3.0.2.0/3.0.2.1 IBM Financial Transaction Manager for ACH Services for Multi-Platform 3.0.2 could allow an authenticated user to obtain sensitive product configuration information from log files. | 4.3 |
2018-10-04 | CVE-2018-11784 | Apache Debian Canonical Netapp Redhat Oracle | Open Redirect vulnerability in multiple products When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. | 4.3 |
2018-10-05 | CVE-2018-15398 | Cisco | Unspecified vulnerability in Cisco products A vulnerability in the per-user-override feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass an access control list (ACL) that is configured for an interface of an affected device. | 4.0 |
3 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2018-10-04 | CVE-2018-17891 | Carestream | Information Exposure vulnerability in Carestream VUE RIS 11.2 Carestream Vue RIS, RIS Client Builds: Version 11.2 and prior running on a Windows 8.1 machine with IIS/7.5. | 3.7 |
2018-10-06 | CVE-2018-18020 | Qpdf Project | Uncontrolled Recursion vulnerability in Qpdf Project Qpdf 8.2.1 In QPDF 8.2.1, in libqpdf/QPDFWriter.cc, QPDFWriter::unparseObject and QPDFWriter::unparseChild have recursive calls for a long time, which allows remote attackers to cause a denial of service via a crafted PDF file. | 3.3 |
2018-10-02 | CVE-2018-6262 | Nvidia | Information Exposure vulnerability in Nvidia Geforce Experience NVIDIA GeForce Experience prior to 3.15 contains a vulnerability when GameStream is enabled where limited sensitive user information may be available to users with system access, which may lead to information disclosure. | 2.5 |