index_ label1 index_ label1
Providing services for federal, state and local government ...
index_ label2 index_ label2
Our commercial entity operations, providing enterprise services ...
index_ label3 index_ label3
How do we prepare for what's to come next? See inside ...
I.T. News
We are constantly interested in the latest and up-to-date technology.
As we move forward with the software development we will continue to use new technologies to improve our products and the customer experience. And we will continue to develop our solutions with both new functionality and increasing integration with the latest major platforms.

As the growing market shares and interests in the I.T. virtualization, we tailored the unique virtualization solution vFleXtor using proven, modern up-to-date technology.

Timely information about security topics and threats:

US-CERT: The United States Computer Emergency Readiness Team
  • Original release date: January 19, 2018

    Lenovo has released security updates to address a vulnerability affecting Enterprise Network Operating System (ENOS) firmware. An attacker could exploit this vulnerability to obtain sensitive information.

    NCCIC/US-CERT encourages users and administrators to review Lenovo's Security Advisory and the Canadian Cyber Incident Response Centre (CCIRC)'s Lenovo Security Advisory for more information and apply the necessary updates or mitigations.


    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: January 18, 2018

    The United Kingdom's National Cyber Security Centre (NCSC) has released a report updating its guidance on Turla Neuron malware, which provides a platform to steal sensitive data. NCSC provides enhanced cybersecurity services to protect against cybersecurity threats.

    NCCIC/US-CERT encourages users and administrators to review the NCSC advisory to access the report and for more information.


    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: January 17, 2018 | Last revised: January 18, 2018

    Cisco has released security updates to address vulnerabilities affecting multiple products. An attacker could exploit one of these vulnerabilities to take control of an affected system.

    NCCIC/US-CERT encourages users and administrators to review the following Cisco Security Advisories and apply the necessary updates:


    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: January 16, 2018

    The Internet Systems Consortium (ISC) has released updates or workarounds that address vulnerabilities in versions of ISC Dynamic Host Configuration Protocol (DHCP) and Berkeley Internet Name Domain (BIND). A remote attacker could exploit these vulnerabilities to cause a denial-of-service condition.

    NCCIC/US-CERT encourages users and administrators to review ISC Knowledge Base Articles AA-01541 and AA-01542 and apply the necessary updates or workarounds.


    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: January 16, 2018

    Oracle has released its Critical Patch Update for January 2018 to address 237 vulnerabilities across multiple products. A remote attacker could exploit some of these vulnerabilities to obtain access to sensitive information.

    NCCIC/US-CERT encourages users and administrators to review the Oracle January 2018 Critical Patch Update and apply the necessary updates.


    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: January 15, 2018

    The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.

    The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

    • High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0

    • Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9

    • Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9

    Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

     

    High Vulnerabilities

    Primary
    Vendor -- Product
    DescriptionPublishedCVSS ScoreSource & Patch Info
    advantech -- webaccessA SQL Injection issue was discovered in WebAccess versions prior to 8.3. WebAccess does not properly sanitize its inputs for SQL commands.2018-01-057.5CVE-2017-16716
    BID
    MISC
    advantech -- webaccessA Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple instances of a vulnerability that allows too much data to be written to a location on the stack.2018-01-057.5CVE-2017-16724
    BID
    MISC
    Back to top

     

    Medium Vulnerabilities

    Primary
    Vendor -- Product
    DescriptionPublishedCVSS ScoreSource & Patch Info
    advantech -- webaccessA Path Traversal issue was discovered in WebAccess versions prior to 8.3. An attacker has access to files within the directory structure of the target device.2018-01-055.0CVE-2017-16720
    BID
    MISC
    advantech -- webaccessAn Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple vulnerabilities that may allow an attacker to cause the program to use an invalid memory address, resulting in a program crash.2018-01-055.0CVE-2017-16728
    BID
    MISC
    advantech -- webaccessAn Improper Input Validation issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows some inputs that may cause the program to crash.2018-01-055.0CVE-2017-16753
    BID
    MISC
    Back to top

     

    Low Vulnerabilities

    Primary
    Vendor -- Product
    DescriptionPublishedCVSS ScoreSource & Patch Info
    There were no low vulnerabilities recorded this week.
    Back to top

     

    Severity Not Yet Assigned

    Primary
    Vendor -- Product
    DescriptionPublishedCVSS ScoreSource & Patch Info
    adobe -- flash
     
    An Out-of-bounds Read issue was discovered in Adobe Flash Player before 28.0.0.137. This vulnerability occurs because of computation that reads data that is past the end of the target buffer. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.2018-01-09not yet calculatedCVE-2018-4871
    BID
    SECTRACK
    REDHAT
    CONFIRM
    advantech -- webaccess
     
    An Unrestricted Upload Of File With Dangerous Type issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows a remote attacker to upload arbitrary files.2018-01-11not yet calculatedCVE-2017-16736
    MISC
    advantech -- webaccess
     
    A use-after-free issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows an unauthenticated attacker to specify an arbitrary address.2018-01-11not yet calculatedCVE-2017-16732
    MISC
    apache -- activemq
     
    In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identified to be present in the web based administration console. The root cause of this issue is improper user data output validation.2018-01-10not yet calculatedCVE-2016-6810
    CONFIRM
    BID
    SECTRACK
    MLIST
    apache -- geode
     
    When an Apache Geode cluster before v1.3.0 is operating in secure mode, a user with read access to specific regions within a Geode cluster may execute OQL queries containing a region name as a bind parameter that allow read access to objects within unauthorized regions.2018-01-09not yet calculatedCVE-2017-9796
    MLIST
    apache -- geode
     
    When an Apache Geode cluster before v1.3.0 is operating in secure mode, a user with read access to specific regions within a Geode cluster may execute OQL queries that allow read and write access to objects within unauthorized regions. In addition a user could invoke methods that allow remote code execution.2018-01-09not yet calculatedCVE-2017-9795
    BID
    MLIST
    apache -- geode
     
    When an Apache Geode cluster before v1.3.0 is operating in secure mode and an authenticated user connects to a Geode cluster using the gfsh tool with HTTP, the user is able to obtain status information and control cluster members even without CLUSTER:MANAGE privileges.2018-01-09not yet calculatedCVE-2017-12622
    MLIST
    apache -- sling
     
    The Apache Sling JCR ContentLoader 2.1.4 XmlReader used in the Sling JCR content loader module makes it possible to import arbitrary files in the content repository, including local files, causing potential information leaks. Users should upgrade to version 2.1.6 of the JCR ContentLoader2018-01-08not yet calculatedCVE-2012-3353
    CONFIRM
    MLIST
    apache -- sling
     
    A flaw in the way URLs are escaped and encoded in the org.apache.sling.xss.impl.XSSAPIImpl#getValidHref and org.apache.sling.xss.impl.XSSFilterImpl#isValidHref allows special crafted URLs to pass as valid, although they carry XSS payloads. The affected versions are Apache Sling XSS Protection API 1.0.4 to 1.0.18, Apache Sling XSS Protection API Compat 1.1.0 and Apache Sling XSS Protection API 2.0.0.2018-01-10not yet calculatedCVE-2017-15717
    MLIST
    artifex_software -- mupdf
     
    In MuPDF 1.12.0, there is an infinite loop vulnerability and application hang in the pdf_parse_array function (pdf/pdf-parse.c) because EOF is not considered. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted pdf file.2018-01-13not yet calculatedCVE-2018-5686
    MISC
    aruba_networks -- clearpass_policy_manager
     
    Aruba Networks ClearPass Policy Manager 6.1.x, 6.2.x before 6.2.5.61640 and 6.3.x before 6.3.0.61712, when configured to use tunneled and non-tunneled EAP methods in a single policy construct, allows remote authenticated users to gain privileges by advertising independent inner and outer identities within a tunneled EAP method.2018-01-08not yet calculatedCVE-2014-2071
    CONFIRM
    asternic.org -- flash_operator_panel
     
    The callforward module in User Control Panel (UCP) in Nicolas Gudino (aka Asternic) Flash Operator Panel (FOP) 2.31.03 allows remote authenticated users to execute arbitrary commands via the command parameter.2018-01-13not yet calculatedCVE-2018-5694
    MISC
    atlassian -- jira
     
    The issue search resource in Atlassian Jira before version 7.4.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the orderby parameter.2018-01-12not yet calculatedCVE-2017-16864
    CONFIRM
    atlassian -- jira
     
    The IncomingMailServers resource in Atlassian Jira before version 7.6.2 allows remote attackers to modify the "incoming mail" whitelist setting via a Cross-site request forgery (CSRF) vulnerability.2018-01-12not yet calculatedCVE-2017-16862
    CONFIRM
    atlassian -- jira
     
    The printable searchrequest issue resource in Atlassian Jira before version 7.2.12 and from version 7.3.0 before 7.6.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the jqlQuery query parameter.2018-01-12not yet calculatedCVE-2017-14594
    CONFIRM
    avantfax -- avantfax
     
    AvantFAX 3.3.3 has XSS via an arbitrary parameter name to the default URI, as demonstrated by a parameter whose name contains a SCRIPT element and whose value is 1.2018-01-10not yet calculatedCVE-2017-18024
    MISC
    aztech -- adsl_devices
     
    cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote attackers to cause a denial of service (WAN connectivity reset) via a direct request.2018-01-12not yet calculatedCVE-2014-6435
    MISC
    BID
    aztech -- adsl_devices
     
    Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login.2018-01-12not yet calculatedCVE-2014-6436
    MISC
    BUGTRAQ
    BID
    aztech -- adsl_devices
     
    Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices allow remote attackers to obtain sensitive device configuration information via vectors involving the ROM file.2018-01-12not yet calculatedCVE-2014-6437
    MISC
    BUGTRAQ
    BID
    barcodewiz -- barcode
     
    Multiple buffer overflows in BarCodeWiz BarCode before 6.7 ActiveX control (BarcodeWiz.DLL) allow remote attackers to execute arbitrary code via a long argument to the (1) BottomText or (2) TopText property.2018-01-09not yet calculatedCVE-2018-5221
    MISC
    MISC
    cisco -- unified communications_manager
     
    A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to perform a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the web-based management interface to click a link that is designed to submit malicious input to the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information on the targeted device. Cisco Bug IDs: CSCvg51264.2018-01-11not yet calculatedCVE-2018-0118
    BID
    CONFIRM
    cobham -- sea_tel_116_build_222429_satellite_devices
     
    Persistent XSS exists in the web server on Cobham Sea Tel 116 build 222429 satellite communication system devices: remote attackers can inject malicious JavaScript code using the device's TELNET shell built-in commands, as demonstrated by the "set ship name" command. This is similar to a Cross Protocol Injection with SNMP.2018-01-07not yet calculatedCVE-2018-5071
    MISC
    cobham -- sea_tel_121_build_222701_devices
     
    Cobham Sea Tel 121 build 222701 devices allow remote attackers to bypass authentication via a direct request to MenuDealerGx.html, MenuDealer.html, MenuEuNCGx.html, MenuEuNC.html, MenuSysGx.html, or MenuSys.html.2018-01-07not yet calculatedCVE-2018-5267
    MISC
    cobham -- sea_tel_121_build_222701_devices
     
    Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potentially sensitive information about valid usernames by reading the loginName lines at the js/userLogin.js URI. NOTE: default passwords for the standard usernames are listed in the product's documentation: Dealer with password seatel3, SysAdmin with password seatel2, and User with password seatel1.2018-01-07not yet calculatedCVE-2018-5266
    MISC
    communigate -- communigate_pro
     
    The "XML Interface to Messaging, Scheduling, and Signaling" (XIMSS) protocol implementation in CommuniGate Pro (CGP) 6.2 suffers from a Missing XIMSS Protocol Validation attack that leads to an email spoofing attack, allowing a malicious authenticated attacker to send a message from any source email address. The attack uses an HTTP POST request to a /Session URI, and interchanges the XML From and To elements.2018-01-08not yet calculatedCVE-2018-3815
    MISC
    comsenz_technology -- discuz!_discuzx
     
    Discuz! DiscuzX X3.4 allows remote attackers to bypass intended access restrictions via the archiver\index.php action parameter.2018-01-12not yet calculatedCVE-2018-5377
    MISC
    comsenz_technology -- discuz!_discuzx
     
    Discuz! DiscuzX X3.4 has XSS via the include\spacecp\spacecp_space.php appid parameter in a delete action.2018-01-12not yet calculatedCVE-2018-5375
    MISC
    comsenz_technology -- discuz!_discuzx
     
    Discuz! DiscuzX X3.4 has XSS via the include\spacecp\spacecp_upload.php op parameter.2018-01-12not yet calculatedCVE-2018-5376
    MISC
    comsenz_technology -- discuz!_discuzx
     
    Discuz! DiscuzX X3.4 has XSS via the view parameter to include/space/space_poll.php, as demonstrated by a mod=space do=poll request to home.php.2018-01-10not yet calculatedCVE-2018-5331
    MISC
    comsenz_technology -- discuz!_discuzx
     
    Discuz! DiscuzX X3.4 allows remote authenticated users to bypass intended attachment-deletion restrictions via a modified aid parameter.2018-01-08not yet calculatedCVE-2018-5259
    MISC
    MISC
    condor5 -- muviko
     
    Multiple SQL injection vulnerabilities in Muviko 1.1 allow remote attackers to execute arbitrary SQL commands via the (1) email parameter to login.php; the (2) season_id parameter to themes/flixer/ajax/load_season.php; the (3) movie_id parameter to themes/flixer/ajax/get_rating.php; the (4) rating or (5) movie_id parameter to themes/flixer/ajax/update_rating.php; or the (6) id parameter to themes/flixer/ajax/set_player_source.php.2018-01-12not yet calculatedCVE-2017-17970
    MISC
    EXPLOIT-DB
    cups -- cups
     
    The browsing feature in the server in CUPS does not filter ANSI escape sequences from shared printer names, which might allow remote attackers to execute arbitrary code via a crafted printer name.2018-01-12not yet calculatedCVE-2014-8166
    MLIST
    MLIST
    BID
    CONFIRM
    d-link -- dsl-2640u_devices
     
    diag_ping.cmd on D-Link DSL-2640U devices with firmware IM_1.00 and ME_1.00, and DSL-2540U devices with firmware ME_1.00, allows authenticated remote attackers to execute arbitrary OS commands via shell metacharacters in the ipaddr field of an HTTP GET request.2018-01-12not yet calculatedCVE-2018-5371
    MISC
    dotclear -- dotclear
     
    Cross-site scripting (XSS) vulnerability in admin/auth.php in Dotclear 2.12.1 allows remote authenticated users to inject arbitrary web script or HTML via the malicious user's email.2018-01-13not yet calculatedCVE-2018-5689
    CONFIRM
    CONFIRM
    dotclear -- dotclear
     
    Cross-site scripting (XSS) vulnerability in admin/users.php in Dotclear 2.12.1 allows remote authenticated users to inject arbitrary web script or HTML via the nb parameter (aka the page limit number).2018-01-13not yet calculatedCVE-2018-5690
    CONFIRM
    CONFIRM
    dragonbyte_technologies -- vbulletin

     
    Multiple cross-site scripting (XSS) vulnerabilities in the Shout Reports in the DragonByte Technologies vBShout module before 6.0.6 for vBulletin allow remote attackers to inject arbitrary web script or HTML via the (1) reportreason parameter in actions/doreport.php or (2) modnotes parameter in actions/updatereport.php.2018-01-11not yet calculatedCVE-2012-6668
    SECUNIA
    CONFIRM
    BID
    XF
    dragonbyte_technologies -- vbulletin
     
    Cross-site scripting (XSS) vulnerability in vbshout.php in DragonByte Technologies vBShout module for vBulletin allows remote attackers to inject arbitrary web script or HTML via the shout parameter in a shout action.2018-01-11not yet calculatedCVE-2012-6667
    SECUNIA
    EXPLOIT-DB
    BID
    dragonbyte_technologies -- vbulletin

     
    Multiple cross-site scripting (XSS) vulnerabilities in the DragonByte Technologies vbActivity module before 3.0.1 for vBulletin allow remote attackers to inject arbitrary web script or HTML via the reason parameter in (1) actions/nominatemedal.php or (2) actions/requestmedal.php.2018-01-11not yet calculatedCVE-2012-6670
    SECUNIA
    CONFIRM
    BID
    XF
    dragonbyte_technologies -- vbulletin
     
    Cross-site scripting (XSS) vulnerability in downloads/actions/editdownload.php in the DragonByte Technologies vBDownloads module 1.3.2 and earlier for vBulletin allows remote attackers to inject arbitrary web script or HTML via the mirrors[] parameter.2018-01-11not yet calculatedCVE-2012-6682
    SECUNIA
    CONFIRM
    BID
    XF
    dragonbyte_technologies -- vbulletin
     
    Multiple cross-site scripting (XSS) vulnerabilities in actions/main.php in the DragonByte Technologies Forumon RPG module before 1.0.8 for vBulletin when creating a new monster, allow remote attackers to inject arbitrary web script or HTML via the (1) monster[title] or (2) monster[description] parameters.2018-01-11not yet calculatedCVE-2012-6671
    SECUNIA
    SECUNIA
    CONFIRM
    BID
    emc -- avamar_server
     
    An issue was discovered in EMC Avamar Server 7.1.x, 7.2.x, 7.3.x, 7.4.x, 7.5.0; EMC NetWorker Virtual Edition (NVE) 9.0.x, 9.1.x, 9.2.x; and EMC Integrated Data Protection Appliance 2.0. A remote authenticated malicious user with low privileges could potentially upload arbitrary maliciously crafted files in any location on the server file system.2018-01-05not yet calculatedCVE-2017-15549
    CONFIRM
    BID
    SECTRACK
    emc -- avamar_server
     
    An issue was discovered in EMC Avamar Server 7.1.x, 7.2.x, 7.3.x, 7.4.x, 7.5.0; EMC NetWorker Virtual Edition (NVE) 9.0.x, 9.1.x, 9.2.x; and EMC Integrated Data Protection Appliance 2.0. A remote authenticated malicious user with low privileges could access arbitrary files on the server file system in the context of the running vulnerable application via Path traversal.2018-01-05not yet calculatedCVE-2017-15550
    CONFIRM
    BID
    SECTRACK
    emc -- avamar_server
     
    An issue was discovered in EMC Avamar Server 7.1.x, 7.2.x, 7.3.x, 7.4.x, 7.5.0; EMC NetWorker Virtual Edition (NVE) 9.0.x, 9.1.x, 9.2.x; and EMC Integrated Data Protection Appliance 2.0. A remote unauthenticated malicious user can potentially bypass application authentication and gain unauthorized root access to the affected systems.2018-01-05not yet calculatedCVE-2017-15548
    CONFIRM
    BID
    SECTRACK
    etherpad -- etherpad
     
    node/utils/ExportEtherpad.js in Etherpad 1.5.x before 1.5.2 might allow remote attackers to obtain sensitive information by leveraging an improper substring check when exporting a padID.2018-01-12not yet calculatedCVE-2015-2298
    MLIST
    CONFIRM
    CONFIRM
    family_connections -- family_connections_cms
     
    Multiple cross-site request forgery (CSRF) vulnerabilities in Family Connections CMS (aka FCMS) 2.9 and earlier allow remote attackers to hijack the authentication of arbitrary users for requests that (1) add news via an add action to familynews.php or (2) add a prayer via an add action to prayers.php.2018-01-11not yet calculatedCVE-2012-0699
    EXPLOIT-DB
    fasterxml_jackson-databind -- fasterxml_jackson-databind
     
    FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.2018-01-10not yet calculatedCVE-2017-17485
    BUGTRAQ
    CONFIRM
    MISC
    ffmpeg -- ffmpeg
     
    Integer underflow in the mov_read_default function in libavformat/mov.c in FFmpeg before 2.4.6 allows remote attackers to obtain sensitive information from heap and/or stack memory via a crafted MP4 file.2018-01-09not yet calculatedCVE-2015-1208
    CONFIRM
    CONFIRM
    CONFIRM
    fiberhome -- lm53q1_vh519r05c01s38_devices
     
    The portal on FiberHome Mobile WIFI Device Model LM53Q1 VH519R05C01S38 uses SOAP based web services in order to interact with the portal. Unauthorized Access to Web Services via CSRF can result in an unauthorized change of username or password of the administrator of the portal.2018-01-12not yet calculatedCVE-2017-16886
    FULLDISC
    EXPLOIT-DB
    fiberhome -- lm53q1_vh519r05c01s38_devices
     
    The portal on FiberHome Mobile WIFI Device Model LM53Q1 VH519R05C01S38 uses SOAP based web services in order to interact with the portal. Unauthorized Access to Web Services can result in disclosure of the WLAN key/password.2018-01-12not yet calculatedCVE-2017-16887
    FULLDISC
    EXPLOIT-DB
    fiberhome -- lm53q1_vh519r05c01s38_devices
     
    Improper Permissions Handling in the Portal on FiberHome LM53Q1 VH519R05C01S38 devices (intended for obtaining information about Internet Usage, Changing Passwords, etc.) allows remote attackers to look for the information without authenticating. The information includes Version of device, Firmware ID, Connected users to device along their MAC Addresses, etc.2018-01-12not yet calculatedCVE-2017-16885
    FULLDISC
    EXPLOIT-DB
    finecms -- finecms
     
    rui Li finecms 5.0.10 is vulnerable to a reflected XSS in the file Weixin.php.2018-01-09not yet calculatedCVE-2017-1000429
    MISC
    flatcore-cms -- flatcore-cms
     
    flatCore-CMS 1.4.6 is vulnerable to reflected XSS in user_management.php due to the use of $_SERVER['PHP_SELF'] to build links and a stored XSS in the admin log panel by specifying a malformed User-Agent string.2018-01-09not yet calculatedCVE-2017-1000428
    CONFIRM
    flexense -- disk_pulse_enterprise
     
    In Flexense Disk Pulse Enterprise v10.1.18, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9120.2018-01-10not yet calculatedCVE-2017-15663
    MISC
    EXPLOIT-DB
    flexense -- diskboss_enterprise
     
    In Flexense DiskBoss Enterprise 8.5.12, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 8094.2018-01-10not yet calculatedCVE-2017-15665
    MISC
    EXPLOIT-DB
    flexense -- diskboss
     
    A stack-based buffer overflow in Flexense DiskBoss 8.8.16 and earlier allows unauthenticated remote attackers to execute arbitrary code in the context of a highly privileged account.2018-01-12not yet calculatedCVE-2018-5262
    MISC
    EXPLOIT-DB
    flexense -- sync_breeze_enterprise
     
    In Flexense Sync Breeze Enterprise v10.1.16, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9121.2018-01-10not yet calculatedCVE-2017-15664
    MISC
    EXPLOIT-DB
    flexense -- vx_search_enterprise
     
    In Flexense VX Search Enterprise v10.1.12, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9123.2018-01-10not yet calculatedCVE-2017-15662
    MISC
    EXPLOIT-DB
    freeipa -- freeipa
     
    It was found that FreeIPA 4.2.0 and later could disclose password hashes to users having the 'System: Read Stage Users' permission. A remote, authenticated attacker could potentially use this flaw to disclose the password hashes belonging to Stage Users. This security issue does not result in disclosure of password hashes belonging to active standard users.2018-01-10not yet calculatedCVE-2017-12169
    BID
    CONFIRM
    general_motors_shanghai -- onstar_sos_ios
     
    An Improper Authentication issue was discovered in General Motors (GM) and Shanghai OnStar (SOS) SOS iOS Client 7.1. Successful exploitation of this vulnerability may allow an attacker to subvert security mechanisms and reset a user account password.2018-01-09not yet calculatedCVE-2017-12695
    BID
    MISC
    general_motors_shanghai -- onstar_sos_ios
     
    An Cleartext Storage of Sensitive Information issue was discovered in General Motors (GM) and Shanghai OnStar (SOS) SOS iOS Client 7.1. Successful exploitation of this vulnerability may allow a remote attacker to access an encryption key that is stored in cleartext in memory.2018-01-09not yet calculatedCVE-2017-9663
    BID
    MISC
    general_motors_shanghai -- onstar_sos_ios
     
    A Man-in-the-Middle issue was discovered in General Motors (GM) and Shanghai OnStar (SOS) SOS iOS Client 7.1. Successful exploitation of this vulnerability may allow an attacker to intercept sensitive information when the client connects to the server.2018-01-09not yet calculatedCVE-2017-12697
    BID
    MISC
    gespage -- gespage
     
    Multiple SQL injection vulnerabilities in Gespage before 7.4.9 allow remote attackers to execute arbitrary SQL commands via the (1) show_prn parameter to webapp/users/prnow.jsp or show_month parameter to (2) webapp/users/blhistory.jsp or (3) webapp/users/prhistory.jsp.2018-01-08not yet calculatedCVE-2017-7997
    FULLDISC
    MISC
    EXPLOIT-DB
    gespage -- gespage
     
    Multiple cross-site scripting (XSS) vulnerabilities in Gespage before 7.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) printer name when adding a printer in the admin panel or (2) username parameter to webapp/users/user_reg.jsp.2018-01-08not yet calculatedCVE-2017-7998
    FULLDISC
    MISC
    gnome/gcab -- gnome/gcab
     
    A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.2018-01-11not yet calculatedCVE-2018-5345
    MISC
    google -- androidIn CameraDeviceClient::submitRequestList of CameraDeviceClient.cpp, there is an out-of-bounds write if metadataSize is too small. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-67782345.2018-01-12not yet calculatedCVE-2017-13210
    BID
    SECTRACK
    CONFIRM
    google -- androidAn elevation of privilege vulnerability in the Broadcom bcmdhd driver. Product: Android. Versions: Android kernel. Android ID: A-63374465. References: B-V2017081501.2018-01-12not yet calculatedCVE-2017-13213
    CONFIRM
    google -- androidAn information disclosure vulnerability in the Android media framework (aac). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-65280786.2018-01-12not yet calculatedCVE-2017-13188
    CONFIRM
    CONFIRM
    google -- androidIn several places in ihevcd_decode.c, a dead loop could occur due to incomplete frames which could lead to memory leaks. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-63522067.2018-01-12not yet calculatedCVE-2017-13196
    BID
    SECTRACK
    CONFIRM
    google -- androidIn ihevcd_decode.c there is a possible infinite loop due to bytes for an sps of unsupported resolution resulting in the same sps being fed in over and over. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-65718319.2018-01-12not yet calculatedCVE-2017-13193
    BID
    SECTRACK
    CONFIRM
    google -- androidIn the hardware HEVC decoder, some media files could cause a page fault. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38495900.2018-01-12not yet calculatedCVE-2017-13214
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    In the ServiceManager::add function in the hardware service manager, there is an insecure permissions check based on the PID of the caller which could allow an application or service to replace a HAL service with its own service. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-68217907.2018-01-12not yet calculatedCVE-2017-13209
    BID
    SECTRACK
    CONFIRM
    EXPLOIT-DB
    google -- android
     
    A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.2018-01-12not yet calculatedCVE-2017-13215
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    An information disclosure vulnerability in the Upstream kernel kernel. Product: Android. Versions: Android kernel. Android ID: A-38159576.2018-01-12not yet calculatedCVE-2017-13222
    CONFIRM
    google -- android
     
    In bta_scan_results_cb_impl of btif_ble_scanner.cc, there is possible resource exhaustion if a large number of repeated BLE scan results are received. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0. Android ID: A-65174158.2018-01-12not yet calculatedCVE-2017-13211
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    An elevation of privilege vulnerability in the Android system (systemui). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62187985.2018-01-12not yet calculatedCVE-2017-13212
    CONFIRM
    google -- android
     
    In receive_packet of libnetutils/packet.c, there is a possible out-of-bounds write due to a missing bounds check on the DHCP response. This could lead to remote code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-67474440.2018-01-12not yet calculatedCVE-2017-13208
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    An information disclosure vulnerability in the Android media framework (libavc). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-63122634.2018-01-12not yet calculatedCVE-2017-13203
    CONFIRM
    CONFIRM
    google -- android
     
    In Bitmap.ccp if Bitmap.nativeCreate fails an out of memory exception is not thrown leading to a java.io.IOException later on. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-33846679.2018-01-12not yet calculatedCVE-2017-13199
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    An information disclosure vulnerability in the Android media framework (libavc). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64380237.2018-01-12not yet calculatedCVE-2017-13204
    CONFIRM
    CONFIRM
    google -- android
     
    A vulnerability in the Android media framework (ex) related to composition of frames lacking a color map. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68399117.2018-01-12not yet calculatedCVE-2017-13198
    CONFIRM
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while performing update of FOTA partition, uninitialized data can be pushed to storage.2018-01-10not yet calculatedCVE-2017-14869
    CONFIRM
    google -- android
     
    An information disclosure vulnerability in the Android media framework (aacdec). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-65025048.2018-01-12not yet calculatedCVE-2017-13206
    CONFIRM
    google -- android
     
    An information disclosure vulnerability in the Android media framework (libmpeg2). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64550583.2018-01-12not yet calculatedCVE-2017-13205
    CONFIRM
    CONFIRM
    google -- android
     
    An elevation of privilege vulnerability in the Upstream kernel wifi driver. Product: Android. Versions: Android kernel. Android ID: A-64709938.2018-01-12not yet calculatedCVE-2017-13221
    CONFIRM
    google -- android
     
    An information disclosure vulnerability in the Android media framework (stagefright mpeg4writer). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-37564426.2018-01-12not yet calculatedCVE-2017-13207
    CONFIRM
    google -- android
     
    An information disclosure vulnerability in the Android media framework (libeffects). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-67647856.2018-01-12not yet calculatedCVE-2017-13202
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, if userspace provides a too-large IE length in wlan_hdd_cfg80211_set_ie, a buffer over-read occurs.2018-01-10not yet calculatedCVE-2017-9712
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a LayerStack can be destroyed in between Validate and Commit by the application resulting in a Use After Free condition.2018-01-10not yet calculatedCVE-2017-15849
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, concurrent rx notifications and read() operations in the G-Link PKT driver can result in a double free condition due to missing locking resulting in list_del() and list_add() overlapping and corrupting the next and previous pointers.2018-01-10not yet calculatedCVE-2017-9705
    CONFIRM
    google -- android
     
    The backup mechanism in the adb tool in Android might allow attackers to inject additional applications (APKs) and execute arbitrary code by leveraging failure to filter application data streams.2018-01-12not yet calculatedCVE-2014-7952
    MISC
    FULLDISC
    MISC
    BUGTRAQ
    BID
    MISC
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, an invalid input of firmware size (negative value) from user space can potentially lead to the memory leak or buffer overflow during the WLAN cal data store operation.2018-01-10not yet calculatedCVE-2017-15845
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the SPCom kernel driver, a race condition exists when creating a channel.2018-01-10not yet calculatedCVE-2017-15847
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, userspace can read values from audio codec registers.2018-01-10not yet calculatedCVE-2017-15850
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the fastrpc kernel driver, a buffer overflow vulnerability from userspace may potentially exist.2018-01-10not yet calculatedCVE-2017-15848
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a specially-crafted HDMI CEC message can be used to cause stack memory corruption.2018-01-10not yet calculatedCVE-2017-9689
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, by calling an IPA ioctl and searching for routing/filer/hdr rule handle from ipa_idr pointer using ipa_idr_find() function, the wrong structure pointer can be returned resulting in a slab out of bound access in the IPA driver.2018-01-10not yet calculatedCVE-2017-14879
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the pp_pgc_get_config() graphics driver function, a kernel memory overwrite can potentially occur.2018-01-10not yet calculatedCVE-2017-14873
    CONFIRM
    google -- android
     
    In the ihevcd_parse_slice.c function, slave threads are not joined if there is an error. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64784973.2018-01-12not yet calculatedCVE-2017-13197
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    A denial of service vulnerability in the Upstream kernel synaptics touchscreen controller. Product: Android. Versions: Android kernel. Android ID: A-62800865.2018-01-12not yet calculatedCVE-2017-13219
    CONFIRM
    google -- android
     
    Access to CNTVCT_EL0 could be used for side channel attacks. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-68266545.2018-01-12not yet calculatedCVE-2017-13218
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    In DisplayFtmItem in the bootloader, there is an out-of-bounds write due to reading a string without verifying that it's null-terminated. This could lead to a secure boot bypass and a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-68269077.2018-01-12not yet calculatedCVE-2017-13217
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    An information disclosure vulnerability in the Android media framework (av) related to id3 unsynchronization. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-63100526.2018-01-12not yet calculatedCVE-2017-13200
    CONFIRM
    CONFIRM
    google -- android
     
    An information disclosure vulnerability in the Android media framework (mediadrm). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-63982768.2018-01-12not yet calculatedCVE-2017-13201
    CONFIRM
    google -- android
     
    In libMtkOmxVdec.so there is a possible heap buffer overflow. This could lead to a remote elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38308024. References: M-ALPS03495789.2018-01-12not yet calculatedCVE-2017-13225
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    An elevation of privilege vulnerability in the MediaTek mtk. Product: Android. Versions: Android kernel. Android ID: A-32591194. References: M-ALPS03149184.2018-01-12not yet calculatedCVE-2017-13226
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing a user supplied sparse image, a buffer overflow vulnerability could occur if the sparse header block size is equal to 4294967296.2018-01-10not yet calculatedCVE-2017-11080
    CONFIRM
    google -- android
     
    In ashmem_ioctl of ashmem.c, there is an out-of-bounds write due to insufficient locking when accessing asma. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-66954097.2018-01-12not yet calculatedCVE-2017-13216
    BID
    SECTRACK
    CONFIRM
    EXPLOIT-DB
    google -- android
     
    An elevation of privilege vulnerability in the Upstream kernel bluez. Product: Android. Versions: Android kernel. Android ID: A-63527053.2018-01-12not yet calculatedCVE-2017-13220
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, there is a potential buffer overflow vulnerability in hdd_parse_setrmcenable_command and hdd_parse_setrmcactionperiod_command APIs as buffers defined in this API can hold maximum 32 bytes but data more than 32 bytes can get copied.2018-01-10not yet calculatedCVE-2017-11081
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while updating a firmware image, data is read from flash into RAM without checking that the data fits into allotted RAM size.2018-01-10not yet calculatedCVE-2017-11003
    CONFIRM
    google -- android
     
    In the parseURL function of URLStreamHandler, there is improper input validation of the host field. This could lead to a remote elevation of privilege that could enable bypassing user interaction requirements with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68341964.2018-01-12not yet calculatedCVE-2017-13176
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while flashing ubi image an uninitialized memory could be accessed.2018-01-10not yet calculatedCVE-2017-11066
    CONFIRM
    google -- android
     
    In the initDecoder function of SoftAVCDec, there is a possible out-of-bounds write to mCodecCtx due to a use after free when buffer allocation fails. This could lead to remote code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-66969281.2018-01-12not yet calculatedCVE-2017-13178
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing sparse image, uninitialized heap memory can potentially be flashed due to the lack of validation of sparse image block header size.2018-01-10not yet calculatedCVE-2017-11079
    CONFIRM
    google -- android
     
    In several functions of libhevc, NEON registers are not preserved. This could lead to remote code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68320413.2018-01-12not yet calculatedCVE-2017-13177
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, manipulation of SafeSwitch Image data can result in Heap overflow.2018-01-10not yet calculatedCVE-2017-11069
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    NVIDIA driver contains an integer overflow vulnerability which could cause a use after free and possibly lead to an elevation of privilege enabling code execution as a privileged process. This issue is rated as high. Version: N/A. Android ID: A-37776156. References: N-CVE-2017-0869.2018-01-12not yet calculatedCVE-2017-0869
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    In MPEG4Extractor.cpp, there are several places where functions return early without cleaning up internal buffers which could lead to memory leaks. This could lead to remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-64452857.2018-01-12not yet calculatedCVE-2017-0855
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while updating the recovery message for eMMC devices, 1088 bytes of stack memory can potentially be leaked.2018-01-10not yet calculatedCVE-2017-14870
    CONFIRM
    google -- android
     
    An information disclosure vulnerability in the Android framework (clipboardservice). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-64934810.2018-01-12not yet calculatedCVE-2017-0846
    CONFIRM
    google -- android
     
    In the ihevcd_allocate_static_bufs and ihevcd_create functions of SoftHEVC, there is a possible out-of-bounds write due to a use after free. Both ps_codec_obj and ps_create_op->s_ivd_create_op_t.pv_handle point to the same memory and ps_codec_obj could be freed without clearing ps_create_op->s_ivd_create_op_t.pv_handle. This could lead to remote code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-66969193.2018-01-12not yet calculatedCVE-2017-13179
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    In the ihevcd_parse_sps function of ihevcd_parse_headers.c, several parameter values could be negative which could lead to negative indexes which could lead to an infinite loop. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-65398821.2018-01-12not yet calculatedCVE-2017-13195
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    A vulnerability in the Android media framework (libavc) related to incorrect use of mmco parameters. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-65735716.2018-01-12not yet calculatedCVE-2017-13186
    CONFIRM
    CONFIRM
    google -- android
     
    In the ihevcd_parse_slice_header function of ihevcd_parse_slice_header.c a slice address of zero after the first slice could result in an infinite loop. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64380202.2018-01-12not yet calculatedCVE-2017-13192
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    An information disclosure vulnerability in the Android media framework (libhevc). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-65034175.2018-01-12not yet calculatedCVE-2017-13187
    CONFIRM
    CONFIRM
    google -- android
     
    A vulnerability in the Android media framework (libavc) related to handling dec_hdl memory allocation failures. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68300072.2018-01-12not yet calculatedCVE-2017-13189
    CONFIRM
    CONFIRM
    google -- android
     
    In the enableVSyncInjections function of SurfaceFlinger, there is a possible use after free of mVSyncInjector. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-65483324.2018-01-12not yet calculatedCVE-2017-13184
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    A vulnerability in the Android media framework (libhevc) related to handling ps_codec_obj memory allocation failures. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68299873.2018-01-12not yet calculatedCVE-2017-13190
    CONFIRM
    CONFIRM
    google -- android
     
    In the sendFormatChange function of ACodec, there is a possible integer overflow which could lead to an out-of-bounds write. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-67737022.2018-01-12not yet calculatedCVE-2017-13182
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    In the doGetThumb and getThumbnail functions of MtpServer, there is a possible double free due to not NULLing out a freed pointer. This could lead to an local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-67864232.2018-01-12not yet calculatedCVE-2017-13181
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    An information disclosure vulnerability in the Android media framework (libhevc). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-65123471.2018-01-12not yet calculatedCVE-2017-13185
    CONFIRM
    CONFIRM
    google -- android
     
    In the OMXNodeInstance::useBuffer and IOMX::freeBuffer functions, there is a possible use after free due to a race condition if the user frees the buffer while it's being used in another thread. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: 8.1. Android ID: A-38118127.2018-01-12not yet calculatedCVE-2017-13183
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    In the onQueueFilled function of SoftAVCDec, there is a possible out-of-bounds write due to a use after free if a bad header causes the decoder to get caught in a loop while another thread frees the memory it's accessing. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-66969349.2018-01-12not yet calculatedCVE-2017-13180
    BID
    SECTRACK
    CONFIRM
    google -- android
     
    A vulnerability in the Android media framework (libvpx) related to odd frame width. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64710201.2018-01-12not yet calculatedCVE-2017-13194
    CONFIRM
    CONFIRM
    google -- android
     
    In the ihevcd_decode function of ihevcd_decode.c, there is an infinite loop due to an incomplete frame error. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64380403.2018-01-12not yet calculatedCVE-2017-13191
    BID
    SECTRACK
    CONFIRM
    google -- chrome
     
    The Google V8 engine, as used in Google Chrome before 44.0.2403.89 and QtWebEngineCore in Qt before 5.5.1, allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted web site.2018-01-09not yet calculatedCVE-2015-1290
    CONFIRM
    CONFIRM
    SUSE
    MISC
    CONFIRM
    CONFIRM
    graphicsmagick -- graphicsmagick
     
    In GraphicsMagick 1.3.27, there is an infinite loop and application hang in the ReadBMPImage function (coders/bmp.c). Remote attackers could leverage this vulnerability to cause a denial of service via an image file with a crafted bit-field mask value.2018-01-13not yet calculatedCVE-2018-5685
    MISC
    MISC
    hibernate -- validator
     
    In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue().2018-01-10not yet calculatedCVE-2017-7536
    BID
    SECTRACK
    REDHAT
    REDHAT
    REDHAT
    REDHAT
    REDHAT
    REDHAT
    REDHAT
    REDHAT
    REDHAT
    CONFIRM
    hitron -- hitron_devices
     
    Hitron CVE-30360 devices use a 578A958E3DD933FC DES key that is shared across different customers' installations, which makes it easier for attackers to obtain sensitive information by decrypting a backup configuration file, as demonstrated by a password hash in the um_auth_account_password field.2018-01-07not yet calculatedCVE-2014-10069
    MISC
    MISC
    MISC
    huawei -- campus_switches
     
    Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal.2018-01-08not yet calculatedCVE-2014-5394
    CONFIRM
    BID
    XF
    ibm -- curam_social_program_management
     
    IBM Curam Social Program Management 6.0.5, 6.1.1, 6.2.0, and 7.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 134921.2018-01-11not yet calculatedCVE-2017-1739
    CONFIRM
    BID
    MISC
    ibm -- curam_social_program_management
     
    IBM Curam Social Program Management 6.0.5, 6.1.1, 6.2.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 134922.2018-01-11not yet calculatedCVE-2017-1740
    CONFIRM
    BID
    MISC
    ibm -- qradar
     
    IBM QRadar 7.2 and 7.3 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 119737.2018-01-10not yet calculatedCVE-2016-9722
    CONFIRM
    MISC
    ibm -- qradar
     
    IBM QRadar 7.2 and 7.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 133121.2018-01-10not yet calculatedCVE-2017-1623
    CONFIRM
    BID
    MISC
    ibm -- security_access_manager_appliance
     
    IBM Security Access Manager Appliance 9.0.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 130675.2018-01-10not yet calculatedCVE-2017-1533
    CONFIRM
    BID
    SECTRACK
    MISC
    ibm -- security_access_manager_appliance
     
    IBM Security Access Manager Appliance 9.0.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 128613.2018-01-11not yet calculatedCVE-2017-1478
    CONFIRM
    SECTRACK
    MISC
    ibm -- security_access_manager_appliance
     
    IBM Security Access Manager Appliance 8.0.0 and 9.0.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 130676.2018-01-10not yet calculatedCVE-2017-1534
    CONFIRM
    SECTRACK
    MISC
    ibm -- security_access_manager_appliance
     
    IBM Security Access Manager Appliance 8.0.0 and 9.0.0 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 128378.2018-01-10not yet calculatedCVE-2017-1459
    CONFIRM
    SECTRACK
    MISC
    ibm -- security_identity_manager_virtual_appliance
     
    IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.0 before 7.0.1-ISS-SIM-FP0001 do not properly restrict failed login attempts, which makes it easier for remote attackers to obtain access via a brute-force approach. IBM X-Force ID: 111695.2018-01-12not yet calculatedCVE-2016-0332
    CONFIRM
    XF
    ibm -- security_identity_manager_virtual_appliance
     
    Cross-site request forgery (CSRF) vulnerability in IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.0 before 7.0.1-ISS-SIM-FP0001 allows remote attackers to hijack the authentication of users for requests that have unspecified impact via unknown vectors. IBM X-Force ID: 111736.2018-01-12not yet calculatedCVE-2016-0335
    CONFIRM
    XF
    ibm -- security_identity_manager_virtual_appliance
     
    IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.0 before 7.0.1-ISS-SIM-FP0001 allows remote authenticated users to execute arbitrary code with administrator privileges via unspecified vectors. IBM X-Force ID: 111640.2018-01-12not yet calculatedCVE-2016-0324
    CONFIRM
    XF
    ibm -- security_identity_manager_virtual_appliance
     
    Cross-site scripting (XSS) vulnerability in IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.0 before 7.0.1-ISS-SIM-FP0001 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. IBM X-Force ID: 111737.2018-01-12not yet calculatedCVE-2016-0336
    CONFIRM
    XF
    ibm -- security_identity_manager_virtual_appliance
     
    IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.0 before 7.0.1-ISS-SIM-FP0001 allows local users to gain administrator privileges via unspecified vectors. IBM X-Force ID: 111643.2018-01-12not yet calculatedCVE-2016-0327
    CONFIRM
    XF
    ibm -- tivoli_key_lifecycle_managerIBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 133638.2018-01-09not yet calculatedCVE-2017-1671
    CONFIRM
    BID
    MISC
    ibm -- tivoli_key_lifecycle_manager
     
    IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 133540.2018-01-09not yet calculatedCVE-2017-1666
    CONFIRM
    BID
    MISC
    ibm -- tivoli_key_lifecycle_manager
     
    IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 133562.2018-01-09not yet calculatedCVE-2017-1668
    CONFIRM
    BID
    MISC
    ibm -- tivoli_key_lifecycle_manager
     
    IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 133637.2018-01-09not yet calculatedCVE-2017-1670
    CONFIRM
    BID
    MISC
    ibm -- urbancode_deploy
     
    IBM UrbanCode Deploy (UCD) 6.1 and 6.2 could allow an authenticated user to edit objects that they should not have access to due to improper access controls. IBM X-Force ID: 128691.2018-01-09not yet calculatedCVE-2017-1493
    CONFIRM
    BID
    MISC
    ibm -- websphere_application_server
     
    IBM WebSphere Application Server (IBM Liberty for Java for Bluemix 3.15) could allow a local attacker to obtain sensitive information, caused by improper handling of application requests, which could allow unauthorized access to read a file. IBM X-Force ID: 134003.2018-01-11not yet calculatedCVE-2017-1681
    CONFIRM
    MISC
    ibm -- websphere_portal
     
    IBM WebSphere Portal 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 137158.2018-01-11not yet calculatedCVE-2018-1361
    SECTRACK
    MISC
    CONFIRM
    ibm -- websphere
     
    IBM WebSphere MQ 7.0, 7.1, 7.5, 8.0, and 9.0 service trace module could be used to execute untrusted code under 'mqm' user. IBM X-Force ID: 132953.2018-01-09not yet calculatedCVE-2017-1612
    CONFIRM
    BID
    MISC
    icy_phoenix -- icy_phoenix
     
    Icy Phoenix 2.2.0.105 allows SQL injection via an unapprove request to admin_kb_art.php or the order parameter to admin_jr_admin.php, related to functions_kb.php.2018-01-13not yet calculatedCVE-2018-5697
    MISC
    imagemagick -- imagemagick
     
    ImageMagick 7.0.7-22 Q16 has memory leaks in the EncodeImageAttributes function in coders/json.c, as demonstrated by the ReadPSDLayersInternal function in coders/psd.c.2018-01-12not yet calculatedCVE-2018-5358
    CONFIRM
    imagemagick -- imagemagick
     
    ImageMagick 7.0.7-22 Q16 has memory leaks in the ReadDCMImage function in coders/dcm.c.2018-01-12not yet calculatedCVE-2018-5357
    CONFIRM
    imagemagick -- imagemagickIn ImageMagick 7.0.6-10 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allow remote attackers to cause a denial of service via a crafted file.2018-01-12not yet calculatedCVE-2017-18029
    CONFIRM
    imagemagick -- imagemagick
     
    In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allow remote attackers to cause a denial of service via a crafted file.2018-01-12not yet calculatedCVE-2017-18027
    CONFIRM
    imagemagick -- imagemagick
     
    In ImageMagick 7.0.7-17 Q16, there is a heap-based buffer over-read in coders/sixel.c in the ReadSIXELImage function, related to the sixel_decode function.2018-01-05not yet calculatedCVE-2018-5248
    BID
    CONFIRM
    imagemagick -- imagemagick
     
    In ImageMagick 7.0.7-12 Q16, there are memory leaks in MontageImageCommand in MagickWand/montage.c.2018-01-05not yet calculatedCVE-2017-18022
    BID
    CONFIRM
    imagemagick -- imagemagick
     
    In ImageMagick 7.0.7-1 Q16, a memory exhaustion vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allow remote attackers to cause a denial of service via a crafted file.2018-01-12not yet calculatedCVE-2017-18028
    CONFIRM
    imagemagick -- imagemagick
     
    In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadPATTERNImage in coders/pattern.c.2018-01-05not yet calculatedCVE-2018-5246
    BID
    CONFIRM
    innotube -- itguard-manager
     
    cgi-bin/drknow.cgi in Innotube ITGuard-Manager 0.0.0.1 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the username field, as demonstrated by a username beginning with "admin|" to use the '|' metacharacter.2018-01-08not yet calculatedCVE-2017-18025
    EXPLOIT-DB
    intel -- driver_and_support_assistance
     
    SEMA driver in Intel Driver and Support Assistant before version 3.1.1 allows a local attacker the ability to read and writing to Memory Status registers potentially allowing information disclosure or a denial of service condition.2018-01-09not yet calculatedCVE-2018-3610
    CONFIRM
    irssi -- irssi
     
    When using incomplete escape codes, Irssi before 1.0.6 may access data beyond the end of the string.2018-01-06not yet calculatedCVE-2018-5205
    CONFIRM
    irssi -- irssi
     
    When the channel topic is set without specifying a sender, Irssi before 1.0.6 may dereference a NULL pointer.2018-01-06not yet calculatedCVE-2018-5206
    CONFIRM
    irssi -- irssi
     
    In Irssi before 1.0.6, a calculation error in the completion code could cause a heap buffer overflow when completing certain strings.2018-01-06not yet calculatedCVE-2018-5208
    CONFIRM
    irssi -- irssi
     
    When using an incomplete variable argument, Irssi before 1.0.6 may access data beyond the end of the string.2018-01-06not yet calculatedCVE-2018-5207
    CONFIRM
    ixsystems -- freenas
     
    FreeNAS before 9.3-M3 has a blank admin password, which allows remote attackers to gain root privileges by leveraging a WebGui login.2018-01-08not yet calculatedCVE-2014-5334
    MLIST
    BID
    CONFIRM
    jolla -- sailfish_os
     
    Jolla Sailfish OS before 1.1.2.16 allows remote attackers to spoof phone numbers and trigger calls to arbitrary numbers via spaces in a tel: URL.2018-01-12not yet calculatedCVE-2015-3888
    MISC
    joomla! -- joomla!
     
    The StackIdeas EasyDiscuss (aka com_easydiscuss) extension before 4.0.21 for Joomla! allows XSS.2018-01-08not yet calculatedCVE-2018-5263
    CONFIRM
    EXPLOIT-DB
    joomla! -- joomla!
     
    The iJoomla com_adagency plugin 6.0.9 for Joomla! allows SQL injection via the `advertiser_status` and `status_select` parameters to index.php.2018-01-13not yet calculatedCVE-2018-5696
    MISC
    jungo_connectivity -- windriver
     
    Race condition in Jungo Windriver 12.5.1 allows local users to cause a denial of service (buffer overflow) or gain system privileges by flipping pool buffer size, aka a "double fetch" vulnerability.2018-01-11not yet calculatedCVE-2018-5189
    EXPLOIT-DB
    MISC
    juniper_networks -- junos_os
     
    A sustained sequence of different types of normal transit traffic can trigger a high CPU consumption denial of service condition in the Junos OS register and schedule software interrupt handler subsystem when a specific command is issued to the device. This affects one or more threads and conversely one or more running processes running on the system. Once this occurs, the high CPU event(s) affects either or both the forwarding and control plane. As a result of this condition the device can become inaccessible in either or both the control and forwarding plane and stops forwarding traffic until the device is rebooted. The issue will reoccur after reboot upon receiving further transit traffic. Score: 5.7 MEDIUM (CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) For network designs utilizing layer 3 forwarding agents or other ARP through layer 3 technologies, the score is slightly higher. Score: 6.5 MEDIUM (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) If the following entry exists in the RE message logs then this may indicate the issue is present. This entry may or may not appear when this issue occurs. /kernel: Expensive timeout(9) function: Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D50; 12.3X48 versions prior to 12.3X48-D30; 12.3R versions prior to 12.3R12-S7; 14.1 versions prior to 14.1R8-S4, 14.1R9; 14.1X53 versions prior to 14.1X53-D30, 14.1X53-D34; 14.2 versions prior to 14.2R8; 15.1 versions prior to 15.1F6, 15.1R3; 15.1X49 versions prior to 15.1X49-D40; 15.1X53 versions prior to 15.1X53-D31, 15.1X53-D33, 15.1X53-D60. No other Juniper Networks products or platforms are affected by this issue.2018-01-10not yet calculatedCVE-2018-0004
    CONFIRM
    juniper_networks -- junos_os
     
    An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to the local segment, through a local segment broadcast, may be able to cause a Junos device to enter an improper boundary check condition allowing a memory corruption to occur, leading to a denial of service. Further crafted packets may be able to sustain the denial of service condition. Score: 6.5 MEDIUM (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Further, if the attacker is authenticated on the target device receiving and processing the malicious LLDP packet, while receiving the crafted packets, the attacker may be able to perform command or arbitrary code injection over the target device thereby elevating their permissions and privileges, and taking control of the device. Score: 7.8 HIGH (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to one or more local segments, via LLDP proxy / tunneling agents or other LLDP through Layer 3 deployments, through one or more local segment broadcasts, may be able to cause multiple Junos devices to enter an improper boundary check condition allowing a memory corruption to occur, leading to multiple distributed Denials of Services. These Denials of Services attacks may have cascading Denials of Services to adjacent connected devices, impacts network devices, servers, workstations, etc. Further crafted packets may be able to sustain these Denials of Services conditions. Score 6.8 MEDIUM (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H) Further, if the attacker is authenticated on one or more target devices receiving and processing these malicious LLDP packets, while receiving the crafted packets, the attacker may be able to perform command or arbitrary code injection over multiple target devices thereby elevating their permissions and privileges, and taking control multiple devices. Score: 7.8 HIGH (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71; 12.3 versions prior to 12.3R12-S7; 12.3X48 versions prior to 12.3X48-D55; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D46, 14.1X53-D50, 14.1X53-D107; 14.2 versions prior to 14.2R7-S9, 14.2R8; 15.1 versions prior to 15.1F2-S17, 15.1F5-S8, 15.1F6-S8, 15.1R5-S7, 15.1R7; 15.1X49 versions prior to 15.1X49-D90; 15.1X53 versions prior to 15.1X53-D65; 16.1 versions prior to 16.1R4-S6, 16.1R5; 16.1X65 versions prior to 16.1X65-D45; 16.2 versions prior to 16.2R2; 17.1 versions prior to 17.1R2. No other Juniper Networks products or platforms are affected by this issue.2018-01-10not yet calculatedCVE-2018-0007
    CONFIRM
    juniper_networks -- junos_os
     
    An unauthenticated root login may allow upon reboot when a commit script is used. A commit script allows a device administrator to execute certain instructions during commit, which is configured under the [system scripts commit] stanza. Certain commit scripts that work without a problem during normal commit may cause unexpected behavior upon reboot which can leave the system in a state where root CLI login is allowed without a password due to the system reverting to a "safe mode" authentication state. Lastly, only logging in physically to the console port as root, with no password, will work. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71 on SRX; 12.3X48 versions prior to 12.3X48-D55 on SRX; 14.1 versions prior to 14.1R9; 14.1X53 versions prior to 14.1X53-D40 on QFX, EX; 14.2 versions prior to 14.2R7-S9, 14.2R8; 15.1 versions prior to 15.1F5-S7, 15.1F6-S8, 15.1R5-S6, 15.1R6; 15.1X49 versions prior to 15.1X49-D110 on SRX; 15.1X53 versions prior to 15.1X53-D232 on QFX5200/5110; 15.1X53 versions prior to 15.1X53-D49, 15.1X53-D470 on NFX; 15.1X53 versions prior to 15.1X53-D65 on QFX10K; 16.1 versions prior to 16.1R2. No other Juniper Networks products or platforms are affected by this issue.2018-01-10not yet calculatedCVE-2018-0008
    CONFIRM
    juniper_networks -- junos_os
     
    QFX and EX Series switches configured to drop traffic when the MAC move limit is exceeded will forward traffic instead of dropping traffic. This can lead to denials of services or other unintended conditions. Affected releases are Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D40; 15.1X53 versions prior to 15.1X53-D55; 15.1 versions prior to 15.1R7.2018-01-10not yet calculatedCVE-2018-0005
    CONFIRM
    juniper_networks -- junos_os
     
    On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeated crashes of the flowd daemon which results in an extended Denial of Service condition. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D60 on SRX series; 12.3X48 versions prior to 12.3X48-D35 on SRX series; 14.1 versions prior to 14.1R9 on MX series; 14.2 versions prior to 14.2R8 on MX series; 15.1X49 versions prior to 15.1X49-D60 on SRX series; 15.1 versions prior to 15.1R5-S8, 15.1F6-S9, 15.1R6-S4, 15.1R7 on MX series; 16.1 versions prior to 16.1R6 on MX series; 16.2 versions prior to 16.2R3 on MX series; 17.1 versions prior to 17.1R2-S4, 17.1R3 on MX series. No other Juniper Networks products or platforms are affected by this issue.2018-01-10not yet calculatedCVE-2018-0002
    CONFIRM
    juniper_networks -- junos_os
     
    On Juniper Networks SRX series devices, firewall rules configured to match custom application UUIDs starting with zeros can match all TCP traffic. Due to this issue, traffic that should have been blocked by other rules is permitted to flow through the device resulting in a firewall bypass condition. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71 on SRX series; 12.3X48 versions prior to 12.3X48-D55 on SRX series; 15.1X49 versions prior to 15.1X49-D100 on SRX series.2018-01-10not yet calculatedCVE-2018-0009
    BID
    CONFIRM
    juniper_networks -- junos_os
     
    A high rate of VLAN authentication attempts sent from an adjacent host on the local broadcast domain can trigger high memory utilization by the BBE subscriber management daemon (bbe-smgd), and lead to a denial of service condition. The issue was caused by attempting to process an unbounded number of pending VLAN authentication requests, leading to excessive memory allocation. This issue only affects devices configured for DHCPv4/v6 over AE auto-sensed VLANs, utilized in Broadband Edge (BBE) deployments. Other configurations are unaffected by this issue. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R6-S2, 15.1R7; 16.1 versions prior to 16.1R5-S1, 16.1R6; 16.2 versions prior to 16.2R2-S2, 16.2R3; 17.1 versions prior to 17.1R2-S5, 17.1R3; 17.2 versions prior to 17.2R2.2018-01-10not yet calculatedCVE-2018-0006
    CONFIRM
    juniper_networks -- junos_os
     
    A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D67; 12.3 versions prior to 12.3R12-S5; 12.3X48 versions prior to 12.3X48-D35; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D44, 14.1X53-D50; 14.2 versions prior to 14.2R7-S7, 14.2R8; 15.1 versions prior to 15.1R3; 15.1X49 versions prior to 15.1X49-D30; 15.1X53 versions prior to 15.1X53-D70.2018-01-10not yet calculatedCVE-2018-0001
    CONFIRM
    juniper_networks -- junos_os
     
    A specially crafted MPLS packet received or processed by the system, on an interface configured with MPLS, will store information in the system memory. Subsequently, if this stored information is accessed, this may result in a kernel crash leading to a denial of service. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71; 12.3R12 versions prior to 12.3R12-S7; 12.3X48 versions prior to 12.3X48-D55; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D45, 14.1X53-D107; 14.2 versions prior to 14.2R7-S7, 14.2R8; 15.1 versions prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7; 15.1X49 versions prior to 15.1X49-D100; 15.1X53 versions prior to 15.1X53-D65, 15.1X53-D231; 16.1 versions prior to 16.1R3-S6, 16.1R4-S6, 16.1R5; 16.1X65 versions prior to 16.1X65-D45; 16.2 versions prior to 16.2R2-S1, 16.2R3; 17.1 versions prior to 17.1R2-S2, 17.1R3; 17.2 versions prior to 17.2R1-S3, 17.2R2; 17.2X75 versions prior to 17.2X75-D50. No other Juniper Networks products or platforms are affected by this issue.2018-01-10not yet calculatedCVE-2018-0003
    CONFIRM
    juniper_networks -- junos_space_network_management_platform
     
    A local file inclusion vulnerability in Juniper Networks Junos Space Network Management Platform may allow an authenticated user to retrieve files from the system.2018-01-10not yet calculatedCVE-2018-0013
    CONFIRM
    juniper_networks -- junos_space_security_director
     
    Junos Space is affected by a privilege escalation vulnerability that may allow a local authenticated attacker to gain root privileges.2018-01-10not yet calculatedCVE-2018-0012
    CONFIRM
    juniper_networks -- junos_space_security_director
     
    A reflected cross site scripting (XSS) vulnerability in Junos Space may potentially allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a session, and to perform administrative actions on the Junos Space network management device.2018-01-10not yet calculatedCVE-2018-0011
    CONFIRM
    juniper_networks -- junos_space_security_director
     
    A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was created for another user to perform SSH access. Affected releases are all versions of Junos Space Security Director prior to 17.2R1.2018-01-10not yet calculatedCVE-2018-0010
    CONFIRM
    juniper_networks -- screenos
     
    Juniper Networks ScreenOS devices do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is often detected as CVE-2003-0001. The issue affects all versions of Juniper Networks ScreenOS prior to 6.3.0r25.2018-01-10not yet calculatedCVE-2018-0014
    CONFIRM
    kentico -- kentico
     
    Kentico 9.0 through 11.0 has a stack-based buffer overflow via the SqlName, SqlPswd, Database, UserName, or Password field in a SilentInstall XML document.2018-01-08not yet calculatedCVE-2018-5282
    MISC
    ks_mobile -- cheetah_mobile_armorfly_browser_and_downloader
     
    Cheetah Mobile Armorfly Browser & Downloader 1.1.05.0010, when installed on unspecified "older" Android platforms, allows Same Origin Policy Bypass.2018-01-11not yet calculatedCVE-2018-5327
    MISC
    ks_mobile -- cheetah_mobile_cm_browser_app
     
    Cheetah Mobile CM Browser 5.22.06.0012, when installed on unspecified "older" Android platforms, allows Same Origin Policy Bypass.2018-01-11not yet calculatedCVE-2018-5326
    MISC
    ldaptive -- ldaptive
     
    DefaultHostnameVerifier in Ldaptive (formerly vt-ldap) does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.2018-01-08not yet calculatedCVE-2014-3607
    CONFIRM
    CONFIRM
    CONFIRM
    CONFIRM
    CONFIRM
    lenovo -- lenovo
     
    In Enterprise Networking Operating System (ENOS) in Lenovo and IBM RackSwitch and BladeCenter products, an authentication bypass known as "HP Backdoor" was discovered during a Lenovo security audit in the serial console, Telnet, SSH, and Web interfaces. This bypass mechanism can be accessed when performing local authentication under specific circumstances. If exploited, admin-level access to the switch is granted.2018-01-10not yet calculatedCVE-2017-3765
    CONFIRM
    lhaplus --lhaplus
     
    Improper verification when expanding ZIP64 archives in Lhaplus versions 1.73 and earlier may lead to unintended contents to be extracted from a specially crafted ZIP64 archive.2018-01-12not yet calculatedCVE-2017-2158
    CONFIRM
    JVN
    libav -- libav
     
    In Libav 12.1, there is an invalid memcpy call in the ff_mov_read_stsd_entries function of libavformat/mov.c. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) and program failure with a crafted avi file.2018-01-13not yet calculatedCVE-2018-5684
    MISC
    libming -- libming
     
    In libming 0.4.8, there is an integer overflow (caused by an out-of-range left shift) in the readUInt32 function (util/read.c). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted swf file.2018-01-08not yet calculatedCVE-2018-5294
    MISC
    libtiff -- libtiff
     
    LibTIFF 4.0.9 mishandles the reading of TIFF files, as demonstrated by a heap-based buffer over-read in the ReadTIFFImage function in coders/tiff.c in GraphicsMagick 1.3.27.2018-01-13not yet calculatedCVE-2018-5360
    MISC
    linuxmagic -- magicspam
     
    The LinuxMagic MagicSpam extension 2.0.13 for Plesk allows local users to discover mailbox names by reading /var/log/magicspam/mslog.2018-01-13not yet calculatedCVE-2018-5693
    MISC
    linux -- linux_kernel
     
    In the Linux kernel through 4.14.13, drivers/block/loop.c mishandles lo_release serialization, which allows attackers to cause a denial of service (__lock_acquire use-after-free) or possibly have unspecified other impact.2018-01-12not yet calculatedCVE-2018-5344
    MISC
    MISC
    linux -- linux_kernel
     
    In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.2018-01-11not yet calculatedCVE-2018-5333
    CONFIRM
    CONFIRM
    linux -- linux_kernel
     
    In the Linux kernel through 4.14.13, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).2018-01-11not yet calculatedCVE-2018-5332
    CONFIRM
    CONFIRM
    linux -- linux_kernel
     
    A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.2018-01-09not yet calculatedCVE-2017-15129
    MISC
    MISC
    MISC
    MISC
    MISC
    MISC
    MISC
    MISC
    lrzip -- lrzip
     
    In Long Range Zip (aka lrzip) 0.631, there is an infinite loop and application hang in the unzip_match function in runzip.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted lrz file.2018-01-12not yet calculatedCVE-2018-5650
    MISC
    magento -- magento
     
    Magento Community Edition and Enterprise Edition before 2.0.10 and 2.1.x before 2.1.2 have CSRF resulting in deletion of a customer address from an address book, aka APPSEC-1433.2018-01-08not yet calculatedCVE-2018-5301
    CONFIRM
    malwarebytes -- malwarebytes_premiumIn Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C40E024.2018-01-08not yet calculatedCVE-2018-5274
    MISC
    malwarebytes -- malwarebytes_premium
     
    In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C40E020.2018-01-08not yet calculatedCVE-2018-5275
    MISC
    malwarebytes -- malwarebytes_premium
     
    In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e010.2018-01-08not yet calculatedCVE-2018-5270
    MISC
    malwarebytes -- malwarebytes_premium
     
    In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e00c.2018-01-08not yet calculatedCVE-2018-5278
    MISC
    malwarebytes -- malwarebytes_premium
     
    In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e014.2018-01-08not yet calculatedCVE-2018-5273
    MISC
    malwarebytes -- malwarebytes_premium
     
    In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e000.2018-01-08not yet calculatedCVE-2018-5277
    MISC
    malwarebytes -- malwarebytes_premium
     
    In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e004.2018-01-08not yet calculatedCVE-2018-5272
    MISC
    malwarebytes -- malwarebytes_premium
     
    In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e02c.2018-01-08not yet calculatedCVE-2018-5279
    BID
    MISC
    malwarebytes -- malwarebytes_premium
     
    In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e018.2018-01-08not yet calculatedCVE-2018-5276
    MISC
    malwarebytes -- malwarebytes_premium
     
    In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e008.2018-01-08not yet calculatedCVE-2018-5271
    BID
    MISC
    matrixssl -- matrixssl
     
    MatrixSSL version 3.7.2 has an incorrect UTCTime date range validation in its X.509 certificate validation process resulting in some certificates have their expiration (beginning) year extended (delayed) by 100 years.2018-01-09not yet calculatedCVE-2017-1000415
    MISC
    MISC
    microsoft -- .net_framework_and_.net_coreMicrosoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, and 4.7 and .NET Core 1.0 and 2.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka ".NET Security Feature Bypass Vulnerability".2018-01-09not yet calculatedCVE-2018-0786
    BID
    SECTRACK
    CONFIRM
    microsoft -- .net_framework_and_.net_core
     
    Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 5.7 and .NET Core 1.0. 1.1 and 2.0 allow a denial of service vulnerability due to the way XML documents are processed, aka ".NET and .NET Core Denial Of Service Vulnerability". This CVE is unique from CVE-2018-0765.2018-01-09not yet calculatedCVE-2018-0764
    BID
    SECTRACK
    CONFIRM
    microsoft -- asp.net_core
     
    ASP.NET Core 1.0. 1.1, and 2.0 allow a cross site request forgery vulnerability due to the ASP.NET Core project templates, aka "ASP.NET Core Cross Site Request Forgery Vulnerability".2018-01-09not yet calculatedCVE-2018-0785
    BID
    SECTRACK
    CONFIRM
    microsoft -- asp.net_core
     
    ASP.NET Core 1.0. 1.1, and 2.0 allow an elevation of privilege vulnerability due to the ASP.NET Core project templates, aka "ASP.NET Core Elevation Of Privilege Vulnerability". This CVE is unique from CVE-2018-0808.2018-01-09not yet calculatedCVE-2018-0784
    BID
    SECTRACK
    CONFIRM
    microsoft -- chakracore
     
    Microsoft ChakraCore allows an attacker to bypass Control Flow Guard (CFG) in conjunction with another vulnerability to run arbitrary code on a target system, due to how the Chakra scripting engine handles accessing memory, aka "Scripting Engine Security Feature Bypass".2018-01-09not yet calculatedCVE-2018-0818
    BID
    CONFIRM
    microsoft -- office_2016_for_mac
     
    Microsoft Office 2016 for Mac allows an attacker to send a specially crafted email attachment to a user in an attempt to launch a social engineering attack, such as phishing, due to how Outlook for Mac displays encoded email addresses, aka "Spoofing Vulnerability in Microsoft Office for Mac."2018-01-09not yet calculatedCVE-2018-0819
    BID
    SECTRACK
    CONFIRM
    microsoft -- officeMicrosoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Remote Code Execution Vulnerability".2018-01-09not yet calculatedCVE-2018-0795
    BID
    SECTRACK
    CONFIRM
    microsoft -- office
     
    Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Memory Corruption Vulnerability".2018-01-09not yet calculatedCVE-2018-0812
    BID
    SECTRACK
    CONFIRM
    microsoft -- office
     
    Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807.2018-01-09not yet calculatedCVE-2018-0804
    BID
    SECTRACK
    CONFIRM
    microsoft -- office
     
    Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0804, CVE-2018-0806, and CVE-2018-08072018-01-09not yet calculatedCVE-2018-0805
    BID
    SECTRACK
    CONFIRM
    microsoft -- office
     
    Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0804, CVE-2018-0805, and CVE-2018-0806.2018-01-09not yet calculatedCVE-2018-0807
    BID
    SECTRACK
    CONFIRM
    microsoft -- office
     
    Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0804, CVE-2018-0805, and CVE-2018-0807.2018-01-09not yet calculatedCVE-2018-0806
    BID
    SECTRACK
    CONFIRM
    microsoft -- office
     
    Microsoft Excel in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Excel Remote Code Execution Vulnerability".2018-01-09not yet calculatedCVE-2018-0796
    BID
    SECTRACK
    CONFIRM
    microsoft -- office
     
    Microsoft Word 2016 in Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0794.2018-01-09not yet calculatedCVE-2018-0792
    BID
    SECTRACK
    CONFIRM
    microsoft -- office
     
    Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812.2018-01-09not yet calculatedCVE-2018-0802
    BID
    SECTRACK
    MISC
    MISC
    CONFIRM
    microsoft -- office
     
    Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability".2018-01-09not yet calculatedCVE-2018-0798
    BID
    SECTRACK
    CONFIRM
    microsoft -- office
     
    Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way RTF content is handled, aka "Microsoft Word Memory Corruption Vulnerability".2018-01-09not yet calculatedCVE-2018-0797
    BID
    SECTRACK
    CONFIRM
    microsoft -- office
     
    Microsoft Word in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0792.2018-01-09not yet calculatedCVE-2018-0794
    BID
    SECTRACK
    CONFIRM
    microsoft -- office
     
    Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Remote Code Execution Vulnerability".2018-01-09not yet calculatedCVE-2018-0801
    BID
    SECTRACK
    CONFIRM
    microsoft -- outlook
     
    Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, and Microsoft Outlook 2016 allow a remote code execution vulnerability due to the way email messages are parsed, aka "Microsoft Outlook Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0793.2018-01-09not yet calculatedCVE-2018-0791
    BID
    SECTRACK
    CONFIRM
    microsoft -- outlook
     
    Microsoft Outlook 2007, Microsoft Outlook 2010 and Microsoft Outlook 2013 allow a remote code execution vulnerability due to the way email messages are parsed, aka "Microsoft Outlook Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0791.2018-01-09not yet calculatedCVE-2018-0793
    BID
    SECTRACK
    CONFIRM
    microsoft -- sharepoint_enterprise_server
     
    Microsoft Access in Microsoft SharePoint Enterprise Server 2013 and Microsoft SharePoint Enterprise Server 2016 allows a cross-site-scripting (XSS) vulnerability due to the way image field values are handled, aka "Microsoft Access Tampering Vulnerability".2018-01-09not yet calculatedCVE-2018-0799
    BID
    SECTRACK
    CONFIRM
    microsoft -- sharepoint_products
     
    Microsoft SharePoint Foundation 2010, Microsoft SharePoint Server 2013 and Microsoft SharePoint Server 2016 allow an elevation of privilege vulnerability due to the way web requests are handled, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0790.2018-01-09not yet calculatedCVE-2018-0789
    BID
    SECTRACK
    CONFIRM
    microsoft -- sharepoint_products
     
    Microsoft SharePoint Foundation 2010, Microsoft SharePoint Server 2013 and Microsoft SharePoint Server 2016 allow an elevation of privilege vulnerability due to the way web requests are handled, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0789.2018-01-09not yet calculatedCVE-2018-0790
    BID
    SECTRACK
    CONFIRM
    milum -- office_tracker
     
    Office Tracker 11.2.5 has XSS via the logincount parameter to the /otweb/OTPClientLogin URI.2018-01-10not yet calculatedCVE-2017-18023
    MISC
    mono -- mono
     
    The TLS stack in Mono before 3.12.1 makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204.2018-01-08not yet calculatedCVE-2015-2319
    CONFIRM
    MLIST
    BID
    UBUNTU
    CONFIRM
    CONFIRM
    MISC
    DEBIAN
    mono -- mono
     
    The TLS stack in Mono before 3.12.1 allows remote attackers to have unspecified impact via vectors related to client-side SSLv2 fallback.2018-01-08not yet calculatedCVE-2015-2320
    CONFIRM
    MLIST
    BID
    UBUNTU
    CONFIRM
    CONFIRM
    DEBIAN
    mono -- mono
     
    The TLS stack in Mono before 3.12.1 allows man-in-the-middle attackers to conduct message skipping attacks and consequently impersonate clients by leveraging missing handshake state validation, aka a "SMACK SKIP-TLS" issue.2018-01-08not yet calculatedCVE-2015-2318
    CONFIRM
    MLIST
    BID
    UBUNTU
    CONFIRM
    CONFIRM
    MISC
    DEBIAN
    moxa -- moxa
     
    An issue was discovered in Moxa MXview v2.8 and prior. The unquoted service path escalation vulnerability could allow an authorized user with file access to escalate privileges by inserting arbitrary code into the unquoted service path.2018-01-12not yet calculatedCVE-2017-14030
    BID
    MISC
    newsbee_cms -- newsbee_cms
     
    NewsBee allows XSS via the Company Name field in the Settings under admin/admin.php.2018-01-13not yet calculatedCVE-2018-5687
    MISC
    newsbee_cms -- newsbee_cms
     
    SQL injection vulnerability in NewsBee CMS allow remote attackers to execute arbitrary SQL commands.2018-01-08not yet calculatedCVE-2017-5971
    EXPLOIT-DB
    novosoft -- handy_password
     
    A buffer overflow in Handy Password 4.9.3 allows remote attackers to execute arbitrary code via a long "Title name" field in "mail box" data that is mishandled in an "Open from mail box" action.2018-01-10not yet calculatedCVE-2017-17946
    MISC
    MISC
    numpy -- numpy
     
    __init__.py in f2py in NumPy before 1.8.1 allows local users to write to arbitrary files via a symlink attack on a temporary file.2018-01-08not yet calculatedCVE-2014-1858
    FEDORA
    FEDORA
    MLIST
    BID
    CONFIRM
    CONFIRM
    XF
    CONFIRM
    CONFIRM
    CONFIRM
    numpy -- numpy
     
    (1) core/tests/test_memmap.py, (2) core/tests/test_multiarray.py, (3) f2py/f2py2e.py, and (4) lib/tests/test_io.py in NumPy before 1.8.1 allow local users to write to arbitrary files via a symlink attack on a temporary file.2018-01-08not yet calculatedCVE-2014-1859
    FEDORA
    FEDORA
    MLIST
    BID
    CONFIRM
    CONFIRM
    XF
    CONFIRM
    CONFIRM
    CONFIRM
    opencv -- opencv
     
    In OpenCV 3.3.1, an assertion failure happens in cv::RBaseStream::setPos in modules/imgcodecs/src/bitstrm.cpp because of an incorrect integer cast.2018-01-08not yet calculatedCVE-2018-5269
    MISC
    opencv -- opencv
     
    In OpenCV 3.3.1, a heap-based buffer overflow happens in cv::Jpeg2KDecoder::readComponent8u in modules/imgcodecs/src/grfmt_jpeg2000.cpp when parsing a crafted image file.2018-01-08not yet calculatedCVE-2018-5268
    MISC
    palo_alto_networks -- pan-os
     
    Cross-site scripting (XSS) vulnerability in the Captive Portal function in Palo Alto Networks PAN-OS before 8.0.7 allows remote attackers to inject arbitrary web script or HTML by leveraging an unspecified configuration.2018-01-10not yet calculatedCVE-2017-16878
    SECTRACK
    CONFIRM
    palo_alto_networks -- pan-os
     
    Palo Alto Networks PAN-OS 6.1, 7.1, and 8.0.x before 8.0.7, when an interface implements SSL decryption with RSA enabled or hosts a GlobalProtect portal or gateway, might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.2018-01-10not yet calculatedCVE-2017-17841
    BID
    SECTRACK
    CONFIRM
    palo_alto_networks -- pan-os
     
    Cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.7, when the GlobalProtect gateway or portal is configured, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.2018-01-10not yet calculatedCVE-2017-15941
    BID
    SECTRACK
    CONFIRM
    parity -- parity_browser
     
    Parity Browser 1.6.10 and earlier allows remote attackers to bypass the Same Origin Policy and obtain sensitive information by requesting other websites via the Parity web proxy engine (reusing the current website's token, which is not bound to an origin).2018-01-11not yet calculatedCVE-2017-18016
    MLIST
    CONFIRM
    MISC
    EXPLOIT-DB
    perl -- perl
     
    clipedit in the Clipboard module for Perl allows local users to delete arbitrary files via a symlink attack on /tmp/clipedit$$.2018-01-08not yet calculatedCVE-2014-5509
    MLIST
    BID
    CONFIRM
    MISC
    phoenix_contact -- fl_switchAn Improper Authorization issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to craft special HTTP requests allowing an attacker to bypass web-service authentication allowing the attacker to obtain administrative privileges on the device.2018-01-12not yet calculatedCVE-2017-16743
    MISC
    phoenix_contact -- fl_switch
     
    An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information.2018-01-12not yet calculatedCVE-2017-16741
    MISC
    phpmelody -- phpmelody
     
    PHP Melody version 2.7.1 suffer from SQL Injection Time-based attack on the page ajax.php with the parameter playlist.2018-01-09not yet calculatedCVE-2018-5211
    EXPLOIT-DB
    piwigo -- piwigo
     
    Piwigo v2.8.2 has XSS via the `tab`, `to`, `section`, `mode`, `installstatus`, and `display` parameters of the `admin.php` file.2018-01-13not yet calculatedCVE-2018-5692
    MISC
    podofo -- podofo
     
    In PoDoFo 0.9.5, there is an uncontrolled memory allocation in the PdfParser::ReadXRefSubsection function (base/PdfParser.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted pdf file.2018-01-08not yet calculatedCVE-2018-5296
    MISC
    podofo -- podofo
     
    In PoDoFo 0.9.5, there is an integer overflow in the PdfObjectStreamParserObject::ReadObjectsFromStream function (base/PdfObjectStreamParserObject.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted pdf file.2018-01-09not yet calculatedCVE-2018-5309
    MISC
    podofo -- podofo
     
    PoDoFo 0.9.5 does not properly validate memcpy arguments in the PdfMemoryOutputStream::Write function (base/PdfOutputStream.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service or possibly unspecified other impact via a crafted pdf file.2018-01-09not yet calculatedCVE-2018-5308
    MISC
    podofo -- podofo
     
    In PoDoFo 0.9.5, there is an integer overflow in the PdfXRefStreamParserObject::ParseStream function (base/PdfXRefStreamParserObject.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted pdf file.2018-01-08not yet calculatedCVE-2018-5295
    MISC
    prestashop -- prestashop
     
    PrestaShop 1.7.2.4 allow user enumeration via the Reset Password feature, by noticing which reset attempts do not produce a "This account does not exist" error message.2018-01-13not yet calculatedCVE-2018-5682
    MISC
    prestashop -- prestashop
     
    PrestaShop 1.7.2.4 has XSS via source-code editing on the "Pages > Edit page" screen.2018-01-13not yet calculatedCVE-2018-5681
    MISC
    proctor_and_gamble -- oral-b_app
     
    In the Procter & Gamble "Oral-B App" (aka com.pg.oralb.oralbapp) application 5.0.0 for Android, AES encryption with static parameters is used to secure the locally stored shared preferences. An attacker can gain access to locally stored user data more easily by leveraging access to the preferences XML file.2018-01-08not yet calculatedCVE-2018-5298
    MISC
    progress_software -- sitefinity
     
    Sitefinity 5.1, 5.2, 5.3, 5.4, 6.x, 7.x, 8.x, 9.x, and 10.x allow remote attackers to bypass authentication and consequently cause a denial of service on load balanced sites or gain privileges via vectors related to weak cryptography.2018-01-08not yet calculatedCVE-2017-15883
    CONFIRM
    MISC
    qemu -- qemu
     
    Use-after-free vulnerability in hw/pci/pcie.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU instance crash) via hotplug and hotunplug operations of Virtio block devices.2018-01-12not yet calculatedCVE-2014-3471
    GENTOO
    MLIST
    BID
    CONFIRM
    MLIST
    qemu -- qemu
     
    VNC server implementation in Quick Emulator (QEMU) before 2.14.3 was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host.2018-01-09not yet calculatedCVE-2017-15124
    CONFIRM
    red_hat -- cloudforums_management_engine
     
    The check_privileges method in vmdb/app/controllers/application_controller.rb in ManageIQ, as used in Red Hat CloudForms Management Engine (CFME), allows remote authenticated users to bypass authorization and gain privileges by leveraging improper RBAC checking, related to the rbac_user_edit action.2018-01-11not yet calculatedCVE-2014-0087
    CONFIRM
    MISC
    red_hat -- enterprise_linux
     
    It was found that system umask policy is not being honored when creating XDG user directories, since Xsession sources xdg-user-dirs.sh before setting umask policy. This only affects xdg-user-dirs before 0.15.5 as shipped with Red Hat Enterprise Linux.2018-01-09not yet calculatedCVE-2017-15131
    CONFIRM
    red_hat -- jboss_enterprise_application_platform
     
    It was discovered that the jboss init script as used in Red Hat JBoss Enterprise Application Platform 7.0.7.GA performed unsafe file handling which could result in local privilege escalation. This issue is a result of an incomplete fix for CVE-2016-8656.2018-01-10not yet calculatedCVE-2017-12189
    BID
    REDHAT
    REDHAT
    REDHAT
    REDHAT
    CONFIRM
    red_hat -- openshift_enterprise
     
    (1) oo-analytics-export and (2) oo-analytics-import in the openshift-origin-broker-util package in Red Hat OpenShift Enterprise 1 and 2 allow local users to have unspecified impact via a symlink attack on an unspecified file in /tmp.2018-01-08not yet calculatedCVE-2013-4364
    CONFIRM
    redmine -- redmine
     
    Redmine before 3.2.9, 3.3.x before 3.3.6, and 3.4.x before 3.4.4 does not block the --config and --debugger flags to the Mercurial hg program, which allows remote attackers to execute arbitrary commands (through the Mercurial adapter) via vectors involving a branch whose name begins with a --config= or --debugger= substring, a related issue to CVE-2017-17536.2018-01-10not yet calculatedCVE-2017-18026
    MISC
    MISC
    MISC
    MISC
    MISC
    rockwell_automation_allen-bradley -- micrologix_1400_controllers
     
    A Buffer Overflow issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers, Series B and C Versions 21.002 and earlier. The stack-based buffer overflow vulnerability has been identified, which may allow remote code execution.2018-01-09not yet calculatedCVE-2017-16740
    BID
    MISC
    ruby -- ruby
     
    test/tc_database.rb in the lean-ruport gem 0.3.8 for Ruby places the mysql user password on the mysqldump command line, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-4998
    MLIST
    MLIST
    MISC
    ruby -- ruby
     
    Race condition in lib/vlad/dba/mysql.rb in the VladTheEnterprising gem 0.2 for Ruby allows local users to obtain sensitive information by reading the MySQL root password from a temporary file before it is removed.2018-01-10not yet calculatedCVE-2014-4995
    MLIST
    MLIST
    BID
    MISC
    XF
    ruby -- ruby
     
    lib/vlad/dba/mysql.rb in the VladTheEnterprising gem 0.2 for Ruby allows local users to write to arbitrary files via a symlink attack on /tmp/my.cnf.#{target_host}.2018-01-10not yet calculatedCVE-2014-4996
    MLIST
    MLIST
    BID
    MISC
    XF
    ruby -- ruby
     
    (1) lib/backup/cli/utility.rb in the backup-agoddard gem 3.0.28 and (2) lib/backup/cli/utility.rb in the backup_checksum gem 3.0.23 for Ruby place credentials on the openssl command line, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-4993
    MLIST
    MLIST
    MLIST
    MISC
    MISC
    ruby -- ruby
     
    lib/commands/setup.rb in the point-cli gem 0.0.1 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-4997
    MLIST
    MLIST
    BID
    MISC
    ruby -- ruby
     
    lib/gyazo/client.rb in the gyazo gem 1.0.0 for Ruby allows local users to write to arbitrary files via a symlink attack on a temporary file, related to time-based filenames.2018-01-10not yet calculatedCVE-2014-4994
    MLIST
    MLIST
    MISC
    ruby -- ruby
     
    lib/cap-strap/helpers.rb in the cap-strap gem 0.1.5 for Ruby places credentials on the useradd command line, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-4992
    MLIST
    MLIST
    MISC
    ruby -- ruby
     
    chef/travis-cookbooks/ci_environment/perlbrew/recipes/default.rb in the ciborg gem 3.0.0 for Ruby allows local users to write to arbitrary files and gain privileges via a symlink attack on /tmp/perlbrew-installer.2018-01-10not yet calculatedCVE-2014-5003
    MLIST
    MLIST
    MISC
    ruby -- ruby
     
    (1) lib/dataset/database/mysql.rb and (2) lib/dataset/database/postgresql.rb in the codders-dataset gem 1.3.2.1 for Ruby place credentials on the mysqldump command line, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-4991
    MLIST
    MLIST
    BID
    MISC
    ruby -- ruby
     
    The login function in lib/lawn.rb in the lawn-login gem 0.0.7 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-5000
    MLIST
    MLIST
    MISC
    ruby -- ruby
     
    The lynx gem 0.2.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes.2018-01-10not yet calculatedCVE-2014-5002
    MLIST
    MLIST
    MISC
    ruby -- ruby
     
    lib/ksymfony1.rb in the kcapifony gem 2.1.6 for Ruby places database user passwords on the (1) mysqldump, (2) pg_dump, (3) mysql, and (4) psql command lines, which allows local users to obtain sensitive information by listing the processes.2018-01-10not yet calculatedCVE-2014-5001
    MLIST
    MLIST
    MISC
    ruby -- ruby
     
    lib/brbackup.rb in the brbackup gem 0.1.1 for Ruby places the database password on the mysql command line, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-5004
    MLIST
    MLIST
    BID
    MISC
    ruby -- ruby
     
    vendor/plugins/dataset/lib/dataset/database/mysql.rb in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local users to obtain sensitive information by listing the process.2018-01-10not yet calculatedCVE-2014-4999
    MLIST
    MLIST
    MISC
    sap -- hana
     
    A remote unauthenticated attacker, SAP HANA 1.00 and 2.00, could send specially crafted SOAP requests to the SAP Startup Service and disclose information such as the platform's hostname.2018-01-09not yet calculatedCVE-2018-2362
    BID
    CONFIRM
    CONFIRM
    sap -- netweaver_and_basis
     
    SAP NetWeaver, SAP BASIS from 7.00 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.52, contains code that allows you to execute arbitrary program code of the user's choice. A malicious user can therefore control the behaviour of the system or can potentially escalate privileges by executing malicious code without legitimate credentials.2018-01-09not yet calculatedCVE-2018-2363
    BID
    CONFIRM
    CONFIRM
    CONFIRM
    sap -- solution_manager
     
    In SAP Solution Manager 7.20, the role SAP_BPO_CONFIG gives the Business Process Operations (BPO) configuration user more authorization than required for configuring the BPO tools.2018-01-09not yet calculatedCVE-2018-2361
    BID
    CONFIRM
    CONFIRM
    sap -- startup_service
     
    SAP Startup Service, SAP KERNEL 7.45, 7.49, and 7.52, is missing an authentication check for functionalities that require user identity and cause consumption of file system storage.2018-01-09not yet calculatedCVE-2018-2360
    BID
    CONFIRM
    CONFIRM
    seagate -- personal_cloud
     
    Seagate Media Server in Seagate Personal Cloud has unauthenticated command injection in the uploadTelemetry and getLogs functions in views.py because .psp URLs are handled by the fastcgi.server component and shell metacharacters are mishandled.2018-01-11not yet calculatedCVE-2018-5347
    MISC
    shibboleth -- shibboleth
     
    Shibboleth XMLTooling-C before 1.6.3, as used in Shibboleth Service Provider before 2.6.0 on Windows and other products, mishandles digital signatures of user attribute data, which allows remote attackers to obtain sensitive information or conduct impersonation attacks via a crafted DTD.2018-01-13not yet calculatedCVE-2018-0486
    MISC
    MISC
    skybox_security -- skybox_platform
     
    An issue was discovered in Skybox Platform before 7.5.401. SQL Injection exists in /skyboxview/webservice/services/VersionWebService via a soapenv:Body element.2018-01-12not yet calculatedCVE-2015-9249
    MISC
    skybox_security -- skybox_platform
     
    An issue was discovered in Skybox Platform before 7.5.401. Directory Traversal exists in /skyboxview/webskybox/attachmentdownload and /skyboxview/webskybox/filedownload via the tempFileName parameter.2018-01-12not yet calculatedCVE-2015-9250
    MISC
    skybox_security -- skybox_platform
     
    An issue was discovered in Skybox Platform before 7.5.401. Reflected cross-site scripting vulnerabilities exist in /skyboxview/webservice/services/VersionRepositoryWebService via a soapenv:Body element, or in the status parameter to login.html.2018-01-12not yet calculatedCVE-2015-9247
    MISC
    skybox_security -- skybox_platform
     
    An issue was discovered in Skybox Platform before 7.5.401. Remote Unauthenticated Code Execution exists via a WAR archive containing a JSP file. The WAR file is sent to /skyboxview-softwareupdate/services/CollectorSoftwareUpdate and the JSP file is reached at /opt/skyboxview/thirdparty/jboss/server/web/work/jboss.web/localhost.2018-01-12not yet calculatedCVE-2015-9246
    MISC
    skybox_security -- skybox_platform
     
    An issue was discovered in Skybox Platform before 7.5.401. Stored cross-site scripting vulnerabilities exist in the title, Comments, or Description field to /skyboxview/webskybox/tickets in Change Manager.2018-01-12not yet calculatedCVE-2015-9248
    MISC
    sonicwall -- sonicos
     
    SonicWall SonicOS on Network Security Appliance (NSA) 2016 Q4 devices has XSS via the Configure SSO screens.2018-01-08not yet calculatedCVE-2018-5280
    BID
    MISC
    sonicwall -- sonicos
     
    SonicWall SonicOS on Network Security Appliance (NSA) 2017 Q4 devices has XSS via the CFS Custom Category and Cloud AV DB Exclusion Settings screens.2018-01-08not yet calculatedCVE-2018-5281
    BID
    MISC
    sonicwall -- global_management_system
     
    SonicWall Global Management System (GMS) 8.1 has XSS via the `newName` and `Name` values of the `/sgms/TreeControl` module.2018-01-13not yet calculatedCVE-2018-5691
    MISC
    MISC
    sophos -- xg_firewall
     
    An NC-25986 issue was discovered in the Logging subsystem of Sophos XG Firewall with SFOS before 17.0.3 MR3. An unauthenticated user can trigger a persistent XSS vulnerability found in the WAF log page (Control Center -> Log Viewer -> in the filter option "Web Server Protection") in the webadmin interface, and execute any action available to the webadmin of the firewall (e.g., creating a new user, enabling SSH, or adding an SSH authorized key). The WAF log page will execute the "User-Agent" parameter in the HTTP POST request.2018-01-12not yet calculatedCVE-2017-18014
    FULLDISC
    MISC
    CONFIRM
    CONFIRM
    sulu-standard -- sulu-standard
     
    Sulu-standard version 1.6.6 is vulnerable to stored cross-site scripting vulnerability, within the page creation page, which can result in disruption of service and execution of javascript code.2018-01-09not yet calculatedCVE-2017-1000465
    CONFIRM
    symantec -- advanced_security_gateway
     
    The Symantec Advanced Secure Gateway (ASG) 6.6, ASG 6.7 (prior to 6.7.2.1), ProxySG 6.5 (prior to 6.5.10.6), ProxySG 6.6, and ProxySG 6.7 (prior to 6.7.2.1) management console is susceptible to a reflected XSS vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to inject arbitrary JavaScript code into the management console web client application. This is a separate vulnerability from CVE-2016-10256.2018-01-09not yet calculatedCVE-2016-10257
    BID
    SECTRACK
    CONFIRM
    symantec -- proxysg
     
    The Symantec ProxySG 6.5 (prior to 6.5.10.6), 6.6, and 6.7 (prior to 6.7.2.1) management console is susceptible to a reflected XSS vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to inject arbitrary JavaScript code into the management console web client application. This is a separate vulnerability from CVE-2016-10257.2018-01-09not yet calculatedCVE-2016-10256
    BID
    SECTRACK
    CONFIRM
    symmetricom -- s350i
     
    SQL injection vulnerability in the checkPassword function in Symmetricom s350i 2.70.15 allows remote attackers to execute arbitrary SQL commands via vectors involving a username.2018-01-08not yet calculatedCVE-2014-5071
    MISC
    symmetricom -- s350i
     
    Directory traversal vulnerability in the web application in Symmetricom s350i 2.70.15 allows remote attackers to read arbitrary files via a (1) ../ (dot dot slash) or (2) ..\ (dot dot forward slash) before a file name.2018-01-11not yet calculatedCVE-2014-5068
    MISC
    symmetricom -- s350i
     
    Cross-site scripting (XSS) vulnerability in Symmetricom s350i 2.70.15 allows remote attackers to inject arbitrary web script or HTML via vectors involving system logs.2018-01-08not yet calculatedCVE-2014-5069
    MISC
    symmetricom -- s350i
     
    Symmetricom s350i 2.70.15 allows remote authenticated users to gain privileges via vectors related to pushing unauthenticated users to the login page.2018-01-11not yet calculatedCVE-2014-5070
    MISC
    teamspeak -- clientBuffer overflow in TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab with two \\ (backslash) characters, a digit, a \ (backslash) character, and "z" in a series of nested img BBCODE tags.2018-01-08not yet calculatedCVE-2014-7222
    MISC
    MISC
    MISC
    BID
    XF
    teamspeak -- client
     
    TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (buffer overflow and application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab containing [img]//http:// substrings.2018-01-08not yet calculatedCVE-2014-7221
    MISC
    MISC
    BID
    XF
    MISC
    tp-link -- multiple_devicesTP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-time variable in the webfilter.lua file.2018-01-11not yet calculatedCVE-2017-15636
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-interface variable in the cmxddns.lua file.2018-01-11not yet calculatedCVE-2017-15613
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-outif variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15614
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-workmode variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15631
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-remotesubnet variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15630
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the max_conn variable in the session_limits.lua file.2018-01-11not yet calculatedCVE-2017-15635
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-mppeencryption variable in the pptp_server.lua file.2018-01-11not yet calculatedCVE-2017-15632
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-pns variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15627
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the lcpechointerval variable in the pptp_server.lua file.2018-01-11not yet calculatedCVE-2017-15628
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the name variable in the wportal.lua file.2018-01-11not yet calculatedCVE-2017-15634
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-ipgroup variable in the session_limits.lua file.2018-01-11not yet calculatedCVE-2017-15633
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the pptphellointerval variable in the pptp_server.lua file.2018-01-11not yet calculatedCVE-2017-15637
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-tunnelname variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15629
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-olmode variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15625
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-interface variable in the phddns.lua file.2018-01-11not yet calculatedCVE-2017-15616
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-zone variable in the ipmac_import.lua file.2018-01-11not yet calculatedCVE-2017-15620
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-enable variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15618
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the iface variable in the interface_wan.lua file.2018-01-11not yet calculatedCVE-2017-15617
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the pptphellointerval variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15619
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-bindif variable in the pptp_server.lua file.2018-01-11not yet calculatedCVE-2017-15626
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-authtype variable in the pptp_server.lua file.2018-01-11not yet calculatedCVE-2017-15624
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the lcpechointerval variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15615
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-mppeencryption variable in the pptp_client.lua file.2018-01-11not yet calculatedCVE-2017-15622
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-enable variable in the pptp_server.lua file.2018-01-11not yet calculatedCVE-2017-15623
    BUGTRAQ
    MISC
    tp-link -- multiple_devices
     
    TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the olmode variable in the interface_wan.lua file.2018-01-11not yet calculatedCVE-2017-15621
    BUGTRAQ
    MISC
    undertow -- undertow
     
    In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.2018-01-10not yet calculatedCVE-2017-7559
    REDHAT
    REDHAT
    REDHAT
    REDHAT
    REDHAT
    REDHAT
    REDHAT
    REDHAT
    CONFIRM
    CONFIRM
    vmware -- v4_desktop_agents
     
    The VMware V4H and V4PA desktop agents (6.x before 6.5.1) contain a privilege escalation vulnerability. Successful exploitation of this issue could result in a low privileged windows user escalating their privileges to SYSTEM.2018-01-05not yet calculatedCVE-2017-4946
    BID
    SECTRACK
    CONFIRM
    vmware -- workstation_and_fusion
     
    VMware Workstation and Fusion contain a use-after-free vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may allow a guest to execute code on the host. Note: IPv6 mode for VMNAT is not enabled by default.2018-01-11not yet calculatedCVE-2017-4949
    BID
    SECTRACK
    CONFIRM
    vmware -- workstation_and_fusion
     
    VMware Workstation and Fusion contain an integer overflow vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may lead to an out-of-bound read which can then be used to execute code on the host in conjunction with other issues. Note: IPv6 mode for VMNAT is not enabled by default.2018-01-11not yet calculatedCVE-2017-4950
    BID
    SECTRACK
    CONFIRM
    vmware -- workstation
     
    VMware Workstation (14.x before 14.1.0 and 12.x) and Horizon View Client (4.x before 4.7.0) contain an out-of-bounds read vulnerability in TPView.dll. On Workstation, this issue in conjunction with other bugs may allow a guest to leak information from host or may allow for a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this issue in conjunction with other bugs may allow a View desktop to leak information from host or may allow for a Denial of Service on the Windows OS that runs the Horizon View Client. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View.2018-01-05not yet calculatedCVE-2017-4948
    BID
    SECTRACK
    SECTRACK
    SECTRACK
    CONFIRM
    vmware -- workstation
     
    VMware Workstation (14.x and 12.x) and Fusion (10.x and 8.x) contain a guest access control vulnerability. This issue may allow program execution via Unity on locked Windows VMs. VMware Tools must be updated to 10.2.0 for each VM to resolve CVE-2017-4945. VMware Tools 10.2.0 is consumed by Workstation 14.1.0 and Fusion 10.1.0 by default.2018-01-05not yet calculatedCVE-2017-4945
    BID
    SECTRACK
    SECTRACK
    CONFIRM
    websitebaker -- websitebaker
     
    Multiple persistent stored Cross-Site-Scripting (XSS) vulnerabilities in the files /wb/admin/admintools/tool.php (Droplet Description) and /install/index.php (Site Title) in WebsiteBaker 2.10.0 allow attackers to insert persistent JavaScript code that gets reflected back to users in multiple areas in the application.2018-01-10not yet calculatedCVE-2017-16514
    MISC
    wecon_technology -- levi_studio_hmi_editor
     
    An issue was discovered in WECON Technology LEVI Studio HMI Editor v1.8.29 and prior. A specially-crafted malicious file may be able to cause a heap-based buffer overflow vulnerability when opened by a user.2018-01-12not yet calculatedCVE-2017-16737
    BID
    MISC
    wecon_technology -- levi_studio_hmi_editor
     
    An issue was discovered in WECON Technology LEVI Studio HMI Editor v1.8.29 and prior. Specially-crafted malicious files may be able to cause stack-based buffer overflow vulnerabilities, which may allow remote code execution.2018-01-12not yet calculatedCVE-2017-16739
    BID
    MISC
    whale -- whale
     
    The Installer in Whale allows DLL hijacking.2018-01-07not yet calculatedCVE-2017-15913
    CONFIRM
    wireshark -- wireshark
     
    In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the WCP dissector could crash. This was addressed in epan/dissectors/packet-wcp.c by validating the available buffer length.2018-01-11not yet calculatedCVE-2018-5335
    BID
    CONFIRM
    CONFIRM
    CONFIRM
    wireshark -- wireshark
     
    In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by correcting the signature timestamp bounds checks.2018-01-11not yet calculatedCVE-2018-5334
    BID
    CONFIRM
    CONFIRM
    CONFIRM
    wireshark -- wireshark
     
    In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash. This was addressed in epan/tvbparse.c by limiting the recursion depth.2018-01-11not yet calculatedCVE-2018-5336
    CONFIRM
    CONFIRM
    CONFIRM
    CONFIRM
    wizardmac -- wizardmac
     
    libreadstat.a in WizardMac ReadStat 0.1.1 has a heap-based buffer over-read via an unterminated string.2018-01-13not yet calculatedCVE-2018-5698
    CONFIRM
    wordpress -- wordpressAn issue was discovered in the weblizar-pinterest-feeds plugin 1.1.1 for WordPress. XSS exists via the wp-admin/admin-ajax.php weblizar_pffree_settings_save_get-users parameter.2018-01-12not yet calculatedCVE-2018-5653
    MISC
    wordpress -- wordpressThe WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[browser_redirect][redirect_by_language] parameter to wp-admin/options.php.2018-01-12not yet calculatedCVE-2018-5364
    MISC
    MISC
    wordpress -- wordpressAn issue was discovered in the dark-mode plugin 1.6 for WordPress. XSS exists via the wp-admin/profile.php dark_mode_end parameter.2018-01-12not yet calculatedCVE-2018-5652
    MISC
    wordpress -- wordpressThe WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[post_type][post] parameter to wp-admin/options.php.2018-01-12not yet calculatedCVE-2018-5367
    MISC
    MISC
    wordpress -- wordpressAn issue was discovered in the weblizar-pinterest-feeds plugin 1.1.1 for WordPress. XSS exists via the wp-admin/admin-ajax.php security parameter.2018-01-12not yet calculatedCVE-2018-5655
    MISC
    wordpress -- wordpressAn issue was discovered in the read-and-understood plugin 2.1 for WordPress. XSS exists via the wp-admin/options-general.php rnu_username_validation_title parameter.2018-01-12not yet calculatedCVE-2018-5668
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php social_icon_1 parameter.2018-01-12not yet calculatedCVE-2018-5664
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php button_text_link parameter.2018-01-12not yet calculatedCVE-2018-5663
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. CSRF exists via wp-admin/admin.php.2018-01-12not yet calculatedCVE-2018-5658
    MISC
    wordpress -- wordpress
     
    The Jetpack plugin before 4.0.3 for WordPress has XSS via a crafted Vimeo link.2018-01-12not yet calculatedCVE-2016-10706
    MISC
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php coming-soon_title parameter.2018-01-12not yet calculatedCVE-2018-5659
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php logo_height parameter.2018-01-12not yet calculatedCVE-2018-5665
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php coming-soon_sub_title parameter.2018-01-12not yet calculatedCVE-2018-5660
    MISC
    wordpress -- wordpress
     
    The WpJobBoard plugin 4.4.4 for WordPress allows SQL injection via the order or sort parameter to the wpjb-job or wpjb-alerts module, with a request to wp-admin/admin.php.2018-01-13not yet calculatedCVE-2018-5695
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php logo_width parameter.2018-01-12not yet calculatedCVE-2018-5661
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. XSS exists via the wp-admin/admin.php form_field5[label] parameter.2018-01-12not yet calculatedCVE-2018-5672
    MISC
    wordpress -- wordpress
     
    The Photos in Wifi application 1.0.1 for iOS has directory traversal via the ext parameter to assets-library://asset/asset.php.2018-01-08not yet calculatedCVE-2018-5283
    MISC
    wordpress -- wordpress
     
    The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-transfer page.2018-01-08not yet calculatedCVE-2018-5288
    MISC
    MISC
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. XSS exists via the wp-admin/admin.php sale_conditions[count][] parameter.2018-01-12not yet calculatedCVE-2018-5670
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. CSRF exists via wp-admin/admin.php.2018-01-12not yet calculatedCVE-2018-5673
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the read-and-understood plugin 2.1 for WordPress. XSS exists via the wp-admin/options-general.php rnu_username_validation_pattern parameter.2018-01-12not yet calculatedCVE-2018-5667
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the read-and-understood plugin 2.1 for WordPress. CSRF exists via wp-admin/options-general.php.2018-01-12not yet calculatedCVE-2018-5669
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php counter_title parameter.2018-01-12not yet calculatedCVE-2018-5662
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php counter_title_icon parameter.2018-01-12not yet calculatedCVE-2018-5657
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php bg_color parameter.2018-01-12not yet calculatedCVE-2018-5666
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the weblizar-pinterest-feeds plugin 1.1.1 for WordPress. XSS exists via the wp-admin/admin-ajax.php PFFREE_Access_Token parameter.2018-01-12not yet calculatedCVE-2018-5654
    MISC
    wordpress -- wordpress
     
    The GD Rating System plugin 2.3 for WordPress has Directory Traversal in the wp-admin/admin.php panel parameter for the gd-rating-system-information page.2018-01-08not yet calculatedCVE-2018-5289
    MISC
    MISC
    MISC
    wordpress -- wordpress
     
    The GD Rating System plugin 2.3 for WordPress has Directory Traversal in the wp-admin/admin.php panel parameter for the gd-rating-system-transfer page.2018-01-08not yet calculatedCVE-2018-5290
    MISC
    MISC
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. XSS exists via the wp-admin/admin.php extra_field1[items][field_item1][price_percent] parameter.2018-01-12not yet calculatedCVE-2018-5671
    MISC
    wordpress -- wordpress
     
    The Jetpack plugin before 4.0.4 for WordPress has XSS via the Likes module.2018-01-12not yet calculatedCVE-2016-10705
    MISC
    MISC
    wordpress -- wordpress
     
    The Easy Custom Auto Excerpt plugin 2.4.6 for WordPress has XSS via the tonjoo_ecae_options[custom_css] parameter to the wp-admin/admin.php?page=tonjoo_excerpt URI.2018-01-09not yet calculatedCVE-2018-5311
    MISC
    MISC
    wordpress -- wordpress
     
    The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-about page.2018-01-08not yet calculatedCVE-2018-5286
    MISC
    MISC
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the weblizar-pinterest-feeds plugin 1.1.1 for WordPress. CSRF exists via wp-admin/admin-ajax.php.2018-01-12not yet calculatedCVE-2018-5656
    MISC
    wordpress -- wordpress
     
    The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[post_type][page] parameter to wp-admin/options.php.2018-01-12not yet calculatedCVE-2018-5362
    MISC
    MISC
    wordpress -- wordpress
     
    The GD Rating System plugin 2.3 for WordPress has Directory Traversal in the wp-admin/admin.php panel parameter for the gd-rating-system-about page.2018-01-08not yet calculatedCVE-2018-5287
    MISC
    MISC
    MISC
    wordpress -- wordpress
     
    The tabs-responsive plugin 1.8.0 for WordPress has XSS via the post_title parameter to wp-admin/post.php.2018-01-09not yet calculatedCVE-2018-5312
    MISC
    MISC
    wordpress -- wordpress
     
    The Wachipi WP Events Calendar plugin 1.0 for WordPress has SQL Injection via the event_id parameter to event.php.2018-01-12not yet calculatedCVE-2018-5315
    MISC
    EXPLOIT-DB
    wordpress -- wordpress
     
    In the "Media from FTP" plugin before 9.85 for WordPress, Directory Traversal exists via the searchdir parameter to the wp-admin/admin.php?page=mediafromftp-search-register URI.2018-01-09not yet calculatedCVE-2018-5310
    MISC
    MISC
    MISC
    wordpress -- wordpress
     
    The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-tools page.2018-01-08not yet calculatedCVE-2018-5293
    MISC
    MISC
    MISC
    wordpress -- wordpress
     
    The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[enabled_languages][en] or wpglobus_option[enabled_languages][fr] (or any other language) parameter to wp-admin/options.php.2018-01-12not yet calculatedCVE-2018-5363
    MISC
    MISC
    wordpress -- wordpress
     
    The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[selector_wp_list_pages][show_selector] parameter to wp-admin/options.php.2018-01-12not yet calculatedCVE-2018-5365
    MISC
    MISC
    wordpress -- wordpress
     
    The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-information page.2018-01-08not yet calculatedCVE-2018-5292
    MISC
    MISC
    MISC
    wordpress -- wordpress
     
    The GD Rating System plugin 2.3 for WordPress has Directory Traversal in the wp-admin/admin.php panel parameter for the gd-rating-system-tools page.2018-01-08not yet calculatedCVE-2018-5291
    MISC
    MISC
    MISC
    wordpress -- wordpress
     
    The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[more_languages] parameter to wp-admin/options.php.2018-01-12not yet calculatedCVE-2018-5366
    MISC
    MISC
    wordpress -- wordpress
     
    The ImageInject plugin 1.15 for WordPress has CSRF via wp-admin/options-general.php.2018-01-08not yet calculatedCVE-2018-5285
    MISC
    MISC
    MISC
    wordpress -- wordpress
     
    The ImageInject plugin 1.15 for WordPress has XSS via the flickr_appid parameter to wp-admin/options-general.php.2018-01-08not yet calculatedCVE-2018-5284
    MISC
    MISC
    MISC
    wordpress -- wordpress
     
    The "SagePay Server Gateway for WooCommerce" plugin before 1.0.9 for WordPress has XSS via the includes/pages/redirect.php page parameter.2018-01-09not yet calculatedCVE-2018-5316
    MISC
    MISC
    MISC
    wordpress -- wordpress
     
    An issue was discovered in the dark-mode plugin 1.6 for WordPress. XSS exists via the wp-admin/profile.php dark_mode_start parameter.2018-01-12not yet calculatedCVE-2018-5651
    MISC
    wordpress -- wordpress
     
    The Dbox 3D Slider Lite plugin through 1.2.2 for WordPress has SQL Injection via settings\sliders.php (current_slider_id parameter).2018-01-12not yet calculatedCVE-2018-5374
    MISC
    wordpress -- wordpress
     
    The Smooth Slider plugin through 2.8.6 for WordPress has SQL Injection via smooth-slider.php (trid parameter).2018-01-12not yet calculatedCVE-2018-5373
    MISC
    wordpress -- wordpress
     
    The SrbTransLatin plugin 1.46 for WordPress has XSS via an srbtranslatoptions action to wp-admin/options-general.php with a lang_identificator parameter.2018-01-12not yet calculatedCVE-2018-5369
    MISC
    MISC
    wordpress -- wordpress
     
    The SrbTransLatin plugin 1.46 for WordPress has CSRF via an srbtranslatoptions action to wp-admin/options-general.php.2018-01-12not yet calculatedCVE-2018-5368
    MISC
    MISC
    wordpress -- wordpress
     
    The Testimonial Slider plugin through 1.2.4 for WordPress has SQL Injection via settings\sliders.php (current_slider_id parameter).2018-01-12not yet calculatedCVE-2018-5372
    MISC
    wordpress -- wordpress
     
    The WPGlobus plugin 1.9.6 for WordPress has CSRF via wp-admin/options.php.2018-01-12not yet calculatedCVE-2018-5361
    MISC
    MISC
    xen -- xen
     
    In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn't freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.2018-01-05not yet calculatedCVE-2018-5244
    BID
    CONFIRM
    xplico -- xplico
     
    Xplico before 1.2.1 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the name of an uploaded PCAP file. NOTE: this issue can be exploited without authentication by leveraging the user registration feature.2018-01-05not yet calculatedCVE-2017-16666
    CONFIRM
    MISC
    MISC
    MISC
    EXPLOIT-DB
    CONFIRM
    yawcam -- yawcam
     
    Directory traversal in the HTTP server on Yawcam 0.2.6 through 0.6.0 devices allows attackers to read arbitrary files through a sequence of the form '.x./' or '....\x/' where x is a pattern composed of one or more (zero or more for the second pattern) of either \ or ..\ -- for example a '.\./', '....\/' or '...\./' sequence. For files with no extension, a single dot needs to be appended to ensure the HTTP server does not alter the request, e.g., a "GET /.\./.\./.\./.\./.\./.\./.\./windows/system32/drivers/etc/hosts." request.2018-01-10not yet calculatedCVE-2017-17662
    MISC
    CONFIRM
    yodobashi_camera -- yodobashi_app_for_android
     
    The Yodobashi App for Android 1.2.1.0 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.2018-01-12not yet calculatedCVE-2015-2981
    JVN
    JVNDB
    BID
     wordpress -- wordpress
     
    Unrestricted file upload vulnerability in the Gravity Upload Ajax plugin 1.1 and earlier for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file under wp-content/uploads/gravity_forms.2018-01-08not yet calculatedCVE-2014-4972
    MISC
    MISC
    Back to top

    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: January 11, 2018

    VMware has released security updates to address vulnerabilities in VMware Workstation and Fusion. An attacker could exploit these vulnerabilities to take control of an affected system.

    NCCIC/US-CERT encourages users and administrators to review the VMware Security Advisory VMSA-2018-0005 and apply the necessary updates.


    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: January 11, 2018

    Juniper Networks has released security updates to address vulnerabilities affecting multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.

    NCCIC/US-CERT encourages users and administrators to review the following Juniper Security Advisories and apply necessary updates:

    • ScreenOS: Etherleak vulnerability found on ScreenOS device (CVE-2018-0014)
    • Junos Space Security Director and Log Collector: Multiple vulnerabilities resolved in 17.2R1 release
    • CTPView: Multiple Linux kernel vulnerabilities
    • Junos Space: Multiple vulnerabilities resolved in 17.2R1 release
    • Junos OS: OpenSSH Memory exhaustion due to unregistered KEXINIT handler (CVE-2016-8858)
    • SRX Series: Firewall bypass vulnerability when UUID with leading zeros is configured. (CVE-2018-0009)
    • Junos: commit script may allow unauthenticated root login upon reboot (CVE-2018-0008)
    • Junos: bbe-smgd process denial of service while processing VLAN authentication requests/rejects (CVE-2018-0006)
    • Junos OS: MAC move limit configured to drop traffic may forward traffic. (CVE-2018-0005)
    • Junos OS: Kernel Denial of Service Vulnerability (CVE-2018-0004)
    • Junos OS: A crafted MPLS packet may lead to a kernel crash (CVE-2018-0003)
    • Junos OS: Malicious LLDP crafted packet leads to privilege escalation, denial of service. (CVE-2018-0007)
    • Junos OS: MX series, SRX series: Denial of service vulnerability in Flowd on devices with ALG enabled. (CVE-2018-0002)
    • Junos: Unauthenticated Remote Code Execution through J-Web interface (CVE-2018-0001) Junos: Unauthenticated Remote Code Execution through J-Web interface (CVE-2018-0001)

    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: January 10, 2018

    VMware has released security updates to address a vulnerability in multiple products. An attacker could exploit this vulnerability to obtain access to sensitive information.

    NCCIC/US-CERT encourages users and administrators to review the VMware Security Advisory VMSA-2018-0004 and apply the necessary updates.


    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: January 09, 2018

    Microsoft has released updates to address vulnerabilities in Microsoft software. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

    US-CERT encourages users and administrators to review Microsoft's January 2018 Security Update Summary and Deployment Information and apply the necessary updates.


    This product is provided subject to this Notification and this Privacy & Use policy.