index_ label1 index_ label1
Providing services for federal, state and local government ...
index_ label2 index_ label2
Our commercial entity operations, providing enterprise services ...
index_ label3 index_ label3
How do we prepare for what's to come next? See inside ...
I.T. News
We are constantly interested in the latest and up-to-date technology.
As we move forward with the software development we will continue to use new technologies to improve our products and the customer experience. And we will continue to develop our solutions with both new functionality and increasing integration with the latest major platforms.

As the growing market shares and interests in the I.T. virtualization, we tailored the unique virtualization solution vFleXtor using proven, modern up-to-date technology.

Timely information about security topics and threats:

US-CERT: The United States Computer Emergency Readiness Team
  • Original release date: August 15, 2018

    Cisco has released updates to address vulnerabilities affecting Cisco products. A remote attacker could exploit these vulnerabilities to cause a denial-of-service condition.  

    NCCIC encourages users and administrators to review the following Cisco Security Advisories and apply the necessary updates:


    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: August 14, 2018

    The Federal Bureau of Investigation (FBI) has released an article on building a digital defense against travel scams. FBI explains how scammers trick consumers with "free" vacation ploys. These offers may be fake or involve hidden fees. Legitimate companies will not ask prize winners to pay to claim their reward.

    NCCIC encourages consumers to review the FBI Article, the Federal Trade Commission's Travel Tips, and NCCIC's Tip on Avoiding Social Engineering and Phishing Attacks for more information.


    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: August 14, 2018 | Last revised: August 15, 2018

    VMware has released security updates to address vulnerabilities in vSphere, Workstation, Fusion, and Virtual Appliances. An attacker could exploit these vulnerabilities to obtain sensitive information.

    NCCIC encourages users and administrators to review VMware Security Advisories VMSA-2018-0020, VMSA-2018-0021, and VMSA-2018-0022 and apply the necessary updates.


    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: August 14, 2018

    The Samba Team has released security updates to address several vulnerabilities in Samba. An attacker could exploit one of these vulnerabilities to take control of an affected system.

    NCCIC encourages users and administrators to review the Samba Security Announcements for CVE-2018-10858, CVE-2018-10918, CVE-2018-10919, CVE-2018-1139, and CVE-2018-1140 and apply the necessary updates.


    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: August 14, 2018

    Adobe has released security updates to address vulnerabilities in Adobe Acrobat and Reader, Adobe Experience Manager, Adobe Flash Player, and Adobe Creative Cloud Desktop Application. An attacker could exploit some of these vulnerabilities to take control of an affected system.

    NCCIC encourages users and administrators to review Adobe Security Bulletins APSB18-20, APSB18-25, APSB18-26, and APSB18-29, and apply the necessary updates.


    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: August 14, 2018

    Microsoft has released updates to address multiple vulnerabilities in Microsoft software. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

    NCCIC encourages users and administrators to review Microsoft?s August 2018 Security Update Summary and Deployment Information and apply the necessary updates.


    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: August 14, 2018 | Last revised: August 15, 2018

    Intel has released recommendations to address a side-channel vulnerability called L1 Terminal Fault (L1TF) that affects multiple Intel microprocessors. An attacker could exploit this vulnerability to obtain sensitive information.

    NCCIC encourages users and administrators to review Intel's Security Advisory INTEL-SA-00161, apply the necessary mitigations, and refer to software vendors for appropriate patches, when available.

    Additional resources include:


    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: August 13, 2018 | Last revised: August 14, 2018

    Oracle has released a security alert to address a vulnerability in multiple versions of Oracle Database. A remote attacker could exploit this vulnerability to take control of an affected system.

    NCCIC encourages users and administrators to review the Oracle Security Alert and the Multi-State Information Sharing & Analysis Center Advisory 2018-089 for more information and apply the necessary update.


    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: August 13, 2018

    The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.

    The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

    • High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0

    • Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9

    • Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9

    Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

    The NCCIC Weekly Vulnerability Summary Bulletin is created using information from the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD). In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

     

    High Vulnerabilities

    Primary
    Vendor -- Product
    DescriptionPublishedCVSS ScoreSource & Patch Info
    There were no high vulnerabilities recorded this week.
    Back to top

     

    Medium Vulnerabilities

    Primary
    Vendor -- Product
    DescriptionPublishedCVSS ScoreSource & Patch Info
    There were no medium vulnerabilities recorded this week.
    Back to top

     

    Low Vulnerabilities

    Primary
    Vendor -- Product
    DescriptionPublishedCVSS ScoreSource & Patch Info
    There were no low vulnerabilities recorded this week.
    Back to top

     

    Severity Not Yet Assigned

    Primary
    Vendor -- Product
    DescriptionPublishedCVSS ScoreSource & Patch Info
    aedes -- aedes
     
    Improper authorization in aedes version <0.35.0 will publish a LWT in a channel when a client is not authorized.2018-08-08not yet calculatedCVE-2018-3778
    MISC
    MISC
    MISC
    apache -- airflowIt was noticed an XSS in certain 404 pages that could be exploited to perform an XSS attack. Chrome will detect this as a reflected XSS attempt and prevent the page from loading. Firefox and other browsers don't, and are vulnerable to this attack. Mitigation: The fix for this is to upgrade to Apache Airflow 1.9.0 or above.2018-08-06not yet calculatedCVE-2017-12614
    MLIST
    arubanetworks -- airwaveAruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to an XML external entities (XXE). XXEs are a way to permit XML parsers to access storage that exist on external systems. If an unprivileged user is permitted to control the contents of XML files, XXE can be used as an attack vector. Because the XML parser has access to the local filesystem and runs with the permissions of the web server, it can access any file that is readable by the web server and copy it to an external system of the attacker's choosing. This could include files that contain passwords, which could then lead to privilege escalation.2018-08-06not yet calculatedCVE-2016-8526
    CONFIRM
    BID
    EXPLOIT-DB
    arubanetworks -- airwaveAruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to a reflected cross-site scripting (XSS). The vulnerability is present in the VisualRF component of AirWave. By exploiting this vulnerability, an attacker who can trick a logged-in AirWave administrative user into clicking a link could obtain sensitive information, such as session cookies or passwords. The vulnerability requires that an administrative users click on the malicious link while currently logged into AirWave in the same browser.2018-08-06not yet calculatedCVE-2016-8527
    CONFIRM
    BID
    EXPLOIT-DB
    arubanetworks -- arubaosMultiple memory corruption flaws are present in ArubaOS which could allow an unauthenticated user to crash ArubaOS processes. With sufficient time and effort, it is possible these vulnerabilities could lead to the ability to execute arbitrary code - remote code execution has not yet been confirmed.2018-08-06not yet calculatedCVE-2017-9003
    CONFIRM
    SECTRACK
    arubanetworks -- arubaosArubaOS, all versions prior to 6.3.1.25, 6.4 prior to 6.4.4.16, 6.5.x prior to 6.5.1.9, 6.5.2, 6.5.3 prior to 6.5.3.3, 6.5.4 prior to 6.5.4.2, 8.x prior to 8.1.0.4 FIPS and non-FIPS versions of software are both affected equally is vulnerable to unauthenticated arbitrary file access. An unauthenticated user with network access to an Aruba mobility controller on TCP port 8080 or 8081 may be able to access arbitrary files stored on the mobility controller. Ports 8080 and 8081 are used for captive portal functionality and are listening, by default, on all IP interfaces of the mobility controller, including captive portal interfaces. The attacker could access files which could contain passwords, keys, and other sensitive information that could lead to full system compromise.2018-08-06not yet calculatedCVE-2017-9000
    CONFIRM
    SECTRACK
    arubanetworks -- clearpassAruba ClearPass prior to 6.6.9 has a vulnerability in the API that helps to coordinate cluster actions. An authenticated user with the "mon" permission could use this vulnerability to obtain cluster credentials which could allow privilege escalation. This vulnerability is only present when authenticated as a user with "mon" permission.2018-08-06not yet calculatedCVE-2018-7059
    CONFIRM
    arubanetworks -- clearpassAruba ClearPass 6.6.x prior to 6.6.9 and 6.7.x prior to 6.7.1 is vulnerable to CSRF attacks against authenticated users. An attacker could manipulate an authenticated user into performing actions on the web administrative interface.2018-08-06not yet calculatedCVE-2018-7060
    CONFIRM
    arubanetworks -- clearpassAruba ClearPass, all versions of 6.6.x prior to 6.6.9 are affected by an authentication bypass vulnerability, an attacker can leverage this vulnerability to gain administrator privileges on the system. The vulnerability is exposed only on ClearPass web interfaces, including administrative, guest captive portal, and API. Customers who do not expose ClearPass web interfaces to untrusted users are impacted to a lesser extent.2018-08-06not yet calculatedCVE-2018-7058
    CONFIRM
    arubanetworks -- clearpassAruba ClearPass 6.6.3 and later includes a feature called "SSH Lockout", which causes ClearPass to lock accounts with too many login failures through SSH. When this feature is enabled, an unauthenticated remote command execution vulnerability is present which could allow an unauthenticated user to execute arbitrary commands on the underlying operating system with "root" privilege level. This vulnerability is only present when a specific feature has been enabled. The SSH Lockout feature is not enabled by default, so only systems which have enabled this feature are vulnerable.2018-08-06not yet calculatedCVE-2017-9001
    CONFIRM
    arubanetworks -- clearpassAll versions of Aruba ClearPass prior to 6.6.8 contain reflected cross-site scripting vulnerabilities. By exploiting this vulnerability, an attacker who can trick a logged-in ClearPass administrative user into clicking a link could obtain sensitive information, such as session cookies or passwords. The vulnerability requires that an administrative users click on the malicious link while currently logged into ClearPass in the same browser.2018-08-06not yet calculatedCVE-2017-9002
    CONFIRM
    asus -- hg100_devicesASUS HG100 devices allow denial of service via an IPv4 packet flood.2018-08-10not yet calculatedCVE-2018-11492
    MISC
    atlassian -- cloudtokenUnauthenticated access to cloudtoken daemon on Linux via network from version 0.1.1 before version 0.1.24 allows attackers on the same subnet to gain temporary AWS credentials for the users' roles.2018-08-10not yet calculatedCVE-2018-13390
    MISC
    auracms -- auracms
     
    AuraCMS 2.3 allows XSS via a Bukutamu -> AddGuestbook action.2018-08-07not yet calculatedCVE-2018-15199
    MISC
    celalink -- clr-m20_devicesCeLa Link CLR-M20 devices allow unauthorized users to upload any file (e.g., asp, aspx, cfm, html, jhtml, jsp, or shtml), which causes remote code execution as well. Because of the WebDAV feature, it is possible to upload arbitrary files by utilizing the PUT method.2018-08-07not yet calculatedCVE-2018-15137
    MISC
    cgit -- cgit
     
    cgit_clone_objects in CGit before 1.2.1 has a directory traversal vulnerability when `enable-http-clone=1` is not turned off, as demonstrated by a cgit/cgit.cgi/git/objects/?path=../ request.2018-08-03not yet calculatedCVE-2018-14912
    MISC
    MLIST
    MISC
    DEBIAN
    cisco -- thorStack-based buffer overflow in the Cisco Thor decoder before commit 18de8f9f0762c3a542b1122589edb8af859d9813 allows local users to cause a denial of service (segmentation fault) and execute arbitrary code via a crafted non-conformant Thor bitstream.2018-08-09not yet calculatedCVE-2018-0429
    CONFIRM
    cobbler -- cobbler
     
    It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XMLRPC. A remote, unauthenticated attacker could use this flaw to gain high privileges within cobbler, upload files to arbitrary location in the context of the daemon.2018-08-09not yet calculatedCVE-2018-10931
    REDHAT
    CONFIRM
    coremail -- coremail
     
    Cross-site scripting (XSS) vulnerability in intervalCheck.jsp in Coremail XT 3.0 allows remote attackers to inject arbitrary web script or HTML via the sid parameter.2018-08-10not yet calculatedCVE-2018-14503
    MISC
    couchdb -- couchdbCouchDB administrative users before 2.2.0 can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user under which CouchDB runs, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows a CouchDB admin user to gain arbitrary remote code execution, bypassing CVE-2017-12636 and CVE-2018-8007.2018-08-08not yet calculatedCVE-2018-11769
    BID
    MISC
    craft -- cms
     
    A Server Side Template Injection (SSTI) was discovered in the SEOmatic plugin before 3.1.4 for Craft CMS, because requests that don't match any elements incorrectly generate the canonicalUrl, and can lead to execution of Twig code.2018-08-06not yet calculatedCVE-2018-14716
    MISC
    CONFIRM
    CONFIRM
    CONFIRM
    CONFIRM
    EXPLOIT-DB
    crestron -- tsw-x60_and_mc3For Crestron TSW-X60 version prior to 2.001.0037.001 and MC3 version prior to 1.502.0047.001, The devices are shipped with authentication disabled, and there is no indication to users that they need to take steps to enable it. When compromised, the access to the CTP console is left open.2018-08-10not yet calculatedCVE-2018-10630
    MISC
    crestron -- tsw-x60_and_mc3Crestron TSW-X60 all versions prior to 2.001.0037.001 and MC3 all versions prior to 1.502.0047.00, The passwords for special sudo accounts may be calculated using information accessible to those with regular user privileges. Attackers could decipher these passwords, which may allow them to execute hidden API calls and escape the CTP console sandbox environment with elevated privileges.2018-08-10not yet calculatedCVE-2018-13341
    MISC
    csrf-magic -- csrf-magic
     
    In csrf-magic before 1.0.4, if $GLOBALS['csrf']['secret'] is not configured, the Anti-CSRF Token used is predictable and would permit an attacker to bypass the CSRF protections, because an automatically generated secret is not used.2018-08-07not yet calculatedCVE-2013-7464
    MISC
    MISC
    MISC
    dell -- wyse_management_suiteDell WMS versions 1.1 and prior are impacted by multiple unquoted service path vulnerabilities. Affected software installs multiple services incorrectly by specifying the paths to the service executables without quotes. This could potentially allow a low-privileged local user to execute arbitrary executables with elevated privileges.2018-08-10not yet calculatedCVE-2018-11063
    MISC
    dell_emc -- data_protection_advisor_and_data_protection_applianceDell EMC Data Protection Advisor, versions 6.2, 6,3, 6.4, 6.5 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 contain a XML External Entity (XXE) Injection vulnerability in the REST API. An authenticated remote malicious user could potentially exploit this vulnerability to read certain system files in the server or cause denial of service by supplying specially crafted Document Type Definitions (DTDs) in an XML request.2018-08-10not yet calculatedCVE-2018-11048
    FULLDISC
    SECTRACK
    dilawar -- soundAn issue has been found in dilawar sound through 2017-11-27. The end of openWavFile in wav-file.cc has Mismatched Memory Management Routines (operator new [] versus operator delete).2018-08-05not yet calculatedCVE-2018-14948
    MISC
    MISC
    django -- django
     
    django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.2018-08-03not yet calculatedCVE-2018-14574
    BID
    SECTRACK
    UBUNTU
    DEBIAN
    CONFIRM
    drupal -- drupal
     
    Drupal core 8 before versions 8.3.4 allows remote attackers to execute arbitrary code due to the PECL YAML parser not handling PHP objects safely during certain operations.2018-08-06not yet calculatedCVE-2017-6920
    BID
    SECTRACK
    CONFIRM
    emlsoft -- emlsoftAn issue was discovered in EMLsoft 5.4.5. The eml/upload/eml/?action=user&do=add page allows CSRF.2018-08-06not yet calculatedCVE-2018-14966
    MISC
    emlsoft -- emlsoftAn issue was discovered in EMLsoft 5.4.5. The eml/upload/eml/?action=address&do=add page allows CSRF.2018-08-06not yet calculatedCVE-2018-14965
    MISC
    emlsoft -- emlsoftAn issue was discovered in EMLsoft 5.4.5. upload\eml\action\action.address.php has SQL Injection via the numPerPage parameter.2018-08-06not yet calculatedCVE-2018-14968
    MISC
    emlsoft -- emlsoftAn issue was discovered in EMLsoft 5.4.5. upload\eml\action\action.user.php has SQL Injection via the numPerPage parameter.2018-08-06not yet calculatedCVE-2018-14967
    MISC
    emlsoft -- emlsoftAn issue was discovered in EMLsoft 5.4.5. XSS exists via the eml/upload/eml/?action=address&do=edit page.2018-08-06not yet calculatedCVE-2018-14964
    MISC
    ethereum -- eether_tokenAn integer overflow in the unprotected distributeToken function of a smart contract implementation for EETHER (EETHER), an Ethereum ERC20 token, will lead to an unauthorized increase of an attacker's digital assets.2018-08-08not yet calculatedCVE-2018-11561
    MISC
    ethereum -- megacryptopolisThe doPayouts() function of the smart contract implementation for MegaCryptoPolis, an Ethereum game, has a Denial of Service vulnerability. If a smart contract that has a fallback function always causing exceptions buys a land, users cannot buy lands near that contract's land, because those purchase attempts will not be completed unless the doPayouts() function successfully sends Ether to certain neighbors.2018-08-06not yet calculatedCVE-2018-13877
    MISC
    ethereum -- mycryptochampThe randMod() function of the smart contract implementation for MyCryptoChamp, an Ethereum game, generates a random value with publicly readable variables such as the current block information and a private variable, (which can be read with a getStorageAt call). Therefore, attackers can get powerful champs/items and get rewards.2018-08-07not yet calculatedCVE-2018-12885
    MISC
    MISC
    MISC
    ethereum -- smartmesh_tokenThe transferProxy and approveProxy functions of a smart contract implementation for SmartMesh (SMT), an Ethereum ERC20 token, allow attackers to accomplish an unauthorized transfer of digital assets because replay attacks can occur with the same-named functions (with the same signatures) in other tokens: First (FST), GG Token (GG), M2C Mesh Network (MTC), M2C Mesh Network (mesh), and UG Token (UGT).2018-08-10not yet calculatedCVE-2018-10769
    MISC
    freebsd -- freebsdOne of the data structures that holds TCP segments in all versions of FreeBSD prior to 11.2-RELEASE-p1, 11.1-RELEASE-p12, and 10.4-RELEASE-p10 uses an inefficient algorithm to reassemble the data. This causes the CPU time spent on segment processing to grow linearly with the number of segments in the reassembly queue. An attacker who has the ability to send TCP traffic to a victim system can degrade the victim system's network performance and/or consume excessive CPU by exploiting the inefficiency of TCP reassembly handling, with relatively small bandwidth cost.2018-08-09not yet calculatedCVE-2018-6922
    SECTRACK
    FREEBSD
    gitea_and_gogs -- gitea_and_gogs
     
    An SSRF vulnerability in webhooks in Gitea through 1.5.0-rc2 and Gogs through 0.11.53 allows remote attackers to access intranet services.2018-08-07not yet calculatedCVE-2018-15192
    MISC
    MISC
    gogs -- gogsA CSRF vulnerability in the admin panel in Gogs through 0.11.53 allows remote attackers to execute admin operations via a crafted issue / link.2018-08-07not yet calculatedCVE-2018-15193
    MISC
    gogs -- gogs
     
    Open redirect vulnerability in Gogs before 0.12 allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via an initial /\ substring in the user/login redirect_to parameter, related to the function isValidRedirect in routes/user/auth.go.2018-08-07not yet calculatedCVE-2018-15178
    MISC
    MISC
    gxlcms -- gxlcms
     
    In Gxlcms 2.0, a news/index.php?s=Admin-Admin-Insert CSRF attack can add an administrator account.2018-08-07not yet calculatedCVE-2018-15177
    MISC
    harmonic -- nsg_9000_devicesHarmonic NSG 9000 devices have a default password of nsgadmin for the admin account, a default password of nsgguest for the guest account, and a default password of nsgconfig for the config account.2018-08-05not yet calculatedCVE-2018-14943
    MISC
    harmonic -- nsg_9000_devicesHarmonic NSG 9000 devices allow remote authenticated users to read the webapp.py source code via a direct request for the /webapp.py URI.2018-08-05not yet calculatedCVE-2018-14941
    MISC
    harmonic -- nsg_9000_devicesHarmonic NSG 9000 devices allow remote authenticated users to conduct directory traversal attacks, as demonstrated by "POST /PY/EMULATION_GET_FILE" or "POST /PY/EMULATION_EXPORT" with FileName=../../../passwd in the POST data.2018-08-05not yet calculatedCVE-2018-14942
    MISC

    hewlett_packard_enterprise -- arcsight_winc_connector

    A remote code execution security vulnerability has been identified in all versions of the HP ArcSight WINC Connector prior to v7.3.0.2018-08-06not yet calculatedCVE-2016-4391
    BID
    SECTRACK
    CONFIRM
    hewlett_packard_enterprise -- business_service_managementA remote code execution vulnerability was identified in HP Business Service Management (BSM) using Apache Commons Collection Java Deserialization versions v9.20-v9.262018-08-06not yet calculatedCVE-2016-4405
    BID
    CONFIRM
    hewlett_packard_enterprise -- business_service_managementA remote cross site scripting vulnerability has been identified in HP Business Service Management software v9.1x, v9.20 - v9.25IP1.2018-08-06not yet calculatedCVE-2016-4392
    BID
    SECTRACK
    CONFIRM
    hewlett_packard_enterprise -- centralview_fraud_risk_managementHPE has identified a remote privilege escalation vulnerability in HPE CentralView Fraud Risk Management earlier than version CV 6.1. This isssue is resolved in HF16 for HPE CV 6.1 or subsequent version.2018-08-06not yet calculatedCVE-2017-8992
    CONFIRM
    hewlett_packard_enterprise -- centralview_fraud_risk_managementHPE has identified a remote disclosure of information vulnerability in HPE CentralView Fraud Risk Management earlier than version CV 6.1. This isssue is resolved in HF16 for HPE CV 6.1 or subsequent version.2018-08-06not yet calculatedCVE-2018-7070
    CONFIRM
    hewlett_packard_enterprise -- centralview_fraud_risk_management
     
    HPE has identified a remote HOST header attack vulnerability in HPE CentralView Fraud Risk Management earlier than version CV 6.1. This isssue is resolved in HF16 for HPE CV 6.1 or subsequent version.2018-08-06not yet calculatedCVE-2018-7068
    CONFIRM
    hewlett_packard_enterprise -- centralview_fraud_risk_management
     
    HPE has identified a remote unauthenticated access to files vulnerability in HPE CentralView Fraud Risk Management earlier than version CV 6.1. This isssue is resolved in HF16 for HPE CV 6.1 or subsequent version.2018-08-06not yet calculatedCVE-2018-7069
    CONFIRM
    hewlett_packard_enterprise -- centralview_fraud_risk_management
     
    HPE has identified a cross site scripting (XSS) vulnerability in HPE CentralView Fraud Risk Management earlier than version CV 6.1. This isssue is resolved in HF16 for HPE CV 6.1 or subsequent version.2018-08-06not yet calculatedCVE-2017-8991
    CONFIRM
    hewlett_packard_enterprise -- icewall_sso_dfw
     
    A security vulnerability in HPE IceWall SSO Dfw 10.0 and 11.0 on RHEL, HP-UX, and Windows could be exploited remotely to allow URL Redirection.2018-08-06not yet calculatedCVE-2017-8989
    CONFIRM
    hewlett_packard_enterprise -- integrated_lights_outA Unauthenticated Remote Denial of Service vulnerability was identified in HPE Integrated Lights-Out 3 (iLO 3) version v1.88 only. The vulnerability is resolved in iLO3 v1.89 or subsequent versions.2018-08-06not yet calculatedCVE-2017-8987
    SECTRACK
    CONFIRM
    hewlett_packard_enterprise -- integrated_lights_outA remote code execution was identified in HPE Integrated Lights-Out 4 (iLO 4) earlier than version v2.60 and HPE Integrated Lights-Out 5 (iLO 5) earlier than version v1.30.2018-08-06not yet calculatedCVE-2018-7078
    SECTRACK
    CONFIRM
    hewlett_packard_enterprise -- integrated_lights_out
     
    A remote cross site scripting vulnerability was identified in HPE iLO 3 all version prior to v1.88 and HPE iLO 4 all versions prior to v2.44.2018-08-06not yet calculatedCVE-2016-4406
    BID
    SECTRACK
    CONFIRM
    hewlett_packard_enterprise -- intelligent_management_centerA potential security vulnerability has been identified in HPE Intelligent Management Center Platform (IMC Plat) 7.3 E0506P09. The vulnerability could be remotely exploited to allow for remote directory traversal leading to arbitrary file deletion.2018-08-06not yet calculatedCVE-2018-7092
    SECTRACK
    CONFIRM
    hewlett_packard_enterprise -- intelligent_management_center_wireless_service_manager
     
    A remote code execution vulnerability was identified in HPE Intelligent Management Center (iMC) Wireless Service Manager (WSM) Software earlier than version WSM 7.3 (E0506). This issue was resolved in HPE IMC Wireless Services Manager Software IMC WSM 7.3 E0506P01 or subsequent version.2018-08-06not yet calculatedCVE-2017-8990
    SECTRACK
    CONFIRM
    hewlett_packard_enterprise -- intelligent_management_center
     
    A remote code execution vulnerability was identified in HPE Intelligent Management Center (iMC) PLAT 7.3 E0506P07. The vulnerability was resolved in iMC PLAT 7.3 E0605P04 or subsequent version.2018-08-06not yet calculatedCVE-2018-7074
    SECTRACK
    CONFIRM
    hewlett_packard_enterprise -- intelligent_management_center
     
    A remote cross-site scripting (XSS) vulnerability was identified in HPE Intelligent Management Center (iMC) PLAT version v7.3 (E0506). The vulnerability is fixed in Intelligent Management Center PLAT 7.3 E0605P04 or subsequent version.2018-08-06not yet calculatedCVE-2018-7075
    CONFIRM
    hewlett_packard_enterprise -- keyviewA security vulnerability was identified in the Filter SDK component of HP KeyView earlier than v11.2. The vulnerability could be exploited remotely to allow code execution via a memory allocation issue.2018-08-06not yet calculatedCVE-2016-4404
    BID
    SECTRACK
    CONFIRM
    hewlett_packard_enterprise -- keyviewA security vulnerability was identified in the Filter SDK component of HP KeyView earlier than v11.2. The vulnerability could be exploited remotely to allow code execution via buffer overflow.2018-08-06not yet calculatedCVE-2016-4402
    BID
    SECTRACK
    CONFIRM
    hewlett_packard_enterprise -- keyviewA security vulnerability was identified in the Filter SDK component of HP KeyView earlier than v11.2. The vulnerability could be exploited remotely to allow code execution via memory corruption.2018-08-06not yet calculatedCVE-2016-4403
    BID
    SECTRACK
    CONFIRM
    hewlett_packard_enterprise -- moonshot_provisioning_manager
     
    A remote bypass of security restrictions vulnerability was identified in HPE Moonshot Provisioning Manager prior to v1.24.2018-08-06not yet calculatedCVE-2018-7072
    CONFIRM
    MISC
    hewlett_packard_enterprise -- moonshot_provisioning_manager
     
    A local arbitrary file modification vulnerability was identified in HPE Moonshot Provisioning Manager prior to v1.24.2018-08-06not yet calculatedCVE-2018-7073
    CONFIRM
    UBUNTU
    MISC
    hewlett_packard_enterprise -- network_function_virtualization_director
     
    HPE has identified a remote access to sensitive information vulnerability in HPE Network Function Virtualization Director (NFVD) 4.2.1 prior to gui patch 3.2018-08-06not yet calculatedCVE-2018-7071
    CONFIRM
    hewlett_packard_enterprise -- network_node_manager_iA security vulnerability was identified in HP Network Node Manager i (NNMi) Software 10.00, 10.01 (patch1), 10.01 (patch 2), 10.10. The vulnerability could result in cross-site scripting (XSS).2018-08-06not yet calculatedCVE-2016-4400
    BID
    SECTRACK
    CONFIRM
    hewlett_packard_enterprise -- network_node_manager_iA local code execution security vulnerability was identified in HP Network Node Manager i (NNMi) v10.00, v10.10 and v10.20 Software.2018-08-06not yet calculatedCVE-2016-4397
    BID
    BID
    SECTRACK
    CONFIRM
    hewlett_packard_enterprise -- network_node_manager_iA security vulnerability was identified in HP Network Node Manager i (NNMi) Software 10.00, 10.01 (patch1), 10.01 (patch 2), 10.10. The vulnerability could result in cross-site scripting (XSS).2018-08-06not yet calculatedCVE-2016-4399
    BID
    SECTRACK
    CONFIRM
    hewlett_packard_enterprise -- network_node_manager_iA remote arbitrary code execution vulnerability was identified in HP Network Node Manager i (NNMi) Software 10.00, 10.01 (patch1), 10.01 (patch 2), 10.10 using Java Deserialization.2018-08-06not yet calculatedCVE-2016-4398
    BID
    CONFIRM
    hewlett_packard_enterprise -- restful_interface_toolA remote execution of arbitrary code vulnerability has been identified in HPE RESTful Interface Tool 1.5, 2.0 (hprest-1.5-79.x86_64.rpm, ilorest-2.0-403.x86_64.rpm). The issue is resolved in iLOREST v2.1 or subsequent versions.2018-08-06not yet calculatedCVE-2017-8968
    CONFIRM
    hewlett_packard_enterprise -- xp_command_view_advanced_edition
     
    A Remote Bypass of Security Restrictions vulnerability was identified in HPE XP Command View Advanced Edition Software Earlier than 8.5.3-00. The vulnerability impacts DevMgr Earlier than 8.5.3-00 (for Windows, Linux), RepMgr earlier than 8.5.3-00 (for Windows, Linux) and HDLM earlier than 8.5.3-00 (for Windows, Linux, Solaris, AIX).2018-08-06not yet calculatedCVE-2017-8988
    CONFIRM
    hewlett_packard_enterprise -- xp_p9000_command_view_advanced_edition
     
    HPE XP P9000 Command View Advanced Edition Software (CVAE) has open URL redirection vulnerability in versions 7.0.0-00 to earlier than 8.60-00 of DevMgr, TSMgr and RepMgr.2018-08-06not yet calculatedCVE-2018-7091
    CONFIRM
    hewlett_packard_enterprise -- xp_p9000_command_view_advanced_edition
     
    HPE XP P9000 Command View Advanced Edition Software (CVAE) has local and remote cross site scripting vulnerability in versions 7.0.0-00 to earlier than 8.60-00 of DevMgr, TSMgr and RepMgr.2018-08-06not yet calculatedCVE-2018-7090
    CONFIRM
    hitachi -- command_suiteAn Information Exposure issue was discovered in Hitachi Command Suite 8.5.3. A remote attacker may be able to exploit a flaw in the permission of messaging that may allow for information exposure via a crafted message.2018-08-09not yet calculatedCVE-2018-14735
    CONFIRM
    ibm -- jazz_foundation_productsIBM Jazz Foundation products (IBM Rational DOORS Next Generation 5.0 through 5.0.2 and 6.0 through 6.0.5) are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 139025.2018-08-06not yet calculatedCVE-2018-1422
    CONFIRM
    BID
    XF
    ibm -- maximo_asset_managementIBM Maximo Asset Management 7.6 through 7.6.3 installs with a default administrator account that a remote intruder could use to gain administrator access to the system. This vulnerability is due to an incomplete fix for CVE-2015-4966. IBM X-Force ID: 142116.2018-08-03not yet calculatedCVE-2018-1524
    XF
    CONFIRM
    ibm -- maximo_asset_managementIBM Maximo Asset Management 7.6 through 7.6.3 could allow an authenticated user to obtain sensitive information from the WhoAmI API. IBM X-Force ID: 142290.2018-08-06not yet calculatedCVE-2018-1528
    BID
    XF
    CONFIRM
    ibm -- rhapsody_model_managerIBM Rhapsody Model Manager 6.0.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 145510.2018-08-07not yet calculatedCVE-2018-1690
    CONFIRM
    XF
    ibm -- security_identity_governance_virtual_applianceIBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 126859.2018-08-06not yet calculatedCVE-2017-1366
    CONFIRM
    XF
    ibm -- security_identity_governance_virtual_applianceIBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 generates an error message that includes sensitive information about its environment, users, or associated data. IBM X-Force ID: 127400.2018-08-06not yet calculatedCVE-2017-1412
    CONFIRM
    XF
    ibm -- security_identity_governance_virtual_applianceIBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 could allow a local attacker to inject commands into malicious files that could be executed by the administrator. IBM X-Force ID: 135855.2018-08-06not yet calculatedCVE-2017-1755
    CONFIRM
    XF
    ibm -- security_identity_governance_virtual_applianceIBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 126861.2018-08-06not yet calculatedCVE-2017-1368
    CONFIRM
    XF
    ibm -- security_identity_governance_virtual_applianceIBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 127399.2018-08-06not yet calculatedCVE-2017-1411
    CONFIRM
    XF
    ibm -- security_identity_governance_virtual_applianceIBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 127342.2018-08-06not yet calculatedCVE-2017-1396
    CONFIRM
    XF
    ibm -- security_identity_governance_virtual_applianceIBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 127396.2018-08-06not yet calculatedCVE-2017-1409
    CONFIRM
    XF
    ibm -- websphere_mqIBM WebSphere MQ 8.0.0.2 through 8.0.0.8 and 9.0.0.0 through 9.0.0.3 could allow users to have more authority than they should have if an MQ administrator creates an invalid user group name. IBM X-Force ID: 142888.2018-08-06not yet calculatedCVE-2018-1551
    BID
    XF
    CONFIRM
    ignited -- cmsAn issue was discovered in Ignited CMS through 2017-02-19. ign/index.php/admin/pages/add_page allows a CSRF attack to add pages.2018-08-08not yet calculatedCVE-2018-15203
    MISC
    insteon -- hubSpecially crafted commands sent through the PubNub service in Insteon Hub 2245-222 with firmware version 1012 can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability.At 0x9d014cc0 the value for the cmd key is copied using strcpy to the buffer at $sp+0x11c. This buffer is 20 bytes large, sending anything longer will cause a buffer overflow.2018-08-06not yet calculatedCVE-2017-16252
    MISC
    insteon -- hubAn exploitable buffer overflow vulnerability exists in the PubNub message handler for the 'ad' channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability.2018-08-06not yet calculatedCVE-2017-14447
    MISC
    jenkins -- jenkins
     
    jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful build. This could in some cases result in emails being sent to people who have no user account in Jenkins, and in rare cases even people who were not involved in whatever project was being built, due to some mapping based on the local-part of email addresses.2018-08-06not yet calculatedCVE-2017-2654
    CONFIRM
    CONFIRM
    jiofi -- 4g_hotspot_m2s_devicesJioFi 4G Hotspot M2S devices allow attackers to cause a denial of service (secure configuration outage) via an XSS payload in the SSID name and Security Key fields.2018-08-09not yet calculatedCVE-2018-15181
    MISC
    jpeg_encoder -- jpeg_encoderAn issue has been found in jpeg_encoder through 2015-11-27. It is a heap-based buffer overflow in the function readFromBMP in jpeg_encoder.cpp.2018-08-05not yet calculatedCVE-2018-14945
    MISC
    MISC
    jpeg_encoder -- jpeg_encoder
     
    An issue has been found in jpeg_encoder through 2015-11-27. It is a SEGV in the function readFromBMP in jpeg_encoder.cpp. The signal is caused by an out-of-bounds write.2018-08-05not yet calculatedCVE-2018-14944
    MISC
    MISC
    juunan06 -- ecommerceAn issue was discovered in Juunan06 eCommerce through 2018-08-05. There is a CSRF vulnerability in ee/eBoutique/app/template/includes/crudTreatment.php that can add new users and add products.2018-08-08not yet calculatedCVE-2018-15202
    MISC
    laravel -- frameworkIn Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack.2018-08-09not yet calculatedCVE-2018-15133
    CONFIRM
    libpq -- libpq
     
    A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.2018-08-09not yet calculatedCVE-2018-10915
    CONFIRM
    DEBIAN
    CONFIRM
    libreoffice -- libreofficeThe get_app_path function in desktop/unx/source/start.c in LibreOffice through 6.0.5 mishandles the realpath function in certain environments such as FreeBSD libc, which might allow attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact if LibreOffice is automatically launched during web browsing with pathnames controlled by a remote web site.2018-08-05not yet calculatedCVE-2018-14939
    BID
    MISC
    libtiff -- libtiff
     
    ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf.2018-08-08not yet calculatedCVE-2018-15209
    MISC
    linux -- kernelThe swiotlb_print_info function in lib/swiotlb.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by reading dmesg data from a "software IO TLB" printk call.2018-08-07not yet calculatedCVE-2018-5953
    BID
    MISC
    linux -- kernelThe pcpu_embed_first_chunk function in mm/percpu.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by reading dmesg data from a "pages/cpu" printk call.2018-08-07not yet calculatedCVE-2018-5995
    BID
    MISC
    linux -- kernel
     
    The aoedisk_debugfs_show function in drivers/block/aoe/aoeblk.c in the Linux kernel through 4.16.4rc4 allows local users to obtain sensitive address information by reading "ffree: " lines in a debugfs file.2018-08-10not yet calculatedCVE-2018-7754
    CONFIRM
    MISC
    linux -- kernel
     
    Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.2018-08-06not yet calculatedCVE-2018-5390
    BID
    SECTRACK
    SECTRACK
    CONFIRM
    UBUNTU
    UBUNTU
    DEBIAN
    CERT-VN
    CONFIRM
    lxc-user-nic -- lxc-user-nic
     
    lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.2018-08-10not yet calculatedCVE-2018-6556
    CONFIRM
    CONFIRM
    UBUNTU
    medtronic -- mycarelink_and_patient_monitorA vulnerability was discovered in all versions of Medtronic MyCareLink 24950 and 24952 Patient Monitor. The affected product's update service does not sufficiently verify the authenticity of the data uploaded. An attacker who obtains per-product credentials from the monitor and paired implantable cardiac device information can potentially upload invalid data to the Medtronic CareLink network.2018-08-10not yet calculatedCVE-2018-10626
    BID
    MISC
    medtronic -- mycarelink_and_patient_monitorA vulnerability was discovered in all versions of Medtronic MyCareLink 24950 and 24952 Patient Monitor. The affected products use per-product credentials that are stored in a recoverable format. An attacker can use these credentials for network authentication and encryption of local data at rest.2018-08-10not yet calculatedCVE-2018-10622
    BID
    MISC
    multiple_vendors -- bluetooth_firmware_and_operating_system_software_drivers
     
    Bluetooth firmware or operating system software drivers in macOS versions before 10.13, High Sierra and iOS versions before 11.4, and Android versions before the 2018-06-05 patch may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange, which may allow a remote attacker to obtain the encryption key used by the device.2018-08-07not yet calculatedCVE-2018-5383
    MISC
    BID
    SECTRACK
    CONFIRM
    CERT-VN
    netcomm_wireless -- 4g_lte_light_industrial_m2m_routerNetComm Wireless G LTE Light Industrial M2M Router (NWL-25) with firmware 2.0.29.11 and prior. The directory of the device is listed openly without authentication.2018-08-10not yet calculatedCVE-2018-14785
    MISC
    netcomm_wireless -- 4g_lte_light_industrial_m2m_routerNetComm Wireless G LTE Light Industrial M2M Router (NWL-25) with firmware 2.0.29.11 and prior. A cross-site request forgery condition can occur, allowing an attacker to change passwords of the device remotely.2018-08-10not yet calculatedCVE-2018-14783
    MISC
    netcomm_wireless -- 4g_lte_light_industrial_m2m_routerNetComm Wireless G LTE Light Industrial M2M Router (NWL-25) with firmware 2.0.29.11 and prior. The device is vulnerable to several cross-site scripting attacks, allowing a remote attacker to run arbitrary code on the device.2018-08-10not yet calculatedCVE-2018-14784
    MISC
    netcomm_wireless -- 4g_lte_light_industrial_m2m_routerNetComm Wireless G LTE Light Industrial M2M Router (NWL-25) with firmware 2.0.29.11 and prior. The device allows access to configuration files and profiles without authenticating the user.2018-08-10not yet calculatedCVE-2018-14782
    MISC
    netiq -- edirectoryUnvalidated redirect vulnerability in in NetIQ eDirectory before 9.1.1 HF1.2018-08-09not yet calculatedCVE-2018-7692
    MISC
    netiq -- edirectoryInformation leakage vulnerability in NetIQ eDirectory before 9.1.1 HF1 due to shared memory usage.2018-08-09not yet calculatedCVE-2018-7686
    MISC
    nmap -- nmap
     
    Nmap through 7.70, when the -sV option is used, allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted TCP-based service.2018-08-07not yet calculatedCVE-2018-15173
    MISC
    MISC
    ocs_inventory_ng -- ocs_inventory_serverUnrestricted file upload (with remote code execution) in require/mail/NotificationMail.php in Webconsole in OCS Inventory NG OCS Inventory Server through 2.5 allows a privileged user to gain access to the server via a template file containing PHP code, because file extensions other than .html are permitted.2018-08-06not yet calculatedCVE-2018-14857
    FULLDISC
    SECTRACK
    CONFIRM
    onethink -- onethinkAn issue was discovered in OneThink v1.1. There is a CSRF vulnerability in admin.php?s=/User/add.html that can add a user.2018-08-07not yet calculatedCVE-2018-15198
    MISC
    onethink -- onethink
     
    An issue was discovered in OneThink v1.1. There is a CSRF vulnerability in admin.php?s=/AuthManager/addToGroup.html that can endow administrator privileges.2018-08-07not yet calculatedCVE-2018-15197
    MISC
    oracle -- database_serverA vulnerability was discovered in the Java VM component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1 and 18. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via Oracle Net to compromise Java VM. While the vulnerability is in Java VM, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java VM. CVSS 3.0 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).2018-08-10not yet calculatedCVE-2018-3110
    CONFIRM
    pdf2json -- pdf2jsonAn issue has been found in PDF2JSON 0.69. The HtmlString class in ImgOutputDev.cc has Mismatched Memory Management Routines (malloc versus operator delete).2018-08-05not yet calculatedCVE-2018-14946
    MISC
    MISC
    pdf2json -- pdf2jsonAn issue has been found in PDF2JSON 0.69. XmlFontAccu::CSStyle in XmlFonts.cc has Mismatched Memory Management Routines (operator new [] versus operator delete).2018-08-05not yet calculatedCVE-2018-14947
    MISC
    MISC
    php -- php
     
    An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories.2018-08-07not yet calculatedCVE-2018-15132
    MISC
    MISC
    MISC
    MISC
    phpcms -- phpcms
     
    PHPCMS 9 allows remote attackers to cause a denial of service (resource consumption) via large font_size, height, and width parameters in an api.php?op=checkcode request.2018-08-05not yet calculatedCVE-2018-14940
    MISC
    phpscriptsmall.com -- advanced_real_estate_scriptPHP Scripts Mall advanced-real-estate-script 4.0.9 has CSRF via edit-profile.php.2018-08-10not yet calculatedCVE-2018-15187
    MISC
    phpscriptsmall.com -- advanced_real_estate_scriptPHP Scripts Mall advanced-real-estate-script has XSS via the Name field of a profile.2018-08-10not yet calculatedCVE-2018-15189
    MISC
    phpscriptsmall.com -- advanced_real_estate_scriptPHP Scripts Mall advanced-real-estate-script 4.0.9 allows remote attackers to cause a denial of service (page structure loss) via crafted JavaScript code in the Name field of a profile.2018-08-10not yet calculatedCVE-2018-15188
    MISC
    phpscriptsmall.com -- basic_b2b_scriptPHP Scripts Mall Basic B2B Script 2.0.0 has Reflected and Stored XSS via the First name, Last name, Address 1, City, State, and Company name fields.2018-08-03not yet calculatedCVE-2018-14541
    MISC
    EXPLOIT-DB
    phpscriptsmall.com -- car_rental_scriptPHP Scripts Mall Car Rental Script 2.0.8 has XSS via the FirstName and LastName fields.2018-08-09not yet calculatedCVE-2018-15182
    MISC
    phpscriptsmall.com -- cms_auditor_websitePHP Scripts Mall Chartered Accountant : Auditor Website 2.0.1 has CSRF via client/auditor/updprofile.php.2018-08-10not yet calculatedCVE-2018-15186
    MISC
    phpscriptsmall.com -- hotel_booking_scriptPHP Scripts Mall hotel-booking-script 2.0.4 allows XSS via the First Name, Last Name, or Address field.2018-08-10not yet calculatedCVE-2018-15190
    MISC
    phpscriptsmall.com -- hotel_booking_scriptPHP Scripts Mall hotel-booking-script 2.0.4 allows remote attackers to cause a denial of service via crafted JavaScript code in the First Name, Last Name, or Address field.2018-08-10not yet calculatedCVE-2018-15191
    MISC
    phpscriptsmall.com -- naukri_clone_scriptPHP Scripts Mall Naukri / Shine / Jobsite Clone Script 3.0.4 has Stored XSS via the USERNAME field, a related issue to CVE-2018-6795.2018-08-09not yet calculatedCVE-2018-15184
    MISC
    phpscriptsmall.com -- naukri_clone_scriptPHP Scripts Mall Naukri / Shine / Jobsite Clone Script 3.0.4 allows remote attackers to cause a denial of service (page update outage) via crafted PHP and JavaScript code in the "Current Position" field.2018-08-10not yet calculatedCVE-2018-15185
    MISC
    phpscriptsmall.com -- php_template_store_scriptPHP Template Store Script 3.0.6 allows XSS via the Address line 1, Address Line 2, Bank name, or A/C Holder name field in a profile.2018-08-06not yet calculatedCVE-2018-14869
    MISC
    EXPLOIT-DB
    phpscriptsmall.com -- resume_builder_scriptPHP Scripts Mall Myperfectresume / JobHero / Resume Clone Script 2.0.6 has Stored XSS via the Full Name and Title fields.2018-08-09not yet calculatedCVE-2018-15183
    MISC
    postgresql -- postgresqlIt was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.2018-08-09not yet calculatedCVE-2018-10925
    CONFIRM
    DEBIAN
    CONFIRM
    qcms -- qcmsAn issue was discovered in QCMS 3.0.1. upload/System/Controller/backend/product.php has XSS.2018-08-06not yet calculatedCVE-2018-14973
    MISC
    qcms -- qcmsAn issue was discovered in QCMS 3.0.1. upload/System/Controller/backend/user.php has XSS.2018-08-06not yet calculatedCVE-2018-14971
    MISC
    qcms -- qcmsAn issue was discovered in QCMS 3.0.1. upload/System/Controller/backend/category.php has XSS.2018-08-06not yet calculatedCVE-2018-14976
    MISC
    qcms -- qcmsAn issue was discovered in QCMS 3.0.1. upload/System/Controller/backend/down.php has XSS.2018-08-06not yet calculatedCVE-2018-14972
    MISC
    qcms -- qcmsAn issue was discovered in QCMS 3.0.1. upload/System/Controller/backend/slideshow.php has XSS.2018-08-06not yet calculatedCVE-2018-14970
    MISC
    qcms -- qcmsAn issue was discovered in QCMS 3.0.1. upload/System/Controller/backend/album.php has XSS.2018-08-06not yet calculatedCVE-2018-14975
    MISC
    qcms -- qcmsAn issue was discovered in QCMS 3.0.1. upload/System/Controller/guest.php has XSS, as demonstrated by the name parameter, a different vulnerability than CVE-2018-8070.2018-08-06not yet calculatedCVE-2018-14977
    MISC
    qcms -- qcmsAn issue was discovered in QCMS 3.0.1. CSRF exists via the backend/user/admin/add.html URI.2018-08-06not yet calculatedCVE-2018-14978
    MISC
    qcms -- qcmsAn issue was discovered in QCMS 3.0.1. upload/System/Controller/backend/news.php has XSS.2018-08-06not yet calculatedCVE-2018-14974
    MISC
    qcms -- qcms
     
    An issue was discovered in QCMS 3.0.1. upload/System/Controller/backend/system.php has XSS.2018-08-06not yet calculatedCVE-2018-14969
    MISC
    responsive_filemanager -- responsive_filemanagerupload.php in Responsive FileManager 9.13.1 allows SSRF via the url parameter.2018-08-03not yet calculatedCVE-2018-14728
    MISC
    EXPLOIT-DB
    rubygems -- active-support_gemactive-support ruby gem 5.2.0 could allow a remote attacker to execute arbitrary code on the system, caused by containing a malicious backdoor. An attacker could exploit this vulnerability to execute arbitrary code on the system.2018-08-10not yet calculatedCVE-2018-3779
    MISC
    siemens -- automation_license_managerA vulnerability has been identified in Automation License Manager 5 (All versions < 5.3.4.4). An attacker with network access to the device could send specially crafted network packets to determine whether or not a network port on another remote system is accessible or not. This allows the attacker to do basic network scanning using the victims machine. Successful exploitation requires a network connection to the affected device. The attacker does not need privileges, no user interaction is required. The impact is limited to determining whether or not a port on a target system is accessible by the affected device.2018-08-07not yet calculatedCVE-2018-11456
    CONFIRM
    siemens -- automation_license_managerA vulnerability has been identified in Automation License Manager 5 (All versions < 5.3.4.4), Automation License Manager 6 (All versions < 6.0.1). A directory traversal vulnerability could allow a remote attacker to move arbitrary files, which can result in code execution, compromising confidentiality, integrity and availability of the system. Successful exploitation requires a network connection to the affected device. The attacker does not need privileges or special conditions of the system, but user interaction is required.2018-08-07not yet calculatedCVE-2018-11455
    CONFIRM
    siemens -- simatic_step_7_and_simatic_winccA vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V10, V11, V12 (All versions), SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V13 (All versions), SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V14 (All versions < V14 SP1 Update 6), SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V15 (All versions < V15 Update 2). Improper file permissions in the default installation of TIA Portal may allow an attacker with local file system access to insert specially crafted files which may prevent TIA Portal startup (Denial-of-Service) or lead to local code execution. No special privileges are required, but the victim needs to attempt to start TIA Portal after the manipulation.2018-08-07not yet calculatedCVE-2018-11453
    CONFIRM
    siemens -- simatic_step_7_and_simatic_winccA vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V10, V11, V12 (All versions), SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V13 (All versions), SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V14 (All versions < V14 SP1 Update 6), SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V15 (All versions < V15 Update 2). Improper file permissions in the default installation of TIA Portal may allow an attacker with local file system access to manipulate resources which may be transferred to devices and executed there by a different user. No special privileges are required, but the victim needs to transfer the manipulated files to a device. Execution is caused on the target device rather than on the PG device.2018-08-07not yet calculatedCVE-2018-11454
    CONFIRM
    squirrelmail -- squirrelmailThe mail message display page in SquirrelMail through 1.4.22 has XSS via a "<svg><a xlink:href="https://www.us-cert.gov attack.2018-08-05not yet calculatedCVE-2018-14950
    MISC
    MISC
    MISC
    squirrelmail -- squirrelmailThe mail message display page in SquirrelMail through 1.4.22 has XSS via a "<form action='data:text" attack.2018-08-05not yet calculatedCVE-2018-14951
    MISC
    MISC
    MISC
    squirrelmail -- squirrelmailThe mail message display page in SquirrelMail through 1.4.22 has XSS via the formaction attribute.2018-08-05not yet calculatedCVE-2018-14954
    MISC
    MISC
    MISC
    squirrelmail -- squirrelmailThe mail message display page in SquirrelMail through 1.4.22 has XSS via a "<math xlink:href="https://www.us-cert.gov attack.2018-08-05not yet calculatedCVE-2018-14953
    MISC
    MISC
    MISC
    squirrelmail -- squirrelmailThe mail message display page in SquirrelMail through 1.4.22 has XSS via a "<math><maction xlink:href="https://www.us-cert.gov attack.2018-08-05not yet calculatedCVE-2018-14952
    MISC
    MISC
    MISC
    squirrelmail -- squirrelmailThe mail message display page in SquirrelMail through 1.4.22 has XSS via SVG animations (animate to attribute).2018-08-05not yet calculatedCVE-2018-14955
    MISC
    MISC
    MISC
    symfony -- symfonyAn issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. The Intl component includes various bundle readers that are used to read resource bundles from the local filesystem. The read() methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a URL parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack, aka Directory Traversal.2018-08-06not yet calculatedCVE-2017-16654
    CONFIRM
    CONFIRM
    DEBIAN
    symfony -- symfonyAn issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. When a form is submitted by the user, the request handler classes of the Form component merge POST data and uploaded files data into one array. This big array forms the data that are then bound to the form. At this stage there is no difference anymore between submitted POST data and uploaded files. A user can send a crafted HTTP request where the value of a "FileType" is sent as normal POST data that could be interpreted as a local file path on the server-side (for example, "file:///etc/passwd"). If the application did not perform any additional checks about the value submitted to the "FileType", the contents of the given file on the server could have been exposed to the attacker.2018-08-06not yet calculatedCVE-2017-16790
    CONFIRM
    DEBIAN
    symfony -- symfonyAn issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. The current implementation of CSRF protection in Symfony (Version >=2) does not use different tokens for HTTP and HTTPS; therefore the token is subject to MITM attacks on HTTP and can then be used in an HTTPS context to do CSRF attacks.2018-08-06not yet calculatedCVE-2017-16653
    CONFIRM
    CONFIRM
    DEBIAN
    thinksaas -- thinksaasThinkSAAS through 2018-07-25 has XSS via the index.php?app=group&ac=create&ts=do groupdesc parameter.2018-08-07not yet calculatedCVE-2018-15130
    MISC
    thinksaas -- thinksaasThinkSAAS through 2018-07-25 has XSS via the index.php?app=article&ac=comment&ts=do content parameter.2018-08-07not yet calculatedCVE-2018-15129
    MISC
    tibco -- activematrix_businessworksThe BusinessWorks engine component of TIBCO Software Inc.'s TIBCO ActiveMatrix BusinessWorks, TIBCO ActiveMatrix BusinessWorks for z/Linux, and TIBCO ActiveMatrix BusinessWorks Distribution for TIBCO Silver Fabric contains a vulnerability that may allow XML eXternal Entity (XXE) attacks via incoming network messages, and may disclose the contents of files accessible to a running BusinessWorks engine Affected releases are TIBCO Software Inc. TIBCO ActiveMatrix BusinessWorks: versions up to and including 5.13.0, TIBCO ActiveMatrix BusinessWorks for z/Linux: versions up to and including 5.13.0, TIBCO ActiveMatrix BusinessWorks Distribution for TIBCO Silver Fabric: versions up to and including 5.13.0.2018-08-08not yet calculatedCVE-2018-12408
    BID
    MISC
    CONFIRM
    ubuntu -- ubuntu
     
    The CUPS AppArmor profile incorrectly confined the dnssd backend due to use of hard links. A local attacker could possibly use this issue to escape confinement. This flaw affects versions prior to 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1 in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS, and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS.2018-08-10not yet calculatedCVE-2018-6553
    MLIST
    UBUNTU
    DEBIAN
    vdsm -- vdsm
     
    It was found that vdsm before version 4.20.37 invokes qemu-img on untrusted inputs without limiting resources. By uploading a specially crafted image, an attacker could cause the qemu-img process to consume unbounded amounts of memory of CPU time, causing a denial of service condition that could potentially impact other users of the host.2018-08-09not yet calculatedCVE-2018-10908
    MISC
    CONFIRM
    MISC
    weaselcms -- weaselcmsAn issue was discovered in WeaselCMS v0.3.5. CSRF can update the website settings (such as the theme, title, and description) via index.php.2018-08-05not yet calculatedCVE-2018-14958
    MISC
    weaselcms -- weaselcmsAn issue was discovered in WeaselCMS v0.3.5. CSRF can create new pages via an index.php?b=pages&a=new URI.2018-08-05not yet calculatedCVE-2018-14959
    MISC
    wolf -- cms
     
    Wolf CMS 0.8.3.1 has XSS in the Snippets tab, as demonstrated by a ?/admin/snippet/edit/1 URI.2018-08-10not yet calculatedCVE-2018-14837
    MISC
    wordpress -- wordpress
     
    In WordPress 4.9.7, plugins uploaded via the admin area are not verified as being ZIP files. This allows for PHP files to be uploaded. Once a PHP file is uploaded, the plugin extraction fails, but the PHP file remains in a predictable wp-content/uploads location, allowing for an attacker to then execute the file. This represents a security risk in limited scenarios where an attacker (who does have the required capabilities for plugin uploads) cannot simply place arbitrary PHP code into a valid plugin ZIP file and upload that plugin, because a machine's wp-content/plugins directory permissions were set up to block all new plugins.2018-08-10not yet calculatedCVE-2018-14028
    MISC
    MISC
    MISC
    wpa_supplicant -- wpa_supplicant
     
    An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.2018-08-08not yet calculatedCVE-2018-14526
    SECTRACK
    MLIST
    MISC
    MISC
    xiao5ucompany -- xiao5ucompanyXiao5uCompany 1.7 has CSRF via admin/Admin.asp.2018-08-06not yet calculatedCVE-2018-14960
    MISC
    MISC
    xnview -- xnviewXnView 2.45 allows remote attackers to cause a denial of service (User Mode Write AV starting at MSVCR120!memcpy+0x0000000000000074 and application crash) or possibly have unspecified other impact via a crafted RLE file.2018-08-07not yet calculatedCVE-2018-15176
    MISC
    xnview -- xnviewXnView 2.45 allows remote attackers to cause a denial of service (User Mode Write AV starting at Qt5Core!QVariant::~QVariant+0x0000000000000014 and application crash) or possibly have unspecified other impact via a crafted RLE file.2018-08-07not yet calculatedCVE-2018-15175
    MISC
    xnview -- xnview
     
    XnView 2.45 allows remote attackers to cause a denial of service (Read Access Violation at the Instruction Pointer and application crash) or possibly have unspecified other impact via a crafted ICO file.2018-08-07not yet calculatedCVE-2018-15174
    MISC
    zoho_manageengine -- applications_managerA SQL Injection vulnerability exists in the Zoho ManageEngine Applications Manager 13 before build 13820 via the resids parameter in a /editDisplaynames.do?method=editDisplaynames GET request.2018-08-07not yet calculatedCVE-2018-15168
    MISC
    MISC
    zoho_manageengine -- applications_managerA reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Applications Manager 13 before build 13820 allows remote attackers to inject arbitrary web script or HTML via the /deleteMO.do method parameter.2018-08-07not yet calculatedCVE-2018-15169
    MISC
    MISC
    zzcms --  zzcmszzcms 8.3 has CSRF via the admin/adminadd.php?action=add URI.2018-08-06not yet calculatedCVE-2018-14963
    MISC
    zzcms --  zzcmszzcms 8.3 has stored XSS related to the content variable in user/manage.php and zt/show.php.2018-08-06not yet calculatedCVE-2018-14962
    MISC
    zzcms --  zzcms
     
    dl/dl_sendmail.php in zzcms 8.3 has SQL Injection via the sql parameter.2018-08-06not yet calculatedCVE-2018-14961
    MISC
    MISC
    Back to top

    This product is provided subject to this Notification and this Privacy & Use policy.


  • Original release date: August 10, 2018

    As summer break ends, many students will return to school with mobile devices, such as smart phones, tablets, and laptops. Although these devices can help students with their schoolwork and stay in touch with family and friends, there are risks associated with using them. However, there are simple steps that can help keep students stay safe while using their mobile devices and getting online.

    NCCIC suggests reviewing the following tips and resources for information to keep students cyber safe:


    This product is provided subject to this Notification and this Privacy & Use policy.