US CERT: Security Bulletins

Subscribe to US CERT: Security Bulletins hírcsatorna
Alerts warn about vulnerabilities, incidents, and other security issues that pose a significant risk.
Frissítve: 19 perc 50 másodperc
2017. szeptember 18.

SB17-261: Vulnerability Summary for the Week of September 11, 2017

Original release date: September 18, 2017

The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.

The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0

  • Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9

  • Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9

Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

 

High VulnerabilitiesPrimary
Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infogoogle -- androidA elevation of privilege vulnerability in the Android framework (windowmanager). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-62196835.2017-09-089.3CVE-2017-0752
BID
CONFIRMgoogle -- androidA remote code execution vulnerability in the Android libraries (libgdx). Product: Android. Versions: 7.1.1, 7.1.2, 8.0. Android ID: A-62218744.2017-09-089.3CVE-2017-0753
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the Android libraries (libminikin). Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-32178311.2017-09-089.3CVE-2017-0755
BID
CONFIRMgoogle -- androidA remote code execution vulnerability in the Android media framework (libstagefright). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-34621073.2017-09-089.3CVE-2017-0756
BID
CONFIRMgoogle -- androidA remote code execution vulnerability in the Android media framework (libavc). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36006815.2017-09-089.3CVE-2017-0757
BID
CONFIRMgoogle -- androidA remote code execution vulnerability in the Android media framework (libhevc). Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36492741.2017-09-089.3CVE-2017-0758
BID
CONFIRMgoogle -- androidA remote code execution vulnerability in the Android media framework (libstagefright). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36715268.2017-09-089.3CVE-2017-0759
BID
CONFIRMgoogle -- androidA remote code execution vulnerability in the Android media framework (libstagefright). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37237396.2017-09-089.3CVE-2017-0760
BID
CONFIRMgoogle -- androidA remote code execution vulnerability in the Android media framework (libavc). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-38448381.2017-09-089.3CVE-2017-0761
BID
CONFIRMgoogle -- androidA remote code execution vulnerability in the Android media framework (libhevc). Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-62214264.2017-09-089.3CVE-2017-0762
BID
CONFIRMgoogle -- androidA remote code execution vulnerability in the Android media framework (libhevc). Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62534693.2017-09-089.3CVE-2017-0763
BID
CONFIRMgoogle -- androidA remote code execution vulnerability in the Android media framework (libvorbis). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62872015.2017-09-089.3CVE-2017-0764
BID
CONFIRMgoogle -- androidA remote code execution vulnerability in the Android media framework (libstagefright). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62872863.2017-09-089.3CVE-2017-0765
BID
CONFIRMgoogle -- androidA remote code execution vulnerability in the Android media framework (libjhead). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37776688.2017-09-089.3CVE-2017-0766
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the Android media framework (libeffects). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37536407.2017-09-089.3CVE-2017-0767
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the Android media framework (libeffects). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62019992.2017-09-089.3CVE-2017-0768
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the Android media framework (libstagefright). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-37662122.2017-09-089.3CVE-2017-0769
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the Android media framework (libmediaplayerservice). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-38234812.2017-09-089.3CVE-2017-0770
BID
CONFIRMgoogle -- androidA denial of service vulnerability in the Android media framework (libskia). Product: Android. Versions: 7.0, 7.1.1, 7.1.2. Android ID: A-37624243.2017-09-087.1CVE-2017-0771
BID
CONFIRMgoogle -- androidA denial of service vulnerability in the Android media framework (libavc). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-38115076.2017-09-087.1CVE-2017-0772
BID
CONFIRMgoogle -- androidA denial of service vulnerability in the Android media framework (libhevc). Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-37615911.2017-09-087.1CVE-2017-0773
BID
CONFIRMgoogle -- androidA denial of service vulnerability in the Android media framework (libstagefright). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-62673844.2017-09-087.1CVE-2017-0774
BID
CONFIRMgoogle -- androidA denial of service vulnerability in the Android media framework (libstagefright). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-62673179.2017-09-087.1CVE-2017-0775
BID
CONFIRMgoogle -- androidA information disclosure vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2. Android ID: A-62133227.2017-09-087.8CVE-2017-0778
BID
CONFIRMgoogle -- androidA denial of service vulnerability in the Android runtime (android messenger). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-37742976.2017-09-087.1CVE-2017-0780
BID
CONFIRMgoogle -- androidA information disclosure vulnerability in the N/A memory subsystem. Product: Android. Versions: Android kernel. Android ID: A-35764946.2017-09-087.1CVE-2017-0793
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the MediaTek accessory detector driver. Product: Android. Versions: Android kernel. Android ID: A-36198473. References: M-ALPS03361480.2017-09-089.3CVE-2017-0795
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the MediaTek auxadc driver. Product: Android. Versions: Android kernel. Android ID: A-62458865. References: M-ALPS03353884, M-ALPS03353886, M-ALPS03353887.2017-09-089.3CVE-2017-0796
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the MediaTek accessory detector driver. Product: Android. Versions: Android kernel. Android ID: A-62459766. References: M-ALPS03353854.2017-09-089.3CVE-2017-0797
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the MediaTek kernel. Product: Android. Versions: Android kernel. Android ID: A-36100671. References: M-ALPS03365532.2017-09-089.3CVE-2017-0798
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the MediaTek lastbus. Product: Android. Versions: Android kernel. Android ID: A-36731602. References: M-ALPS03342072.2017-09-089.3CVE-2017-0799
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the MediaTek teei. Product: Android. Versions: Android kernel. Android ID: A-37683975. References: M-ALPS03302988.2017-09-089.3CVE-2017-0800
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the MediaTek libmtkomxvdec. Product: Android. Versions: Android kernel. Android ID: A-38447970. References: M-ALPS03337980.2017-09-089.3CVE-2017-0801
BID
CONFIRMibm -- db2_connectIBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access. IBM X-Force ID: 128178.2017-09-127.2CVE-2017-1451
CONFIRM
BID
SECTRACK
MISCibm -- db2_connectIBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user to obtain elevated privilege and overwrite DB2 files. IBM X-Force ID: 128180.2017-09-127.2CVE-2017-1452
CONFIRM
BID
SECTRACK
MISCimagemagick -- imagemagickIn ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function PersistPixelCache in magick/cache.c, which allows attackers to cause a denial of service (memory consumption in ReadMPCImage in coders/mpc.c) via a crafted file.2017-09-127.1CVE-2017-14325
CONFIRMimagemagick -- imagemagickImageMagick 7.0.6-6 has a large loop vulnerability in ReadWPGImage in coders/wpg.c, causing CPU exhaustion via a crafted wpg image file.2017-09-127.1CVE-2017-14341
CONFIRM
CONFIRMmicrosoft -- edgeMicrosoft Edge in Microsoft Windows 1703 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8731, CVE-2017-8734, and CVE-2017-11766.2017-09-127.6CVE-2017-8751
SECTRACK
CONFIRMsynology -- photo_stationMultiple SQL injection vulnerabilities in Synology Photo Station before 6.7.4-3433 and 6.3-2968 allow remote attackers to execute arbitrary SQL commands via the (1) article_id parameter to label.php; or (2) type parameter to synotheme.php.2017-09-087.5CVE-2017-11161
CONFIRMtcpdump -- tcpdumpThe SMB/CIFS parser in tcpdump before 4.9.2 has a buffer over-read in smbutil.c:name_len().2017-09-147.5CVE-2017-12893
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpSeveral protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in addrtoname.c:lookup_bytestring().2017-09-147.5CVE-2017-12894
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe ICMP parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp.c:icmp_print().2017-09-147.5CVE-2017-12895
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:isakmp_rfc3948_print().2017-09-147.5CVE-2017-12896
SECTRACK
CONFIRM
CONFIRM
CONFIRMtcpdump -- tcpdumpThe ISO CLNS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isoclns_print().2017-09-147.5CVE-2017-12897
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:interp_reply().2017-09-147.5CVE-2017-12898
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe DECnet parser in tcpdump before 4.9.2 has a buffer over-read in print-decnet.c:decnet_print().2017-09-147.5CVE-2017-12899
SECTRACK
CONFIRM
CONFIRM
CONFIRMtcpdump -- tcpdumpSeveral protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in util-print.c:tok2strbuf().2017-09-147.5CVE-2017-12900
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe EIGRP parser in tcpdump before 4.9.2 has a buffer over-read in print-eigrp.c:eigrp_print().2017-09-147.5CVE-2017-12901
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe Zephyr parser in tcpdump before 4.9.2 has a buffer over-read in print-zephyr.c, several functions.2017-09-147.5CVE-2017-12902
SECTRACK
CONFIRM
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-ip6.c:ip6_print().2017-09-147.5CVE-2017-12985
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().2017-09-147.5CVE-2017-12986
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().2017-09-147.5CVE-2017-12987
SECTRACK
CONFIRM
CONFIRM
CONFIRMtcpdump -- tcpdumpThe telnet parser in tcpdump before 4.9.2 has a buffer over-read in print-telnet.c:telnet_parse().2017-09-147.5CVE-2017-12988
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().2017-09-147.5CVE-2017-12991
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe RIPng parser in tcpdump before 4.9.2 has a buffer over-read in print-ripng.c:ripng_print().2017-09-147.5CVE-2017-12992
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c, several functions.2017-09-147.5CVE-2017-12993
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().2017-09-147.5CVE-2017-12994
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe PIMv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-pim.c:pimv2_print().2017-09-147.5CVE-2017-12996
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_extd_ip_reach().2017-09-147.5CVE-2017-12998
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print().2017-09-147.5CVE-2017-12999
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IEEE 802.15.4 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_15_4.c:ieee802_15_4_if_print().2017-09-147.5CVE-2017-13000
SECTRACK
CONFIRM
CONFIRM
CONFIRM
CONFIRMtcpdump -- tcpdumpThe NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:nfs_printfh().2017-09-147.5CVE-2017-13001
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe AODV parser in tcpdump before 4.9.2 has a buffer over-read in print-aodv.c:aodv_extension().2017-09-147.5CVE-2017-13002
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe LMP parser in tcpdump before 4.9.2 has a buffer over-read in print-lmp.c:lmp_print().2017-09-147.5CVE-2017-13003
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c:juniper_parse_header().2017-09-147.5CVE-2017-13004
SECTRACK
CONFIRM
CONFIRM
CONFIRMtcpdump -- tcpdumpThe NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:xid_map_enter().2017-09-147.5CVE-2017-13005
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe L2TP parser in tcpdump before 4.9.2 has a buffer over-read in print-l2tp.c, several functions.2017-09-147.5CVE-2017-13006
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe Apple PKTAP parser in tcpdump before 4.9.2 has a buffer over-read in print-pktap.c:pktap_if_print().2017-09-147.5CVE-2017-13007
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().2017-09-147.5CVE-2017-13008
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_print().2017-09-147.5CVE-2017-13009
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe BEEP parser in tcpdump before 4.9.2 has a buffer over-read in print-beep.c:l_strnstart().2017-09-147.5CVE-2017-13010
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpSeveral protocol parsers in tcpdump before 4.9.2 could cause a buffer overflow in util-print.c:bittok2str_internal().2017-09-147.5CVE-2017-13011
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe ICMP parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp.c:icmp_print().2017-09-147.5CVE-2017-13012
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe ARP parser in tcpdump before 4.9.2 has a buffer over-read in print-arp.c, several functions.2017-09-147.5CVE-2017-13013
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe White Board protocol parser in tcpdump before 4.9.2 has a buffer over-read in print-wb.c:wb_prep(), several functions.2017-09-147.5CVE-2017-13014
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe EAP parser in tcpdump before 4.9.2 has a buffer over-read in print-eap.c:eap_print().2017-09-147.5CVE-2017-13015
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print().2017-09-147.5CVE-2017-13016
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe DHCPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-dhcp6.c:dhcp6opt_print().2017-09-147.5CVE-2017-13017
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().2017-09-147.5CVE-2017-13018
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().2017-09-147.5CVE-2017-13019
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print().2017-09-147.5CVE-2017-13020
SECTRACK
CONFIRM
CONFIRM
CONFIRMtcpdump -- tcpdumpThe ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_print().2017-09-147.5CVE-2017-13021
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printroute().2017-09-147.5CVE-2017-13022
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().2017-09-147.5CVE-2017-13023
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().2017-09-147.5CVE-2017-13024
SECTRACK
CONFIRM
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().2017-09-147.5CVE-2017-13025
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c, several functions.2017-09-147.5CVE-2017-13026
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe LLDP parser in tcpdump before 4.9.2 has a buffer over-read in print-lldp.c:lldp_mgmt_addr_tlv_print().2017-09-147.5CVE-2017-13027
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe BOOTP parser in tcpdump before 4.9.2 has a buffer over-read in print-bootp.c:bootp_print().2017-09-147.5CVE-2017-13028
SECTRACK
CONFIRM
CONFIRM
CONFIRMtcpdump -- tcpdumpThe PPP parser in tcpdump before 4.9.2 has a buffer over-read in print-ppp.c:print_ccp_config_options().2017-09-147.5CVE-2017-13029
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe PIM parser in tcpdump before 4.9.2 has a buffer over-read in print-pim.c, several functions.2017-09-147.5CVE-2017-13030
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IPv6 fragmentation header parser in tcpdump before 4.9.2 has a buffer over-read in print-frag6.c:frag6_print().2017-09-147.5CVE-2017-13031
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe RADIUS parser in tcpdump before 4.9.2 has a buffer over-read in print-radius.c:print_attr_string().2017-09-147.5CVE-2017-13032
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print().2017-09-147.5CVE-2017-13033
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().2017-09-147.5CVE-2017-13034
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_id().2017-09-147.5CVE-2017-13035
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe OSPFv3 parser in tcpdump before 4.9.2 has a buffer over-read in print-ospf6.c:ospf6_decode_v3().2017-09-147.5CVE-2017-13036
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printts().2017-09-147.5CVE-2017-13037
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe PPP parser in tcpdump before 4.9.2 has a buffer over-read in print-ppp.c:handle_mlppp().2017-09-147.5CVE-2017-13038
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c, several functions.2017-09-147.5CVE-2017-13039
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe MPTCP parser in tcpdump before 4.9.2 has a buffer over-read in print-mptcp.c, several functions.2017-09-147.5CVE-2017-13040
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_nodeinfo_print().2017-09-147.5CVE-2017-13041
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe HNCP parser in tcpdump before 4.9.2 has a buffer over-read in print-hncp.c:dhcpv6_print().2017-09-147.5CVE-2017-13042
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_multicast_vpn().2017-09-147.5CVE-2017-13043
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe HNCP parser in tcpdump before 4.9.2 has a buffer over-read in print-hncp.c:dhcpv4_print().2017-09-147.5CVE-2017-13044
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe VQP parser in tcpdump before 4.9.2 has a buffer over-read in print-vqp.c:vqp_print().2017-09-147.5CVE-2017-13045
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().2017-09-147.5CVE-2017-13046
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print().2017-09-147.5CVE-2017-13047
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp_obj_print().2017-09-147.5CVE-2017-13048
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe Rx protocol parser in tcpdump before 4.9.2 has a buffer over-read in print-rx.c:ubik_print().2017-09-147.5CVE-2017-13049
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe RPKI-Router parser in tcpdump before 4.9.2 has a buffer over-read in print-rpki-rtr.c:rpki_rtr_pdu_print().2017-09-147.5CVE-2017-13050
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp_obj_print().2017-09-147.5CVE-2017-13051
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe CFM parser in tcpdump before 4.9.2 has a buffer over-read in print-cfm.c:cfm_print().2017-09-147.5CVE-2017-13052
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_rt_routing_info().2017-09-147.5CVE-2017-13053
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe LLDP parser in tcpdump before 4.9.2 has a buffer over-read in print-lldp.c:lldp_private_8023_print().2017-09-147.5CVE-2017-13054
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_is_reach_subtlv().2017-09-147.5CVE-2017-13055
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe Cisco HDLC parser in tcpdump before 4.9.2 has a buffer over-read in print-chdlc.c:chdlc_print().2017-09-147.5CVE-2017-13687
SECTRACK
CONFIRM
CONFIRM
CONFIRMtcpdump -- tcpdumpThe OLSR parser in tcpdump before 4.9.2 has a buffer over-read in print-olsr.c:olsr_print().2017-09-147.5CVE-2017-13688
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IKEv1 parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:ikev1_id_print().2017-09-147.5CVE-2017-13689
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IKEv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c, several functions.2017-09-147.5CVE-2017-13690
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().2017-09-147.5CVE-2017-13725
SECTRACK
CONFIRM
CONFIRM
CONFIRMBack to top

 

Medium VulnerabilitiesPrimary
Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoazeotech -- daqfactoryAn Uncontrolled Search Path Element issue was discovered in AzeoTech DAQFactory versions prior to 17.1. An uncontrolled search path element vulnerability has been identified, which may execute malicious DLL files that have been placed within the search path.2017-09-084.6CVE-2017-5147
BID
MISCdivinglog -- diving_logXXE in Diving Log 6.0 allows attackers to remotely view local files through a crafted dive.xml file that is mishandled during a Subsurface import.2017-09-084.3CVE-2017-9095
MISCee -- 4gee_wifi_mbb_firmwareEE 4GEE WiFi MBB (before EE60_00_05.00_31) devices have CSRF, related to goform/AddNewProfile, goform/setWanDisconnect, goform/setSMSAutoRedirectSetting, goform/setReset, and goform/uploadBackupSettings.2017-09-116.8CVE-2017-14267
MISC
MISC
MISC
MISC
MISC
MISC
MISCee -- 4gee_wifi_mbb_firmwareEE 4GEE WiFi MBB (before EE60_00_05.00_31) devices have XSS in the sms_content parameter in a getSMSlist request.2017-09-114.3CVE-2017-14268
MISC
MISCee -- 4gee_wifi_mbb_firmwareEE 4GEE WiFi MBB (before EE60_00_05.00_31) devices allow remote attackers to obtain sensitive information via a JSONP endpoint, as demonstrated by passwords and SMS content.2017-09-115.0CVE-2017-14269
MISC
MISCellucian -- banner_studentCross-site scripting (XSS) vulnerability in Ellucian (formerly SunGard) Banner Student 8.5.1.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.2017-09-114.3CVE-2015-4687
MISC
BUGTRAQffmpeg -- ffmpegThe av_color_primaries_name function in libavutil/pixdesc.c in FFmpeg 3.3.3 may return a NULL pointer depending on a value contained in a file, but callers do not anticipate this, as demonstrated by the avcodec_string function in libavcodec/utils.c, leading to a NULL pointer dereference. (It is also conceivable that there is security relevance for a NULL pointer dereference in av_color_primaries_name calls within the ffprobe command-line program.)2017-09-096.8CVE-2017-14225
BID
MISC
MISCfortinet -- fortiosA Cross-Site Scripting vulnerability in Fortinet FortiOS versions 5.6.0 and earlier allows attackers to Execute unauthorized code or commands via the action input during the activation of a FortiToken.2017-09-114.3CVE-2017-3132
BID
SECTRACK
CONFIRM
EXPLOIT-DBfortinet -- fortiosA Cross-Site Scripting vulnerability in Fortinet FortiOS versions 5.6.0 and earlier allows attackers to execute unauthorized code or commands via the Replacement Message HTML for SSL-VPN.2017-09-114.3CVE-2017-3133
BID
SECTRACK
CONFIRM
EXPLOIT-DBgoogle -- androidA information disclosure vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-38496660.2017-09-084.3CVE-2017-0776
BID
CONFIRMgoogle -- androidA information disclosure vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2. Android ID: A-38342499.2017-09-084.3CVE-2017-0777
BID
CONFIRMgoogle -- androidA information disclosure vulnerability in the Android media framework (audioflinger). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-38340117.2017-09-084.3CVE-2017-0779
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the Android system (nfc). Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37287958.2017-09-085.8CVE-2017-0784
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37351060. References: B-V2017060101.2017-09-085.8CVE-2017-0786
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37722970. References: B-V2017053104.2017-09-085.8CVE-2017-0787
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37722328. References: B-V2017053103.2017-09-085.8CVE-2017-0788
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37685267. References: B-V2017053102.2017-09-085.8CVE-2017-0789
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37357704. References: B-V2017053101.2017-09-085.8CVE-2017-0790
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37306719. References: B-V2017052302.2017-09-085.8CVE-2017-0791
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the Upstream kernel scsi driver. Product: Android. Versions: Android kernel. Android ID: A-35644812.2017-09-086.8CVE-2017-0794
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the MediaTek kernel. Product: Android. Versions: Android kernel. Android ID: A-36232120. References: M-ALPS03384818.2017-09-086.8CVE-2017-0802
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the MediaTek accessory detector driver. Product: Android. Versions: Android kernel. Android ID: A-36136137. References: M-ALPS03361477.2017-09-086.8CVE-2017-0803
BID
CONFIRMgoogle -- androidA elevation of privilege vulnerability in the MediaTek mmc driver. Product: Android. Versions: Android kernel. Android ID: A-36274676. References: M-ALPS03361487.2017-09-086.8CVE-2017-0804
BID
CONFIRMgraphicsmagick -- graphicsmagickOff-by-one error in the DrawImage function in magick/render.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (DrawDashPolygon heap-based buffer over-read and application crash) via a crafted file.2017-09-114.3CVE-2017-14314
CONFIRM
CONFIRMibm -- db2_connectIBM DB2 10.5 and 11.1 contains a denial of service vulnerability. A remote user can cause disruption of service for DB2 Connect Server setup with a particular configuration. IBM X-Force ID: 129829.2017-09-124.3CVE-2017-1519
CONFIRM
BID
SECTRACK
MISCibm -- db2_connectIBM DB2 9.7, 10,1, 10.5, and 11.1 is vulnerable to an unauthorized command that allows the database to be activated when authentication type is CLIENT. IBM X-Force ID: 129830.2017-09-124.3CVE-2017-1520
CONFIRM
BID
SECTRACK
MISCibm -- qradar_security_information_and_event_managerIBM QRadar 7.2 and 7.3 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 122957.2017-09-125.0CVE-2017-1162
CONFIRM
BID
MISCimagemagick -- imagemagickA heap-based buffer over-read in SampleImage() in MagickCore/resize.c in ImageMagick 7.0.6-8 Q16 allows remote attackers to cause a denial of service via a crafted file.2017-09-114.3CVE-2017-14248
CONFIRMimagemagick -- imagemagickImageMagick 7.0.6-8 Q16 mishandles EOF checks in ReadMPCImage in coders/mpc.c, leading to division by zero in GetPixelCacheTileSize in MagickCore/cache.c, allowing remote attackers to cause a denial of service via a crafted file.2017-09-114.3CVE-2017-14249
CONFIRMimagemagick -- imagemagickIn ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function ReadMPCImage in coders/mpc.c, which allows attackers to cause a denial of service via a crafted file.2017-09-124.3CVE-2017-14324
CONFIRMimagemagick -- imagemagickIn ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted file.2017-09-124.3CVE-2017-14326
CONFIRMimagemagick -- imagemagickImageMagick 7.0.6-6 has a memory exhaustion vulnerability in ReadWPGImage in coders/wpg.c via a crafted wpg image file.2017-09-124.3CVE-2017-14342
CONFIRMimagemagick -- imagemagickImageMagick 7.0.6-6 has a memory leak vulnerability in ReadXCFImage in coders/xcf.c via a crafted xcf image file.2017-09-124.3CVE-2017-14343
CONFIRMjasper_project -- jasperThere is an infinite loop in the jpc_dec_tileinit function in jpc/jpc_dec.c of Jasper 2.0.13. It will lead to a remote denial of service attack.2017-09-095.0CVE-2017-14229
MISCnasm -- netwide_assemblerIn Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in the function paste_tokens() in preproc.c, aka a NULL pointer dereference. It will lead to remote denial of service.2017-09-095.0CVE-2017-14228
MISCnexusphp_project -- nexusphpNexusPHP 1.5.beta5.20120707 has XSS in the returnto parameter to fun.php in a delete action.2017-09-124.3CVE-2017-14347
MISCnovell -- leapThe mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.2017-09-086.9CVE-2016-5759
SUSE
MLISTstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to a "User Mode Write AV starting at STDUJBIG2File!DllUnregisterServer+0x000000000000cb8c."2017-09-114.6CVE-2017-14286
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to a "Read Access Violation on Control Flow starting at STDUJBIG2File+0x00000000000015eb."2017-09-114.6CVE-2017-14287
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to a "User Mode Write AV starting at STDUJBIG2File!DllGetClassObject+0x0000000000002ff7."2017-09-114.6CVE-2017-14288
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to a "User Mode Write AV starting at STDUJBIG2File!DllGetClassObject+0x000000000000303e."2017-09-114.6CVE-2017-14289
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Heap Corruption starting at wow64!Wow64NotifyDebugger+0x000000000000001d."2017-09-114.6CVE-2017-14290
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to a "User Mode Write AV starting at STDUJBIG2File!DllUnregisterServer+0x00000000000076d8."2017-09-114.6CVE-2017-14291
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to a "User Mode Write AV starting at STDUJBIG2File!DllUnregisterServer+0x000000000000570e."2017-09-114.6CVE-2017-14292
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Heap Corruption starting at wow64!Wow64LdrpInitialize+0x00000000000008e1."2017-09-114.6CVE-2017-14293
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to a "User Mode Write AV starting at STDUJBIG2File!DllUnregisterServer+0x000000000000566e."2017-09-114.6CVE-2017-14294
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at STDUJBIG2File!DllGetClassObject+0x00000000000043e6."2017-09-114.6CVE-2017-14296
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls Code Flow starting at STDUJBIG2File!DllGetClassObject+0x0000000000002f35."2017-09-114.6CVE-2017-14297
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at STDUJBIG2File!DllGetClassObject+0x00000000000038e8."2017-09-114.6CVE-2017-14298
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at STDUJBIG2File!DllGetClassObject+0x000000000000384b."2017-09-114.6CVE-2017-14299
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at STDUJBIG2File!DllGetClassObject+0x0000000000004479."2017-09-114.6CVE-2017-14300
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at STDUJBIG2File!DllUnregisterServer+0x00000000000076d3."2017-09-114.6CVE-2017-14301
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to "Data from Faulting Address controls Branch Selection starting at STDUJBIG2File!DllGetClassObject+0x00000000000064d7."2017-09-114.6CVE-2017-14302
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to a "Read Access Violation starting at STDUJBIG2File!DllGetClassObject+0x0000000000003047."2017-09-114.6CVE-2017-14303
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to a "Read Access Violation starting at STDUJBIG2File!DllGetClassObject+0x00000000000043e0."2017-09-114.6CVE-2017-14304
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to "Data from Faulting Address controls Branch Selection starting at STDUJBIG2File!DllUnregisterServer+0x0000000000005578."2017-09-114.6CVE-2017-14305
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to a "Read Access Violation starting at STDUJBIG2File!DllUnregisterServer+0x0000000000006e10."2017-09-114.6CVE-2017-14306
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77400000!TpAllocCleanupGroup+0x0000000000000402."2017-09-114.6CVE-2017-14307
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to a "Read Access Violation starting at STDUJBIG2File!DllUnregisterServer+0x0000000000006ddd."2017-09-114.6CVE-2017-14308
MISCstdutility -- stdu_viewerSTDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to a "Read Access Violation starting at STDUJBIG2File!DllUnregisterServer+0x0000000000006ec8."2017-09-114.6CVE-2017-14309
MISCsynology -- photo_stationDirectory traversal vulnerability in synphotoio in Synology Photo Station before 6.7.4-3433 and 6.3-2968 allows remote authenticated users to read arbitrary files via unspecified vectors.2017-09-084.0CVE-2017-11162
CONFIRMsynology -- photo_stationServer-side request forgery (SSRF) vulnerability in file_upload.php in Synology Photo Station before 6.7.4-3433 and 6.3-2968 allows remote authenticated users to download arbitrary local files via the url parameter.2017-09-084.0CVE-2017-12071
CONFIRMtcpdump -- tcpdumpThe RESP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-resp.c:resp_get_length().2017-09-145.0CVE-2017-12989
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe ISAKMP parser in tcpdump before 4.9.2 could enter an infinite loop due to bugs in print-isakmp.c, several functions.2017-09-145.0CVE-2017-12990
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe DNS parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-domain.c:ns_print().2017-09-145.0CVE-2017-12995
SECTRACK
CONFIRM
CONFIRMtcpdump -- tcpdumpThe LLDP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-lldp.c:lldp_private_8021_print().2017-09-145.0CVE-2017-12997
SECTRACK
CONFIRM
CONFIRMtcpreplay -- tcpreplaytcprewrite in Tcpreplay 3.4.4 has a Heap-Based Buffer Overflow vulnerability triggered by a crafted PCAP file.2017-09-126.8CVE-2017-14266
EXPLOIT-DBtypo3 -- typo3Unrestricted File Upload vulnerability in the fileDenyPattern in sysext/core/Classes/Core/SystemEnvironmentBuilder.php in TYPO3 7.6.0 to 7.6.21 and 8.0.0 to 8.7.4 allows remote authenticated users to upload files with a .pht extension and consequently execute arbitrary PHP code.2017-09-116.5CVE-2017-14251
BID
SECTRACK
CONFIRMxnview -- xnviewXnView Classic for Windows Version 2.40 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to a "User Mode Write AV near NULL starting at wow64!Wow64NotifyDebugger+0x000000000000001d."2017-09-114.6CVE-2017-14275
MISCxnview -- xnviewXnView Classic for Windows Version 2.40 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to "Possible Stack Corruption starting at jbig2dec+0x0000000000002fbe."2017-09-114.6CVE-2017-14276
MISCxnview -- xnviewXnView Classic for Windows Version 2.40 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to a "Read Access Violation starting at jbig2dec+0x0000000000005956."2017-09-114.6CVE-2017-14277
MISCxnview -- xnviewXnView Classic for Windows Version 2.40 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to a "Read Access Violation starting at jbig2dec+0x0000000000005940."2017-09-114.6CVE-2017-14278
MISCxnview -- xnviewXnView Classic for Windows Version 2.40 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to a "Read Access Violation starting at jbig2dec+0x0000000000005643."2017-09-114.6CVE-2017-14279
MISCxnview -- xnviewXnView Classic for Windows Version 2.40 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to "Data from Faulting Address controls Branch Selection starting at jbig2dec+0x000000000000571d."2017-09-114.6CVE-2017-14280
MISCxnview -- xnviewXnView Classic for Windows Version 2.40 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at jbig2dec+0x00000000000090f1."2017-09-114.6CVE-2017-14281
MISCxnview -- xnviewXnView Classic for Windows Version 2.40 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to a "Read Access Violation starting at jbig2dec+0x0000000000005862."2017-09-114.6CVE-2017-14282
MISCxnview -- xnviewXnView Classic for Windows Version 2.40 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to a "Read Access Violation starting at jbig2dec+0x0000000000008fe4."2017-09-114.6CVE-2017-14283
MISCxnview -- xnviewXnView Classic for Windows Version 2.40 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77400000!RtlGetCurrentDirectory_U+0x000000000000016c."2017-09-114.6CVE-2017-14284
MISCxnview -- xnviewXnView Classic for Windows Version 2.40 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77400000!RtlInterlockedPopEntrySList+0x000000000000039b."2017-09-114.6CVE-2017-14285
MISCBack to top

 

Low VulnerabilitiesPrimary
Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infofortinet -- fortiosA Cross-Site Scripting vulnerability in Fortinet FortiOS versions 5.4.0 through 5.4.4 and 5.6.0 allows attackers to execute unauthorized code or commands via the filter input in "Applications" under FortiView.2017-09-113.5CVE-2017-3131
BID
SECTRACK
CONFIRM
EXPLOIT-DBfortinet -- fortiosA Cross-Site Scripting vulnerability in Fortinet FortiOS versions 5.4.0 through 5.4.4 allows attackers to execute unauthorized code or commands via 'Comments' while saving Config Revisions.2017-09-113.5CVE-2017-7734
BID
SECTRACK
CONFIRMfortinet -- fortiosA Cross-Site Scripting vulnerability in Fortinet FortiOS versions 5.2.0 through 5.2.11 and 5.4.0 through 5.4.4 allows attackers to execute unauthorized code or commands via the "Groups" input while creating or editing User Groups.2017-09-113.5CVE-2017-7735
BID
SECTRACK
CONFIRMgoogle -- androidA information disclosure vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37305578. References: B-V2017052301.2017-09-083.3CVE-2017-0792
BID
CONFIRMwolfcms -- wolf_cmsWolf CMS 0.8.3.1 allows Cross-Site Scripting (XSS) attacks. The vulnerability exists due to insufficient sanitization of the file name in a "create-file-popup" action, and the directory name in a "create-directory-popup" action, in the HTTP POST method to the "/plugin/file_manager/" script (aka an /admin/plugin/file_manager/browse// URI).2017-09-083.5CVE-2017-11611
MISCBack to top

 

Severity Not Yet AssignedPrimary
Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoalegrocart -- alegrocart
 PHP remote file inclusion vulnerability in the get_file function in upload/admin2/controller/report_logs.php in AlegroCart 1.2.8 allows remote administrators to execute arbitrary PHP code via a URL in the file_path parameter to upload/admin2.2017-09-11not yet calculatedCVE-2015-9227
MISC
FULLDISC
MISC
EXPLOIT-DBalegrocart -- alegrocart
 Multiple SQL injection vulnerabilities in AlegroCart 1.2.8 allow remote administrators to execute arbitrary SQL commands via the download parameter in the (1) check_download and possibly (2) check_filename function in upload/admin2/model/products/model_admin_download.php or remote authenticated users with a valid Paypal transaction token to execute arbitrary SQL commands via the ref parameter in the (3) orderUpdate function in upload/catalog/extension/payment/paypal.php.2017-09-11not yet calculatedCVE-2015-9226
MISC
FULLDISC
MISC
EXPLOIT-DBansible -- vault
 An exploitable vulnerability exists in the yaml loading functionality of Ansible Vault before 1.0.5. A specially crafted vault can execute arbitrary python commands resulting in command execution. An attacker can insert python into the vault to trigger this vulnerability.2017-09-14not yet calculatedCVE-2017-2809
BID
CONFIRM
CONFIRM
CONFIRM
MISCanydesk -- anydesk
 AnyDesk before 3.6.1 on Windows has a DLL injection vulnerability.2017-09-12not yet calculatedCVE-2017-14397
CONFIRMapache -- brooklyn
 Apache Brooklyn uses the SnakeYAML library for parsing YAML inputs. SnakeYAML allows the use of YAML tags to indicate that SnakeYAML should unmarshal data to a Java type. In the default configuration in Brooklyn before 0.10.0, SnakeYAML will allow unmarshalling to any Java type available on the classpath. This could provide an authenticated user with a means to cause the JVM running Brooklyn to load and run Java code without detection by Brooklyn. Such code would have the privileges of the Java process running Brooklyn, including the ability to open files and network connections, and execute system commands. There is known to be a proof-of-concept exploit using this vulnerability.2017-09-13not yet calculatedCVE-2016-8744
CONFIRM
MLISTapache -- brooklyn
 In Apache Brooklyn before 0.10.0, the REST server is vulnerable to cross-site request forgery (CSRF), which could permit a malicious web site to produce a link which, if clicked whilst a user is logged in to Brooklyn, would cause the server to execute the attacker's commands as the user. There is known to be a proof-of-concept exploit using this vulnerability.2017-09-13not yet calculatedCVE-2016-8737
BID
CONFIRM
MLISTapache -- brooklyn
 In Apache Brooklyn before 0.10.0, the REST server is vulnerable to cross-site scripting where one authenticated user can cause scripts to run in the browser of another user authorized to access the first user's resources. This is due to improper escaping of server-side content. There is known to be a proof-of-concept exploit using this vulnerability.2017-09-13not yet calculatedCVE-2017-3165
BID
CONFIRM
MLISTapache -- spark
 In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an attacker with access to any user account on the local machine. It does not affect apps run by spark-submit or spark-shell. The attacker would be able to execute code as the user that ran the Spark application. Users are encouraged to update to version 2.2.0 or later.2017-09-13not yet calculatedCVE-2017-12612
BID
MISCapache -- struts
 The REST Plugin in Apache Struts 2.1.2 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.2017-09-15not yet calculatedCVE-2017-9805
BID
SECTRACK
CONFIRM
CONFIRM
CONFIRM
CONFIRM
EXPLOIT-DBapache -- traffic_server
 Unspecified vulnerability in the HTTP/2 experimental feature in Apache Traffic Server before 5.3.x before 5.3.2 has unknown impact and attack vectors, a different vulnerability than CVE-2015-5168.2017-09-13not yet calculatedCVE-2015-5206
MLISTapache -- traffic_server
 Unspecified vulnerability in the HTTP/2 experimental feature in Apache Traffic Server 5.3.x before 5.3.2 has unknown impact and attack vectors, a different vulnerability than CVE-2015-5206.2017-09-13not yet calculatedCVE-2015-5168
MLISTapache -- wicketApache Wicket before 1.5.13, 6.x before 6.19.0, and 7.x before 7.0.0-M5 make it easier for attackers to defeat a cryptographic protection mechanism and predict encrypted URLs by leveraging use of CryptoMapper as the default encryption provider.2017-09-15not yet calculatedCVE-2014-7808
MLIST
MISCapple -- iosIn Apple iOS 7 through 9, due to a BlueBorne flaw in the implementation of LEAP (Low Energy Audio Protocol), a large audio command can be sent to a targeted device and lead to a heap overflow with attacker-controlled data. Since the audio commands sent via LEAP are not properly validated, an attacker can use this overflow to gain full control of the device through the relatively high privileges of the Bluetooth stack in iOS. The attack bypasses Bluetooth access control; however, the default "Bluetooth On" value must be present in Settings.2017-09-12not yet calculatedCVE-2017-14315
BID
MISCaxesstel -- mu553s_modem _router _firmware
 On the Axesstel MU553S MU55XS-V1.14, there is a Stored Cross Site Scripting vulnerability in the APN parameter under the "Basic Settings" page.2017-09-13not yet calculatedCVE-2017-13724
MISCaxesstel -- mu553s_modem _router _firmware
 Axesstel MU553S MU55XS-V1.14 devices have a default password of admin for the admin account.2017-09-13not yet calculatedCVE-2017-11351
MISCaxesstel -- mu553s_modem _router _firmware
 Cross-Site Request Forgery (CSRF) exists in cgi-bin/ConfigSet on Axesstel MU553S MU55XS-V1.14 devices.2017-09-13not yet calculatedCVE-2017-11350
MISCbeijing_hanbang – hanbanggaoke_devices
 On Beijing Hanbang Hanbanggaoke devices, because user-controlled input is not sufficiently sanitized, sending a PUT request to /ISAPI/Security/users/1 allows an admin password change.2017-09-12not yet calculatedCVE-2017-14335
MISCbento4 -- bento4
 In the SDK in Bento4 1.5.0-616, SetItemCount in Core/Ap4StscAtom.h file contains a Write Memory Access Violation vulnerability. It is possible to exploit this vulnerability and possibly execute arbitrary code by opening a crafted .MP4 file.2017-09-11not yet calculatedCVE-2017-14258
CONFIRMbento4 -- bento4
 In the SDK in Bento4 1.5.0-616, the AP4_StssAtom class in Ap4StssAtom.cpp contains a Write Memory Access Violation vulnerability. It is possible to exploit this vulnerability and possibly execute arbitrary code by opening a crafted .MP4 file.2017-09-11not yet calculatedCVE-2017-14260
CONFIRMbento4 -- bento4
 In the SDK in Bento4 1.5.0-616, the AP4_StscAtom class in Ap4StscAtom.cpp contains a Write Memory Access Violation vulnerability. It is possible to exploit this vulnerability and possibly execute arbitrary code by opening a crafted .MP4 file.2017-09-11not yet calculatedCVE-2017-14259
CONFIRMbento4 -- bento4
 In the SDK in Bento4 1.5.0-616, the AP4_StszAtom class in Ap4StszAtom.cpp file contains a Read Memory Access Violation vulnerability. It is possible to exploit this vulnerability by opening a crafted .MP4 file.2017-09-11not yet calculatedCVE-2017-14261
CONFIRMbento4 -- bento4
 In the SDK in Bento4 1.5.0-616, AP4_AtomSampleTable::GetSample in Core/Ap4AtomSampleTable.cpp contains a Read Memory Access Violation vulnerability. It is possible to exploit this vulnerability by opening a crafted .MP4 file.2017-09-11not yet calculatedCVE-2017-14257
CONFIRM

blackcat-cms -- blackcat_cms


 In BlackCat CMS 1.2.2, unrestricted file upload is possible in backend\media\ajax_rename.php via the extension parameter, as demonstrated by changing the extension from .jpg to .php.2017-09-12not yet calculatedCVE-2017-14399
MISCblackwave -- dive_assistant
 XXE in Dive Assistant - Template Builder in Blackwave Dive Assistant - Desktop Edition 8.0 allows attackers to remotely view local files via a crafted template.xml file.2017-09-12not yet calculatedCVE-2017-8918
MISCblue_coat -- malware_analysis_appliance_and_malware_analyzer_g2
 Blue Coat Malware Analysis Appliance (MAA) before 4.2.5 and Malware Analyzer G2 allow remote attackers to bypass a virtual machine protection mechanism and consequently write to arbitrary files, cause a denial of service (host reboot or reset to factory defaults), or execute arbitrary code via vectors related to saving files during analysis.2017-09-11not yet calculatedCVE-2015-4523
CONFIRMbluez -- bluez
 All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests.2017-09-12not yet calculatedCVE-2017-1000250
BID
CONFIRM
MISCcelery_flower -- celery_flower
 flower.initd in the Gentoo dev-python/flower package before 0.9.1-r1 for Celery Flower sets PID file ownership to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command.2017-09-15not yet calculatedCVE-2017-14483
CONFIRMcisco -- meeting_server
 A vulnerability in the Traversal Using Relay NAT (TURN) server included with Cisco Meeting Server (CMS) could allow an authenticated, remote attacker to gain unauthenticated or unauthorized access to components of or sensitive information in an affected system. The vulnerability is due to an incorrect default configuration of the TURN server, which could expose internal interfaces and ports on the external interface of an affected system. An attacker could exploit this vulnerability by using a TURN server to perform an unauthorized connection to a Call Bridge, a Web Bridge, or a database cluster in an affected system, depending on the deployment model and CMS services in use. A successful exploit could allow the attacker to gain unauthenticated access to a Call Bridge or database cluster in an affected system or gain unauthorized access to sensitive meeting information in an affected system. To exploit this vulnerability, the attacker must have valid credentials for the TURN server of the affected system. This vulnerability affects Cisco Meeting Server (CMS) deployments that are running a CMS Software release prior to Release 2.0.16, 2.1.11, or 2.2.6. Cisco Bug IDs: CSCvf51127.2017-09-13not yet calculatedCVE-2017-12249
BID
SECTRACK
CONFIRMcorega -- cg-wlr300nm
 CG-WLR300NM Firmware version 1.90 and earlier allows an attacker to execute arbitrary OS commands via unspecified vectors.2017-09-15not yet calculatedCVE-2017-10813
MISC
JVNcorega -- cg-wlr300nm
 Buffer overflow in CG-WLR300NM Firmware version 1.90 and earlier allows an attacker to execute arbitrary code via unspecified vectors.2017-09-15not yet calculatedCVE-2017-10814
MISC
JVNcyrus -- cyrus_imap
 In the mboxlist_do_find function in imap/mboxlist.c in Cyrus IMAP before 3.0.4, an off-by-one error in prefix calculation for the LIST command caused use of uninitialized memory, which might allow remote attackers to obtain sensitive information or cause a denial of service (daemon crash) via a 'LIST "" "Other Users"' command.2017-09-10not yet calculatedCVE-2017-14230
CONFIRM
CONFIRM
CONFIRM
CONFIRM

d-link -- d-link

D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/run/storage_account_root permissions.2017-09-13not yet calculatedCVE-2017-14427
MISC

d-link -- d-link


 The D-Link NPAPI extension, as used on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices, participates in mydlink Cloud Services by establishing a TCP relay service for HTTP, even though a TCP relay service for HTTPS is also established.2017-09-13not yet calculatedCVE-2017-14419
MISC

d-link -- d-link


 D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0644 /var/etc/shadow (aka the /etc/shadow symlink target) permissions.2017-09-13not yet calculatedCVE-2017-14426
MISCd-link -- d-link
 D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices have XSS in the action parameter to htdocs/web/sitesurvey.php.2017-09-13not yet calculatedCVE-2017-14415
MISCd-link -- d-link
 D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices have XSS in the action parameter to htdocs/web/wpsacts.php.2017-09-13not yet calculatedCVE-2017-14413
MISCd-link -- d-link
 D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/passwd permissions.2017-09-13not yet calculatedCVE-2017-14424
MISCd-link -- d-link
 D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices have XSS in the action parameter to htdocs/web/wandetect.php.2017-09-13not yet calculatedCVE-2017-14416
MISC

d-link -- d-link


 D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices allow remote attackers to cause a denial of service (daemon crash) via crafted LAN traffic.2017-09-13not yet calculatedCVE-2017-14430
MISCd-link -- d-link
 D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices have a hardcoded password of wrgac25_dlink.2013gui_dir850l for the Alphanetworks account upon device reset, which allows remote attackers to obtain root access via a TELNET session.2017-09-13not yet calculatedCVE-2017-14421
MISCd-link -- d-link
 D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/run/hostapd* permissions.2017-09-13not yet calculatedCVE-2017-14428
MISC

d-link -- d-link


 htdocs/parentalcontrols/bind.php on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices does not prevent unauthenticated nonce-guessing attacks, which makes it easier for remote attackers to change the DNS configuration via a series of requests.2017-09-13not yet calculatedCVE-2017-14423
MISC

d-link -- d-link


 The D-Link NPAPI extension, as used in conjunction with D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices, sends the cleartext admin password over the Internet as part of interaction with mydlink Cloud Services.2017-09-13not yet calculatedCVE-2017-14418
MISC

d-link -- d-link


 The D-Link NPAPI extension, as used on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.2017-09-13not yet calculatedCVE-2017-14420
MISCd-link -- d-link
 D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/etc/hnapasswd permissions.2017-09-13not yet calculatedCVE-2017-14425
MISCd-link -- d-link
 D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices use the same hardcoded /etc/stunnel.key private key across different customers' installations, which allows remote attackers to defeat the HTTPS cryptographic protection mechanisms by leveraging knowledge of this key from another installation.2017-09-13not yet calculatedCVE-2017-14422
MISC

d-link -- d-link


 D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices have XSS in the action parameter to htdocs/web/shareport.php.2017-09-13not yet calculatedCVE-2017-14414
MISC

d-link -- d-link


 register_send.php on D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices does not require authentication, which can result in unintended enrollment in mydlink Cloud Services.2017-09-13not yet calculatedCVE-2017-14417
MISC

d-link -- d-link


 The DHCP client on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices allows unauthenticated remote code execution as root because /etc/services/INET/inet_ipv4.php mishandles shell metacharacters, affecting generated files such as WAN-1-udhcpc.sh.2017-09-13not yet calculatedCVE-2017-14429
MISCdolibarr -- erp_crm
 SQL injection vulnerability in admin/menus/edit.php in Dolibarr ERP/CRM version 6.0.0 allows remote attackers to execute arbitrary SQL commands via the menuId parameter.2017-09-11not yet calculatedCVE-2017-14238
CONFIRMdolibarr -- erp_crm
 Cross-site scripting (XSS) vulnerability in Dolibarr ERP/CRM 6.0.0 allows remote authenticated users to inject arbitrary web script or HTML via the Title parameter to htdocs/admin/menus/edit.php.2017-09-11not yet calculatedCVE-2017-14241
CONFIRMdolibarr -- erp_crm
 SQL injection vulnerability in don/list.php in Dolibarr version 6.0.0 allows remote attackers to execute arbitrary SQL commands via the statut parameter.2017-09-11not yet calculatedCVE-2017-14242
CONFIRM

dolibarr -- erp_crm


 There is a sensitive information disclosure vulnerability in document.php in Dolibarr ERP/CRM version 6.0.0 via the file parameter.2017-09-11not yet calculatedCVE-2017-14240
CONFIRMdolibarr -- erp_crm
 Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr ERP/CRM 6.0.0 allow remote authenticated users to inject arbitrary web script or HTML via the (1) CompanyName, (2) CompanyAddress, (3) CompanyZip, (4) CompanyTown, (5) Fax, (6) EMail, (7) Web, (8) ManagingDirectors, (9) Note, (10) Capital, (11) ProfId1, (12) ProfId2, (13) ProfId3, (14) ProfId4, (15) ProfId5, or (16) ProfId6 parameter to htdocs/admin/company.php.2017-09-11not yet calculatedCVE-2017-14239
CONFIRMdrupal -- drupal
 Open redirect vulnerability in Drupal 6.x before 6.35 and 7.x before 7.35 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the destination parameter.2017-09-13not yet calculatedCVE-2015-2749
CONFIRM
DEBIAN
MLIST
BID
CONFIRM
CONFIRMdrupal -- drupal
 Multiple SQL injection vulnerabilities in the User Dashboard module 7.x before 7.x-1.4 for Drupal allow remote attackers to execute arbitrary SQL commands via unspecified vectors.2017-09-11not yet calculatedCVE-2015-7877
CONFIRM
MISCdrupal -- drupal
 Open redirect vulnerability in URL-related API functions in Drupal 6.x before 6.35 and 7.x before 7.35 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving the "//" initial sequence.2017-09-13not yet calculatedCVE-2015-2750
CONFIRM
CONFIRM
DEBIAN
MLIST
BID
CONFIRMdrupal -- drupal
 The Entity Registration module 7.x-1.x before 7.x-1.5 for Drupal allows remote attackers to obtain sensitive event registration information by leveraging the "Register other accounts" permission and knowledge of usernames.2017-09-13not yet calculatedCVE-2015-7880
MLIST
BID
MISC
CONFIRMdrupal -- drupal
 Cross-site scripting (XSS) vulnerability in the Stickynote module 7.x before 7.x-1.3 for Drupal allows remote authenticated users with permission to create or edit a stickynote to inject arbitrary web script or HTML via note text on the admin listing page.2017-09-11not yet calculatedCVE-2015-7879
MLIST
BID
CONFIRM
MISCeclipse -- kura
 The network enabled distribution of Kura before 2.1.0 takes control over the device's firewall setup but does not allow IPv6 firewall rules to be configured. Still the Equinox console port 5002 is left open, allowing to log into Kura without any user credentials over unencrypted telnet and executing commands using the Equinox "exec" command. As the process is running as "root" full control over the device can be acquired. IPv6 is also left in auto-configuration mode, accepting router advertisements automatically and assigns a MAC address based IPv6 address.2017-09-11not yet calculatedCVE-2017-7649
CONFIRM
CONFIRMellucian -- banner_student
 Ellucian (formerly SunGard) Banner Student 8.5.1.2 through 8.7 allows remote attackers to reset arbitrary passwords via unspecified vectors, aka "Weak Password Reset."2017-09-11not yet calculatedCVE-2015-4689
MISC
BUGTRAQellucian -- banner_student
 Open redirect vulnerability in Ellucian (formerly SunGard) Banner Student 8.5.1.2 through 8.7 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in an unspecified parameter.2017-09-11not yet calculatedCVE-2015-5054
MISC
BUGTRAQellucian -- banner_student
 Ellucian (formerly SunGard) Banner Student 8.5.1.2 through 8.7 allow remote attackers to enumerate user accounts via a series of requests.2017-09-11not yet calculatedCVE-2015-4688
MISC
BUGTRAQelux_rp -- elux_rp
 In eLux RP 5.x before 5.5.1000 LTSR and 5.6.x before 5.6.2 CR when classic desktop mode is used, it is possible to start applications other than defined, even if the user does not have permissions to change application definitions.2017-09-13not yet calculatedCVE-2017-14124
CONFIRM

emc -- appsync


 EMC AppSync (all versions prior to 3.5) contains a SQL injection vulnerability that could potentially be exploited by malicious users to compromise the affected system.2017-09-12not yet calculatedCVE-2017-8015
CONFIRM
BIDeyesofnetwork -- eyesofnetwork
 The EyesOfNetwork web interface (aka eonweb) 5.1-0 has SQL injection via the term parameter to module/admin_group/search.php.2017-09-12not yet calculatedCVE-2017-14403
MISCeyesofnetwork -- eyesofnetwork
 The EyesOfNetwork web interface (aka eonweb) 5.1-0 allows local file inclusion via the tool_list parameter (aka the url_tool variable) to module/tool_all/select_tool.php, as demonstrated by a tool_list=php://filter/ substring.2017-09-12not yet calculatedCVE-2017-14404
MISCeyesofnetwork -- eyesofnetwork
 The EyesOfNetwork web interface (aka eonweb) 5.1-0 allows remote command execution via shell metacharacters in a hosts_cacti array parameter to module/admin_device/index.php.2017-09-12not yet calculatedCVE-2017-14405
MISCeyesofnetwork -- eyesofnetwork
 SQL Injection exists in the EyesOfNetwork web interface (aka eonweb) 5.1-0 via the group_id cookie to side.php.2017-09-11not yet calculatedCVE-2017-14252
MISCeyesofnetwork -- eyesofnetwork
 The EyesOfNetwork web interface (aka eonweb) 5.1-0 has SQL injection via the user_name parameter to module/admin_user/add_modify_user.php in the "ACCOUNT CREATION" section, related to lack of input validation in include/function.php.2017-09-12not yet calculatedCVE-2017-14402
MISCeyesofnetwork -- eyesofnetwork
 The EyesOfNetwork web interface (aka eonweb) 5.1-0 has SQL injection via the user_name parameter to module/admin_user/add_modify_user.php in the "ACCOUNT UPDATE" section.2017-09-12not yet calculatedCVE-2017-14401
MISCeyesofnetwork -- eyesofnetwork
 SQL Injection exists in the EyesOfNetwork web interface (aka eonweb) 5.1-0 via the user_id cookie to header.php, a related issue to CVE-2017-1000060.2017-09-11not yet calculatedCVE-2017-14247
MISCffmpeg -- ffmpeg
 In libavformat/asfdec_f.c in FFmpeg 3.3.3, a DoS in asf_build_simple_index() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted ASF file, which claims a large "ict" field in the header but does not contain sufficient backing data, is provided, the for loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.2017-09-08not yet calculatedCVE-2017-14223
BID
CONFIRMffmpeg -- ffmpeg
 In libavformat/mov.c in FFmpeg 3.3.3, a DoS in read_tfra() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted MOV file, which claims a large "item_count" field in the header but does not contain sufficient backing data, is provided, the loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.2017-09-08not yet calculatedCVE-2017-14222
BID
CONFIRMfile() -- file()
 An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017).2017-09-11not yet calculatedCVE-2017-1000249
CONFIRM
CONFIRMfujitsu -- fence-explorer
 Untrusted search path vulnerability in FENCE-Explorer for Windows V8.4.1 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.2017-09-15not yet calculatedCVE-2017-10855
MISC
JVNgenixcms -- genixcms
 GeniXCMS before 1.1.0 allows remote attackers to cause a denial of service (account blockage) by leveraging the mishandling of certain username substring relationships, such as the admin<script> username versus the admin username, related to register.php, User.class.php, and Type.class.php.2017-09-10not yet calculatedCVE-2017-14231
CONFIRM
CONFIRMgentoo -- gentoo_security
 The Gentoo sci-mathematics/gimps package before 28.10-r1 for Great Internet Mersenne Prime Search (GIMPS) allows local users to gain privileges by creating a hard link under /var/lib/gimps, because an unsafe "chown -R" command is executed.2017-09-15not yet calculatedCVE-2017-14484
CONFIRMgnu -- binutils
 The process_version_sections function in readelf.c in GNU Binutils 2.29 allows attackers to cause a denial of service (Integer Overflow, and hang because of a time-consuming loop) or possibly have unspecified other impact via a crafted binary file with invalid values of ent.vn_next, during "readelf -a" execution.2017-09-12not yet calculatedCVE-2017-14333
CONFIRMgnu -- emacs
 GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article).2017-09-14not yet calculatedCVE-2017-14482
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRMgoogle -- android
 A information disclosure vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146698.2017-09-14not yet calculatedCVE-2017-0785
BID
CONFIRMgoogle -- android
 A information disclosure vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63145701.2017-09-14not yet calculatedCVE-2017-0783
BID
CONFIRMgoogle -- android
 A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146237.2017-09-14not yet calculatedCVE-2017-0782
BID
CONFIRMgoogle -- android
 Integer overflow in IAudioPolicyService.cpp in Android allows local users to gain privileges via a crafted application, aka Android Bug ID 19261727.2017-09-15not yet calculatedCVE-2015-1527
BID
CONFIRM
MISCgoogle -- android
 A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146105.2017-09-14not yet calculatedCVE-2017-0781
BID
CONFIRM

honeywell -- network_video_recorder


 Honeywell NVR devices allow remote attackers to create a user account in the admin group by leveraging access to a guest account to obtain a session ID, and then sending that session ID in a userManager.addUser request to the /RPC2 URI. The attacker can login to the device with that new user account to fully control the device.2017-09-11not yet calculatedCVE-2017-14263
MISCi-filter -- install_program_and_installer
 Untrusted search path vulnerability in "i-filter 6.0 install program" file version 1.0.8.1 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.2017-09-15not yet calculatedCVE-2017-10858
MISC
JVNi-filter -- install_program_and_installer
 Untrusted search path vulnerability in "i-filter 6.0 installer" timestamp of code signing is before 23 Aug 2017 (JST) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.2017-09-15not yet calculatedCVE-2017-10859
MISC
JVNi-filter -- install_program_and_installer
 Untrusted search path vulnerability in "i-filter 6.0 installer" timestamp of code signing is before 23 Aug 2017 (JST) allows an attacker to execute arbitrary code via a specially crafted executable file in an unspecified directory.2017-09-15not yet calculatedCVE-2017-10860
MISC
JVNibm -- api_connect
 IBM API Connect 5.0.7.0 through 5.0.7.2 is vulnerable to a regular expression attack that could allow an authenticated attacker to use a regex and cause the system to slow or hang. IBM X-Force ID: 131546.2017-09-13not yet calculatedCVE-2017-1556
CONFIRM
BID
MISCibm -- business_process_manager_and_websphere_lombardi_edition
 IBM Business Process Manager (aka BPM) 7.5.x, 8.0.x, and 8.5.x and WebSphere Lombardi Edition (aka WLE) 7.2.x allow remote authenticated users to bypass intended access restrictions on internal service types via vectors involving the executeServiceByName URL.2017-09-15not yet calculatedCVE-2015-0110
BID
CONFIRMibm -- db2
 IBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access. IBM X-Force ID: 128058.2017-09-12not yet calculatedCVE-2017-1439
CONFIRM
BID
SECTRACK
MISCibm -- db2
 IBM DB2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access. IBM X-Force ID: 128057.2017-09-12not yet calculatedCVE-2017-1438
CONFIRM
BID
SECTRACK
MISC

ibm -- db2


 IBM DB2 for Linux, UNIX and Windows 11.1 (includes DB2 Connect Server) under unusual circumstances, could expose highly sensitive information in the error log to a local user.2017-09-12not yet calculatedCVE-2017-1434
CONFIRM
BID
SECTRACK
MISCibm -- informix_dynamic_server
 IBM Informix Dynamic Server 12.1 could allow a local user logged in with database administrator user to gain root privileges. IBM X-Force ID: 129620.2017-09-13not yet calculatedCVE-2017-1508
CONFIRM
BID
MISCibm -- maximo_asset_management
 IBM Maximo Asset Management 7.5 and 7.6 could allow an authenticated user to inject commands into work orders that could be executed by another user that downloads the affected file. IBM X-Force ID: 126538.2017-09-12not yet calculatedCVE-2017-1352
CONFIRM
BID
MISC

imagemagick -- imagemagick


 In ImageMagick 7.0.7-1 Q16, the PersistPixelCache function in magick/cache.c mishandles the pixel cache nexus, which allows remote attackers to cause a denial of service (NULL pointer dereference in the function GetVirtualPixels in MagickCore/cache.c) via a crafted file.2017-09-12not yet calculatedCVE-2017-14400
CONFIRM

imagemagick -- imagemagick


 A heap-based buffer overflow in WritePCXImage in coders/pcx.c in ImageMagick 7.0.6-8 Q16 allows remote attackers to cause a denial of service or code execution via a crafted file.2017-09-08not yet calculatedCVE-2017-14224
BID
CONFIRMindia_goods_and_services_tax_network -- offline_utility_tool
 GSTN_offline_tool in India Goods and Services Tax Network (GSTN) Offline Utility tool before 1.2 executes winstart-server.vbs from the "C:\GST Offline Tool" directory, which has insecure permissions. This allows local users to gain privileges by replacing winstart-server.vbs with arbitrary VBScript code. For example, a local user could create VBScript code for a TCP reverse shell, and use that later for Remote Command Execution.2017-09-14not yet calculatedCVE-2017-13779
MISCinternet_initiative_japan -- seil
 SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device's encrypted communications via a specially crafted packet.2017-09-15not yet calculatedCVE-2017-10856
MISC
JVNjazz -- reporting_service
 An unspecified vulnerability in the Lifecycle Query Engine of Jazz Reporting Service 6.0 through 6.0.4 could disclose highly sensitive information.2017-09-14not yet calculatedCVE-2017-1490
CONFIRM
BID
MISCjenkins -- jenkins
 Jenkins before 1.586 does not set the secure flag on session cookies when run on Tomcat 7.0.41 or later, which makes it easier for remote attackers to capture cookies by intercepting their transmission within an HTTP session.2017-09-12not yet calculatedCVE-2014-9634
MLIST
BID
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRMjenkins -- jenkins
 Jenkins before 1.586 does not set the HttpOnly flag in a Set-Cookie header for session cookies when run on Tomcat 7.0.41 or later, which makes it easier for remote attackers to obtain potentially sensitive information via script access to cookies.2017-09-12not yet calculatedCVE-2014-9635
MLIST
BID
CONFIRM
CONFIRM
CONFIRM
MISC
CONFIRM

joomla -- joomla!


 The Googlemaps plugin before 3.1 for Joomla! allows remote attackers to conduct XML injection attacks via the url parameter to plugin_googlemap2_proxy.php.2017-09-14not yet calculatedCVE-2013-7429
FULLDISC
CONFIRM
MLIST
MLISTjungo -- windriver
 This vulnerability allows local attackers to escalate privileges on Jungo WinDriver 12.4.0 and earlier. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the processing of IOCTL 0x953824a7 by the windrvr1240 kernel driver. The issue lies in the failure to properly validate user-supplied data which can result in an out-of-bounds write condition. An attacker can leverage this vulnerability to execute arbitrary code under the context of kernel.2017-09-11not yet calculatedCVE-2017-14075
MISC
EXPLOIT-DBjungo -- windriver
 This vulnerability allows local attackers to escalate privileges on Jungo WinDriver 12.4.0 and earlier. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the processing of IOCTL 0x95382673 by the windrvr1240 kernel driver. The issue lies in the failure to properly validate user-supplied data which can result in a kernel pool overflow. An attacker can leverage this vulnerability to execute arbitrary code under the context of kernel.2017-09-12not yet calculatedCVE-2017-14344
MISC
EXPLOIT-DBjungo -- windriver
 This vulnerability allows local attackers to escalate privileges on Jungo WinDriver 12.4.0 and earlier. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the processing of IOCTL 0x953824b7 by the windrvr1240 kernel driver. The issue lies in the failure to properly validate user-supplied data which can result in a kernel pool overflow. An attacker can leverage this vulnerability to execute arbitrary code under the context of kernel.2017-09-11not yet calculatedCVE-2017-14153
MISC
EXPLOIT-DBkind_editor -- kind_editor
 Vulnerability in web application Kind Editor v4.1.12, kindeditor/php/upload_json.php does not check authentication before allow users to upload files.2017-09-14not yet calculatedCVE-2017-1002024
MISC
MISC
MISCkubernetes -- azure_cloud_provider
 Default access permissions for Persistent Volumes (PVs) created by the Kubernetes Azure cloud provider in versions 1.6.0 to 1.6.5 are set to "container" which exposes a URI that can be accessed without authentication on the public internet. Access to the URI string requires privileged access to the Kubernetes cluster or authenticated access to the Azure portal.2017-09-14not yet calculatedCVE-2017-1002100
MISC
MISClibofx -- libofx
 An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.2017-09-13not yet calculatedCVE-2017-2816
BID
MISClibraw -- libraw
 LibRaw before 0.18.4 has a heap-based Buffer Overflow in the processCanonCameraInfo function via a crafted file.2017-09-12not yet calculatedCVE-2017-14348
CONFIRMlibraw -- libraw
 A Stack-based Buffer Overflow was discovered in xtrans_interpolate in internal/dcraw_common.cpp in LibRaw before 0.18.3. It could allow a remote denial of service or code execution attack.2017-09-11not yet calculatedCVE-2017-14265
CONFIRMlinux -- linux_kernel
 The XFS_IS_REALTIME_INODE macro in fs/xfs/xfs_linux.h in the Linux kernel before 4.13.2 does not verify that a filesystem has a realtime device, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via vectors related to setting an RHINHERIT flag on a directory.2017-09-15not yet calculatedCVE-2017-14340
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRMlinux -- linux_kernel
 The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 3.3-rc1 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.2017-09-12not yet calculatedCVE-2017-1000251
BID
CONFIRM
MISClinux -- linux_kernel
 The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel through 4.13.2 allows local users to cause a denial of service (panic) by leveraging incorrect length validation.2017-09-15not yet calculatedCVE-2017-14489
CONFIRM
CONFIRM

linux -- linux_kernel


 The tpacket_rcv function in net/packet/af_packet.c in the Linux kernel before 4.13 mishandles vnet headers, which might allow local users to cause a denial of service (buffer overflow, and disk and memory corruption) or possibly have unspecified other impact via crafted system calls.2017-09-15not yet calculatedCVE-2017-14497
CONFIRM
CONFIRM
CONFIRM
CONFIRMmagneto2 -- magneto2
 The Fastly CDN module before 1.2.26 for Magneto2, when used with a third-party authentication plugin, might allow remote authenticated users to obtain sensitive information from authenticated sessions via vectors involving caching of redirect responses.2017-09-14not yet calculatedCVE-2017-13761
CONFIRMmantisbt -- mantisbt
 CAPTCHA bypass vulnerability in MantisBT before 1.2.19.2017-09-12not yet calculatedCVE-2014-9624
MLIST
SECTRACK
CONFIRM
XF
CONFIRM
CONFIRMmicrosoft -- .net_framework
 Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability."2017-09-12not yet calculatedCVE-2017-8759
BID
SECTRACK
CONFIRM
EXPLOIT-DBmicrosoft -- bluetooth_driver
 Microsoft Bluetooth Driver in Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703 allows a spoofing vulnerability due to Microsoft's implementation of the Bluetooth stack, aka "Microsoft Bluetooth Driver Spoofing Vulnerability".2017-09-12not yet calculatedCVE-2017-8628
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.2017-09-12not yet calculatedCVE-2017-8738
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, and CVE-2017-11764.2017-09-12not yet calculatedCVE-2017-8756
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, and CVE-2017-8756.2017-09-12not yet calculatedCVE-2017-11764
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8731, CVE-2017-8751, and CVE-2017-11766.2017-09-12not yet calculatedCVE-2017-8734
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way Microsoft Edge handles objects in memory, aka "Microsoft Edge Remote Code Execution Vulnerability".2017-09-12not yet calculatedCVE-2017-8757
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to trick a user by redirecting the user to a specially crafted website, due to the way that Microsoft Edge parses HTTP content, aka "Microsoft Edge Spoofing Vulnerability". This CVE ID is unique from CVE-2017-8724.2017-09-12not yet calculatedCVE-2017-8735
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.2017-09-12not yet calculatedCVE-2017-8752
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to trick a user into loading a page containing malicious content, due to the way that the Edge Content Security Policy (CSP) validates certain specially crafted documents, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-8754.2017-09-12not yet calculatedCVE-2017-8723
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.2017-09-12not yet calculatedCVE-2017-8649
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows Version 1703 allows an attacker to obtain information to further compromise the user's system, due to the way that Microsoft Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8597 and CVE-2017-8643.2017-09-12not yet calculatedCVE-2017-8648
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to obtain information to further compromise the user's system, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability".2017-09-12not yet calculatedCVE-2017-8739
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 Version 1703 allows an attacker to trick a user by redirecting the user to a specially crafted website, due to the way that Microsoft Edge parses HTTP content, aka "Microsoft Edge Spoofing Vulnerability". This CVE ID is unique from CVE-2017-8735.2017-09-12not yet calculatedCVE-2017-8724
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.2017-09-12not yet calculatedCVE-2017-8740
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 1607 and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8734, CVE-2017-8751, and CVE-2017-11766.2017-09-12not yet calculatedCVE-2017-8731
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.2017-09-12not yet calculatedCVE-2017-8753
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to trick a user into loading a page containing malicious content, due to the way that the Edge Content Security Policy (CSP) validates certain specially crafted documents, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-8723.2017-09-12not yet calculatedCVE-2017-8754
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to leave a malicious website open during user clipboard activities, due to the way that Microsoft Edge handles clipboard events, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8597 and CVE-2017-8648.2017-09-12not yet calculatedCVE-2017-8643
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.2017-09-12not yet calculatedCVE-2017-8660
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8756, and CVE-2017-11764.2017-09-12not yet calculatedCVE-2017-8755
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8731, CVE-2017-8734, and CVE-2017-8751.2017-09-12not yet calculatedCVE-2017-11766
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 Version 1703 allows an attacker to obtain information to further compromise the user's system, due to the way that Microsoft Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8643 and CVE-2017-8648.2017-09-12not yet calculatedCVE-2017-8597
BID
SECTRACK
CONFIRM

microsoft -- edge


 Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.2017-09-12not yet calculatedCVE-2017-8729
BID
SECTRACK
CONFIRMmicrosoft -- excel_for_mac_2011
 A remote code execution vulnerability exists in Microsoft Excel for Mac 2011 when it fails to properly handle objects in memory, aka "Microsoft Office Remote Code Execution".2017-09-12not yet calculatedCVE-2017-8567
BID
SECTRACK
CONFIRMmicrosoft -- excel
 A remote code execution vulnerability exists in Excel Services, Microsoft Excel 2007 Service Pack 3, Microsoft Excel 2010 Service Pack 2, Microsoft Excel 2013 Service Pack 1, Microsoft Excel 2013 RT Service Pack 1, Microsoft Excel 2016, Microsoft Office Web Apps 2013, Microsoft Office Compatibility Pack Service Pack 3, Microsoft Excel Web App 2013 Service Pack 1, Microsoft Excel Viewer 2007 Service Pack 3, and Office Online Server when they fail to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8630, CVE-2017-8632, and CVE-2017-8744.2017-09-12not yet calculatedCVE-2017-8631
BID
SECTRACK
CONFIRMmicrosoft -- excel
 A remote code execution vulnerability exists in Excel Services, Microsoft Excel 2007 Service Pack 3, Microsoft Excel 2010 Service Pack 2, Microsoft Excel 2013 Service Pack 1, Microsoft Excel 2013 RT Service Pack 1, and Microsoft Excel 2016 when they fail to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8630, CVE-2017-8632, and CVE-2017-8731.2017-09-12not yet calculatedCVE-2017-8744
BID
SECTRACK
CONFIRMmicrosoft -- exchange_server
 Microsoft Exchange Server 2013 and Microsoft Exchange Server 2016 allow an input sanitization issue with Microsoft Exchange that could potentially result in unintended Information Disclosure, aka "Microsoft Exchange Information Disclosure Vulnerability"2017-09-12not yet calculatedCVE-2017-11761
BID
SECTRACK
CONFIRMmicrosoft -- exchange_server
 Microsoft Exchange Server 2016 allows an elevation of privilege vulnerability when Microsoft Exchange Outlook Web Access (OWA) fails to properly handle web requests, aka "Microsoft Exchange Cross-Site Scripting Vulnerability."2017-09-12not yet calculatedCVE-2017-8758
BID
SECTRACK
CONFIRMmicrosoft -- internet_explorer
 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.2017-09-12not yet calculatedCVE-2017-8748
BID
SECTRACK
SECTRACK
CONFIRMmicrosoft -- internet_explorer
 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Internet Explorer and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.2017-09-12not yet calculatedCVE-2017-8741
BID
SECTRACK
SECTRACK
CONFIRMmicrosoft -- internet_explorer
 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Internet Explorer accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8749.2017-09-12not yet calculatedCVE-2017-8747
BID
SECTRACK
CONFIRMmicrosoft -- internet_explorer
 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to trick a user into believing that the user was visiting a legitimate website, due to the way that Internet Explorer handles specific HTML content, aka "Internet Explorer Spoofing Vulnerability".2017-09-12not yet calculatedCVE-2017-8733
BID
SECTRACK
CONFIRMmicrosoft -- internet_explorer
 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browsers access objects in memory, aka "Microsoft Browser Memory Corruption Vulnerability".2017-09-12not yet calculatedCVE-2017-8750
BID
SECTRACK
SECTRACK
CONFIRMmicrosoft -- internet_explorer
 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to obtain specific information used in the parent domain, due to Microsoft browser parent domain verification in certain functionality, aka "Microsoft Browser Information Disclosure Vulnerability".2017-09-12not yet calculatedCVE-2017-8736
BID
SECTRACK
SECTRACK
CONFIRMmicrosoft -- internet_explorer
 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Internet Explorer accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8747.2017-09-12not yet calculatedCVE-2017-8749
BID
SECTRACK
CONFIRMmicrosoft -- office_2016
 Microsoft Office 2016 allows a remote code execution vulnerability when it fails to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8631, CVE-2017-8632, and CVE-2017-8744.2017-09-12not yet calculatedCVE-2017-8630
BID
SECTRACK
CONFIRMmicrosoft -- powerpoint_and_sharepoint_and_office_online_server
 A remote code execution vulnerability exists in Microsoft PowerPoint 2016, Microsoft SharePoint Enterprise Server 2016, and Office Online Server when they fail to properly handle objects in memory, aka "PowerPoint Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8742.2017-09-12not yet calculatedCVE-2017-8743
BID
SECTRACK
CONFIRMmicrosoft -- publisher
 A remote code execution vulnerability exists in Microsoft Publisher 2007 Service Pack 3 and Microsoft Publisher 2010 Service Pack 2 when they fail to properly handle objects in memory, aka "Microsoft Office Publisher Remote Code Execution".2017-09-12not yet calculatedCVE-2017-8725
BID
SECTRACK
CONFIRM

microsoft -- sharepoint_server_2013


 Microsoft SharePoint Server 2013 Service Pack 1 allows an elevation of privilege vulnerability when it fails to properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint XSS Vulnerability".2017-09-12not yet calculatedCVE-2017-8629
BID
SECTRACK
CONFIRMmicrosoft -- sharepoint
 An elevation of privilege vulnerability exists in Microsoft SharePoint Foundation 2013 Service Pack 1 when it does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Cross Site Scripting Vulnerability".2017-09-12not yet calculatedCVE-2017-8745
BID
CONFIRMmicrosoft -- windowsThe Windows Server DHCP service in Windows Server 2012 Gold and R2, and Windows Server 2016 allows an attacker to either run arbitrary code on the DHCP failover server or cause the DHCP service to become nonresponsive, due to a memory corruption vulnerability in the Windows Server DHCP service, aka "Windows DHCP Server Remote Code Execution Vulnerability".2017-09-12not yet calculatedCVE-2017-8686
BID
SECTRACK
CONFIRMmicrosoft -- windowsThe Windows Hyper-V component on Microsoft Windows 8.1, Windows Server 2012 Gold and R2,, Windows 10 1607, and Windows Server 2016 allows a remote code execution vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka "Remote Desktop Virtual Host Remote Code Execution Vulnerability".2017-09-12not yet calculatedCVE-2017-8714
BID
SECTRACK
CONFIRMmicrosoft -- windows
 Windows Control Flow Guard in Microsoft Windows 10 Version 1703 allows an attacker to run a specially crafted application to bypass Control Flow Guard, due to the way that Control Flow Guard handles objects in memory, aka "Windows Security Feature Bypass Vulnerability".2017-09-12not yet calculatedCVE-2017-8716
BID
SECTRACK
CONFIRMmicrosoft -- windows
 Windows Uniscribe in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an attacker to execute code remotely via a specially crafted website or a specially crafted document or email attachment, aka "Microsoft Graphics Component Remote Code Execution."2017-09-12not yet calculatedCVE-2017-8696
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8708, CVE-2017-8679, and CVE-2017-8719.2017-09-12not yet calculatedCVE-2017-8709
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8677, CVE-2017-8680, CVE-2017-8681, and CVE-2017-8687.2017-09-12not yet calculatedCVE-2017-8678
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Windows GDI+ component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly discloses kernel memory addresses, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8678, CVE-2017-8680, CVE-2017-8681, and CVE-2017-8687.2017-09-12not yet calculatedCVE-2017-8677
BID
SECTRACK
CONFIRMmicrosoft -- windows
 A remote code execution vulnerability exists in Microsoft Excel 2010 Service Pack 2, Microsoft Excel 2013 Service Pack 1, Microsoft Excel 2013 RT Service Pack 1, Microsoft Excel 2016, Microsoft Office Web Apps 2013, Microsoft Excel for Mac 2011, Microsoft Excel 2016 for Mac, and Microsoft Office Compatibility Pack Service Pack 3, when they fail to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8630, CVE-2017-8631, and CVE-2017-8744.2017-09-12not yet calculatedCVE-2017-8632
BID
SECTRACK
CONFIRM

microsoft -- windows


 The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8679, CVE-2017-8709, and CVE-2017-8719.2017-09-12not yet calculatedCVE-2017-8708
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Windows Kernel-Mode Drivers component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability".. This CVE ID is unique from CVE-2017-8720.2017-09-12not yet calculatedCVE-2017-8675
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Windows Hyper-V component on Microsoft Windows 10 1607 and Windows Server 2016 allows an information disclosure vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8707, CVE-2017-8706, CVE-2017-8712, and CVE-2017-8713.2017-09-12not yet calculatedCVE-2017-8711
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Windows Graphics Device Interface (GDI) in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, 1607, 1703, and Server 2016; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an authenticated attacker to retrieve information from a targeted system via a specially crafted application, aka "Windows GDI+ Information Disclosure Vulnerability."2017-09-12not yet calculatedCVE-2017-8676
BID
SECTRACK
CONFIRMmicrosoft -- windows
 Windows GDI+ on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT 8.1, allows information disclosure by the way it discloses kernel memory addresses, aka "Windows GDI+ Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8685 and CVE-2017-8688.2017-09-12not yet calculatedCVE-2017-8684
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Windows NetBT Session Services component on Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability when it fails to maintain certain sequencing requirements, aka "NetBIOS Remote Code Execution Vulnerability".2017-09-12not yet calculatedCVE-2017-0161
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8708, CVE-2017-8709, and CVE-2017-8719.2017-09-12not yet calculatedCVE-2017-8679
BID
SECTRACK
CONFIRM

microsoft -- windows


 The Windows Hyper-V component on Microsoft Windows 10 1607 and Windows Server 2016 allows a denial of service vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability".2017-09-12not yet calculatedCVE-2017-8704
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8708, CVE-2017-8709, and CVE-2017-8679.2017-09-12not yet calculatedCVE-2017-8719
BID
SECTRACK
CONFIRMmicrosoft -- windows
 Windows GDI+ on Microsoft Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows information disclosure by the way it discloses kernel memory addresses, aka "Windows GDI+ Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8684 and CVE-2017-8688.2017-09-12not yet calculatedCVE-2017-8685
BID
SECTRACK
CONFIRMmicrosoft -- windows
 Windows graphics on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an attacker to execute remote code by the way it handles embedded fonts, aka "Win32k Graphics Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8682.2017-09-12not yet calculatedCVE-2017-8683
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT 8.1 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8678, CVE-2017-8677, CVE-2017-8681, and CVE-2017-8687.2017-09-12not yet calculatedCVE-2017-8680
BID
SECTRACK
CONFIRM

microsoft -- windows


 The Windows Hyper-V component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka Hyper-V Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8706, CVE-2017-8711, CVE-2017-8712, and CVE-2017-8713.2017-09-12not yet calculatedCVE-2017-8707
BID
SECTRACK
CONFIRMmicrosoft -- windows
 Microsoft Windows PDF Library in Microsoft Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Windows PDF Library handles objects in memory, aka "Windows PDF Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8728.2017-09-12not yet calculatedCVE-2017-8737
BID
SECTRACK
CONFIRMmicrosoft -- windows
 Windows Uniscribe in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, 1607, 1703, and Server 2016; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an attacker to obtain information to further compromise a user's system via a specially crafted document or an untrusted webpage, aka "Graphics Component Information Disclosure Vulnerability."2017-09-12not yet calculatedCVE-2017-8695
BID
SECTRACK
CONFIRM

microsoft -- windows


 Windows Error Reporting (WER) in Microsoft Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows an attacker to gain greater access to sensitive information and system functionality, due to the way that WER handles and executes files, aka "Windows Elevation of Privilege Vulnerability".2017-09-12not yet calculatedCVE-2017-8702
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8678, CVE-2017-8680, CVE-2017-8677, and CVE-2017-8681.2017-09-12not yet calculatedCVE-2017-8687
BID
SECTRACK
CONFIRMmicrosoft -- windows
 Microsoft Windows PDF Library in Microsoft Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Windows PDF Library handles objects in memory, aka "Windows PDF Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8737.2017-09-12not yet calculatedCVE-2017-8728
BID
SECTRACK
CONFIRM

microsoft -- windows


 Windows Shell in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to run arbitrary code in the context of the current user, due to the way that Windows Shell validates file copy destinations, aka "Windows Shell Remote Code Execution Vulnerability".2017-09-12not yet calculatedCVE-2017-8699
BID
SECTRACK
CONFIRMmicrosoft -- windows
 Windows GDI+ on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows information disclosure by the way it discloses kernel memory addresses, aka "Windows GDI+ Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8684 and CVE-2017-8685.2017-09-12not yet calculatedCVE-2017-8688
BID
SECTRACK
CONFIRMmicrosoft -- windows
 Windows graphics on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, Windows Server 2016, Microsoft Office Word Viewer, Microsoft Office 2007 Service Pack 3 , and Microsoft Office 2010 Service Pack 2 allows an attacker to execute remote code by the way it handles embedded fonts, aka "Win32k Graphics Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8683.2017-09-12not yet calculatedCVE-2017-8682
BID
SECTRACK
CONFIRMmicrosoft -- windows
 A remote code execution vulnerability exists in Microsoft PowerPoint 2007 Service Pack 3, Microsoft PowerPoint 2010 Service Pack 2, Microsoft PowerPoint 2013 Service Pack 1, Microsoft PowerPoint 2013 RT Service Pack 1, Microsoft PowerPoint 2016, Microsoft PowerPoint Viewer 2007, Microsoft SharePoint Server 2013 Service Pack 1, Microsoft SharePoint Enterprise Server 2016, Microsoft Office Web Apps 2010 Service Pack 2, and Microsoft Office Compatibility Pack Service Pack 3 when they fail to properly handle objects in memory, aka "PowerPoint Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8743.2017-09-12not yet calculatedCVE-2017-8742
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Microsoft Common Console Document (.msc) in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1 allows an attacker to read arbitrary files via an XML external entity (XXE) declaration, due to the way that the Microsoft Common Console Document (.msc) parses XML input containing a reference to an external entity, aka "Windows Information Disclosure Vulnerability".2017-09-12not yet calculatedCVE-2017-8710
BID
SECTRACK
CONFIRM

microsoft -- windows


 The Windows Hyper-V component on Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8707, CVE-2017-8711, CVE-2017-8712, and CVE-2017-8713.2017-09-12not yet calculatedCVE-2017-8706
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Windows Hyper-V component on Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows an information disclosure vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8707, CVE-2017-8711, CVE-2017-8706, and CVE-2017-8713.2017-09-12not yet calculatedCVE-2017-8712
BID
SECTRACK
CONFIRMmicrosoft -- windows
 Windows Device Guard in Windows 10 1607, 1703, and Windows Server 2016 allows A security feature bypass vulnerability due to how PowerShell exposes functions and processes user supplied code, aka "Device Guard Security Feature Bypass Vulnerability".2017-09-12not yet calculatedCVE-2017-8746
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8678, CVE-2017-8680, CVE-2017-8677, and CVE-2017-8687.2017-09-12not yet calculatedCVE-2017-8681
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Microsoft Windows graphics component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8675.2017-09-12not yet calculatedCVE-2017-8720
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Windows Hyper-V component on Microsoft Windows Windows 8.1, Windows Server 2012 Gold and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8707, CVE-2017-8711, CVE-2017-8712, and CVE-2017-8706.2017-09-12not yet calculatedCVE-2017-8713
BID
SECTRACK
CONFIRMmicrosoft -- windows
 The Windows Uniscribe component on Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows remote code execution vulnerability when it fails to properly handle objects in memory, aka "Uniscribe Remote Code Execution Vulnerability".2017-09-12not yet calculatedCVE-2017-8692
BID
SECTRACK
CONFIRMmisp -- misp
 When MISP before 2.4.80 is configured with X.509 certificate authentication (CertAuth) in conjunction with a non-MISP external user management ReST API, if an external user provides X.509 certificate authentication and this API returns an empty value, the unauthenticated user can be granted access as an arbitrary user.2017-09-12not yet calculatedCVE-2017-14337
CONFIRM
CONFIRM

mit -- kerberos


 Double free vulnerability in MIT Kerberos 5 (aka krb5) allows attackers to have unspecified impact via vectors involving automatic deletion of security contexts on error.2017-09-13not yet calculatedCVE-2017-11462
CONFIRM
CONFIRM
CONFIRM
FEDORAmongodb -- libson
 In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c.2017-09-09not yet calculatedCVE-2017-14227
BID
MISC
MISC
MISCmosquitto -- mosquitto
 In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.2017-09-11not yet calculatedCVE-2017-7650
CONFIRM
BID
CONFIRMmp3gain -- mp3gain
 A stack-based buffer over-read was discovered in filterYule in gain_analysis.c in MP3Gain version 1.5.2. The vulnerability causes an application crash, which leads to remote denial of service.2017-09-12not yet calculatedCVE-2017-14407
MISCmp3gain -- mp3gain
 A stack-based buffer overflow was discovered in copy_mp in interface.c in mpglibDBL, as used in MP3Gain version 1.5.2. The vulnerability causes an out-of-bounds write, which leads to remote denial of service or possibly code execution.2017-09-12not yet calculatedCVE-2017-14411
MISCmp3gain -- mp3gain
 A buffer over-read was discovered in III_i_stereo in layer3.c in mpglibDBL, as used in MP3Gain version 1.5.2. The vulnerability causes an application crash, which leads to remote denial of service.2017-09-12not yet calculatedCVE-2017-14410
MISCmp3gain -- mp3gain
 An invalid memory write was discovered in copy_mp in interface.c in mpglibDBL, as used in MP3Gain version 1.5.2. The vulnerability causes a denial of service (segmentation fault and application crash) or possibly unspecified other impact.2017-09-12not yet calculatedCVE-2017-14412
MISCmp3gain -- mp3gain
 A NULL pointer dereference was discovered in sync_buffer in interface.c in mpglibDBL, as used in MP3Gain version 1.5.2. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.2017-09-12not yet calculatedCVE-2017-14406
MISCmp3gain -- mp3gain
 A buffer overflow was discovered in III_dequantize_sample in layer3.c in mpglibDBL, as used in MP3Gain version 1.5.2. The vulnerability causes an out-of-bounds write, which leads to remote denial of service or possibly code execution.2017-09-12not yet calculatedCVE-2017-14409
MISCmp3gain -- mp3gain
 A stack-based buffer over-read was discovered in dct36 in layer3.c in mpglibDBL, as used in MP3Gain version 1.5.2. The vulnerability causes an application crash, which leads to remote denial of service.2017-09-12not yet calculatedCVE-2017-14408
MISCnagios_core -- nagios_core
 Nagios Core through 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account.2017-09-11not yet calculatedCVE-2017-14312
MISC

ntt_docomo -- wi-fi_station_l-02f


 Wi-Fi STATION L-02F Software version V10g and earlier allows remote attackers to access the device with administrative privileges and perform unintended operations through a backdoor account.2017-09-15not yet calculatedCVE-2017-10845
JVN
MISCntt_docomo -- wi-fi_station_l-02f
 Wi-Fi STATION L-02F Software version V10b and earlier allows remote attackers to bypass access restrictions to obtain information on device settings via unspecified vectors.2017-09-15not yet calculatedCVE-2017-10846
JVN
MISCosticket -- osticket
 In osTicket 1.10, SQL injection is possible by constructing an array via use of square brackets at the end of a parameter name, as demonstrated by the key parameter to file.php.2017-09-12not yet calculatedCVE-2017-14396
MISCpagure -- pagure
 Pagure 3.3.0 and earlier is vulnerable to loss of confidentially due to improper authorization2017-09-14not yet calculatedCVE-2017-1002151
MISC
MISCpuppetlabs -- apache_module
 Versions of the puppetlabs-apache module prior to 1.11.1 and 2.1.0 make it very easy to accidentally misconfigure TLS trust. If you specify the `ssl_ca` parameter but do not specify the `ssl_certs_dir` parameter, a default will be provided for the `ssl_certs_dir` that will trust certificates from any of the system-trusted certificate authorities. This did not affect FreeBSD.2017-09-15not yet calculatedCVE-2017-2299
CONFIRMpython-fedora -- python-fedora
 python-fedora 0.8.0 and lower is vulnerable to an open redirect resulting in loss of CSRF protection2017-09-14not yet calculatedCVE-2017-1002150
MISC
MISCqnap -- qts_media_library
 QNAP has patched a remote code execution vulnerability affecting the QTS Media Library in all versions prior to QTS 4.2.6 build 20170905 and QTS 4.3.3.0299 build 20170901. This particular vulnerability allows a remote attacker to execute commands on a QNAP NAS using a transcoding service on port 9251. A remote user does not require any privileges to successfully execute an attack.2017-09-14not yet calculatedCVE-2017-13067
CONFIRMrazer_synapse -- razer_synapse
 rzpnk.sys in Razer Synapse 2.20.15.1104 allows local users to read and write to arbitrary memory locations, and consequently gain privileges, via a methodology involving a handle to \Device\PhysicalMemory, IOCTL 0x22A064, and ZwMapViewOfSection.2017-09-13not yet calculatedCVE-2017-14398
MISC

redhat -- enterprise_mrg


 Race condition in the kernel in Red Hat Enterprise Linux 7, kernel-rt and Red Hat Enterprise MRG 2, when the nfnetlink_log module is loaded, allows local users to cause a denial of service (panic) by creating netlink sockets.2017-09-14not yet calculatedCVE-2015-7553
CONFIRM

redhat -- jboss_eap


 Red Hat JBoss EAP version 3.0.7 through before 4.0.0.Beta1 is vulnerable to a server-side cache poisoning or CORS requests in the JAX-RS component resulting in a moderate impact.2017-09-13not yet calculatedCVE-2017-7561
BID
MISC

rhnsd -- rhnsd

It was found that rhnsd PID files are created as world-writable that allows local attackers to fill the disks or to kill selected processes.2017-09-13not yet calculatedCVE-2017-7560
CONFIRMruby -- ruby
 Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a leakage of its heap by the malicious specification of the format of sprintf method. If a script allows to accept any format from the outside, there is a risk to be spied the contents of the heap.2017-09-15not yet calculatedCVE-2017-0898
SECTRACK
MISC
MISC
MISCsamsung -- network_video_recorder
 On Samsung NVR devices, remote attackers can read the MD5 password hash of the 'admin' account via certain szUserName JSON data to cgi-bin/main-cgi, and login to the device with that hash in the szUserPasswd parameter.2017-09-11not yet calculatedCVE-2017-14262
MISCsilverstripe -- silverstripe
 SilverStripe CMS before 3.6.1 has XSS via an SVG document that is mishandled by (1) the Insert Media option in the content editor or (2) an admin/assets/add pathname, as demonstrated by the admin/pages/edit/EditorToolbar/MediaForm/field/AssetUploadField/upload URI, aka issue SS-2017-017.2017-09-15not yet calculatedCVE-2017-14498
MISC
MISC
MISC
MISC

sophos -- surfright_hitmanpro

In Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean), a crafted IOCTL with code 0x22E1C0 might lead to kernel data leaks. Because the leak occurs at the driver level, an attacker can use this vulnerability to leak some critical information about the machine such as nt!ExpPoolQuotaCookie.2017-09-13not yet calculatedCVE-2017-7441
MISC
MISC

sophos -- surfright_hitmanpro


 A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to crash the OS via a malformed IOCTL call.2017-09-13not yet calculatedCVE-2017-6007
MISC
MISC

sophos -- surfright_hitmanpro


 A kernel pool overflow in the driver hitmanpro37.sys in Sophos SurfRight HitmanPro before 3.7.20 Build 286 (included in the HitmanPro.Alert solution and Sophos Clean) allows local users to escalate privileges via a malformed IOCTL call.2017-09-13not yet calculatedCVE-2017-6008
MISC
MISC
MISC
MISCsourcebans -- sourcebans
 Cross-site scripting (XSS) vulnerability in SourceBans before 2.0 pre-alpha allows remote attackers to inject arbitrary web script or HTML via the advSearch parameter to index.php.2017-09-11not yet calculatedCVE-2015-8349
BUGTRAQ
MISCstdu -- stdu_viewer
 STDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to a "Read Access Violation starting at STDUJBIG2File!DllUnregisterServer+0x0000000000001869."2017-09-11not yet calculatedCVE-2017-14310
MISCstdu -- stdu_viewer
 STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls Code Flow starting at STDUJBIG2File+0x00000000000015e9."2017-09-11not yet calculatedCVE-2017-14295
MISCsymantec -- encryption_desktop
 Symantec Encryption Desktop before SED 10.4.1MP2 can allow remote attackers to cause a denial of service (resource consumption) via crafted web requests."2017-09-13not yet calculatedCVE-2017-6330
BID
CONFIRMterramaster -- tos
 Shell metacharacter injection vulnerability in /usr/www/include/ajax/GetTest.php in TerraMaster TOS before 3.0.34 leads to remote code execution as root.2017-09-15not yet calculatedCVE-2017-9328
MISCtianchoy/blog -- tianchoy/blog
 upload.php in tianchoy/blog through 2017-09-12 allows unrestricted file upload and PHP code execution by using the image/jpeg, image/pjpeg, image/png, or image/gif content type for a .php file.2017-09-12not yet calculatedCVE-2017-14346
MISCtianchoy/blog -- tianchoy/blog
 SQL Injection exists in tianchoy/blog through 2017-09-12 via the id parameter to view.php.2017-09-12not yet calculatedCVE-2017-14345
MISCvbulletin -- vbulletin
 functions_vbseo_hook.php in the VBSEO module for vBulletin allows remote authenticated users to execute arbitrary code via the HTTP Referer header to visitormessage.php.2017-09-15not yet calculatedCVE-2014-9463
CONFIRM
EXPLOIT-DBvmware -- esxi_and_workstation_and_fusion
 VMware ESXi 6.5 without patch ESXi650-201707101-SG, ESXi 6.0 without patch ESXi600-201706101-SG, ESXi 5.5 without patch ESXi550-201709101-SG, Workstation (12.x before 12.5.3), Fusion (8.x before 8.5.4) contain a NULL pointer dereference vulnerability. This issue occurs when handling guest RPC requests. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs.2017-09-15not yet calculatedCVE-2017-4925
BID
SECTRACK
SECTRACK
CONFIRM

vmware -- esxi_and_workstation_and_fusion


 VMware ESXi (ESXi 6.5 without patch ESXi650-201707101-SG), Workstation (12.x before 12.5.7) and Fusion (8.x before 8.5.8) contain an out-of-bounds write vulnerability in SVGA device. This issue may allow a guest to execute code on the host.2017-09-15not yet calculatedCVE-2017-4924
BID
SECTRACK
SECTRACK
CONFIRMvmware -- vcenter_server
 VMware vCenter Server (6.5 prior to 6.5 U1) contains a vulnerability that may allow for stored cross-site scripting (XSS). An attacker with VC user privileges can inject malicious java-scripts which will get executed when other VC users access the page.2017-09-15not yet calculatedCVE-2017-4926
BID
SECTRACK
CONFIRMwordpress -- wordpressVulnerability in wordpress plugin wordpress-gallery-transformation v1.0, SQL injection is in ./wordpress-gallery-transformation/gallery.php via $jpic parameter being unsanitized before being passed into an SQL query.2017-09-14not yet calculatedCVE-2017-1002028
MISC
MISC
MISCwordpress -- wordpress
 Cross-site scripting (XSS) vulnerability in the Ultimate Member WordPress plugin before 1.3.29 for WordPress allows remote attackers to inject arbitrary web script or HTML via the _refer parameter to wp-admin/users.php.2017-09-11not yet calculatedCVE-2015-8354
MISC
BUGTRAQ
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin surveys v1.01.8, The code in survey_form.php does not sanitize the action variable before placing it inside of an SQL query.2017-09-14not yet calculatedCVE-2017-1002020
MISC
MISC
MISCwordpress -- wordpress
 PHP remote file inclusion vulnerability in the Gwolle Guestbook plugin before 1.5.4 for WordPress, when allow_url_include is enabled, allows remote authenticated users to execute arbitrary PHP code via a URL in the abspath parameter to frontend/captcha/ajaxresponse.php. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences regardless of whether allow_url_include is enabled.2017-09-11not yet calculatedCVE-2015-8351
MISC
BUGTRAQ
CONFIRM
EXPLOIT-DB
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin eventr v1.02.2, The edit.php form and event_form.php code do not sanitize input, this allows for blind SQL injection via the event parameter.2017-09-14not yet calculatedCVE-2017-1002019
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin surveys v1.01.8, The code in individual_responses.php does not sanitize the survey_id variable before placing it inside of an SQL query.2017-09-14not yet calculatedCVE-2017-1002021
MISC
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin mobile-friendly-app-builder-by-easytouch v3.0, The code in file ./mobile-friendly-app-builder-by-easytouch/server/images.php doesn't require authentication or check that the user is allowed to upload content.2017-09-14not yet calculatedCVE-2017-1002000
BID
BID
MISC
MISC
EXPLOIT-DBwordpress -- wordpress
 The shibboleth_login_form function in shibboleth.php in the Shibboleth plugin before 1.8 for WordPress is prone to an XSS vulnerability due to improper use of add_query_arg().2017-09-11not yet calculatedCVE-2017-14313
CONFIRM
CONFIRM
MISCwordpress -- wordpress
 Multiple cross-site scripting (XSS) vulnerabilities in the Calls to Action plugin before 2.5.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) open-tab parameter in a wp_cta_global_settings action to wp-admin/edit.php or (2) wp-cta-variation-id parameter to ab-testing-call-to-action-example/.2017-09-11not yet calculatedCVE-2015-8350
MISC
BUGTRAQ
CONFIRM
MISCwordpress -- wordpress
 Cross-site scripting (XSS) vulnerability in the Role Scoper plugin before 1.3.67 for WordPress allows remote attackers to inject arbitrary web script or HTML via the object_name parameter in a rs-object_role_edit page to wp-admin/admin.php.2017-09-11not yet calculatedCVE-2015-8353
MISC
BUGTRAQ
CONFIRM
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin gift-certificate-creator v1.0, The code in gc-list.php doesn't sanitize user input to prevent a stored XSS vulnerability.2017-09-14not yet calculatedCVE-2017-1002017
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin surveys v1.01.8, The code in questions.php does not sanitize the survey variable before placing it inside of an SQL query.2017-09-14not yet calculatedCVE-2017-1002022
MISC
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin eventr v1.02.2, The edit.php form and attendees.php code do not sanitize input, this allows for blind SQL injection via the event parameter.2017-09-14not yet calculatedCVE-2017-1002018
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin image-gallery-with-slideshow v1.5.2, Blind SQL Injection in image-gallery-with-slideshow/admin_setting.php via selectMulGallery parameter.2017-09-14not yet calculatedCVE-2017-1002015
MISC
MISCwordpress -- wordpress
 In post-new.php in the Photocrati NextGEN Gallery plugin 2.1.10 for WordPress, unrestricted file upload is available via the name parameter, if a file extension is changed from .jpg to .php.2017-09-12not yet calculatedCVE-2015-9228
MISC
MISC
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin rk-responsive-contact-form v1.0, The variable $delid isn't sanitized before being passed into an SQL query in file ./rk-responsive-contact-form/include/rk_user_list.php.2017-09-14not yet calculatedCVE-2017-1002027
MISC
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin flickr-picture-backup v0.7, The code in flickr-picture-download.php doesn't check to see if the user is authenticated or that they have permission to upload files.2017-09-14not yet calculatedCVE-2017-1002016
MISC
MISCwordpress -- wordpress
 In the nggallery-manage-gallery page in the Photocrati NextGEN Gallery plugin 2.1.15 for WordPress, XSS is possible for remote authenticated administrators via the images[1][alttext] parameter.2017-09-12not yet calculatedCVE-2015-9229
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin image-gallery-with-slideshow v1.5.2, In image-gallery-with-slideshow/admin_setting.php the following snippet of code does not sanitize input via the gid variable before passing it into an SQL statement.2017-09-14not yet calculatedCVE-2017-1002012
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin image-gallery-with-slideshow v1.5.2, Blind SQL Injection via imgid parameter in image-gallery-with-slideshow/admin_setting.php.2017-09-14not yet calculatedCVE-2017-1002013
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin DTracker v1.5, The code dtracker/save_contact.php doesn't check that the user is authorized before injecting new contacts into the wp_contact table.2017-09-14not yet calculatedCVE-2017-1002006
BID
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin Easy Team Manager v1.3.2, The code does not sanitize id before making it part of an SQL statement in file ./easy-team-manager/inc/easy_team_manager_desc_edit.php2017-09-14not yet calculatedCVE-2017-1002023
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin image-gallery-with-slideshow v1.5.2, Blind SQL Injection in image-gallery-with-slideshow/admin_setting.php via gallery_name parameter.2017-09-14not yet calculatedCVE-2017-1002014
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin mobile-app-builder-by-wappress v1.05, The plugin includes unlicensed vulnerable CMS software from http://www.invedion.com.2017-09-14not yet calculatedCVE-2017-1002001
MISC
MISC
EXPLOIT-DBwordpress -- wordpress
 Vulnerability in wordpress plugin wp2android-turn-wp-site-into-android-app v1.1.4, The plugin includes unlicensed vulnerable CMS software from http://www.invedion.com.2017-09-14not yet calculatedCVE-2017-1002003
BID
MISC
MISC
EXPLOIT-DBwordpress -- wordpress
 Vulnerability in wordpress plugin webapp-builder v2.0, The plugin includes unlicensed vulnerable CMS software from http://www.invedion.com/2017-09-14not yet calculatedCVE-2017-1002002
BID
MISC
MISC
EXPLOIT-DBwordpress -- wordpress
 Vulnerability in wordpress plugin DTracker v1.5, In file ./dtracker/download.php user input isn't sanitized via the id variable before adding it to the end of an SQL query.2017-09-14not yet calculatedCVE-2017-1002004
BID
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin DTracker v1.5, In file ./dtracker/delete.php user input isn't sanitized via the contact_id variable before adding it to the end of an SQL query.2017-09-14not yet calculatedCVE-2017-1002005
BID
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin add-edit-delete-listing-for-member-module v1.0, The plugin author does not sanitize user supplied input via $act before passing it into an SQL statement.2017-09-14not yet calculatedCVE-2017-1002025
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin Event Expresso Free v3.1.37.11.L, The function edit_event_category does not sanitize user-supplied input via the $id parameter before passing it into an SQL statement.2017-09-14not yet calculatedCVE-2017-1002026
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin image-gallery-with-slideshow v1.5.2, There is a stored XSS vulnerability via the $value->gallery_name and $value->gallery_description where anyone with privileges to modify or add galleries/images and inject javascript into the database.2017-09-14not yet calculatedCVE-2017-1002011
MISC
MISCwordpress -- wordpress
 In the admin/db-backup-security/db-backup-security.php page in the BulletProof Security plugin before .52.5 for WordPress, XSS is possible for remote authenticated administrators via the DBTablePrefix parameter.2017-09-12not yet calculatedCVE-2015-9230
MISC
MISC
MISC
MISC
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin Membership Simplified v1.58, The code in membership-simplified-for-oap-members-only/updateDB.php is vulnerable to blind SQL injection because it doesn't sanitize user input via recordId in the delete_media function.2017-09-14not yet calculatedCVE-2017-1002010
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin Membership Simplified v1.58, The code in membership-simplified-for-oap-members-only/updateDB.php is vulnerable to blind SQL injection because it doesn't sanitize user input via recordId in the delete function.2017-09-14not yet calculatedCVE-2017-1002009
MISC
MISCwordpress -- wordpress
 Vulnerability in wordpress plugin membership-simplified-for-oap-members-only v1.58, The file download code located membership-simplified-for-oap-members-only/download.php does not check whether a user is logged in and has download privileges.2017-09-14not yet calculatedCVE-2017-1002008
MISC
MISC
MISC
EXPLOIT-DBwordpress -- wordpress
 Vulnerability in wordpress plugin DTracker v1.5, The code dtracker/save_mail.php doesn't check that the user is authorized before injecting new contacts into the wp_contact table.2017-09-14not yet calculatedCVE-2017-1002007
BID
MISC
MISCxen -- xen
 A domain cleanup issue was discovered in the C xenstore daemon (aka cxenstored) in Xen through 4.9.x. When shutting down a VM with a stubdomain, a race in cxenstored may cause a double-free. The xenstored daemon may crash, resulting in a DoS of any parts of the system relying on it (including domain creation / destruction, ballooning, device changes, etc.).2017-09-12not yet calculatedCVE-2017-14317
BID
SECTRACK
CONFIRMxen -- xen
 A grant unmapping issue was discovered in Xen through 4.9.x. When removing or replacing a grant mapping, the x86 PV specific path needs to make sure page table entries remain in sync with other accounting done. Although the identity of the page frame was validated correctly, neither the presence of the mapping nor page writability were taken into account.2017-09-12not yet calculatedCVE-2017-14319
BID
SECTRACK
CONFIRMxen -- xen
 An issue was discovered in Xen 4.5.x through 4.9.x. The function `__gnttab_cache_flush` handles GNTTABOP_cache_flush grant table operations. It checks to see if the calling domain is the owner of the page that is to be operated on. If it is not, the owner's grant table is checked to see if a grant mapping to the calling domain exists for the page in question. However, the function does not check to see if the owning domain actually has a grant table or not. Some special domains, such as `DOMID_XEN`, `DOMID_IO` and `DOMID_COW` are created without grant tables. Hence, if __gnttab_cache_flush operates on a page owned by these special domains, it will attempt to dereference a NULL pointer in the domain struct.2017-09-12not yet calculatedCVE-2017-14318
BID
SECTRACK
CONFIRMxen -- xen
 A parameter verification issue was discovered in Xen through 4.9.x. The function `alloc_heap_pages` allows callers to specify the first NUMA node that should be used for allocations through the `memflags` parameter; the node is extracted using the `MEMF_get_node` macro. While the function checks to see if the special constant `NUMA_NO_NODE` is specified, it otherwise does not handle the case where `node >= MAX_NUMNODES`. This allows an out-of-bounds access to an internal array.2017-09-12not yet calculatedCVE-2017-14316
BID
SECTRACK
CONFIRMxen -- xen
 Memory leak in Xen 3.3 through 4.8.x allows guest OS users to cause a denial of service (ARM or x86 AMD host OS memory consumption) by continually rebooting, because certain cleanup is skipped if no pass-through device was ever assigned, aka XSA-207.2017-09-13not yet calculatedCVE-2017-14431
CONFIRMxnview -- xnview
 XnView Classic for Windows Version 2.40 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to a "User Mode Write AV starting at ntdll_77400000!RtlFillMemoryUlong+0x0000000000000010."2017-09-11not yet calculatedCVE-2017-14270
MISCxnview -- xnview
 XnView Classic for Windows Version 2.40 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to a "User Mode Write AV starting at jbig2dec+0x000000000000595d."2017-09-11not yet calculatedCVE-2017-14272
MISCxnview -- xnview
 XnView Classic for Windows Version 2.40 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to a "User Mode Write AV starting at ntdll_77400000!RtlImpersonateSelfEx+0x000000000000024e."2017-09-11not yet calculatedCVE-2017-14271
MISCxnview -- xnview
 XnView Classic for Windows Version 2.40 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at jbig2dec+0x0000000000008706."2017-09-11not yet calculatedCVE-2017-14274
MISCxnview -- xnview
 XnView Classic for Windows Version 2.40 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to a "User Mode Write AV starting at ntdll_77400000!RtlInterlockedPopEntrySList+0x00000000000003b0."2017-09-11not yet calculatedCVE-2017-14273
MISCBack to top

This product is provided subject to this Notification and this Privacy & Use policy.


2017. szeptember 11.

SB17-254: Vulnerability Summary for the Week of September 4, 2017

Original release date: September 11, 2017

The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.

The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0

  • Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9

  • Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9

Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

 

High VulnerabilitiesPrimary
Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoffmpeg -- ffmpegIn libavformat/mxfdec.c in FFmpeg 3.3.3, a DoS in mxf_read_index_entry_array() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted MXF file, which claims a large "nb_index_entries" field in the header but does not contain sufficient backing data, is provided, the loop would consume huge CPU resources, since there is no EOF check inside the loop. Moreover, this big loop can be invoked multiple times if there is more than one applicable data segment in the crafted MXF file.2017-09-077.1CVE-2017-14170
CONFIRMffmpeg -- ffmpegIn libavformat/nsvdec.c in FFmpeg 3.3.3, a DoS in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted NSV file, which claims a large "table_entries_used" field in the header but does not contain sufficient backing data, is provided, the loop over 'table_entries_used' would consume huge CPU resources, since there is no EOF check inside the loop.2017-09-077.1CVE-2017-14171
CONFIRMfujixerox -- contentsbridge_utilityUntrusted search path vulnerability in Installer for ContentsBridge Utility for Windows 7.4.0 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.2017-09-019.3CVE-2017-10851
CONFIRM
JVNfujixerox -- docuworksUntrusted search path vulnerability in Installers for DocuWorks 8.0.7 and earlier and DocuWorks Viewer Light published in Jul 2017 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.2017-09-019.3CVE-2017-10848
CONFIRM
JVNfujixerox -- docuworksUntrusted search path vulnerability in Self-extracting document generated by DocuWorks 8.0.7 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.2017-09-019.3CVE-2017-10849
CONFIRM
JVNgnome -- geditlibgedit.a in GNOME gedit through 3.22.1 allows remote attackers to cause a denial of service (CPU consumption) via a file that begins with many '\0' characters.2017-09-057.1CVE-2017-14108
MISC
MISChelpdezk -- helpdezkHelpDEZk 1.1.1 has SQL Injection in app\modules\admin\controllers\loginController.php via the admin/login/getWarningInfo/id/ PATH_INFO, related to the selectWarning function.2017-09-057.5CVE-2017-14145
MISCimagemagick -- imagemagickThe ReadOneLayer function in coders/xcf.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.2017-09-017.1CVE-2017-12691
CONFIRMimagemagick -- imagemagickThe ReadVIFFImage function in coders/viff.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted VIFF file.2017-09-017.1CVE-2017-12692
CONFIRMimagemagick -- imagemagickThe ReadBMPImage function in coders/bmp.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted BMP file.2017-09-017.1CVE-2017-12693
CONFIRMimagemagick -- imagemagickReadWEBPImage in coders/webp.c in ImageMagick 7.0.6-5 has an issue where memory allocation is excessive because it depends only on a length field in a header.2017-09-047.5CVE-2017-14137
CONFIRMimagemagick -- imagemagickImageMagick 7.0.6-5 has a memory leak vulnerability in ReadWEBPImage in coders/webp.c because memory is not freed in certain error cases, as demonstrated by VP8 errors.2017-09-047.5CVE-2017-14138
CONFIRMimagemagick -- imagemagickIn coders/ps.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "extent" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CPU resources, since there is no EOF check inside the loop.2017-09-077.1CVE-2017-14172
CONFIRM
CONFIRMimagemagick -- imagemagickIn coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CPU resources, since there is no EOF check inside the loop.2017-09-077.1CVE-2017-14174
CONFIRM
CONFIRM
CONFIRMimagemagick -- imagemagickIn coders/xbm.c in ImageMagick 7.0.6-1 Q16, a DoS in ReadXBMImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted XBM file, which claims large rows and columns fields in the header but does not contain sufficient backing data, is provided, the loop over the rows would consume huge CPU resources, since there is no EOF check inside the loop.2017-09-077.1CVE-2017-14175
CONFIRM
CONFIRMmcafee -- security_scan_plusA Code Injection vulnerability in the non-certificate-based authentication mechanism in McAfee Live Safe versions prior to 16.0.3 and McAfee Security Scan Plus (MSS+) versions prior to 3.11.599.3 allows network attackers to perform a malicious file execution via a HTTP backend-response.2017-09-017.5CVE-2017-3897
CONFIRM
BIDnetapp -- data_ontapNetApp Data ONTAP before 8.2.4, when operating in 7-Mode, allows remote attackers to bypass authentication and (1) obtain sensitive information from or (2) modify volumes via vectors related to UTF-8 in the volume language.2017-09-017.5CVE-2015-7746
CONFIRMntt -- enkaku_support_toolUntrusted search path vulnerability in Remote Support Tool (Enkaku Support Tool) All versions distributed through the website till 2017 August 10 allow an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.2017-09-019.3CVE-2017-10829
CONFIRM
MISC
JVNrarlab -- unrarunrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a stack-based buffer over-read in unrarlib.c, related to ExtrFile and stricomp.2017-09-037.5CVE-2017-14122
MISC
MISCsalesagility -- suitecrmRace condition in SuiteCRM before 7.2.3 allows remote attackers to execute arbitrary code. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-5947.2017-09-069.3CVE-2015-5948
MLIST
MISC
CONFIRM
CONFIRMsap -- netweaverXML External Entity (XXE) vulnerability in SAP Netweaver before 7.01.2017-09-067.5CVE-2015-7241
MISC
BUGTRAQ
BID
EXPLOIT-DBscrapy -- scrapyScrapy 1.4 allows remote attackers to cause a denial of service (memory consumption) via large files because arbitrarily many files are read into memory, which is especially problematic if the files are then individually written in a separate thread to a slow storage resource, as demonstrated by interaction between dataReceived (in core/downloader/handlers/http11.py) and S3FilesStore.2017-09-057.8CVE-2017-14158
MISC
MISCsimplesamlphp -- simplesamlphpThe secureCompare method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.13 and earlier, when used with PHP before 5.6, allows attackers to conduct session fixation attacks or possibly bypass authentication by leveraging missing character conversions before an XOR operation.2017-09-017.5CVE-2017-12868
CONFIRM
CONFIRMsimplesamlphp -- simplesamlphpSimpleSAMLphp 1.7.0 through 1.14.10 might allow attackers to obtain sensitive information, gain unauthorized access, or have unspecified other impacts by leveraging incorrect persistent NameID generation when an Identity Provider (IdP) is misconfigured.2017-09-017.5CVE-2017-12873
CONFIRM
CONFIRMtechnicolor -- td5336_firmwareCommand Injection in the Ping Module in the Web Interface on Technicolor TD5336 OI_Fw_v7 devices allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the pingAddr parameter to mnt_ping.cgi.2017-09-0410.0CVE-2017-14127
MISCBack to top

 

Medium VulnerabilitiesPrimary
Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoaspl -- libaxlHeap-based buffer overflow in libaxl 0.6.9 allows attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted XML document.2017-09-066.8CVE-2015-3450
MLIST
BIDbeaker-project -- beakerXML external entity (XXE) vulnerability in bkr/server/jobs.py in Beaker before 20.1 allows remote authenticated users to obtain sensitive information via submitting job XML to the server containing entity references which reference files from the Beaker server's file system.2017-09-064.0CVE-2015-3160
MLIST
BID
CONFIRM
CONFIRM
CONFIRMbeaker-project -- beakerThe admin pages for power types and key types in Beaker before 20.1 do not have any access controls, which allows remote authenticated users to modify power types and key types via navigating to $BEAKER/powertypes and $BEAKER/keytypes respectively.2017-09-064.0CVE-2015-3163
MLIST
BID
CONFIRM
CONFIRMbento4 -- bento4The AP4_AtomSampleTable::GetSample function in Core/Ap4AtomSampleTable.cpp in Bento4 mp42ts before 1.5.0-616 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted mp4 file.2017-09-064.3CVE-2017-12474
MISC
MISC
MISCbento4 -- bento4The AP4_Processor::Process function in Core/Ap4Processor.cpp in Bento4 mp4encrypt before 1.5.0-616 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted mp4 file.2017-09-064.3CVE-2017-12475
MISC
MISC
MISCbento4 -- bento4The AP4_AvccAtom::InspectFields function in Core/Ap4AvccAtom.cpp in Bento4 mp4dump before 1.5.0-616 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted mp4 file.2017-09-064.3CVE-2017-12476
MISC
MISC
MISCembedthis -- goaheadGoAhead 3.4.0 through 3.6.5 has a NULL Pointer Dereference in the websDecodeUrl function in http.c, leading to a crash for a "POST / HTTP/1.1" request.2017-09-055.0CVE-2017-14149
MISCeyesofnetwork -- eonwebIn the EyesOfNetwork web interface (aka eonweb) 5.1-0, module\tool_all\tools\interface.php does not properly restrict exec calls, which allows remote attackers to execute arbitrary commands via shell metacharacters in the host_list parameter to module/tool_all/select_tool.php.2017-09-036.5CVE-2017-14118
MISCeyesofnetwork -- eonwebIn the EyesOfNetwork web interface (aka eonweb) 5.1-0, module\tool_all\tools\snmpwalk.php does not properly restrict popen calls, which allows remote attackers to execute arbitrary commands via shell metacharacters in a parameter.2017-09-036.5CVE-2017-14119
MISCffmpeg -- ffmpegIn the mxf_read_primer_pack function in libavformat/mxfdec.c in FFmpeg 3.3.3, an integer signedness error might occur when a crafted file, which claims a large "item_num" field such as 0xffffffff, is provided. As a result, the variable "item_num" turns negative, bypassing the check for a large value.2017-09-076.8CVE-2017-14169
CONFIRMfroxlor -- froxlorFroxlor before 0.9.33.2 with the default configuration/setup might allow remote attackers to obtain the database password by reading /logs/sql-error.log.2017-09-065.0CVE-2015-5959
MLIST
BID
CONFIRMgnome -- evincebackend/comics/comics-document.c (aka the comic book backend) in GNOME Evince before 3.24.1 allows remote attackers to execute arbitrary commands via a .cbt file that is a TAR archive containing a filename beginning with a "--" command-line option substring, as demonstrated by a --checkpoint-action=exec=bash at the beginning of the filename.2017-09-056.8CVE-2017-1000083
MISC
BID
MISC
MISCgnome -- gdk-pixbufAn exploitable heap overflow vulnerability exists in the gdk_pixbuf__jpeg_image_load_increment functionality of Gdk-Pixbuf 2.36.6. A specially crafted jpeg file can cause a heap overflow resulting in remote code execution. An attacker can send a file or url to trigger this vulnerability.2017-09-056.8CVE-2017-2862
BID
MISCgnome -- gdk-pixbufAn exploitable integer overflow vulnerability exists in the tiff_image_parse functionality of Gdk-Pixbuf 2.36.6 when compiled with Clang. A specially crafted tiff file can cause a heap-overflow resulting in remote code execution. An attacker can send a file or a URL to trigger this vulnerability.2017-09-056.8CVE-2017-2870
BID
MISCgnu -- binutilsThe decode_line_info function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (read_1_byte heap-based buffer over-read and application crash) via a crafted ELF file.2017-09-044.3CVE-2017-14128
BID
CONFIRM
CONFIRMgnu -- binutilsThe read_section function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (parse_comp_unit heap-based buffer over-read and application crash) via a crafted ELF file.2017-09-044.3CVE-2017-14129
BID
CONFIRM
CONFIRMgnu -- binutilsThe _bfd_elf_parse_attributes function in elf-attrs.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (_bfd_elf_attr_strdup heap-based buffer over-read and application crash) via a crafted ELF file.2017-09-044.3CVE-2017-14130
BID
CONFIRM
CONFIRMgraphicsmagick -- graphicsmagickThe ReadJNGImage and ReadOneJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 do not properly manage image pointers after certain error conditions, which allows remote attackers to conduct use-after-free attacks via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-11403.2017-09-016.8CVE-2017-14103
MISC
MISChelpdezk -- helpdezkHelpDEZk 1.1.1 allows remote authenticated users to execute arbitrary PHP code by uploading a .php attachment and then requesting it in the helpdezk\app\uploads\helpdezk\attachments\ directory.2017-09-056.5CVE-2017-14146
MISChonda -- moto_lincHonda Moto LINC 1.6.1 does not verify SSL certificates.2017-09-064.3CVE-2015-2943
JVN
JVNDBibm -- emptoris_strategic_supply_managementIBM Emptoris Strategic Supply Management Platform 10.0.0.x through 10.1.1.x is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 120657.2017-09-056.8CVE-2017-1097
CONFIRM
MISCibm -- inotesIBM Notes 8.5 and 9.0 is vulnerable to a denial of service. If a user is persuaded to click on a malicious link, it could cause the Notes client to hang and have to be restarted. IBM X-Force ID: 121370.2017-09-054.3CVE-2017-1129
CONFIRM
CONFIRM
MISC
EXPLOIT-DBibm -- inotesIBM Notes 8.5 and 9.0 is vulnerable to a denial of service. If a user is persuaded to click on a malicious link, it would open up many file select dialog boxes which would cause the client hang and have to be restarted. IBM X-Force ID: 121371.2017-09-054.3CVE-2017-1130
CONFIRM
BID
MISC
EXPLOIT-DBibm -- qradar_network_securityIBM QRadar Network Security 5.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128376.2017-09-054.3CVE-2017-1457
CONFIRM
BID
MISCibm -- qradar_network_securityIBM QRadar Network Security 5.4 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 128377.2017-09-055.5CVE-2017-1458
CONFIRM
BID
MISCibm -- qradar_network_securityIBM QRadar Network Security 5.4 supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the strongest algorithm that is available to both parties. IBM X-Force ID: 128689.2017-09-055.0CVE-2017-1491
CONFIRM
MISCimagemagick -- imagemagickImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMSLImage in coders/msl.c.2017-09-046.8CVE-2017-14139
CONFIRMimagemagick -- imagemagickIn the function ReadTXTImage() in coders/txt.c in ImageMagick 7.0.6-10, an integer overflow might occur for the addition operation "GetQuantumRange(depth)+1" when "depth" is large, producing a smaller value than expected. As a result, an infinite loop would occur for a crafted TXT file that claims a very large "max_value" value.2017-09-074.3CVE-2017-14173
CONFIRM
CONFIRMjasper_project -- jasperJasPer 2.0.13 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted image, related to the jas_image_ishomosamp function in libjasper/base/jas_image.c.2017-09-044.3CVE-2017-14132
MISCledger-cli -- ledgerAn exploitable buffer overflow vulnerability exists in the tag parsing functionality of Ledger-CLI 3.1.1. A specially crafted journal file can cause an integer underflow resulting in code execution. An attacker can construct a malicious journal file to trigger this vulnerability.2017-09-056.8CVE-2017-2807
BID
MISCledger-cli -- ledgerAn exploitable use-after-free vulnerability exists in the account parsing component of the Ledger-CLI 3.1.1. A specially crafted ledger file can cause a use-after-free vulnerability resulting in arbitrary code execution. An attacker can convince a user to load a journal file to trigger this vulnerability.2017-09-056.8CVE-2017-2808
BID
MISClexmark -- perceptive_document_filtersAn exploitable use-after-free exists in the PDF parsing functionality of Lexmark Perspective Document Filters 11.3.0.2400 and 11.4.0.2452. A crafted PDF document can lead to a use-after-free resulting in direct code execution.2017-09-056.8CVE-2017-2821
BID
MISClexmark -- perceptive_document_filtersAn exploitable code execution vulnerability exists in the image rendering functionality of Lexmark Perceptive Document Filters 11.3.0.2400. A specifically crafted PDF can cause a function call on a corrupted DCTStream to occur, resulting in user controlled data being written to the stack. A maliciously crafted PDF file can be used to trigger this vulnerability.2017-09-056.8CVE-2017-2822
BID
MISClibarchive -- libarchivelibarchive 3.3.2 allows remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c.2017-09-064.3CVE-2017-14166
MISC
MISClibzip_project -- libzipThe _zip_read_eocd64 function in zip_open.c in libzip before 1.3.0 mishandles EOCD records, which allows remote attackers to cause a denial of service (memory allocation failure in _zip_cdir_grow in zip_dirent.c) via a crafted ZIP archive.2017-09-014.3CVE-2017-14107
MISC
MISClinux -- linux_kernelThe tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.2017-09-014.9CVE-2017-14106
CONFIRM
CONFIRM
CONFIRMmcafee -- livesafeA man-in-the-middle attack vulnerability in the non-certificate-based authentication mechanism in McAfee LiveSafe (MLS) versions prior to 16.0.3 allows network attackers to modify the Windows registry value associated with the McAfee update via the HTTP backend-response.2017-09-014.3CVE-2017-3898
CONFIRMmimedefang -- mimedefangMIMEDefang 2.80 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by the init-script.in and mimedefang-init.in scripts.2017-09-014.6CVE-2017-14102
MISC
MISCnetapp -- clustered_data_ontapNetApp Clustered Data ONTAP 8.3.x before 8.3.2P12 allows remote authenticated users to execute arbitrary code on the storage controller via unspecified vectors.2017-09-016.5CVE-2017-12421
CONFIRMnetapp -- clustered_data_ontapNetApp Clustered Data ONTAP 8.3.x before 8.3.2P12 allows remote authenticated users to read data on other Storage Virtual Machines (SVMs) via unspecified vectors.2017-09-014.0CVE-2017-12423
CONFIRMnetapp -- data_ontapNetApp Data ONTAP before 8.2.5 and 8.3.x before 8.3.2P12 allow remote authenticated users to cause a denial of service via vectors related to unsafe user input string handling.2017-09-014.0CVE-2016-1895
CONFIRMnetapp -- oncommand_unified_manager_for_clustered_data_ontapNetApp OnCommand Unified Manager for Clustered Data ONTAP before 7.2P1 does not set the secure flag for an unspecified cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session.2017-09-015.0CVE-2017-14053
CONFIRMopencv -- opencvOpenCV (Open Source Computer Vision Library) 3.3 has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12597.2017-09-044.3CVE-2017-14136
MISC
MISC
MISCopenjpeg -- openjpegAn off-by-one error was discovered in opj_tcd_code_block_enc_allocate_data in lib/openjp2/tcd.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service (heap-based buffer overflow affecting opj_mqc_flush in lib/openjp2/mqc.c and opj_t1_encode_cblk in lib/openjp2/t1.c) or possibly remote code execution.2017-09-056.8CVE-2017-14151
BID
MISC
MISC
MISCopenjpeg -- openjpegA mishandled zero case was discovered in opj_j2k_set_cinema_parameters in lib/openjp2/j2k.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service (heap-based buffer overflow affecting opj_write_bytes_LE in lib/openjp2/cio.c and opj_j2k_write_sot in lib/openjp2/j2k.c) or possibly remote code execution.2017-09-056.8CVE-2017-14152
MISC
MISC
MISCqemu -- qemuUse-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.2017-09-015.0CVE-2017-13711
MLIST
BID
CONFIRM
MLISTrarlab -- unrarunrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a directory traversal vulnerability for RAR v2 archives: pathnames of the form ../[filename] are unpacked into the upper directory.2017-09-035.0CVE-2017-14120
MISC
MISCrarlab -- unrarThe DecodeNumber function in unrarlib.c in unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a NULL pointer dereference flaw triggered by a specially crafted RAR archive.2017-09-036.8CVE-2017-14121
MISC
MISCsimplesamlphp -- infocard_moduleThe InfoCard module 1.0 for SimpleSAMLphp allows attackers to spoof XML messages by leveraging an incorrect check of return values in signature validation utilities.2017-09-015.0CVE-2017-12874
CONFIRMsimplesamlphp -- simplesamlphpThe multiauth module in SimpleSAMLphp 1.14.13 and earlier allows remote attackers to bypass authentication context restrictions and use an authentication source defined in config/authsources.php via vectors related to improper validation of user input.2017-09-015.0CVE-2017-12869
CONFIRMsimplesamlphp -- simplesamlphpSimpleSAMLphp 1.14.12 and earlier make it easier for man-in-the-middle attackers to obtain sensitive information by leveraging use of the aesEncrypt and aesDecrypt methods in the SimpleSAML/Utils/Crypto class to protect session identifiers in replies to non-HTTPS service providers.2017-09-014.3CVE-2017-12870
CONFIRMsimplesamlphp -- simplesamlphpThe aesEncrypt method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV).2017-09-014.3CVE-2017-12871
CONFIRM
CONFIRMsimplesamlphp -- simplesamlphpThe (1) Htpasswd authentication source in the authcrypt module and (2) SimpleSAML_Session class in SimpleSAMLphp 1.14.11 and earlier allow remote attackers to conduct timing side-channel attacks by leveraging use of the standard comparison operator to compare secret material against user input.2017-09-014.3CVE-2017-12872
CONFIRMsuitecrm -- suitecrmSuiteCRM before 7.2.3 allows remote attackers to execute arbitrary code.2017-09-066.8CVE-2015-5947
MLIST
CONFIRM
CONFIRM
CONFIRMvulcanjs -- vulcanTelescopeJS before 0.15 leaks user bcrypt password hashes in websocket messages, which might allow remote attackers to obtain password hashes via a cross-site scripting attack.2017-09-065.0CVE-2015-3454
MLIST
BID
CONFIRM
MISCxnau -- participants_databaseThe Participants Database plugin before 1.7.5.10 for WordPress has XSS.2017-09-044.3CVE-2017-14126
MISC
CONFIRM
EXPLOIT-DBBack to top

 

Low VulnerabilitiesPrimary
Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infobeaker-project -- beakerThe search bar code in bkr/server/widgets.py in Beaker before 20.1 does not escape </script> tags in string literals when producing JSON.2017-09-063.5CVE-2015-3161
MLIST
BID
CONFIRM
MISC
CONFIRMbeaker-project -- beakerCross-site scripting (XSS) vulnerability in the edit comment dialog in bkr/server/widgets.py in Beaker 20.1 allows remote authenticated users to inject arbitrary web script or HTML via writing a crafted comment on an acked or nacked cancelled job.2017-09-063.5CVE-2015-3162
MLIST
BID
CONFIRM
MISC
CONFIRMlinux -- linux_kernelThe move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.2017-09-052.1CVE-2017-14140
CONFIRM
CONFIRM
CONFIRMlinux -- linux_kernelThe atyfb_ioctl function in drivers/video/fbdev/aty/atyfb_base.c in the Linux kernel through 4.12.10 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading locations associated with padding bytes.2017-09-052.1CVE-2017-14156
BID
MISC
MISC
MISCqemu -- qemuQEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.2017-09-012.1CVE-2017-13672
MLIST
BID
CONFIRM
MLISTBack to top

 

Severity Not Yet AssignedPrimary
Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoanchor-cms -- anchor-cms
 Cross-site scripting (XSS) vulnerability in anchor-cms before 0.9-dev.2017-09-07not yet calculatedCVE-2015-5060
CONFIRMapache -- hadoop
 The YARN NodeManager in Apache Hadoop 2.6.x before 2.6.5 and 2.7.x before 2.7.3 can leak the password for credential store provider used by the NodeManager to YARN Applications.2017-09-05not yet calculatedCVE-2016-3086
MLIST
BIDapache_directory -- ldap_api
 Apache Directory LDAP API before 1.0.0-M31 allows attackers to conduct timing attacks via unspecified vectors.2017-09-07not yet calculatedCVE-2015-3250
CONFIRM
MLIST
MLIST
CONFIRMaskbot -- askbot
 Cross-site scripting (XSS) vulnerability in askbot 0.7.51-4.el6.noarch.2017-09-07not yet calculatedCVE-2015-3169
MLIST
BID
CONFIRMasterisk -- asteriskIn Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized command execution is possible. The app_minivm module has an "externnotify" program configuration option that is executed by the MinivmNotify dialplan application. The application uses the caller-id name and number as part of a built string passed to the OS shell for interpretation and execution. Since the caller-id name and number can come from an untrusted source, a crafted caller-id name or number allows an arbitrary shell command injection.2017-09-02not yet calculatedCVE-2017-14100
CONFIRM
SECTRACK
CONFIRM
CONFIRMasterisk -- asterisk
 In the pjsip channel driver (res_pjsip) in Asterisk 13.x before 13.17.1 and 14.x before 14.6.1, a carefully crafted tel URI in a From, To, or Contact header could cause Asterisk to crash.2017-09-02not yet calculatedCVE-2017-14098
CONFIRM
BID
SECTRACK
CONFIRM
CONFIRMasterisk -- asterisk
 In res/res_rtp_asterisk.c in Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized data disclosure (media takeover in the RTP stack) is possible with careful timing by an attacker. The "strictrtp" option in rtp.conf enables a feature of the RTP stack that learns the source address of media for a session and drops any packets that do not originate from the expected address. This option is enabled by default in Asterisk 11 and above. The "nat" and "rtp_symmetric" options (for chan_sip and chan_pjsip, respectively) enable symmetric RTP support in the RTP stack. This uses the source address of incoming media as the target address of any sent media. This option is not enabled by default, but is commonly enabled to handle devices behind NAT. A change was made to the strict RTP support in the RTP stack to better tolerate late media when a reinvite occurs. When combined with the symmetric RTP support, this introduced an avenue where media could be hijacked. Instead of only learning a new address when expected, the new code allowed a new source address to be learned at all times. If a flood of RTP traffic was received, the strict RTP support would allow the new address to provide media, and (with symmetric RTP enabled) outgoing traffic would be sent to this new address, allowing the media to be hijacked. Provided the attacker continued to send traffic, they would continue to receive traffic as well.2017-09-02not yet calculatedCVE-2017-14099
CONFIRM
SECTRACK
CONFIRM
CONFIRM
MISCat&t -- u-verse_firmware
 The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589, NVG599, and unspecified other devices, when IP Passthrough mode is not used, configures an sbdc.ha WAN TCP service on port 61001 with the bdctest account and the bdctest password, which allows remote attackers to obtain sensitive information (such as the Wi-Fi password) by leveraging knowledge of a hardware identifier, related to the Bulk Data Collection (BDC) mechanism defined in Broadband Forum technical reports.2017-09-03not yet calculatedCVE-2017-10793
BID
MISC
MISCat&t -- u-verse_firmware
 The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG599 device, when IP Passthrough mode is not used, configures WAN access to a caserver https service with the tech account and an empty password, which allows remote attackers to obtain root privileges by establishing a session on port 49955 and then installing new software, such as BusyBox with "nc -l" support.2017-09-03not yet calculatedCVE-2017-14116
BID
MISC
MISCat&t -- u-verse_firmware
 The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures ssh-permanent-enable WAN SSH logins to the remotessh account with the 5SaP9I26 password, which allows remote attackers to access a "Terminal shell v1.0" service, and subsequently obtain unrestricted root privileges, by establishing an SSH session and then entering certain shell metacharacters and BusyBox commands.2017-09-03not yet calculatedCVE-2017-14115
BID
MISC
MISCat&t -- u-verse_firmware
 The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures an unauthenticated proxy service on WAN TCP port 49152, which allows remote attackers to establish arbitrary TCP connections to intranet hosts by sending \x2a\xce\x01 followed by other predictable values.2017-09-03not yet calculatedCVE-2017-14117
BID
MISC
MISCazeotech -- daqfactory
 An Uncontrolled Search Path Element issue was discovered in AzeoTech DAQFactory versions prior to 17.1. An uncontrolled search path element vulnerability has been identified, which may execute malicious DLL files that have been placed within the search path.2017-09-08not yet calculatedCVE-2017-5147
BID
MISCazeotech -- daqfactory
 An Incorrect Default Permissions issue was discovered in AzeoTech DAQFactory versions prior to 17.1. Local, non-administrative users may be able to replace or modify original application files with malicious ones.2017-09-08not yet calculatedCVE-2017-12699
BID
MISCcentreon -- centreon
 Cross-site scripting (XSS) vulnerability in Centreon 2.6.1.2017-09-07not yet calculatedCVE-2015-7672
MISCcisco -- asyncos_software_for_cisco_security_appliancesA vulnerability in the malware detection functionality within Advanced Malware Protection (AMP) of Cisco AsyncOS Software for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause an email attachment containing malware to be delivered to the end user. The vulnerability is due to the failure of AMP to scan certain EML attachments that could contain malware. An attacker could exploit this vulnerability by sending an email with a crafted EML attachment through the targeted device. A successful exploit could allow the attacker to bypass the configured ESA email message and content filtering and allow the malware to be delivered to the end user. Vulnerable Products: This vulnerability affects Cisco AsyncOS Software for Cisco ESA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA. Cisco Bug IDs: CSCuz81533.2017-09-07not yet calculatedCVE-2017-12218
SECTRACK
CONFIRMcisco -- emergency_responder
 A vulnerability in the SQL database interface for Cisco Emergency Responder could allow an authenticated, remote attacker to conduct a blind SQL injection attack. The vulnerability is due to a failure to validate user-supplied input used in SQL queries that bypass protection filters. An attacker could exploit this vulnerability by sending crafted URLs that include SQL statements. An exploit could allow the attacker to view or modify entries in some database tables, affecting the integrity of the data. Cisco Bug IDs: CSCvb58973.2017-09-07not yet calculatedCVE-2017-12227
BID
SECTRACK
CONFIRMcisco -- firepower_management_center
 A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvc50771.2017-09-07not yet calculatedCVE-2017-12220
BID
CONFIRMcisco -- firepower_management_center

 A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of the affected software. The vulnerability is due to insufficient validation of user-supplied input by the affected software. Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code in the context of the affected system. Cisco Bug IDs: CSCvc38983.2017-09-07not yet calculatedCVE-2017-12221
BID
CONFIRMcisco -- gprs_tunneling_protocol
 A vulnerability in the General Packet Radio Service (GPRS) Tunneling Protocol ingress packet handler of Cisco ASR 5500 System Architecture Evolution (SAE) Gateways could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation of GPRS Tunneling Protocol packet headers. An attacker could exploit this vulnerability by sending a malformed GPRS Tunneling Protocol packet to an affected device. A successful exploit could allow the attacker to cause the GTPUMGR process on an affected device to restart unexpectedly, resulting in a partial DoS condition. If the GTPUMGR process restarts, there could be a brief impact on traffic passing through the device. Cisco Bug IDs: CSCve07119.2017-09-07not yet calculatedCVE-2017-12217
BID
SECTRACK
CONFIRMcisco -- ios_and_ios_xe
 A vulnerability in the IPv6 Simple Network Management Protocol (SNMP) code of Cisco IOS and Cisco IOS XE Software could allow an authenticated, remote attacker to cause high CPU usage or a reload of the device. The vulnerability is due to IPv6 sub block corruption. An attacker could exploit this vulnerability by polling the affected device IPv6 information. An exploit could allow the attacker to trigger high CPU usage or a reload of the device. Known Affected Releases: Denali-16.3.1. Cisco Bug IDs: CSCvb14640.2017-09-07not yet calculatedCVE-2017-12211
BID
SECTRACK
CONFIRM
CONFIRMcisco -- ios_and_ios_xe
 A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 through 3.18 could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle with