Feed aggregator

  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.
  • warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /var/www/vhosts/wayhorn.com/httpdocs/modules/aggregator/aggregator.pages.inc on line 260.

SB19-014: Vulnerability Summary for the Week of January 7, 2019

US-CERT - Mon, 01/14/2019 - 19:27
Original release date: January 14, 2019

The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.

The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0

  • Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9

  • Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9

Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

The NCCIC Weekly Vulnerability Summary Bulletin is created using information from the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD). In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

 

High VulnerabilitiesPrimary
Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infomicrosoft -- edgeA remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge.2019-01-087.6CVE-2019-0565
BID
CONFIRMBack to top

 

Medium VulnerabilitiesPrimary
Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoarc_project -- arcARC 5.21q allows directory traversal via a full pathname in an archive file.2019-01-075.0CVE-2015-9275
MISC
MISCgetbootstrap -- bootstrapIn Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.2019-01-094.3CVE-2016-10735
MISC
MISC
MISC
MISC
MISC
MISCibm -- api_connectIBM API Connect 5.0.0.0 through 5.0.8.4 could allow a user authenticated as an administrator with limited rights to escalate their privileges. IBM X-Force ID: 151258.2019-01-046.5CVE-2018-1859
BID
XF
CONFIRMmicrosoft -- asp.net_coreA denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka "ASP.NET Core Denial of Service Vulnerability." This affects ASP.NET Core 2.1. This CVE ID is unique from CVE-2019-0548.2019-01-085.0CVE-2019-0564
BID
REDHAT
CONFIRMmicrosoft -- officeAn information disclosure vulnerability exists when Microsoft Outlook improperly handles certain types of messages, aka "Microsoft Outlook Information Disclosure Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Outlook.2019-01-084.3CVE-2019-0559
BID
CONFIRMmicrosoft -- officeAn information disclosure vulnerability exists when Microsoft Office improperly discloses the contents of its memory, aka "Microsoft Office Information Disclosure Vulnerability." This affects Office 365 ProPlus, Microsoft Office.2019-01-084.3CVE-2019-0560
BID
CONFIRMyunucms -- yunucmsYUNUCMS 1.1.8 has XSS in app/admin/controller/System.php because crafted data can be written to the sys.php file, as demonstrated by site_title in an admin/system/basic POST request.2019-01-044.3CVE-2019-5310
MISCyunucms -- yunucmsAn issue was discovered in YUNUCMS V1.1.8. app/index/controller/Show.php has an XSS vulnerability via the index.php/index/show/index cw parameter.2019-01-044.3CVE-2019-5311
MISCBack to top

 

Low VulnerabilitiesPrimary
Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infofrog_cms_project -- frog_cmsFrog CMS 0.9.5 has XSS in the admin/?/page/edit/1 body field.2019-01-093.5CVE-2018-20680
MISCibm -- rational_publishing_engineIBM Publishing Engine 2.1.2, 6.0.5, and 6.0.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-force ID: 144883.2019-01-043.5CVE-2018-1657
BID
XF
CONFIRMibm -- rational_publishing_engineIBM Publishing Engine 2.1.2, 6.0.5, and 6.0.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 153494.2019-01-043.5CVE-2018-1951
BID
XF
CONFIRMBack to top

 

Severity Not Yet AssignedPrimary
Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoapache -- karaf
 Apache Karaf provides a features deployer, which allows users to "hot deploy" a features XML by dropping the file directly in the deploy folder. The features XML is parsed by XMLInputFactory class. Apache Karaf XMLInputFactory class doesn't contain any mitigation codes against XXE. This is a potential security risk as an user can inject external XML entities in Apache Karaf version prior to 4.1.7 or 4.2.2. It has been fixed in Apache Karaf 4.1.7 and 4.2.2 releases.2019-01-07not yet calculatedCVE-2018-11788
MISC
BIDapache -- thriftApache Thrift Java client library versions 0.5.0 through 0.11.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete.2019-01-07not yet calculatedCVE-2018-1320
MISCapache -- thriftThe Apache Thrift Node.js static web server in versions 0.9.2 through 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path.2019-01-07not yet calculatedCVE-2018-11798
BID
MISCapple -- cleanmymac_xAn exploitable privilege escalation vulnerability exists in the Clean My Mac X, version 4.04, helper service due to improper input validation. A user with local access can use this vulnerability to modify the file system as root. An attacker would need local access to the machine for a successful exploit.2019-01-10not yet calculatedCVE-2018-4043
MISCapple -- cleanmymac_xAn exploitable privilege escalation vulnerability exists in the helper service of Clean My Mac X, version 4.04, due to improper input validation. An attacker with local access could exploit this vulnerability to modify the file system as root.2019-01-10not yet calculatedCVE-2018-4047
MISCapple -- cleanmymac_xAn exploitable privilege escalation vulnerability exists in the way the CleanMyMac X software improperly validates inputs. An attacker with local access could use this vulnerability to modify the file system as root. An attacker would need local access to the machine for a successful exploit.2019-01-10not yet calculatedCVE-2018-4032
MISCapple -- cleanmymac_xThe CleanMyMac X software contains an exploitable privilege escalation vulnerability due to improper input validation. An attacker with local access could use this vulnerability to modify the file system as root.2019-01-10not yet calculatedCVE-2018-4033
MISCapple -- cleanmymac_xThe CleanMyMac X software contains an exploitable privilege escalation vulnerability that exists due to improper input validation. An attacker with local access could use this vulnerability to modify the file system as root.2019-01-10not yet calculatedCVE-2018-4034
MISCapple -- cleanmymac_xAn exploitable privilege escalation vulnerability exists in the helper service of Clean My Mac X, version 4.04, due to improper input validation. An attacker with local access could exploit this vulnerability to modify the file system as root.2019-01-10not yet calculatedCVE-2018-4045
MISCapple -- cleanmymac_xThe CleanMyMac X software contains an exploitable privilege escalation vulnerability due to improper input validation. An attacker with local access could use this vulnerability to modify the running kernel extensions on the system.2019-01-10not yet calculatedCVE-2018-4036
MISCapple -- cleanmymac_xThe CleanMyMac X software contains an exploitable privilege escalation vulnerability due to improper input validation. An attacker with local access can use this vulnerability to modify the file system as root.2019-01-10not yet calculatedCVE-2018-4037
MISCapple -- cleanmymac_xThe CleanMyMac X software contains an exploitable privilege escalation vulnerability that exists due to improper input validation. An attacker with local access could use this vulnerability to modify the file system as root.2019-01-10not yet calculatedCVE-2018-4035
MISCapple -- cleanmymac_xAn exploitable denial-of-service vulnerability exists in the helper service of Clean My Mac X, version 4.04, due to improper input validation. A user with local access can use this vulnerability to terminate a privileged helper application. An attacker would need local access to the machine for a successful exploit.2019-01-10not yet calculatedCVE-2018-4046
MISCapple -- cleanmymac_xAn exploitable privilege escalation vulnerability exists in the helper service of Clean My Mac X, version 4.04, due to improper input validation. An attacker with local access could exploit this vulnerability to modify the file system as root.2019-01-10not yet calculatedCVE-2018-4041
MISCapple -- cleanmymac_xAn exploitable privilege escalation vulnerability exists in the helper service of Clean My Mac X, version 4.04, due to improper input validation. An attacker with local access could exploit this vulnerability to modify the file system as root.2019-01-10not yet calculatedCVE-2018-4042
MISCapple -- cleanmymac_xAn exploitable privilege escalation vulnerability exists in the helper service of Clean My Mac X, version 4.04, due to improper input validation. An attacker with local access could exploit this vulnerability to modify the file system as root.2019-01-10not yet calculatedCVE-2018-4044
MISCapple -- iosIn iOS before 11.2, exchange rates were retrieved from HTTP rather than HTTPS. This was addressed by enabling HTTPS for exchange rates.2019-01-11not yet calculatedCVE-2017-2411
CONFIRMapple -- iosIn iOS before 11.4 and macOS High Sierra before 10.13.5, a memory corruption issue exists and was addressed with improved memory handling.2019-01-11not yet calculatedCVE-2018-4404
MISC
CONFIRM
EXPLOIT-DBapple -- iosIn iOS before 11.2, an inconsistent user interface issue was addressed through improved state management.2019-01-11not yet calculatedCVE-2017-13891
CONFIRMapple -- iosIn iOS before 11.2, a type confusion issue was addressed with improved memory handling.2019-01-11not yet calculatedCVE-2017-13888
CONFIRMapple -- iosIn iOS before 11.4, a memory corruption issue exists and was addressed with improved memory handling.2019-01-11not yet calculatedCVE-2018-4330
BID
SECTRACK
CONFIRMapple -- iosIn iOS before 9.3.3, a memory corruption issue existed in the kernel. This issue was addressed through improved memory handling.2019-01-11not yet calculatedCVE-2016-7576
CONFIRMapple -- macos_high_sierraIn macOS High Sierra before 10.13.5, a buffer overflow was addressed with improved size validation.2019-01-11not yet calculatedCVE-2018-4257
CONFIRMapple -- macos_high_sierraIn macOS High Sierra before 10.13.5, an out-of-bounds read was addressed with improved input validation.2019-01-11not yet calculatedCVE-2018-4255
CONFIRMapple -- macos_high_sierraIn macOS High Sierra before 10.13.5, an input validation issue existed in the kernel. This issue was addressed with improved input validation.2019-01-11not yet calculatedCVE-2018-4254
CONFIRMapple -- macos_high_sierraIn macOS High Sierra before 10.13.5, a privacy issue in the handling of Open Directory records was addressed with improved indexing.2019-01-11not yet calculatedCVE-2018-4217
CONFIRMapple -- macos_high_sierraIn macOS High Sierra before 10.13.5, an access issue was addressed with additional sandbox restrictions.2019-01-11not yet calculatedCVE-2018-4183
CONFIRM
DEBIANapple -- macos_high_sierraIn macOS High Sierra before 10.13.5, an access issue was addressed with additional sandbox restrictions on CUPS.2019-01-11not yet calculatedCVE-2018-4182
CONFIRM
DEBIANapple -- macos_high_sierraIn macOS High Sierra before 10.13.5, an issue existed in CUPS. This issue was addressed with improved access restrictions.2019-01-11not yet calculatedCVE-2018-4181
MLIST
CONFIRM
UBUNTU
DEBIANapple -- macos_high_sierraIn macOS High Sierra before 10.13.5, an issue existed in CUPS. This issue was addressed with improved access restrictions.2019-01-11not yet calculatedCVE-2018-4180
MLIST
CONFIRM
UBUNTU
DEBIANapple -- macos_high_sierraIn macOS High Sierra before 10.13.5, a buffer overflow was addressed with improved bounds checking.2019-01-11not yet calculatedCVE-2018-4258
CONFIRMapple -- macos_high_sierraIn macOS High Sierra before 10.13.5, an out-of-bounds read was addressed with improved input validation.2019-01-11not yet calculatedCVE-2018-4256
CONFIRMapple -- macos_high_sierraIn macOS High Sierra before 10.13.4, there was an issue with the handling of smartcard PINs. This issue was addressed with additional logic.2019-01-11not yet calculatedCVE-2018-4179
CONFIRMapple -- macos_high_sierraIn macOS High Sierra before 10.13.2, an access issue existed with privileged WiFi system configuration. This issue was addressed with additional restrictions.2019-01-11not yet calculatedCVE-2017-13886
CONFIRMapple -- macos_high_sierraIn macOS High Sierra before 10.13.2, a logic issue existed in APFS when deleting keys during hibernation. This was addressed with improved state management.2019-01-11not yet calculatedCVE-2017-13887
CONFIRMapple -- multiple_productsIn iOS before 11.4, iCloud for Windows before 7.5, watchOS before 4.3.1, iTunes before 12.7.5 for Windows, and macOS High Sierra before 10.13.5, an out-of-bounds read was addressed with improved input validation.2019-01-11not yet calculatedCVE-2018-4194
MISC
CONFIRM
MISC
MISC
MISCapple -- multiple_productsIn macOS High Sierra before 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan, a logic error existed in the validation of credentials. This was addressed with improved credential validation.2019-01-11not yet calculatedCVE-2017-13889
CONFIRMapple -- multiple_productsIn macOS High Sierra before 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan, an out-of-bounds read was addressed with improved input validation.2019-01-11not yet calculatedCVE-2018-4169
CONFIRMapple -- multiple_productsIn Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 11.4.1, iCloud for Windows before 7.6, sound fetched through audio elements may be exfiltrated cross-origin. This issue was addressed with improved audio taint tracking.2019-01-11not yet calculatedCVE-2018-4278
SECTRACK
GENTOO
CONFIRM
MISC
MISC
MISC
MISC
UBUNTUapple -- multiple_productsIn iOS before 11.4.1, watchOS before 4.3.2, tvOS before 11.4.1, Safari before 11.1.1, macOS High Sierra before 10.13.6, a spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation.2019-01-11not yet calculatedCVE-2018-4277
SECTRACK
MISC
MISC
MISC
CONFIRM
MISCapple -- multiple_productsIn Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 11.4.1, iCloud for Windows before 7.6, multiple memory corruption issues were addressed with improved memory handling.2019-01-11not yet calculatedCVE-2018-4262
SECTRACK
GENTOO
MISC
CONFIRM
MISC
UBUNTUapple -- multiple_productsIn iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.2019-01-11not yet calculatedCVE-2018-4213
GENTOO
MISC
CONFIRM
MISC
MISC
MISC
UBUNTUapple -- multiple_productsIn macOS High Sierra before 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan, a permissions issue existed in Remote Management. This issue was addressed through improved permission validation.2019-01-11not yet calculatedCVE-2018-4298
CONFIRM
MISCapple -- multiple_productsIn iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.2019-01-11not yet calculatedCVE-2018-4212
GENTOO
MISC
CONFIRM
MISC
MISC
MISC
MISC
UBUNTUapple -- multiple_productsIn iOS before 11.3, Safari before 11.1, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, an array indexing issue existed in the handling of a function in javascript core. This issue was addressed with improved checks.2019-01-11not yet calculatedCVE-2018-4210
GENTOO
MISC
MISC
MISC
CONFIRM
UBUNTUapple -- multiple_productsIn iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.2019-01-11not yet calculatedCVE-2018-4209
GENTOO
MISC
CONFIRM
MISC
MISC
MISC
MISC
UBUNTUapple -- multiple_productsIn iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.2019-01-11not yet calculatedCVE-2018-4208
GENTOO
MISC
MISC
MISC
CONFIRM
MISC
MISC
UBUNTUapple -- multiple_productsIn iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.2019-01-11not yet calculatedCVE-2018-4207
GENTOO
MISC
CONFIRM
MISC
MISC
MISC
MISC
UBUNTUapple -- multiple_productsIn iOS before 11.2.5, macOS High Sierra before 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan, watchOS before 4.2.2, and tvOS before 11.2.5, a memory corruption issue exists and was addressed with improved memory handling.2019-01-11not yet calculatedCVE-2018-4189
CONFIRM
MISC
MISC
MISCapple -- multiple_productsIn iCloud for Windows before 7.3, Safari before 11.0.3, iTunes before 12.7.3 for Windows, and iOS before 11.2.5, multiple memory corruption issues exist and were addressed with improved memory handling.2019-01-11not yet calculatedCVE-2018-4147
CONFIRM
MISC
MISC
MISC
MISCapple -- multiple_productsIn iOS before 9.3.3, tvOS before 9.2.2, and OS X El Capitan before v10.11.6 and Security Update 2016-004, a downgrade issue existed with HTTP authentication credentials saved in Keychain. This issue was addressed by storing the authentication types with the credentials.2019-01-11not yet calculatedCVE-2016-4644
MISC
MISC
CONFIRMapple -- multiple_productsIn iOS before 9.3.3, tvOS before 9.2.2, and OS X El Capitan before v10.11.6 and Security Update 2016-004, a validation issue existed in the parsing of 407 responses. This issue was addressed through improved response validation.2019-01-11not yet calculatedCVE-2016-4643
MISC
MISC
CONFIRMapple -- multiple_productsIn iOS before 11.3, tvOS before 11.3, watchOS before 4.3, and macOS before High Sierra 10.13.4, an information disclosure issue existed in the transition of program state. This issue was addressed with improved state handling.2019-01-11not yet calculatedCVE-2018-4185
MISC
MISC
CONFIRM
MISCapple -- multiple_products
 In iOS before 9.3.3, tvOS before 9.2.2, and OS X El Capitan before v10.11.6 and Security Update 2016-004, proxy authentication incorrectly reported HTTP proxies received credentials securely. This issue was addressed through improved warnings.2019-01-11not yet calculatedCVE-2016-4642
MISC
MISC
CONFIRMapple -- safariIn Safari before 11.1, an information leakage issue existed in the handling of downloads in Safari Private Browsing. This issue was addressed with additional validation.2019-01-11not yet calculatedCVE-2018-4186
CONFIRMapple -- swiftnioIn SwiftNIO before 1.8.0, a buffer overflow was addressed with improved size validation.2019-01-11not yet calculatedCVE-2018-4281
CONFIRMartifex -- mupdfArtifex MuPDF 1.14.0 has a SEGV in the function fz_load_page of the fitz/document.c file, as demonstrated by mutool. This is related to page-number mishandling in cbz/mucbz.c, cbz/muimg.c, and svg/svg-doc.c.2019-01-11not yet calculatedCVE-2019-6130
MISCartifex -- mupdfsvg-run.c in Artifex MuPDF 1.14.0 has infinite recursion with stack consumption in svg_run_use_symbol, svg_run_element, and svg_run_use, as demonstrated by mutool.2019-01-11not yet calculatedCVE-2019-6131
MISCaterm -- hc100rcAterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary OS commands via FactoryPassword parameter or bootmode parameter of a certain URL.2019-01-09not yet calculatedCVE-2018-0634
MISC
JVNaterm -- hc100rcAterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary OS commands via filename parameter.2019-01-09not yet calculatedCVE-2018-0635
MISC
JVNaterm -- hc100rcAterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary OS commands via FactoryPassword parameter of a certain URL, different URL from CVE-2018-0634.2019-01-09not yet calculatedCVE-2018-0636
MISC
JVNaterm -- hc100rcAterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary OS commands via import.cgi encKey parameter.2019-01-09not yet calculatedCVE-2018-0638
MISC
JVNaterm -- hc100rcAterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary OS commands via tools_firmware.cgi date parameter, time parameter, and offset parameter.2019-01-09not yet calculatedCVE-2018-0639
MISC
JVNaterm -- hc100rcBuffer overflow in Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary code via netWizard.cgi date parameter, time parameter, and offset parameter.2019-01-09not yet calculatedCVE-2018-0640
MISC
JVNaterm -- hc100rcBuffer overflow in Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary code via tools_system.cgi date parameter, time parameter, and offset parameter.2019-01-09not yet calculatedCVE-2018-0641
MISC
JVNaterm -- hc100rcAterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary OS commands via export.cgi encKey parameter.2019-01-09not yet calculatedCVE-2018-0637
MISC
JVNaterm -- w300pBuffer overflow in Aterm W300P Ver1.0.13 and earlier allows attacker with administrator rights to execute arbitrary code via submit-url parameter.2019-01-09not yet calculatedCVE-2018-0633
MISC
JVNaterm -- w300pBuffer overflow in Aterm W300P Ver1.0.13 and earlier allows attacker with administrator rights to execute arbitrary code via HTTP request and response.2019-01-09not yet calculatedCVE-2018-0632
MISC
JVNaterm -- w300pAterm W300P Ver1.0.13 and earlier allows attacker with administrator rights to execute arbitrary OS commands via targetAPSsid parameter.2019-01-09not yet calculatedCVE-2018-0631
MISC
JVNaterm -- w300pAterm W300P Ver1.0.13 and earlier allows attacker with administrator rights to execute arbitrary OS commands via HTTP request and response.2019-01-09not yet calculatedCVE-2018-0629
MISC
JVNaterm -- w300pAterm W300P Ver1.0.13 and earlier allows attacker with administrator rights to execute arbitrary OS commands via sysCmd parameter.2019-01-09not yet calculatedCVE-2018-0630
MISC
JVNaterm -- wg1200hp_firmwareAterm WG1200HP firmware Ver1.0.31 and earlier allows attacker with administrator rights to execute arbitrary OS commands via HTTP request and response.2019-01-09not yet calculatedCVE-2018-0628
MISC
JVNaterm -- wg1200hp_firmwareAterm WG1200HP firmware Ver1.0.31 and earlier allows attacker with administrator rights to execute arbitrary OS commands via targetAPSsid parameter.2019-01-09not yet calculatedCVE-2018-0627
MISC
JVNaterm -- wg1200hp_firmwareAterm WG1200HP firmware Ver1.0.31 and earlier allows attacker with administrator rights to execute arbitrary OS commands via sysCmd in formWsc parameter.2019-01-09not yet calculatedCVE-2018-0626
MISC
JVNaterm -- wg1200hp_firmwareAterm WG1200HP firmware Ver1.0.31 and earlier allows attacker with administrator rights to execute arbitrary OS commands via formSysCmd parameter.2019-01-09not yet calculatedCVE-2018-0625
MISC
JVNbento4 -- bento4
 An issue was discovered in Bento4 v1.5.1-627. There is a memory leak in AP4_DescriptorFactory::CreateDescriptorFromStream in Core/Ap4DescriptorFactory.cpp when called from the AP4_EsdsAtom class in Core/Ap4EsdsAtom.cpp, as demonstrated by mp42aac.2019-01-11not yet calculatedCVE-2019-6132
MISCbodhi -- bodhi
 Bodhi 2.9.0 and lower is vulnerable to cross-site scripting resulting in code injection caused by incorrect validation of bug titles.2019-01-10not yet calculatedCVE-2017-1002152
CONFIRMbootstrap -- bootstrapIn Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.2019-01-09not yet calculatedCVE-2018-20677
MISC
MISC
MISC
MISC
MISCbootstrap -- bootstrap
 In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.2019-01-09not yet calculatedCVE-2018-20676
MISC
MISC
MISC
MISC
MISCbusybox -- busybox
 An issue was discovered in BusyBox through 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and/or relay) might allow a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to assurance of a 4-byte length when decoding DHCP_SUBNET. NOTE: this issue exists because of an incomplete fix for CVE-2018-20679.2019-01-09not yet calculatedCVE-2019-5747
MISC
MISCbusybox -- busybox
 An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.2019-01-09not yet calculatedCVE-2018-20679
MISC
MISC
MISCcimtechniques -- cimscanIn CIMTechniques CIMScan 6.x through 6.2, the SOAP WSDL parser allows attackers to execute SQL code.2019-01-10not yet calculatedCVE-2018-16803
MISC
MISCcisco -- 900_series_aggregation_services_routerA vulnerability in Cisco 900 Series Aggregation Services Router (ASR) software could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient handling of certain broadcast packets ingress to the device. An attacker could exploit this vulnerability by sending large streams of broadcast packets to an affected device. If successful, an exploit could allow an attacker to impact services running on the device, resulting in a partial DoS condition.2019-01-11not yet calculatedCVE-2018-15464
CISCOcisco -- cisco_asyncos_software_for_cisco_email_security_applianceA vulnerability in the Secure/Multipurpose Internet Mail Extensions (S/MIME) Decryption and Verification or S/MIME Public Key Harvesting features of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause an affected device to corrupt system memory. A successful exploit could cause the filtering process to unexpectedly reload, resulting in a denial of service (DoS) condition on the device. The vulnerability is due to improper input validation of S/MIME-signed emails. An attacker could exploit this vulnerability by sending a malicious S/MIME-signed email through a targeted device. If Decryption and Verification or Public Key Harvesting is configured, the filtering process could crash due to memory corruption and restart, resulting in a DoS condition. The software could then resume processing the same S/MIME-signed email, causing the filtering process to crash and restart again. A successful exploit could allow the attacker to cause a permanent DoS condition. This vulnerability may require manual intervention to recover the ESA.2019-01-10not yet calculatedCVE-2018-15453
BID
CISCOcisco -- cisco_asyncos_software_for_cisco_email_security_applianceA vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper filtering of email messages that contain references to whitelisted URLs. An attacker could exploit this vulnerability by sending a malicious email message that contains a large number of whitelisted URLs. A successful exploit could allow the attacker to cause a sustained DoS condition that could force the affected device to stop scanning and forwarding email messages.2019-01-10not yet calculatedCVE-2018-15460
BID
CISCOcisco -- firepower_management_centerA vulnerability in the Shell Access Filter feature of Cisco Firepower Management Center (FMC), when used in conjunction with remote authentication, could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. The vulnerability occurs because the configuration of the Shell Access Filter, when used with a specific type of remote authentication, can cause a system file to have unbounded writes. An attacker could exploit this vulnerability by sending a steady stream of remote authentication requests to the appliance when the specific configuration is applied. Successful exploitation could allow the attacker to increase the size of a system log file so that it consumes most of the disk space. The lack of available disk space could lead to a DoS condition in which the device functions could operate abnormally, making the device unstable.2019-01-10not yet calculatedCVE-2018-15458
BID
CISCOcisco -- identity_services_engineA vulnerability in the Admin Portal of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to view saved passwords in plain text. The vulnerability is due to the incorrect inclusion of saved passwords when loading configuration pages in the Admin Portal. An attacker with read or write access to the Admin Portal could exploit this vulnerability by browsing to a page that contains sensitive data. An exploit could allow the attacker to recover passwords for unauthorized use and expose those accounts to further attack.2019-01-10not yet calculatedCVE-2018-15456
BID
CISCOcisco -- ios_and_ios_xe_softwareA vulnerability in the TCP socket code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a state condition between the socket state and the transmission control block (TCB) state. While this vulnerability potentially affects all TCP applications, the only affected application observed so far is the HTTP server. An attacker could exploit this vulnerability by sending specific HTTP requests at a sustained rate to a reachable IP address of the affected software. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition on an affected device.2019-01-09not yet calculatedCVE-2018-0282
BID
CISCOcisco -- ios_and_ios_xe_softwareA vulnerability in the access control logic of the Secure Shell (SSH) server of Cisco IOS and IOS XE Software may allow connections sourced from a virtual routing and forwarding (VRF) instance despite the absence of the vrf-also keyword in the access-class configuration. The vulnerability is due to a missing check in the SSH server. An attacker could use this vulnerability to open an SSH connection to an affected Cisco IOS or IOS XE device with a source address belonging to a VRF instance. Once connected, the attacker would still need to provide valid credentials to access the device.2019-01-10not yet calculatedCVE-2018-0484
CISCOcisco -- ip_phone_8800_series_softwareA vulnerability in the Cisco IP Phone 8800 Series Software could allow an unauthenticated, remote attacker to conduct an arbitrary script injection attack on an affected device. The vulnerability exists because the software running on an affected device insufficiently validates user-supplied data. An attacker could exploit this vulnerability by persuading a user to click a malicious link provided to the user or through the interface of an affected device. A successful exploit could allow an attacker to execute arbitrary script code in the context of the user interface or access sensitive system-based information, which under normal circumstances should be prohibited.2019-01-10not yet calculatedCVE-2018-0461
BID
CISCOcisco -- jabber_client_frameworkA vulnerability in the Cisco Jabber Client Framework (JCF) software, installed as part of the Cisco Jabber for Mac client, could allow an authenticated, local attacker to corrupt arbitrary files on an affected device that has elevated privileges. The vulnerability exists due to insecure directory permissions set on a JCF created directory. An authenticated attacker with the ability to access an affected directory could create a hard link to an arbitrary location on the affected system. An attacker could convince another user that has administrative privileges to perform an install or update the Cisco Jabber for Mac client to perform such actions, allowing files to be created in an arbitrary location on the disk or an arbitrary file to be corrupted when it is appended to or overwritten.2019-01-10not yet calculatedCVE-2018-0449
BID
CISCOcisco -- jabber_client_frameworkA vulnerability in Cisco Jabber Client Framework (JCF) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of an affected system. The vulnerability is due to insufficient validation of user-supplied input of an affected client. An attacker could exploit this vulnerability by executing arbitrary JavaScript in the Jabber client of the recipient. A successful exploit could allow the attacker to execute arbitrary script code in the context of the targeted client or allow the attacker to access sensitive client-based information.2019-01-10not yet calculatedCVE-2018-0483
BID
CISCOcisco -- policy_suite_for_mobile_and_policy_suite_diameter_routing_agent_softwareA vulnerability in the Redis implementation used by the Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent software could allow an unauthenticated, remote attacker to modify key-value pairs for short-lived events stored by the Redis server. The vulnerability is due to improper authentication when accessing the Redis server. An unauthenticated attacker could exploit this vulnerability by modifying key-value pairs stored within the Redis server database. An exploit could allow the attacker to reduce the efficiency of the Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent software.2019-01-09not yet calculatedCVE-2018-0181
CISCOcisco -- policy_suite
 A vulnerability in the Graphite web interface of the Policy and Charging Rules Function (PCRF) of Cisco Policy Suite (CPS) could allow an unauthenticated, remote attacker to access the Graphite web interface. The attacker would need to have access to the internal VLAN where CPS is deployed. The vulnerability is due to lack of authentication. An attacker could exploit this vulnerability by directly connecting to the Graphite web interface. An exploit could allow the attacker to access various statistics and Key Performance Indicators (KPIs) regarding the Cisco Policy Suite environment.2019-01-11not yet calculatedCVE-2018-15466
BID
CISCOcisco -- prime_infrastructureA vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.2019-01-10not yet calculatedCVE-2018-15457
BID
CISCOcisco -- prime_network_control_systemA vulnerability in the web-based management interface of Cisco Prime Network Control System could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of the affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based management interface or allow the attacker to access sensitive browser-based information.2019-01-10not yet calculatedCVE-2018-0482
BID
CISCOcisco -- telepresence_management_suiteA vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.2019-01-11not yet calculatedCVE-2018-15467
BID
CISCOcisco -- unified_communications_managerA vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to view digest credentials in clear text. The vulnerability is due to the incorrect inclusion of saved passwords in configuration pages. An attacker could exploit this vulnerability by logging in to the Cisco Unified Communications Manager web-based management interface and viewing the source code for the configuration page. A successful exploit could allow the attacker to recover passwords and expose those accounts to further attack.2019-01-10not yet calculatedCVE-2018-0474
CISCOcisco -- webex_business_suiteA vulnerability in the MyWebex component of Cisco Webex Business Suite could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by convincing a user to click a crafted URL. To exploit this vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link.2019-01-10not yet calculatedCVE-2018-15461
BID
CISCOcybozu -- dezieDirectory traversal vulnerability in Cybozu Dezie 8.0.2 to 8.1.2 allows remote attackers to read arbitrary files via HTTP requests.2019-01-09not yet calculatedCVE-2018-0705
JVN
MISCcybozu -- garoonCybozu Garoon 3.0.0 to 4.10.0 allows remote attackers to bypass access restriction to view information available only for a sign-on user via Single sign-on function.2019-01-09not yet calculatedCVE-2018-16178
JVN
MISCcybozu -- mailwiseDirectory traversal vulnerability in Cybozu Mailwise 5.0.0 to 5.4.5 allows remote attackers to delete arbitrary files via unspecified vectors.2019-01-09not yet calculatedCVE-2018-0702
JVN
MISCcybozu -- officeDirectory traversal vulnerability in Cybozu Office 10.0.0 to 10.8.1 allows remote attackers to delete arbitrary files via HTTP requests.2019-01-09not yet calculatedCVE-2018-0703
JVN
MISCcybozu -- officeDirectory traversal vulnerability in Cybozu Office 10.0.0 to 10.8.1 allows remote attackers to delete arbitrary files via Keitai Screen.2019-01-09not yet calculatedCVE-2018-0704
JVN
MISCcybozu -- remote_serviceCybozu Remote Service 3.0.0 to 3.1.0 allows remote authenticated attackers to upload and execute Java code file on the server via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16169
JVN
MISCcybozu -- remote_serviceImproper countermeasure against clickjacking attack in client certificates management screen was discovered in Cybozu Remote Service 3.0.0 to 3.1.8, that allows remote attackers to trick a user to delete the registered client certificate.2019-01-09not yet calculatedCVE-2018-16172
JVN
MISCcybozu -- remote_serviceDirectory traversal vulnerability in Cybozu Remote Service 3.0.0 to 3.1.8 allows remote attackers to execute Java code file on the server via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16171
JVN
MISCcybozu -- remote_serviceDirectory traversal vulnerability in Cybozu Remote Service 3.0.0 to 3.1.8 for Windows allows remote authenticated attackers to read arbitrary files via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16170
JVN
MISCd-link -- multiple_devicesD-Link DIR-822 C1 before v3.11B01Beta, DIR-822-US C1 before v3.11B01Beta, DIR-850L A* before v1.21B08Beta, DIR-850L B* before v2.22B03Beta, and DIR-880L A* before v1.20B02Beta devices allow authentication bypass.2019-01-08not yet calculatedCVE-2018-20675
MISCd-link -- multiple_devicesD-Link DIR-822 C1 before v3.11B01Beta, DIR-822-US C1 before v3.11B01Beta, DIR-850L A* before v1.21B08Beta, DIR-850L B* before v2.22B03Beta, and DIR-880L A* before v1.20B02Beta devices allow authenticated remote command execution.2019-01-08not yet calculatedCVE-2018-20674
MISCdigital_arts -- i-filterHTTP header injection vulnerability in i-FILTER Ver.9.50R05 and earlier may allow remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks that may result in an arbitrary script injection or setting an arbitrary cookie values via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16181
MISC
JVNdigital_arts -- i-filterCross-site scripting vulnerability in i-FILTER Ver.9.50R05 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16180
MISC
JVNdjango -- django
 In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.2019-01-09not yet calculatedCVE-2019-3498
BID
MISC
MISC
MLIST
UBUNTU
DEBIAN
MISCdocker_engine -- docker_engine
 Docker Engine before 18.09 allows attackers to cause a denial of service (dockerd memory consumption) via a large integer in a --cpuset-mems or --cpuset-cpus value, related to daemon/daemon_unix.go, pkg/parsers/parsers.go, and pkg/sysinfo/sysinfo.go.2019-01-11not yet calculatedCVE-2018-20699
MISC
MISCdokan -- dokan
 Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update.2019-01-07not yet calculatedCVE-2018-5410
BID
MISC
CONFIRM
CERT-VNelfinder -- elfinder
 php/elFinder.class.php in elFinder before 2.1.45 leaks information if PHP's curl extension is enabled and safe_mode or open_basedir is not set.2019-01-10not yet calculatedCVE-2019-5884
MISC
MISCfork -- fork_cms
 Fork CMS 5.0.6 allows stored XSS via the private/en/settings facebook_admin_ids parameter (aka "Admin ids" input in the Facebook section).2019-01-09not yet calculatedCVE-2018-20682
MISCfrog_cms -- frog_cmsFrog CMS 0.9.5 allows XSS via the forgot password page (aka the /admin/?/login/forgot URI).2019-01-11not yet calculatedCVE-2019-6243
MISCfrontaccounting -- frontaccounting
 includes/db/class.reflines_db.inc in FrontAccounting 2.4.6 contains a SQL Injection vulnerability in the reference field that can allow the attacker to grab the entire database of the application via the void_transaction.php filterType parameter.2019-01-08not yet calculatedCVE-2019-5720
MISCfrrouting -- frrouting
 bgpd in FRRouting FRR (aka Free Range Routing) 2.x and 3.x before 3.0.4, 4.x before 4.0.1, 5.x before 5.0.2, and 6.x before 6.0.2 (not affecting Cumulus Linux or VyOS), when ENABLE_BGP_VNC is used for Virtual Network Control, allows remote attackers to cause a denial of service (peering session flap) via attribute 255 in a BGP UPDATE packet. This occurred during Disco in January 2019 because FRR does not implement RFC 7606, and therefore the packets with 255 were considered invalid VNC data and the BGP session was closed.2019-01-10not yet calculatedCVE-2019-5892
CONFIRM
MISC
MISC
MISC
MISC
MISC
MISCgitolite -- gitolite
 commands/rsync in Gitolite before 3.6.11, if .gitolite.rc enables rsync, mishandles the rsync command line, which allows attackers to have a "bad" impact by triggering use of an option other than -v, -n, -q, or -P.2019-01-09not yet calculatedCVE-2018-20683
MISC
MISC
MISC
MISCgnu -- binutilsload_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.2019-01-04not yet calculatedCVE-2018-20671
BID
MISC
MISCgnu -- binutilsThe demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, contains an integer overflow vulnerability (for "Create an array for saving the template argument values") that can trigger a heap-based buffer overflow, as demonstrated by nm.2019-01-04not yet calculatedCVE-2018-20673
BID
MISCgoogle -- chromeThe default selected dialog button in CustomHandlers in Google Chrome prior to 69.0.3497.81 allowed a remote attacker who convinced the user to perform certain operations to open external programs via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-16084
BID
REDHAT
CONFIRM
MISC
GENTOOgoogle -- chromeFailure to prevent navigation to top frame to data URLs in Navigation in Google Chrome on iOS prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of the current page via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-20069
CONFIRM
MISCgoogle -- chromeIncorrect handling of 304 status codes in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of the current page via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-20068
CONFIRM
MISCgoogle -- chromeA renderer initiated back navigation was incorrectly allowed to cancel a browser initiated one in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of the current page via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-20067
CONFIRM
MISCgoogle -- chromeIncorrect object lifecycle in Extensions in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-20066
CONFIRM
MISCgoogle -- chromeHandling of URI action in PDFium in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to initiate potentially unsafe navigations without a user gesture via a crafted PDF file.2019-01-09not yet calculatedCVE-2018-20065
CONFIRM
MISCgoogle -- chromeIncorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.2019-01-09not yet calculatedCVE-2018-6166
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeIncorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.2019-01-09not yet calculatedCVE-2018-6163
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeIncorrect handling of reloads in Navigation in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6165
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeInsufficient origin checks for CSS content in Blink in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6164
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeImproper deserialization in WebGL in Google Chrome on Mac prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6162
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeA heap buffer overflow in GPU in Google Chrome prior to 70.0.3538.67 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-17470
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeAn out of bounds read in PDFium in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.2019-01-09not yet calculatedCVE-2018-17461
CONFIRM
MISCgoogle -- chromeIncorrect handling of clicks in the omnibox in Navigation in Google Chrome prior to 69.0.3497.92 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-17459
REDHAT
CONFIRM
MISCgoogle -- chromeAn improper update of the WebAssembly dispatch table in WebAssembly in Google Chrome prior to 69.0.3497.92 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-17458
REDHAT
CONFIRM
MISCgoogle -- chromeAn object lifecycle issue in Blink could lead to a use after free in WebAudio in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-17457
CONFIRM
MISCgoogle -- chromeJavaScript alert handling in Prompts in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6160
BID
CONFIRM
MISC
GENTOOgoogle -- chromeIncorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.2019-01-09not yet calculatedCVE-2018-20070
CONFIRM
MISCgoogle -- chromeIncorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.2019-01-09not yet calculatedCVE-2018-6167
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeInsufficiently strict origin checks during JIT payment app installation in Payments in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to install a service worker for a domain that can host attacker controled files via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-20071
CONFIRM
MISCgoogle -- chromeInsufficient data validation in V8 builtins string generator could lead to out of bounds read and write access in V8 in Google Chrome prior to 62.0.3202.94 and allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.2019-01-09not yet calculatedCVE-2017-15428
CONFIRM
MISCgoogle -- chromeA missing check for whether a property of a JS object is private in V8 in Google Chrome prior to 55.0.2883.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.2019-01-09not yet calculatedCVE-2016-9651
REDHAT
BID
CONFIRM
MISC
GENTOO
EXPLOIT-DBgoogle -- chromeA memory corruption bug in WebAssembly could lead to out of bounds read and write through V8 in WebAssembly in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.2019-01-09not yet calculatedCVE-2017-15401
CONFIRM
MISCgoogle -- chromeUsing an ID that can be controlled by a compromised renderer which allows any frame to overwrite the page_state of any other frame in the same process in Navigation in Google Chrome on Chrome OS prior to 62.0.3202.74 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.2019-01-09not yet calculatedCVE-2017-15402
CONFIRM
MISCgoogle -- chromeInsufficient data validation in crosh could lead to a command injection under chronos privileges in Networking in Google Chrome on Chrome OS prior to 61.0.3163.113 allowed a local attacker to execute arbitrary code via a crafted HTML page.2019-01-09not yet calculatedCVE-2017-15403
CONFIRM
MISCgoogle -- chromeAn ability to process crash dumps under root privileges and inappropriate symlinks handling could lead to a local privilege escalation in Crash Reporting in Google Chrome on Chrome OS prior to 61.0.3163.113 allowed a local attacker to perform privilege escalation via a crafted HTML page.2019-01-09not yet calculatedCVE-2017-15404
CONFIRM
MISCgoogle -- chromeInappropriate symlink handling and a race condition in the stateful recovery feature implementation could lead to a persistance established by a malicious code running with root privileges in cryptohomed in Google Chrome on Chrome OS prior to 61.0.3163.113 allowed a local attacker to execute arbitrary code via a crafted HTML page.2019-01-09not yet calculatedCVE-2017-15405
CONFIRM
MISCgoogle -- chromeInsufficient enforcement of file access permission in the activeTab case in Extensions in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system via a crafted Chrome Extension.2019-01-09not yet calculatedCVE-2018-6179
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeA precision error in Skia in Google Chrome prior to 68.0.3440.75 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6153
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeEliding from the wrong side in an infobar in DevTools in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to Hide Chrome Security UI via a crafted Chrome Extension.2019-01-09not yet calculatedCVE-2018-6178
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeIncorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.2019-01-09not yet calculatedCVE-2018-6175
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeInteger overflows in Swiftshader in Google Chrome prior to 68.0.3440.75 potentially allowed a remote attacker to execute arbitrary code via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6174
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeIncorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.2019-01-09not yet calculatedCVE-2018-6173
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeIncorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.2019-01-09not yet calculatedCVE-2018-6172
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeA bad cast in PDFium in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.2019-01-09not yet calculatedCVE-2018-6170
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeLack of timeout on extension install prompt in Extensions in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to trigger installation of an unwanted extension via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6169
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeA race condition in Oilpan in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6158
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeBad cast in DevTools in Google Chrome on Win, Linux, Mac, Chrome OS prior to 66.0.3359.117 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted Chrome Extension.2019-01-09not yet calculatedCVE-2018-6151
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeA use after free in ResourceCoordinator in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-16085
BID
REDHAT
CONFIRM
MISC
GENTOOgoogle -- chromeA missing check for popup window handling in Fullscreen in Google Chrome on macOS prior to 69.0.3497.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-16080
BID
REDHAT
CONFIRM
MISC
GENTOOgoogle -- chromeUnsafe handling of credit card details in Autofill in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-16078
BID
REDHAT
CONFIRM
MISC
GENTOOgoogle -- chromeIncorrect handling of asynchronous methods in Fullscreen in Google Chrome on macOS prior to 66.0.3359.117 allowed a remote attacker to enter full screen without showing a warning via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6097
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeA race condition between permission prompts and navigations in Prompts in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-16079
BID
REDHAT
CONFIRM
MISC
GENTOOgoogle -- chromeIncorrect handling of confusable characters in URL Formatter in Google Chrome on macOS prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.2019-01-09not yet calculatedCVE-2018-6100
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeAn asynchronous generator may return an incorrect state in V8 in Google Chrome prior to 66.0.3359.117 allowing a remote attacker to potentially exploit object corruption via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6106
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromereadAsText() can indefinitely read the file picked by the user, rather than only once at the time the file is picked in File API in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to access data on the user file system without explicit consent via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6109
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeParsing documents as HTML in Downloads in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to cause Chrome to execute scripts via a local non-HTML page.2019-01-09not yet calculatedCVE-2018-6110
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeAn object lifetime issue in the developer tools network handler in Google Chrome prior to 66.0.3359.117 allowed a local attacker to execute arbitrary code via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6111
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeAllowing the chrome.debugger API to run on file:// URLs in DevTools in Google Chrome prior to 69.0.3497.81 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system without file access permission via a crafted Chrome Extension.2019-01-09not yet calculatedCVE-2018-16081
BID
REDHAT
CONFIRM
MISC
GENTOOgoogle -- chromeA JavaScript focused window could overlap the fullscreen notification in Fullscreen in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to obscure the full screen warning via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6096
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeAn out of bounds read in Swiftshader in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-16082
BID
REDHAT
CONFIRM
MISC
GENTOOgoogle -- chromeAn out of bounds read in forward error correction code in WebRTC in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-16083
BID
REDHAT
CONFIRM
MISC
GENTOO
EXPLOIT-DBgoogle -- chromeMaking URLs clickable and allowing them to be styled in DevTools in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6112
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeImproper handling of pending navigation entries in Navigation in Google Chrome on iOS prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6113
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeIncorrect enforcement of CSP for <object> tags in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass content security policy via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6114
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeConfusing settings in Autofill in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6117
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeAn integer overflow that could lead to an attacker-controlled heap out-of-bounds write in PDFium in Google Chrome prior to 66.0.3359.170 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.2019-01-09not yet calculatedCVE-2018-6120
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeA missing check for JS-simulated input events in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to download arbitrary files with no user input via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-16088
REDHAT
CONFIRM
MISC
GENTOOgoogle -- chromeLack of proper state tracking in Permissions in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-16087
REDHAT
CONFIRM
MISC
GENTOOgoogle -- chromeMissing bounds check in PDFium in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.2019-01-09not yet calculatedCVE-2018-16076
BID
REDHAT
CONFIRM
MISC
GENTOOgoogle -- chromeInsufficient origin checks in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak cross-origin data via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6093
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeLack of secure text entry mode in Browser UI in Google Chrome on Mac prior to 67.0.3396.62 allowed a local attacker to obtain potentially sensitive information from process memory via a local process.2019-01-09not yet calculatedCVE-2018-6147
BID
SECTRACK
REDHAT
CONFIRM
MISC
DEBIANgoogle -- chromeEarly free of object in use in IndexDB in Google Chrome prior to 67.0.3396.62 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6127
BID
SECTRACK
REDHAT
CONFIRM
MISC
DEBIANgoogle -- chromeOff-by-one error in PDFium in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory write via a crafted PDF file.2019-01-09not yet calculatedCVE-2018-6144
BID
SECTRACK
REDHAT
CONFIRM
MISC
DEBIANgoogle -- chromeInsufficient validation in V8 in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6143
BID
SECTRACK
REDHAT
CONFIRM
MISC
DEBIANgoogle -- chromeInsufficient validation of an image filter in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6141
BID
SECTRACK
REDHAT
CONFIRM
MISC
DEBIANgoogle -- chromeAllowing the chrome.debugger API to attach to Web UI pages in DevTools in Google Chrome prior to 67.0.3396.62 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.2019-01-09not yet calculatedCVE-2018-6140
BID
SECTRACK
REDHAT
CONFIRM
MISC
DEBIANgoogle -- chromeInsufficient target checks on the chrome.debugger API in DevTools in Google Chrome prior to 67.0.3396.62 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.2019-01-09not yet calculatedCVE-2018-6139
BID
SECTRACK
REDHAT
CONFIRM
MISC
DEBIANgoogle -- chromeCSS Paint API in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to leak cross-origin data via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6137
BID
SECTRACK
REDHAT
CONFIRM
MISC
DEBIANgoogle -- chromeLack of clearing the previous site before loading alerts from a new one in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform domain spoofing via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6135
BID
SECTRACK
REDHAT
CONFIRM
MISC
DEBIANgoogle -- chromeIncorrect handling of confusable characters in URL Formatter in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.2019-01-09not yet calculatedCVE-2018-6133
BID
SECTRACK
REDHAT
CONFIRM
MISC
DEBIANgoogle -- chromeA precision error in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6126
BID
BID
SECTRACK
SECTRACK
REDHAT
REDHAT
REDHAT
CONFIRM
MISC
GENTOO
DEBIAN
DEBIAN
EXPLOIT-DBgoogle -- chromeService Workers can intercept any request made by an <embed> or <object> tag in Fetch API in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak cross-origin data via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6091
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeType confusion in ReadableStreams in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6124
BID
SECTRACK
REDHAT
CONFIRM
MISC
DEBIANgoogle -- chromeA use after free in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6123
BID
SECTRACK
REDHAT
CONFIRM
MISC
DEBIANgoogle -- chromeA Javascript reentrancy issues that caused a use-after-free in V8 in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-16065
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeA use after free in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-16066
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeMissing validation in Mojo in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-16068
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chromeA use after free in WebRTC in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted video file.2019-01-09not yet calculatedCVE-2018-16071
BID
REDHAT
CONFIRM
MISC
GENTOO
EXPLOIT-DBgoogle -- chromeA missing origin check related to HLS manifests in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass same origin policy via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-16072
BID
CONFIRM
MISC
GENTOOgoogle -- chromeType confusion could lead to a heap out-of-bounds write in V8 in Google Chrome prior to 64.0.3282.168 allowing a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-6056
BID
REDHAT
CONFIRM
MISC
DEBIANgoogle -- chromeInsufficiently sanitized distributed objects in Updater in Google Chrome on macOS prior to 66.0.3359.117 allowed a local attacker to execute arbitrary code via an executable file.2019-01-09not yet calculatedCVE-2018-6084
BID
BID
CONFIRM
MISC
EXPLOIT-DBgoogle -- chromeA use after free in WebAudio in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.2019-01-09not yet calculatedCVE-2018-16067
BID
REDHAT
CONFIRM
MISC
GENTOO
DEBIANgoogle -- chrome
 Insufficient data validation on image data in PDFium in Google Chrome prior to 51.0.2704.63 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.2019-01-09not yet calculatedCVE-2016-10403
CONFIRM
MISCibm -- api_connectIBM API Connect 5.0.0.0 through 5.0.8.4 is affected by a vulnerability in the role-based access control in the management server that could allow an authenticated user to obtain highly sensitive information. IBM X-Force ID: 153175.2019-01-08not yet calculatedCVE-2018-1932
CONFIRM
BID
XFibm -- i_access_for_windowsAn untrusted search path vulnerability in IBM i Access for Windows versions 7.1 and earlier on Windows can allow arbitrary code execution via a Trojan horse DLL in the current working directory, related to use of the LoadLibrary function. IBM X-Force ID: 152079.2019-01-04not yet calculatedCVE-2018-1888
BID
XF
CONFIRMibm -- jazz_reporting_serviceIBM Jazz Reporting Service (JRS) 6.0.3, 6.0.4, 6.0.5, and 6.0.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152785.2019-01-08not yet calculatedCVE-2018-1918
CONFIRM
BID
XFibm -- spectrum_scaleIBM Spectrum Scale (GPFS) 4.1.1, 4.2.0, 4.2.1, 4.2.2, 4.2.3, and 5.0.0 where the use of Local Read Only Cache (LROC) is enabled may caused read operation on a file to return data from a different file. IBM X-Force ID: 154440.2019-01-08not yet calculatedCVE-2018-1993
BID
XF
CONFIRMimperva -- securesphereImperva SecureSphere running v12.0.0.50 is vulnerable to local arbitrary code execution, escaping sealed-mode.2019-01-10not yet calculatedCVE-2018-5412
EXPLOIT-DBimperva -- securesphereImperva SecureSphere running v13.0, v12.0, or v11.5 allows low privileged users to add SSH login keys to the admin user, resulting in privilege escalation.2019-01-10not yet calculatedCVE-2018-5413
EXPLOIT-DBimperva -- securesphere_gatewayImperva SecureSphere gateway (GW) running v13, for both pre-First Time Login or post-First Time Login (FTL), if the attacker knows the basic authentication passwords, the GW may be vulnerable to RCE through specially crafted requests, from the web access management interface.2019-01-10not yet calculatedCVE-2018-5403
EXPLOIT-DBintel -- nuc_firmware
 Improper setting of device configuration in system firmware for Intel(R) NUC kits may allow a privileged user to potentially enable escalation of privilege via physical access.2019-01-10not yet calculatedCVE-2017-3718
CONFIRMintel -- optane_ssd_dc_p4800xFirmware update routine in bootloader for Intel(R) Optane(TM) SSD DC P4800X before version E2010435 may allow a privileged user to potentially enable a denial of service via local access.2019-01-10not yet calculatedCVE-2018-12167
CONFIRMintel -- optane_ssd_dc_p4800xInsufficient write protection in firmware for Intel(R) Optane(TM) SSD DC P4800X before version E2010435 may allow a privileged user to potentially enable a denial of service via local access.2019-01-10not yet calculatedCVE-2018-12166
CONFIRMintel -- proset/wireless_wifi_softwareImproper directory permissions in the ZeroConfig service in Intel(R) PROSet/Wireless WiFi Software before version 20.90.0.7 may allow an authorized user to potentially enable escalation of privilege via local access.2019-01-10not yet calculatedCVE-2018-12177
CONFIRMintel -- sgx_sdk_and_platform_software_for_windowImproper file verification in install routine for Intel(R) SGX SDK and Platform Software for Windows before 2.2.100 may allow an escalation of privilege via local access.2019-01-10not yet calculatedCVE-2018-18098
CONFIRMintel -- ssd_data_center_tool_for_windowsImproper directory permissions in the installer for the Intel(R) SSD Data Center Tool for Windows before v3.0.17 may allow authenticated users to potentially enable an escalation of privilege via local access.2019-01-10not yet calculatedCVE-2018-3703
CONFIRMintel -- system_support_utility_for_windowsInsufficient path checking in Intel(R) System Support Utility for Windows before 2.5.0.15 may allow an authenticated user to potentially enable an escalation of privilege via local access.2019-01-10not yet calculatedCVE-2019-0088
CONFIRMirssi -- irssi
 Irssi 1.1.x before 1.1.2 has a use after free when hidden lines are expired from the scroll buffer.2019-01-09not yet calculatedCVE-2019-5882
MISC
MISC
MISCjapan_atomic_energy_agency -- mapping_toolUntrusted search path vulnerability in Installer of Mapping Tool 2.0.1.6 and 2.0.1.7 allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.2019-01-09not yet calculatedCVE-2018-16176
MISC
JVNjenkins -- jenkinsAn improper authorization vulnerability exists in Jenkins Jira Plugin 3.0.1 and earlier in JiraSite.java that allows attackers with Overall/Read access to have Jenkins connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.2019-01-09not yet calculatedCVE-2018-1000412
CONFIRMjenkins -- jenkinsAn improper authorization vulnerability exists in Jenkins Crowd 2 Integration Plugin 2.0.0 and earlier in CrowdSecurityRealm.java that allows attackers to have Jenkins perform a connection test, connecting to an attacker-specified server with attacker-specified credentials and connection settings.2019-01-09not yet calculatedCVE-2018-1000422
CONFIRMjenkins -- jenkinsA cross-site scripting vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/model/Api.java that allows attackers to specify URLs to Jenkins that result in rendering arbitrary attacker-controlled HTML by Jenkins.2019-01-09not yet calculatedCVE-2018-1000407
CONFIRMjenkins -- jenkinsA denial of service vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java that allows attackers without Overall/Read permission to access a specific URL on instances using the built-in Jenkins user database security realm that results in the creation of an ephemeral user record in memory.2019-01-09not yet calculatedCVE-2018-1000408
CONFIRMjenkins -- jenkinsA session fixation vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/security/HudsonPrivateSecurityRealm.java that prevented Jenkins from invalidating the existing session and creating a new one when a user signed up for a new user account.2019-01-09not yet calculatedCVE-2018-1000409
CONFIRMjenkins -- jenkinsA cross-site scripting vulnerability exists in Jenkins Git Changelog Plugin 2.6 and earlier in GitChangelogSummaryDecorator/summary.jelly, GitChangelogLeftsideBuildDecorator/badge.jelly, GitLogJiraFilterPostPublisher/config.jelly, GitLogBasicChangelogPostPublisher/config.jelly that allows attackers able to control the Git history parsed by the plugin to have Jenkins render arbitrary HTML on some pages.2019-01-09not yet calculatedCVE-2018-1000426
CONFIRMjenkins -- jenkinsAn insufficiently protected credentials vulnerability exists in Jenkins SonarQube Scanner Plugin 2.8 and earlier in SonarInstallation.java that allows attackers with local file system access to obtain the credentials used to connect to SonarQube.2019-01-09not yet calculatedCVE-2018-1000425
CONFIRMjenkins -- jenkinsAn insufficiently protected credentials vulnerability exists in Jenkins Crowd 2 Integration Plugin 2.0.0 and earlier in CrowdSecurityRealm.java, CrowdConfigurationService.java that allows attackers with local file system access to obtain the credentials used to connect to Crowd 2.2019-01-09not yet calculatedCVE-2018-1000423
CONFIRMjenkins -- jenkinsAn improper authorization vulnerability exists in Jenkins Mesos Plugin 0.17.1 and earlier in MesosCloud.java that allows attackers with Overall/Read access to initiate a test connection to an attacker-specified Mesos server with attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.2019-01-09not yet calculatedCVE-2018-1000421
CONFIRMjenkins -- jenkinsA cross-site request forgery vulnerability exists in Jenkins JUnit Plugin 1.25 and earlier in TestObject.java that allows setting the description of a test result.2019-01-09not yet calculatedCVE-2018-1000411
CONFIRMjenkins -- jenkinsAn improper authorization vulnerability exists in Jenkins Mesos Plugin 0.17.1 and earlier in MesosCloud.java that allows attackers with Overall/Read access to obtain credentials IDs for credentials stored in Jenkins.2019-01-09not yet calculatedCVE-2018-1000420
CONFIRMjenkins -- jenkinsAn improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to obtain credentials IDs for credentials stored in Jenkins.2019-01-09not yet calculatedCVE-2018-1000419
CONFIRMjenkins -- jenkinsAn improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to send test notifications to an attacker-specified HipChat server with attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.2019-01-09not yet calculatedCVE-2018-1000418
CONFIRMjenkins -- jenkinsA cross-site request forgery vulnerability exists in Jenkins Email Extension Template Plugin 1.0 and earlier in ExtEmailTemplateManagement.java that allows creating or removing templates.2019-01-09not yet calculatedCVE-2018-1000417
CONFIRMjenkins -- jenkinsA reflected cross-site scripting vulnerability exists in Jenkins Job Config History Plugin 2.18 and earlier in all Jelly files that shows arbitrary attacker-specified HTML in Jenkins to users with Job/Configure access.2019-01-09not yet calculatedCVE-2018-1000416
CONFIRMjenkins -- jenkinsAn information exposure vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier, and the Stapler framework used by these releases, in core/src/main/java/org/kohsuke/stapler/RequestImpl.java, core/src/main/java/hudson/model/Descriptor.java that allows attackers with Overall/Administer permission or access to the local file system to obtain credentials entered by users if the form submission could not be successfully processed.2019-01-09not yet calculatedCVE-2018-1000410
CONFIRMjenkins -- jenkinsA cross-site request forgery vulnerability exists in Jenkins Config File Provider Plugin 3.1 and earlier in ConfigFilesManagement.java, FolderConfigFileAction.java that allows creating and editing configuration file definitions.2019-01-09not yet calculatedCVE-2018-1000414
CONFIRMjenkins -- jenkinsA cross-site scripting vulnerability exists in Jenkins Config File Provider Plugin 3.1 and earlier in configfiles.jelly, providerlist.jelly that allows users with the ability to configure configuration files to insert arbitrary HTML into some pages in Jenkins.2019-01-09not yet calculatedCVE-2018-1000413
CONFIRMjenkins -- jenkinsA cross-site scripting vulnerability exists in Jenkins Rebuilder Plugin 1.28 and earlier in RebuildAction/BooleanParameterValue.jelly, RebuildAction/ExtendedChoiceParameterValue.jelly, RebuildAction/FileParameterValue.jelly, RebuildAction/LabelParameterValue.jelly, RebuildAction/ListSubversionTagsParameterValue.jelly, RebuildAction/MavenMetadataParameterValue.jelly, RebuildAction/NodeParameterValue.jelly, RebuildAction/PasswordParameterValue.jelly, RebuildAction/RandomStringParameterValue.jelly, RebuildAction/RunParameterValue.jelly, RebuildAction/StringParameterValue.jelly, RebuildAction/TextParameterValue.jelly, RebuildAction/ValidatingStringParameterValue.jelly that allows users with Job/Configuration permission to insert arbitrary HTML into rebuild forms.2019-01-09not yet calculatedCVE-2018-1000415
CONFIRMjenkins -- jenkinsAn insufficiently protected credentials vulnerability exists in Jenkins Artifactory Plugin 2.16.1 and earlier in ArtifactoryBuilder.java, CredentialsConfig.java that allows attackers with local file system access to obtain old credentials configured for the plugin before it integrated with Credentials Plugin.2019-01-09not yet calculatedCVE-2018-1000424
CONFIRMjenkins -- jenkins
 A path traversal vulnerability exists in Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/hudson/model/FileParameterValue.java that allows attackers with Job/Configure permission to define a file parameter with a file name outside the intended directory, resulting in an arbitrary file write on the Jenkins master when scheduling a build.2019-01-09not yet calculatedCVE-2018-1000406
CONFIRMjpcert_coordination_center -- logontracerLogonTracer 1.2.0 and earlier allows remote attackers to conduct Python code injection attacks via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16168
MISC
MISCjpcert_coordination_center -- logontracerCross-site scripting vulnerability in LogonTracer 1.2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16165
MISC
MISCjpcert_coordination_center -- logontracerLogonTracer 1.2.0 and earlier allows remote attackers to conduct XML External Entity (XXE) attacks via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16166
MISC
MISCjpcert_coordination_center -- logontracerLogonTracer 1.2.0 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16167
MISC
MISClib60870 -- lib60870
 An issue was discovered in lib60870 2.1.1. LinkLayer_setAddress in link_layer/link_layer.c has a NULL pointer dereference.2019-01-11not yet calculatedCVE-2019-6137
MISClibiec61850 -- libiec61850An issue has been found in libIEC61850 v1.3.1. Ethernet_setProtocolFilter in hal/ethernet/linux/ethernet_linux.c has a SEGV, as demonstrated by sv_subscriber_example.c and sv_subscriber.c.2019-01-11not yet calculatedCVE-2019-6136
MISClibiec61850 -- libiec61850
 An issue has been found in libIEC61850 v1.3.1. Memory_malloc and Memory_calloc in hal/memory/lib_memory.c have memory leaks when called from mms/iso_mms/common/mms_value.c, server/mms_mapping/mms_mapping.c, and server/mms_mapping/mms_sv.c (via common/string_utilities.c), as demonstrated by iec61850_9_2_LE_example.c.2019-01-11not yet calculatedCVE-2019-6138
MISClibiec61850 -- libiec61850
 An issue has been found in libIEC61850 v1.3.1. Memory_malloc in hal/memory/lib_memory.c has a memory leak when called from Asn1PrimitiveValue_create in mms/asn1/asn1_ber_primitive_value.c, as demonstrated by goose_publisher_example.c and iec61850_9_2_LE_example.c.2019-01-11not yet calculatedCVE-2019-6135
MISC
MISClibpng -- libpng
 png_create_info_struct in png.c in libpng 1.6.36 has a memory leak, as demonstrated by pngcp.2019-01-11not yet calculatedCVE-2019-6129
MISClibtiff -- libtiff
 The TIFFFdOpen function in tif_unix.c in LibTIFF 4.0.10 has a memory leak, as demonstrated by pal2rgb.2019-01-11not yet calculatedCVE-2019-6128
MISC

linux -- linux_kernel
 

The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.2019-01-07not yet calculatedCVE-2019-5489
MISC
BID
MISC
MISC
MISC
MISC

linux -- linux_kernel
 

EARCLINK ESPCMS-P8 has SQL injection in the install_pack/index.php?ac=Member&at=verifyAccount verify_key parameter. install_pack/espcms_public/espcms_db.php may allow retrieving sensitive information from the ESPCMS database.2019-01-07not yet calculatedCVE-2019-5488
MISClockon -- ec-cubeOpen redirect vulnerability in EC-CUBE (EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3.0.4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15, EC-CUBE 3.0.16) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16191
JVN
MISCmate_desktop_environment -- mate-screensavermate-screensaver before 1.20.2 in MATE Desktop Environment allows physically proximate attackers to view screen content and possibly control applications. By unplugging and re-plugging or power-cycling external output devices (such as additionally attached graphical outputs via HDMI, VGA, DVI, etc.) the content of a screensaver-locked session can be revealed. In some scenarios, the attacker can execute applications, such as by clicking with a mouse.2019-01-09not yet calculatedCVE-2018-20681
MISC
MISC
MISC
MISCmcafee -- web_gateway
 Improper input validation in the proxy component of McAfee Web Gateway 7.8.2.0 and later allows remote attackers to cause a denial of service via a crafted HTTP request parameter.2019-01-09not yet calculatedCVE-2019-3581
CONFIRMmicronet -- inplcINplc-RT 3.08 and earlier allows remote attackers to bypass authentication to execute an arbitrary command through the protocol-compliant traffic. This is a different vulnerability than CVE-2018-0670.2019-01-09not yet calculatedCVE-2018-0669
MISC
JVNmicronet -- inplcBuffer overflow in INplc-RT 3.08 and earlier allows remote attackers to cause denial-of-service (DoS) condition that may result in executing arbtrary code via unspecified vectors.2019-01-09not yet calculatedCVE-2018-0668
MISC
JVNmicronet -- inplcPrivilege escalation vulnerability in INplc-RT 3.08 and earlier allows an attacker with administrator rights to execute arbitrary code on the Windows system via unspecified vectors.2019-01-09not yet calculatedCVE-2018-0671
MISC
JVNmicronet -- inplcINplc-RT 3.08 and earlier allows remote attackers to bypass authentication to execute an arbitrary command through the protocol-compliant traffic. This is a different vulnerability than CVE-2018-0669.2019-01-09not yet calculatedCVE-2018-0670
MISC
JVNmicronet -- inplc
 Untrusted search path vulnerability in Installer of INplc SDK Express 3.08 and earlier and Installer of INplc SDK Pro+ 3.08 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.2019-01-09not yet calculatedCVE-2018-0667
MISC
JVNmicrosoft -- .net_frameworkAn information disclosure vulnerability exists in .NET Framework and .NET Core which allows bypassing Cross-origin Resource Sharing (CORS) configurations, aka ".NET Framework Information Disclosure Vulnerability." This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2, Microsoft .NET Framework 4.7/4.7.1/4.7.2, .NET Core 2.1, Microsoft .NET Framework 4.7.1/4.7.2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, .NET Core 2.2, Microsoft .NET Framework 4.7.2.2019-01-08not yet calculatedCVE-2019-0545
BID
REDHAT
CONFIRMmicrosoft -- asp.net_coreA denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka "ASP.NET Core Denial of Service Vulnerability." This affects ASP.NET Core 2.2, ASP.NET Core 2.1. This CVE ID is unique from CVE-2019-0564.2019-01-08not yet calculatedCVE-2019-0548
BID
REDHAT
CONFIRMmicrosoft -- edgeAn elevation of privilege vulnerability exists in Microsoft Edge Browser Broker COM object, aka "Microsoft Edge Elevation of Privilege Vulnerability." This affects Microsoft Edge.2019-01-08not yet calculatedCVE-2019-0566
BID
CONFIRMmicrosoft -- edge_and_chakracoreA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2019-0539, CVE-2019-0567.2019-01-08not yet calculatedCVE-2019-0568
BID
CONFIRMmicrosoft -- edge_and_chakracoreA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2019-0567, CVE-2019-0568.2019-01-08not yet calculatedCVE-2019-0539
BID
CONFIRMmicrosoft -- edge_and_chakracoreA remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2019-0539, CVE-2019-0568.2019-01-08not yet calculatedCVE-2019-0567
BID
CONFIRMmicrosoft -- exchange_serverA remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka "Microsoft Exchange Memory Corruption Vulnerability." This affects Microsoft Exchange Server.2019-01-08not yet calculatedCVE-2019-0586
BID
CONFIRMmicrosoft -- exchange_server
 An information disclosure vulnerability exists when the Microsoft Exchange PowerShell API grants calendar contributors more view permissions than intended, aka "Microsoft Exchange Information Disclosure Vulnerability." This affects Microsoft Exchange Server.2019-01-08not yet calculatedCVE-2019-0588
BID
CONFIRMmicrosoft -- multiple_productsAn information disclosure vulnerability exists when Microsoft Word macro buttons are used improperly, aka "Microsoft Word Information Disclosure Vulnerability." This affects Microsoft Word, Office 365 ProPlus, Microsoft Office, Word.2019-01-08not yet calculatedCVE-2019-0561
BID
CONFIRMmicrosoft -- multiple_productsA remote code execution vulnerability exists in the way that the MSHTML engine inproperly validates input, aka "MSHTML Engine Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Office Word Viewer, Internet Explorer 9, Internet Explorer 11, Microsoft Excel Viewer, Internet Explorer 10, Office 365 ProPlus.2019-01-08not yet calculatedCVE-2019-0541
BID
CONFIRMmicrosoft -- multiple_productsA remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka "Microsoft Word Remote Code Execution Vulnerability." This affects Word, Microsoft Office, Microsoft Office Word Viewer, Office 365 ProPlus, Microsoft SharePoint, Microsoft Office Online Server, Microsoft Word, Microsoft SharePoint Server.2019-01-08not yet calculatedCVE-2019-0585
BID
CONFIRMmicrosoft -- multiple_productsA cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft Office SharePoint XSS Vulnerability." This affects Microsoft SharePoint Server, Microsoft SharePoint, Microsoft Business Productivity Servers. This CVE ID is unique from CVE-2019-0556, CVE-2019-0557.2019-01-08not yet calculatedCVE-2019-0558
BID
CONFIRMmicrosoft -- sharepointA cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft Office SharePoint XSS Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2019-0557, CVE-2019-0558.2019-01-08not yet calculatedCVE-2019-0556
BID
CONFIRMmicrosoft -- sharepointAn elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint Server, Microsoft SharePoint.2019-01-08not yet calculatedCVE-2019-0562
BID
CONFIRMmicrosoft -- sharepoint
 A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft Office SharePoint XSS Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2019-0556, CVE-2019-0558.2019-01-08not yet calculatedCVE-2019-0557
BID
CONFIRMmicrosoft -- skype_for_androidAn elevation of privilege vulnerability exists when Skype for Andriod fails to properly handle specific authentication requests, aka "Skype for Android Elevation of Privilege Vulnerability." This affects Skype 8.35.2019-01-08not yet calculatedCVE-2019-0622
BID
CONFIRMmicrosoft -- visual_studioA remote code execution vulnerability exists in Visual Studio when the C++ compiler improperly handles specific combinations of C++ constructs, aka "Visual Studio Remote Code Execution Vulnerability." This affects Microsoft Visual Studio.2019-01-08not yet calculatedCVE-2019-0546
BID
CONFIRMmicrosoft -- visual_studioAn information disclosure vulnerability exists when Visual Studio improperly discloses arbitrary file contents if the victim opens a malicious .vscontent file, aka "Microsoft Visual Studio Information Disclosure Vulnerability." This affects Microsoft Visual Studio.2019-01-08not yet calculatedCVE-2019-0537
BID
CONFIRMmicrosoft -- windowsAn elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations, aka "Windows Data Sharing Service Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers. This CVE ID is unique from CVE-2019-0572, CVE-2019-0573, CVE-2019-0574.2019-01-08not yet calculatedCVE-2019-0571
BID
CONFIRMmicrosoft -- windowsAn elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka "Windows Runtime Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows Server 2019, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.2019-01-08not yet calculatedCVE-2019-0570
BID
CONFIRMmicrosoft -- windowsAn information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0536, CVE-2019-0549, CVE-2019-0554.2019-01-08not yet calculatedCVE-2019-0569
BID
CONFIRMmicrosoft -- windowsA remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.2019-01-08not yet calculatedCVE-2019-0538
BID
CONFIRMmicrosoft -- windowsA remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Windows Hyper-V Remote Code Execution Vulnerability." This affects Windows 10 Servers, Windows 10, Windows Server 2019. This CVE ID is unique from CVE-2019-0551.2019-01-08not yet calculatedCVE-2019-0550
BID
CONFIRMmicrosoft -- windowsAn information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0536, CVE-2019-0554, CVE-2019-0569.2019-01-08not yet calculatedCVE-2019-0549
BID
CONFIRMmicrosoft -- windowsAn elevation of privilege vulnerability exists when Windows improperly handles authentication requests, aka "Microsoft Windows Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.2019-01-08not yet calculatedCVE-2019-0543
BID
CONFIRMmicrosoft -- windowsAn elevation of privilege vulnerability exists in the Microsoft XmlDocument class that could allow an attacker to escape from the AppContainer sandbox in the browser, aka "Microsoft XmlDocument Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows Server 2019, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.2019-01-08not yet calculatedCVE-2019-0555
BID
CONFIRMmicrosoft -- windowsAn information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0536, CVE-2019-0549, CVE-2019-0569.2019-01-08not yet calculatedCVE-2019-0554
BID
CONFIRMmicrosoft -- windowsAn information disclosure vulnerability exists when Windows Subsystem for Linux improperly handles objects in memory, aka "Windows Subsystem for Linux Information Disclosure Vulnerability." This affects Windows 10 Servers, Windows 10, Windows Server 2019.2019-01-08not yet calculatedCVE-2019-0553
BID
CONFIRMmicrosoft -- windowsAn elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations, aka "Windows Data Sharing Service Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers. This CVE ID is unique from CVE-2019-0571, CVE-2019-0572, CVE-2019-0574.2019-01-08not yet calculatedCVE-2019-0573
BID
CONFIRMmicrosoft -- windowsAn elevation of privilege exists in Windows COM Desktop Broker, aka "Windows COM Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2019, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.2019-01-08not yet calculatedCVE-2019-0552
BID
CONFIRMmicrosoft -- windowsA remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Windows Hyper-V Remote Code Execution Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers. This CVE ID is unique from CVE-2019-0550.2019-01-08not yet calculatedCVE-2019-0551
BID
CONFIRMmicrosoft -- windowsAn elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations, aka "Windows Data Sharing Service Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers. This CVE ID is unique from CVE-2019-0571, CVE-2019-0573, CVE-2019-0574.2019-01-08not yet calculatedCVE-2019-0572
BID
CONFIRMmicrosoft -- windowsA remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.2019-01-08not yet calculatedCVE-2019-0576
BID
CONFIRMmicrosoft -- windowsAn elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations, aka "Windows Data Sharing Service Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers. This CVE ID is unique from CVE-2019-0571, CVE-2019-0572, CVE-2019-0573.2019-01-08not yet calculatedCVE-2019-0574
BID
CONFIRMmicrosoft -- windowsA remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.2019-01-08not yet calculatedCVE-2019-0577
BID
CONFIRMmicrosoft -- windowsA remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.2019-01-08not yet calculatedCVE-2019-0581
BID
CONFIRMmicrosoft -- windowsA remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0583, CVE-2019-0584.2019-01-08not yet calculatedCVE-2019-0582
BID
CONFIRMmicrosoft -- windowsA remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.2019-01-08not yet calculatedCVE-2019-0578
BID
CONFIRMmicrosoft -- windowsA remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.2019-01-08not yet calculatedCVE-2019-0579
BID
CONFIRMmicrosoft -- windowsA remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.2019-01-08not yet calculatedCVE-2019-0580
BID
CONFIRMmicrosoft -- windowsA remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0584.2019-01-08not yet calculatedCVE-2019-0583
BID
CONFIRMmicrosoft -- windowsA remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583.2019-01-08not yet calculatedCVE-2019-0584
BID
CONFIRMmicrosoft -- windowsA remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.2019-01-08not yet calculatedCVE-2019-0575
BID
CONFIRMmicrosoft -- windows
 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0549, CVE-2019-0554, CVE-2019-0569.2019-01-08not yet calculatedCVE-2019-0536
BID
CONFIRMmizuho_bank -- mizuho_direct_app_for_androidThe Mizuho Direct App for Android version 3.13.0 and earlier does not verify server certificates, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.2019-01-09not yet calculatedCVE-2018-16179
MISC
MISCmodulemd -- modulemd
 modulemd 1.3.1 and earlier uses an unsafe function for processing externally provided data, leading to remote code execution.2019-01-10not yet calculatedCVE-2017-1002157
CONFIRMnec -- aterm_wf1200cr_and_aterm_wg1200crAterm WF1200CR and Aterm WG1200CR (Aterm WF1200CR firmware Ver1.1.1 and earlier, Aterm WG1200CR firmware Ver1.0.1 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands via SOAP interface of UPnP.2019-01-09not yet calculatedCVE-2018-16195
MISC
JVNnec -- aterm_wf1200cr_and_aterm_wg1200crAterm WF1200CR and Aterm WG1200CR (Aterm WF1200CR firmware Ver1.1.1 and earlier, Aterm WG1200CR firmware Ver1.0.1 and earlier) allow an attacker on the same network segment to obtain information registered on the device via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16192
MISC
JVNnec -- aterm_wf1200cr_and_aterm_wg1200crCross-site scripting vulnerability in Aterm WF1200CR and Aterm WG1200CR (Aterm WF1200CR firmware Ver1.1.1 and earlier, Aterm WG1200CR firmware Ver1.0.1 and earlier) allows authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16193
MISC
JVNnec -- aterm_wf1200cr_and_aterm_wg1200crAterm WF1200CR and Aterm WG1200CR (Aterm WF1200CR firmware Ver1.1.1 and earlier, Aterm WG1200CR firmware Ver1.0.1 and earlier) allows authenticated attackers to execute arbitrary OS commands via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16194
MISC
JVNnelson -- open_source_erp
 Nelson Open Source ERP v6.3.1 allows SQL Injection via the db/utils/query/data.xml query parameter.2019-01-10not yet calculatedCVE-2019-5893
MISC
EXPLOIT-DBnetapp -- oncommand_unified_manager_for_7-modeOnCommand Unified Manager for 7-Mode (core package) prior to 5.2.4 uses cookies that lack the secure attribute in certain circumstances making it vulnerable to impersonation via man-in-the-middle (MITM) attacks.2019-01-07not yet calculatedCVE-2018-5481
CONFIRMnippon_telegraph_and_telephone_west_corporation -- security_measures_toolUntrusted search path vulnerability in The installer of Windows10 Fall Creators Update Modify module for Security Measures tool allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.2019-01-09not yet calculatedCVE-2018-16177
MISC
JVNnpm -- cordova-plugin-ionic-webviewDirectory traversal vulnerability in cordova-plugin-ionic-webview versions prior to 2.2.0 (not including 2.0.0-beta.0, 2.0.0-beta.1, 2.0.0-beta.2, and 2.1.0-0) allows remote attackers to access arbitrary files via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16202
MISC
JVN
MISCopenssh -- openssh
 In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename.2019-01-10not yet calculatedCVE-2018-20685
BID
MISC
MISCpanasonic -- bn-sdwbp3_firmwareBuffer overflow in BN-SDWBP3 firmware version 1.0.9 and earlier allows an attacker on the same network segment to execute arbitrary code via unspecified vectors.2019-01-09not yet calculatedCVE-2018-0678
JVN
MISCpanasonic -- bn-sdwbp3_firmwareBN-SDWBP3 firmware version 1.0.9 and earlier allows attacker with administrator rights on the same network segment to execute arbitrary OS commands via unspecified vectors.2019-01-09not yet calculatedCVE-2018-0677
JVN
MISCpanasonic -- bn-sdwbp3_firmware
 BN-SDWBP3 firmware version 1.0.9 and earlier allows an attacker on the same network segment to bypass authentication to access to the management screen and execute an arbitrary command via unspecified vectors.2019-01-09not yet calculatedCVE-2018-0676
JVN
MISCpanasonic -- multiple_pcsAn unquoted search path vulnerability in some pre-installed applications on Panasonic PC run on Windows 7 (32bit), Windows 7 (64bit), Windows 8 (64bit), Windows 8.1 (64bit), Windows 10 (64bit) delivered in or later than October 2009 allow local users to gain privileges via a Trojan horse executable file and execute arbitrary code with eleveted privileges.2019-01-09not yet calculatedCVE-2018-16183
JVN
MISCpgpool -- global_development_group_pgpooladminPgpoolAdmin 4.0 and earlier allows remote attackers to bypass the login authentication and obtain the administrative privilege of the PostgreSQL database via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16203
JVN
MISCphpscriptsmall.com -- advance_peer_to_peer_mlm_scriptThe Admin Panel of PHP Scripts Mall Advance Peer to Peer MLM Script v1.7.0 allows remote attackers to bypass intended access restrictions by directly navigating to admin/dashboard.php or admin/user.php, as demonstrated by disclosure of information about users and staff.2019-01-11not yet calculatedCVE-2019-6126
MISCphpscriptsmall.com -- citysearch_/_hotfrog_/_gelbeseiten_clone_scriptPHP Scripts Mall Citysearch / Hotfrog / Gelbeseiten Clone Script 2.0.1 has Reflected XSS via the srch parameter, as demonstrated by restaurants-details.php.2019-01-12not yet calculatedCVE-2019-6248
MISCpivotal -- concoursePivotal Concourse, all versions prior to 4.2.2, puts the user access token in a url during the login flow. A remote attacker who gains access to a user's browser history could obtain the access token and use it to authenticate as the user.2019-01-11not yet calculatedCVE-2019-3803
CONFIRMpolicykit -- policykit
 In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.2019-01-11not yet calculatedCVE-2019-6133
MISC
MISC
MISC
MISCqibosoft -- qibosoft
 qibosoft through V7 allows remote attackers to read arbitrary files via the member/index.php main parameter, as demonstrated by SSRF to a URL on the same web site to read a .sql file.2019-01-08not yet calculatedCVE-2019-5725
MISCrakuten_securities -- market_speedUntrusted search path vulnerability in the installer of MARKET SPEED Ver.16.4 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.2019-01-09not yet calculatedCVE-2018-16182
JVN
MISCred_hat -- satellite
 A cross-site scripting (XSS) flaw was found in the katello component of Satellite. An attacker with privilege to create/edit organizations and locations is able to execute a XSS attacks against other users through the Subscriptions or the Red Hat Repositories wizards. This can possibly lead to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Versions before 3.9.0 are vulnerable.2019-01-12not yet calculatedCVE-2018-16887
CONFIRMricoh -- interactive_whiteboardRICOH Interactive Whiteboard D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400) allows remote attackers to execute arbitrary commands via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16184
JVN
MISCricoh -- interactive_whiteboardThe RICOH Interactive Whiteboard D2200 V1.3 to V2.2, D5500 V1.3 to V2.2, D5510 V1.3 to V2.2, the display versions with RICOH Interactive Whiteboard Controller Type1 V1.3 to V2.2 attached (D5520, D6500, D6510, D7500, D8400), and the display versions with RICOH Interactive Whiteboard Controller Type2 V3.0 to V3.1.10137.0 attached (D5520, D6510, D7500, D8400) does not verify its server certificates, which allows man-in-the-middle attackers to eversdrop on encrypted communication.2019-01-09not yet calculatedCVE-2018-16187
JVN
MISCricoh -- interactive_whiteboardRICOH Interactive Whiteboard D2200 V1.1 to V2.2, D5500 V1.1 to V2.2, D5510 V1.1 to V2.2, the display versions with RICOH Interactive Whiteboard Controller Type1 V1.1 to V2.2 attached (D5520, D6500, D6510, D7500, D8400), and the display versions with RICOH Interactive Whiteboard Controller Type2 V3.0 to V3.1.10137.0 attached (D5520, D6510, D7500, D8400) uses hard-coded credentials, which may allow an attacker on the same network segments to login to the administrators settings screen and change the configuration.2019-01-09not yet calculatedCVE-2018-16186
JVN
MISCricoh -- interactive_whiteboardRICOH Interactive Whiteboard D2200 V1.1 to V2.2, D5500 V1.1 to V2.2, D5510 V1.1 to V2.2, the display versions with RICOH Interactive Whiteboard Controller Type1 V1.1 to V2.2 attached (D5520, D6500, D6510, D7500, D8400), and the display versions with RICOH Interactive Whiteboard Controller Type2 V3.0 to V3.1.10137.0 attached (D5520, D6510, D7500, D8400) allows remote attackers to execute a malicious program.2019-01-09not yet calculatedCVE-2018-16185
JVN
MISCricoh -- interactive_whiteboard
 SQL injection vulnerability in the RICOH Interactive Whiteboard D2200 V1.3 to V2.2, D5500 V1.3 to V2.2, D5510 V1.3 to V2.2, the display versions with RICOH Interactive Whiteboard Controller Type1 V1.3 to V2.2 attached (D5520, D6500, D6510, D7500, D8400), and the display versions with RICOH Interactive Whiteboard Controller Type2 V3.0 to V3.1.10137.0 attached (D5520, D6510, D7500, D8400) allows remote attackers to execute arbitrary SQL commands via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16188
JVN
MISCsap -- business_objects_mobile_for_androidSAP Business Objects Mobile for Android (before 6.3.5) application allows an attacker to provide malicious input in the form of a SAP BI link, preventing legitimate users from accessing the application by crashing it.2019-01-08not yet calculatedCVE-2019-0240
BID
MISC
MISCsap -- bw/4hanaUnder some circumstances, masterdata maintenance in SAP BW/4HANA (fixed in DW4CORE version 1.0 (SP08)) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.2019-01-08not yet calculatedCVE-2019-0243
BID
MISC
MISCsap -- cloud_connectorSAP Cloud Connector, before version 2.11.3, allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.2019-01-08not yet calculatedCVE-2019-0247
MISC
MISCsap -- cloud_connectorSAP Cloud Connector, before version 2.11.3, does not perform any authentication checks for functionalities that require user identity.2019-01-08not yet calculatedCVE-2019-0246
BID
MISC
MISCsap -- commerce
 SAP Commerce (previously known as SAP Hybris Commerce), before version 6.7, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.2019-01-08not yet calculatedCVE-2019-0238
BID
MISC
MISCsap -- crm_webclient_uiSAP CRM WebClient UI (fixed in SAPSCORE 1.12; S4FND 1.02; WEBCUIF 7.31, 7.46, 7.47, 7.48, 8.0, 8.01) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.2019-01-08not yet calculatedCVE-2019-0244
BID
MISC
MISCsap -- crm_webclient_uiSAP CRM WebClient UI (fixed in SAPSCORE 1.12; S4FND 1.02; WEBCUIF 7.31, 7.46, 7.47, 7.48, 8.0, 8.01) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.2019-01-08not yet calculatedCVE-2019-0245
BID
MISC
MISCsap -- enterprise_financial_servicesSAP Enterprise Financial Services (fixed in SAPSCORE 1.13, 1.14, 1.15; S4CORE 1.01, 1.02, 1.03; EA-FINSERV 1.10, 2.0, 5.0, 6.0, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0; Bank/CFM 4.63_20) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.2019-01-08not yet calculatedCVE-2018-2484
BID
MISC
MISCsap -- financial_consolidation_cube_designerA security weakness in SAP Financial Consolidation Cube Designer (BOBJ_EADES fixed in versions 8.0, 10.1) may allow an attacker to discover the password hash of an admin user.2019-01-08not yet calculatedCVE-2018-2499
BID
MISC
MISCsap -- gateway_of_abap_application_serverUnder certain conditions SAP Gateway of ABAP Application Server (fixed in SAP_GWFND 7.5, 7.51, 7.52, 7.53; SAP_BASIS 7.5) allows an attacker to access information which would otherwise be restricted.2019-01-08not yet calculatedCVE-2019-0248
BID
MISC
MISCsap -- landscape_managementUnder certain conditions SAP Landscape Management (VCM 3.0) allows an attacker to access information which would otherwise be restricted.2019-01-08not yet calculatedCVE-2019-0249
BID
MISC
MISCsap -- work_and_inventory_managerSAP Work and Inventory Manager (Agentry_SDK , before 7.0, 7.1) allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.2019-01-08not yet calculatedCVE-2019-0241
BID
MISC
MISCseiko_epson -- printers_and_scannersHTTP header injection vulnerability in SEIKO EPSON printers and scanners (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7) may allow a remote attackers to lead a user to a phishing site or execute an arbitrary script on the user's web browser.2019-01-09not yet calculatedCVE-2018-0689
JVN
MISCseiko_epson -- printers_and_scannersOpen redirect vulnerability in SEIKO EPSON printers and scanners (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the web interface of the affected product.2019-01-09not yet calculatedCVE-2018-0688
JVN
MISCshopxo -- shopxoAn issue was discovered in ShopXO 1.2.0. In the UnlinkDir method of the FileUtil.php file, the input parameters are not checked, resulting in input mishandling by the rmdir method. Attackers can delete arbitrary files by using "../" directory traversal.2019-01-10not yet calculatedCVE-2019-5887
MISCshopxo -- shopxo
 An issue was discovered in ShopXO 1.2.0. In the application\install\controller\Index.php file, there is no validation lock file in the Add method, which allows an attacker to reinstall the database. The attacker can write arbitrary code to database.php during system reinstallation.2019-01-10not yet calculatedCVE-2019-5886
MISCsvgpp -- svgppAn issue was discovered in Anti-Grain Geometry (AGG) 2.4 as used in SVG++ (aka svgpp) 1.2.3. A heap-based buffer overflow bug in svgpp_agg_render may lead to code execution. In the render_scanlines_aa_solid function, the blend_hline function is called repeatedly multiple times. blend_hline is equivalent to a loop containing write operations. Each call writes a piece of heap data, and multiple calls overwrite the data in the heap.2019-01-12not yet calculatedCVE-2019-6247
MISCsvgpp -- svgppAn issue was discovered in SVG++ (aka svgpp) 1.2.3. After calling the gil::get_color function in Generic Image Library in Boost, the return code is used as an address, leading to an Access Violation because of an out-of-bounds read.2019-01-12not yet calculatedCVE-2019-6246
MISCsvgpp -- svgpp
 An issue was discovered in Anti-Grain Geometry (AGG) 2.4 as used in SVG++ (aka svgpp) 1.2.3. In the function agg::cell_aa::not_equal, dx is assigned to (x2 - x1). If dx >= dx_limit, which is (16384 << poly_subpixel_shift), this function will call itself recursively. There can be a situation where (x2 - x1) is always bigger than dx_limit during the recursion, leading to continual stack consumption.2019-01-12not yet calculatedCVE-2019-6245
MISCsystemd-journald -- systemd-journaldAn out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.2019-01-11not yet calculatedCVE-2018-16866
BID
CONFIRM
UBUNTU
MISCsystemd-journald -- systemd-journaldAn allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.2019-01-11not yet calculatedCVE-2018-16865
BID
CONFIRM
UBUNTU
MISCsystemd-journald -- systemd-journald
 An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.2019-01-11not yet calculatedCVE-2018-16864
BID
CONFIRM
UBUNTU
MISC

toshiba -- toshiba_home_gateway_hem-gw16a_and_
hem-gw26a

Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier allows an attacker on the same network segment to bypass access restriction to access the information and files stored on the affected device.2019-01-09not yet calculatedCVE-2018-16197
MISC
JVNtoshiba -- toshiba_home_gateway_hem-gw16a_and_
hem-gw26aToshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier may allow an attacker on the same network segment to access a non-documented developer screen to perform operations on the affected device.2019-01-09not yet calculatedCVE-2018-16198
MISC
JVNtoshiba -- toshiba_home_gateway_hem-gw16a_and_
hem-gw26aCross-site scripting vulnerability in Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier allows an remote attacker to inject arbitrary web script or HTML via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16199
MISC
JVNtoshiba -- toshiba_home_gateway_hem-gw16a_and_
hem-gw26aToshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier allows an attacker on the same network segment to execute arbitrary OS commands.2019-01-09not yet calculatedCVE-2018-16200
MISC
JVNtoshiba -- toshiba_home_gateway_hem-gw16a_and_
hem-gw26aToshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier uses hard-coded credentials, which may allow an attacker on the same network segment to login to the administrators settings screen and change the configuration or execute arbitrary OS commands.2019-01-09not yet calculatedCVE-2018-16201
MISC
JVNtraccar -- traccar_server
 In Traccar Server version 4.2, protocol/SpotProtocolDecoder.java might allow XXE attacks.2019-01-09not yet calculatedCVE-2019-5748
MISC
MISCusualtoolcms -- usualtoolcms
 An issue was discovered in UsualToolCMS 8.0. cmsadmin/a_sqlbackx.php?t=sql allows CSRF attacks that can execute SQL statements, and consequently execute arbitrary PHP code by writing that code into a .php file.2019-01-11not yet calculatedCVE-2019-6244
MISCweseek -- growiCross-site scripting vulnerability in GROWI v3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via New Page modal.2019-01-09not yet calculatedCVE-2018-16205
JVN
MISCweseek -- growi
 Cross-site scripting vulnerability in GROWI v3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.2019-01-09not yet calculatedCVE-2018-0698
JVN
MISCwindows -- dhcp_clientA memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client, aka "Windows DHCP Client Remote Code Execution Vulnerability." This affects Windows 10, Windows 10 Servers.2019-01-08not yet calculatedCVE-2019-0547
BID
CONFIRMwinscp -- winscp
 In WinSCP before 5.14 beta, due to missing validation, the scp implementation would accept arbitrary files sent by the server, potentially overwriting unrelated files. This affects TSCPFileSystem::SCPSink in core/ScpFileSystem.cpp.2019-01-10not yet calculatedCVE-2018-20684
BID
MISC
MISC
MISCwireshark -- wiresharkIn Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the RTSE dissector and other ASN.1 dissectors could crash. This was addressed in epan/charsets.c by adding a get_t61_string length check.2019-01-08not yet calculatedCVE-2019-5718
BID
MISC
MISC
MISCwireshark -- wiresharkIn Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the ISAKMP dissector could crash. This was addressed in epan/dissectors/packet-isakmp.c by properly handling the case of a missing decryption data block.2019-01-08not yet calculatedCVE-2019-5719
MISC
MISC
MISCwireshark -- wiresharkIn Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the P_MUL dissector could crash. This was addressed in epan/dissectors/packet-p_mul.c by rejecting the invalid sequence number of zero.2019-01-08not yet calculatedCVE-2019-5717
BID
MISC
MISC
MISCwireshark -- wiresharkIn Wireshark 2.4.0 to 2.4.11, the ENIP dissector could crash. This was addressed in epan/dissectors/packet-enip.c by changing the memory-management approach so that a use-after-free is avoided.2019-01-08not yet calculatedCVE-2019-5721
MISC
MISC
MISCwireshark -- wireshark
 In Wireshark 2.6.0 to 2.6.5, the 6LoWPAN dissector could crash. This was addressed in epan/dissectors/packet-6lowpan.c by avoiding use of a TVB before its creation.2019-01-08not yet calculatedCVE-2019-5716
BID
MISC
MISC
MISCwordpress -- wordpressCross-site scripting vulnerability in WordPress plugin spam-byebye 2.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.2019-01-12not yet calculatedCVE-2018-16206
JVN
MISCwordpress -- wordpressSQL injection vulnerability in the LearnPress prior to version 3.1.0 allows attacker with administrator rights to execute arbitrary SQL commands via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16175
JVN
MISCwordpress -- wordpressOpen redirect vulnerability in LearnPress prior to version 3.1.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16174
JVN
MISCwordpress -- wordpressCross-site scripting vulnerability in LearnPress prior to version 3.1.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16173
JVN
MISCwordpress -- wordpress
 The "Social Pug - Easy Social Share Buttons" plugin before 1.2.6 for WordPress allows XSS via the wp-admin/admin.php?page=dpsp-toolkit dpsp_message_class parameter.2019-01-09not yet calculatedCVE-2016-10736
MISCwordpress -- wordpress
 Cross-site scripting vulnerability in Event Calendar WD version 1.1.21 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16164
JVN
MISC
MISC
MISCwordpress -- wordpress
 Cross-site scripting vulnerability in Google XML Sitemaps Version 4.0.9 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16204
JVN
MISCxiaocms -- xiaocms
 An issue was discovered in XiaoCms 20141229. It allows admin/index.php?c=database table[] SQL injection. This can be used for PHP code execution via "INTO OUTFILE" with a .php filename.2019-01-11not yet calculatedCVE-2019-6127
MISCxterm.js -- xterm.js
 A remote code execution vulnerability exists in Xterm.js when the component mishandles special characters, aka "Xterm Remote Code Execution Vulnerability." This affects xterm.js.2019-01-09not yet calculatedCVE-2019-0542
BID
MISCyamaha -- multiple_routers
 Yamaha routers RT57i Rev.8.00.95 and earlier, RT58i Rev.9.01.51 and earlier, NVR500 Rev.11.00.36 and earlier, RTX810 Rev.11.01.31 and earlier, allow an administrative user to embed arbitrary scripts to the configuration data through a certain form field of the configuration page, which may be executed on another administrative user's web browser. This is a different vulnerability from CVE-2018-0666.2019-01-09not yet calculatedCVE-2018-0665
MISC
MISC
JVN
MISCyamaha -- multiple_routers
 Yamaha routers RT57i Rev.8.00.95 and earlier, RT58i Rev.9.01.51 and earlier, NVR500 Rev.11.00.36 and earlier, RTX810 Rev.11.01.31 and earlier, allow an administrative user to embed arbitrary scripts to the configuration data through a certain form field of the configuration page, which may be executed on another administrative user's web browser. This is a different vulnerability from CVE-2018-0665.2019-01-09not yet calculatedCVE-2018-0666
MISC
MISC
JVN
MISCyokogawa -- multiple_products
 Buffer overflow in the license management function of YOKOGAWA products (iDefine for ProSafe-RS R1.16.3 and earlier, STARDOM VDS R7.50 and earlier, STARDOM FCN/FCJ Simulator R4.20 and earlier, ASTPLANNER R15.01 and earlier, TriFellows V5.04 and earlier) allows remote attackers to stop the license management function or execute an arbitrary program via unspecified vectors.2019-01-09not yet calculatedCVE-2018-0651
BID
MISC
MISCyokogawa -- multiple_products
 Multiple Yokogawa products that contain Vnet/IP Open Communication Driver (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90)) allows remote attackers to cause a denial of service attack that may result in stopping Vnet/IP Open Communication Driver's communication via unspecified vectors.2019-01-09not yet calculatedCVE-2018-16196
BID
MISC
MISCBack to top

This product is provided subject to this Notification and this Privacy & Use policy.


World's Longest Aircraft Gets Full-Production Go-Ahead

Slashdot - Mon, 01/14/2019 - 18:10
The Airlander 10 -- the world's longest aircraft -- is set to go into full production with the model designed to take its first passengers. "It comes after the prototype Airlander 10 -- a combined plane and airship -- was formally retired following successful final testing," reports the BBC. "As a result, Bedford firm Hybrid Air Vehicles (HAV) has been given Production Organization Approval from the Civil Aviation Authority (CAA)." From the report: An eyewitness said the aircraft appeared to "break in two" after breaking its moorings and deflating, in November that year, less than 24 hours after completing its sixth successful test flight. The firm was given Design Organization Approval from the European Aviation Safety Agency (Easa) in October. Stephen McGlennan, HAV's chief executive, said 2018 had been very good, with Easa's backing a "huge highlight." He said the firm had changed its focus last year towards the production of Airlander 10 as a commercial aircraft for customers. "The prototype served its purpose as the world's first full-sized hybrid aircraft, providing us with the data we needed to move forward from prototype to production standard," he said. It is now hoped the full commercial model will take to the skies with its first paying passengers "in the early 2020s." Approval from the CAA and Easa now puts the firm in a "strong position to launch production."

Read more of this story at Slashdot.

Battlefield 5's Poor Sales Numbers Have Become a Disaster For Electronic Arts

Slashdot - Mon, 01/14/2019 - 15:07
dryriver writes: Electronic Arts has mismanaged the Battlefield franchise in the past -- BF3 and BF4 were not great from a gameplay perspective -- but with Battlefield 5, Electronic Arts is facing a real disaster that has sent its stock plummeting on the stock exchanges. First came the fierce cultural internet backlash from gamers to the Battlefield 5 reveal trailer -- EA tried to inject so much 21st Century gender diversity and Hollywood action-movie style fighting into what was supposed to be a reasonably historically accurate WWII shooter trailer, that many gamers felt the game would be "a seriously inauthentic portrayal of what WW2 warfare really was like." Then the game sold very poorly after a delayed launch date -- far less than the mildly successful WW1 shooter Battlefield 1 for example -- and is currently discounted by 33% to 50% at all major game retailers to try desperately to push sales numbers up. This was also a disaster for Nvidia, as Battlefield 5 was the tentpole title supposed to entice gamers into buying expensive new realtime ray-tracing Nvidia 2080 RTX GPUs. Electronic Arts had to revise its earnings estimates for 2019, some hedge funds sold off their EA stock, fearing low sales and stiff competition from popular Battle Royal games like Fortnite and PUBG, and EA stock is currently 45% down from its peak value in July 2018. EA had already become seriously unpopular with gamers because of annoying Battlefield franchise in-game mechanisms such as heaving to buy decent-aiming-accuracy weapons with additional cash, having to constantly pay for additional DLC content and game maps, and the very poor multiplayer gameplay of its two Star Wars: Battlefront titles (essentially Battlefield with laser blasters set in the Star Wars Universe). It seems that with Battlefield 5, EA -- not a company known for listening to its customers -- finally hit a brick wall, in the form of many Battlefield fans simply not buying or playing Battlefield 5.

Read more of this story at Slashdot.

A Neural Network Can Learn To Recognize the World It Sees Into Concepts

Slashdot - Mon, 01/14/2019 - 13:05
An anonymous reader quotes a report from MIT Technology Review: As good as they are at causing mischief, researchers from the MIT-IBM Watson AI Lab realized GANs, or generative adversarial networks, are also a powerful tool: because they paint what they're "thinking," they could give humans insight into how neural networks learn and reason. [T]he researchers began probing a GAN's learning mechanics by feeding it various photos of scenery -- trees, grass, buildings, and sky. They wanted to see whether it would learn to organize the pixels into sensible groups without being explicitly told how. Stunningly, over time, it did. By turning "on" and "off" various "neurons" and asking the GAN to paint what it thought, the researchers found distinct neuron clusters that had learned to represent a tree, for example. Other clusters represented grass, while still others represented walls or doors. In other words, it had managed to group tree pixels with tree pixels and door pixels with door pixels regardless of how these objects changed color from photo to photo in the training set. Not only that, but the GAN seemed to know what kind of door to paint depending on the type of wall pictured in an image. It would paint a Georgian-style door on a brick building with Georgian architecture, or a stone door on a Gothic building. It also refused to paint any doors on a piece of sky. Without being told, the GAN had somehow grasped certain unspoken truths about the world. Being able to identify which clusters correspond to which concepts makes it possible to control the neural network's output. The team has now released an app called GANpaint that turns this newfound ability into an artistic tool. It allows you to turn on specific neuron clusters to paint scenes of buildings in grassy fields with lots of doors. Beyond its silliness as a playful outlet, it also speaks to the greater potential of this research.

Read more of this story at Slashdot.

GNOME Internet Radio Locator 1.6.0 Released

Slashdot - Mon, 01/14/2019 - 11:33
Longtime Slashdot reader ole writes: GNOME Internet Radio Locator 1.6.0 is now freely available for GNOME systems. The 1.6.0 release is a stable release with Internet radio stations from Norway, Sweden, Denmark, England, Scotland, France and Belgium, as well as U.S.A., Canada, Mexico and Guatemala, mapped for GNOME Maps and city text search interface with auto-completion for 76 world cities that are featured in this release. You may download the 1.6.0 release of GNOME Internet Radio Locator here and download packages for Fedora 28 and 29 on x86_64 here

Read more of this story at Slashdot.

200 Million Chinese Resumes Leak In Huge Database Breach

Slashdot - Mon, 01/14/2019 - 10:02
According to a report from HackenProof, a database containing resumes of over 200 million job seekers in China was exposed last month. "The leaked info included not just the name and working experience of people, but also their mobile phone number, email, marriage status, children, politics, height, weight, driver license, and literacy level as well," reports The Next Web. From the report: Bob Diachenko, Director of Cyber Risk Research at Hacken.io and bug bounty platform HackenProof, found an unprotected instance of MongoDB containing these resumes on December 28. Diachenko found the resumes in the open database search engines Shodan and BinaryEdge. The 854GB database didn't have any password protection and was open to anyone to read. Diachenko wasn't able to identify who generated the database or who owned it, but a now-defunct GitHub code repository featured a code that used an identical data structure to the leaked database. The database contained scraped data from multiple Chinese classified websites like bj.58.com. However, in a blog post, the website's spokesperson denied the leak. Interestingly, the database was taken down as soon as Diachenko posted about the database on Twitter. Sadly, the MongoDB log showed at least a dozen IP addresses that read the instance before it went off the grid.

Read more of this story at Slashdot.

Vuln: GNU Binutils CVE-2018-20712 Heap Buffer Overflow Vulnerability

SecurityFocus Vulnerabilities/Bugtraq - Mon, 01/14/2019 - 08:00
GNU Binutils CVE-2018-20712 Heap Buffer Overflow Vulnerability

Vuln: Identicard Premisys Multiple Security Vulnerabilities

SecurityFocus Vulnerabilities/Bugtraq - Mon, 01/14/2019 - 08:00
Identicard Premisys Multiple Security Vulnerabilities

Arborists Are Bringing the 'Dinosaur of Trees' Back To Life

Slashdot - Mon, 01/14/2019 - 07:23
Arborists are cloning saplings from the stumps of the world's largest, strongest, and longest-lived trees -- felled for timber more than a century ago -- to create redwood "super groves" that can help fight climate change. "Using saplings made from the basal sprouts of these super trees to plant new groves in temperate countries around the world means the growths have a better chance than most to become giants themselves," reports Quartz. "Their ancestors grew up to 400 ft (122 m) tall and to 35 ft in diameter, after all, larger than the largest living redwood today, a giant sequoia in California's Sequoia National Park." From the report: Already, super saplings from the project are thriving in groves in Canada, England, Wales, France, New Zealand, and Australia. None of these locales are places where coastal redwoods grow naturally, but they all have cool temperatures and sufficient fog for the redwoods, which drink moisture from the air in summer rather than relying on rain. [David Milarch, founder of the Archangel Ancient Tree Archive, a U.S. nonprofit that propagates the world's largest trees] calls this "assisted migration." Last month, his organization planted another such grove in the Presidio in San Francisco, California. The park lies along the U.S. west's redwood corridor, which runs from Oregon to California, home to the stumps the saplings were cloned from. But 95% of giant growths there were cut long ago. Many of the redwoods along the corridor now are young trees. Milarch notes that as the local climate is getting hotter and less foggy, it's no longer as conducive to producing the mega growths of yore. Now, 75 saplings created from the basal sprouts of the most rugged and massive ancient tree stumps of the coastal region will grow in the Presidio. They may eventually become the hardiest and tallest trees around, if their ancestors are any indication.

Read more of this story at Slashdot.

Apple's AirPower Wireless Charging Mat Is In Production

Slashdot - Mon, 01/14/2019 - 05:21
Apple's long-delayed AirPower wireless charging mat might finally be in production. According to a tweet from ChargerLAB, a "credible source" says that Apple has begun manufacturing the long-delayed wireless charging mat. The Verge reports: If true, it could mean that the long-overdue product could finally reach the hands of consumers before too much longer. Apple announced in September 2017, that it was introducing wireless charging capabilities in with the iPhone 8 and iPhone X, and gave a preview for its own wireless charging mat that would not only charge the iPhone, but its Apple Watch and AirPods. At the time, Apple didn't announce a price -- only that it was expected to be released sometime in 2018. That obviously didn't happen... If what ChargerLAB says is accurate, that could mean that we'll see more about them in the near future. The site's tweet says that the devices are being manufactured at Luxshare Precision, which already manufactures Apple's AirPods and some cords. MacRumors translated a screenshot of ChargerLAB's WeChat conversation, in which the site's source expects the device be released soon. But given the charger's history of delays and technical challenges, it's probably best not to get one's hopes up just yet.

Read more of this story at Slashdot.

Aaron Swartz's Federal Judge Gives Anonymous Hacker 10 Years In Prison For DDoS Attacks On Children's Hospitals

Slashdot - Mon, 01/14/2019 - 04:20
Danngggg writes: Many will remember Martin Gottesfeld since he was arrested on a speedboat coming from Cuba. He volunteered at trial that he and his wife had just been denied political asylum by Castro. Gottesfeld has said he did it to defend the life of an innocent child named Justina Pelletier. On Thursday, the same judge that over saw the Aaron Swartz case sentenced the Anonymous hacktivist to 10 years in federal prison for a DDoS of Boston Children's Hospital, Harvard-affiliated hospitals, and Wayside Youth and Family. The sentence included $440,000 in restitution, 3 years supervised release, and other conditions. The week before, Gottesfeld docketed a 690-page affidavit (including exhibits) documenting the judge's conflicts of interest and why he doesn't belong anywhere near the case. That's available on the FreeMartyG website. Local news spoke to his wife after the sentencing hearing as well.

Read more of this story at Slashdot.

Plants Can Hear Animals Using Their Flowers

Slashdot - Mon, 01/14/2019 - 03:19
An anonymous reader shares an excerpt from a report via The Atlantic: The latest experiments in this niche but increasingly vocal field come from Lilach Hadany and Yossi Yovel at Tel Aviv University. In one set, they showed that some plants can hear the sounds of animal pollinators and react by rapidly sweetening their nectar. In a second set, they found that other plants make high-pitched noises that lie beyond the scope of human hearing but can nonetheless be detected some distance away. After the team released early copies of two papers describing their work, not yet published in a scientific journal, I ran them past several independent researchers. Some of these researchers have argued that plants are surprisingly communicative; others have doubted the idea. Their views on the new studies, however, didn't fall along obvious partisan lines. Almost unanimously, they loved the paper asserting that plants can hear and were skeptical about the one reporting that plants make noise. Those opposite responses to work done by the same team underscore how controversial this line of research still is, and how hard it is to study the sensory worlds of organisms that are so different from us. First, two team members, Marine Veits and Itzhak Khait, checked whether beach evening primroses could hear. In both lab experiments and outdoor trials, they found that the plants would react to recordings of a bee's wingbeats by increasing the concentration of sugar in their nectar by about 20 percent. They did so in response only to the wingbeats and low frequency, pollinator-like sounds, not to those of higher pitch. And they reacted very quickly, sweetening their nectar in less than three minutes. That's probably fast enough to affect a visiting bee, but even if that insect flies away too quickly, the plant is ready to better entice the next visitor. After all, the presence of one pollinator almost always means that there are more around. But if plants can hear, what are their ears? The team's answer is surprising, yet tidy: It's the flowers themselves. They used lasers to show that the primrose's petals vibrate when hit by the sounds of a bee's wingbeats. If they covered the blooms with glass jars, those vibrations never happened, and the nectar never sweetened. The flower, then, could act like the fleshy folds of our outer ears, channeling sound further into the plant. (Where? No one knows yet!)

Read more of this story at Slashdot.

Pedestrians, E-Scooters Are Clashing In the Struggle For Sidewalk Space

Slashdot - Mon, 01/14/2019 - 02:18
Slashdot reader mileshigh writes: Activists in California have filed a federal lawsuit alleging that parked scooters littering sidewalks interfere with sidewalk accessibility for people with multiple types of disabilities and violate the Americans with Disabilities Act (ADA). Many people have been wondering when this would happen since California courts are notoriously friendly to ADA complaints and lawsuits. Realistically, this type of lawsuit may well be the Achilles' heel of scooter-sharing services, especially if they're granted class-action status as this lawsuit is requesting. Will likely be the first of many. "Without full use of the sidewalk and curb ramps at street intersections, persons with mobility and/or visual impairments have significant barriers in crossing from a pedestrian walkway to a street," the suit alleges. "This is exacerbated when the sidewalk itself is full of obstructions and no longer able to be fully and freely used by people with disabilities." The suit accuses the city of not maintaining streets and sidewalks in a way that doesn't discriminate against the disabled and allowing "dockless scooters used primarily for recreational purposes to proliferate unchecked throughout San Diego and to block safe and equal access for people with disabilities." The lawsuit also alleges the scooter companies have been allowed to "appropriate the public commons for their own profit."

Read more of this story at Slashdot.

Elon Musk Offered Chinese Green Card

Slashdot - Mon, 01/14/2019 - 01:17
hackingbear writes: During Elon Musk's trip to China for the ground-breaking of Tesla's first overseas factory, which will allow it to sell vehicles directly in the world's largest market for electric vehicles, he was offered a Chinese green card when he met with Premier Li Keqiang on Wednesday in Beijing, where they discussed Tesla's China ambitions. "I love China and want to come here more often," Musk was quoted as saying in the report. "If you do, we can issue you a Chinese green card," the premier replied. Getting a Chinese "green card" has been described as "one of the most difficult tasks in the world." By 2017, only about 10,000 foreigners had been granted permanent residency since the program was introduced in 2004, out of an estimated 1 million foreigners living in China; recipients include Dutch scientist Bernard Feringa, who won the 2016 Nobel Prize in chemistry.

Read more of this story at Slashdot.

Huawei Fires Employee Arrested In Poland Over Alleged Spying

Slashdot - Sun, 01/13/2019 - 23:15
Chinese tech giant Huawei has fired Weijing Wang, an employee recently arrested in Poland over spying allegations despite security officials saying the espionage wasn't directly tied to the company. The staffer brought the company into "disrepute," according to a statement. Police also arrested a Polish citizen in connection to the case. Engadget reports: The incident comes at a particularly bad time for Huawei. On top of general distrust sparked by Western governments and intelligence agencies, CFO Wangzhou Meng is facing extradition to the U.S. over accusations she helped avoid sanctions. People are already suspicious, and the arrest doesn't do the company any favors. Moreover, there are already potential consequences. Polish internal affairs minister Joachim Brudzinski has asked the European Union and NATO to coordinate any potential bans on Huawei gear. While Poland is still willing to work with China, the official wanted countries to clarify their stances. There's already been talk of reviewing Huawei's involvement in Poland's 5G network, and this might exacerbate the situation.

Read more of this story at Slashdot.

The US Government Has Amassed Terabytes of Internal WikiLeaks Data

Slashdot - Sun, 01/13/2019 - 22:14
An anonymous reader shares an excerpt from a Gizmodo report, written by national security reporter and transparency activist Emma Best: Late last year, the U.S. government accidentally revealed that a sealed complaint had been filed against Julian Assange, the founder of WikiLeaks. Shortly before this was made public, the FBI reconfirmed its investigation of WikiLeaks was ongoing, and the Wall Street Journal reported that the Department of Justice was optimistic that it would be able to extradite Assange. Soon after, portions of sealed transcripts leaked that implicate WikiLeaks and Assange in directing hackers to target governments and corporations. The charges against Assange have not been officially revealed, though it's plausible that the offenses are related to Russian hacking and the DNC emails. The alleged offenses in the complaint notwithstanding, the government has an abundance of data to work with: over a dozen WikiLeaks' computers, hard drives, and email accounts, including those of the organization's current and former editors-in-chief, along with messages exchanged with alleged Russian hackers about DNC emails. Through a series of search warrants, subpoenas, equipment seizures, and cooperating witnesses, the federal government has collected internal WikiLeaks data covering the majority of the organization's period of operations, from 2009 at least through 2017. In some instances, the seized data has been returned and allegedly destroyed, such as in the case of David House, a technologist and friend of Chelsea Manning when she famously became a source for WikiLeaks. In others, the seized materials include communications between WikiLeaks and their sources. Some of these discussions show WikiLeaks discussing their other sources and specific identifying details about them. Other seizures gave authorities a deeper view of the internal workings of WikiLeaks, including one of the earliest known seizures of WikiLeaks-related data, executed on December 14, 2010, when the messages and user information of several WikiLeaks-linked Twitter accounts were ordered. This search-and-seizure order included direct messages associated with WikiLeaks and its founder, former Army private first class and WikiLeaks source Chelsea Manning, WikiLeaks editor Rop Gongrijp, former WikiLeaks associate Jacob Appelbaum, and former WikiLeaks associate and Icelandic MP Birgitta Jonsdottir, between November 1, 2009, and the order's execution.

Read more of this story at Slashdot.

Is Elon Musk Serious About Building A Flying Tesla?

Slashdot - Sun, 01/13/2019 - 19:34
An anonymous reader quotes Inc: It's inevitable, really. Musk's two largest companies, Tesla Motors and SpaceX, make electric cars and rockets.... Musk tweeted about a "SpaceX option package" for the next Tesla Roadster in June of last year. The upgrade was described as including about "10 small rocket thrusters arranged seamlessly around car. These rocket engines dramatically improve acceleration, top speed, braking & cornering. Maybe they will even allow a Tesla to fly..." Musk then hinted even more strongly at the possibility of a flying Tesla this week when he retweeted a GIF of a flying DeLorean from "Back to the Future," saying: "The new Roadster will actually do something like this." He then went on to describe how small SpaceX air thrusters will be used to essentially turn a Tesla Roadster into a hovercraft or perhaps... something with an even higher vertical range. Two years ago Musk insisted flying cars were noisy and annoyed the people on the ground -- although you could argue this shows he'd been thinking about the mechanics of flying cars, and when it's an appropriate time to use rocket thrusters. Inc's headline? "Elon Musk Has Plans For a Tesla / SpaceX Flying Car (And He's Serious. Probably."

Read more of this story at Slashdot.

Earth's Magnetic Field Is Acting Up and Geologists Don't Know Why

Slashdot - Sun, 01/13/2019 - 16:34
schwit1 quotes Nature: Something strange is going on at the top of the world. Earth's north magnetic pole has been skittering away from Canada and towards Siberia, driven by liquid iron sloshing within the planet's core. The magnetic pole is moving so quickly that it has forced the world's geomagnetism experts into a rare move. [T]hey are set to update the World Magnetic Model, which describes the planet's magnetic field and underlies all modern navigation, from the systems that steer ships at sea to Google Maps on smartphones. The most recent version of the model came out in 2015 and was supposed to last until 2020 -- but the magnetic field is changing so rapidly that researchers have to fix the model now. "The error is increasing all the time," says Arnaud Chulliat, a geomagnetist at the University of Colorado Boulder and the National Oceanic and Atmospheric Administration's (NOAA's) National Centers for Environmental Information.... By early 2018, the World Magnetic Model was in trouble. Researchers from NOAA and the British Geological Survey in Edinburgh had been doing their annual check of how well the model was capturing all the variations in Earth's magnetic field. They realized that it was so inaccurate that it was about to exceed the acceptable limit for navigational errors. Nature's article was updated on January 9th to inform readers that the release of the corrected World Magnetic Model, which should restore accuracy through the end of 2019, has now been postponed from January 15th to January 30th -- "due to the ongoing US government shutdown."

Read more of this story at Slashdot.

Ask Slashdot: Is Today's Technology As Cool As You'd Predicted When You Were Young?

Slashdot - Sun, 01/13/2019 - 13:34
"How does the actual, purchaseable consumer technology available in 2019 compare to what you -- back in the 1960s, '70s, '80s or '90s -- thought consumer technology might look like around the year 2020?" asks Slashdot reader dryriver. Is today's consumer technology as advanced, inventive, groundbreaking and empowering as you imagined it would be 30, 40, 50 years ago? Or is the "technological future that has now actually arrived" different, in various ways, from how you'd hoped/imagined it might be a few decades back? If so, what was different in your "future technologies imagination" than what is available to buy today? Each generation received different dreams from the pop culture of their time. Back in 1969 an 18-year-old Kurt Russell starred in a Disney movie with a malfunctioning mainframe. By 1984 one TV series showed David Hasselhoff with his own talking self-driving car. But how close did your own personal predictions come, asks the original submission. "Do today's technological gadgets manage to live up to how you imagined tech around the year 2020 would be, or do they fall short of what you hoped/imagined might exist by today?

Read more of this story at Slashdot.

Old People Can Produce As Many New Brain Cells As Teenagers

Slashdot - Sun, 01/13/2019 - 10:38
Long-time Slashdot reader Futurepower(R) shares this article about a newly-published study which counters previous theories that neurons stop developing after adolescence: Healthy men and women continue to produce new neurons throughout life, suggesting older people remain more cognitively and emotionally intact than previously believed, researchers found. For decades it was thought that adult brains were hard-wired and unable to form new cells. But a Columbia University study found older people continued to produce neurons in the hippocampus -- a part of the brain important for memory, emotion and cognition -- at a similar rate to young people.... However, the researchers also noted fewer blood vessels and connections between cells in the older brains, which Ms Boldrini said "may be linked to compromised cognitive-emotional resilience" in the elderly. The article suggests these newest findings may be hotly debated. "They come just a month after a University of California study suggested adults do not develop new neurons."

Read more of this story at Slashdot.

Syndicate content