Security News

Bugtraq: [SECURITY] [DSA 4267-1] kamailio security update

SecurityFocus Vulnerabilities - Thu, 08/09/2018 - 17:20
[SECURITY] [DSA 4267-1] kamailio security update
Categories: Security News

CVE-2018-0429

National Vulnerability Database - Thu, 08/09/2018 - 16:29
Stack-based buffer overflow in the Cisco Thor decoder before commit 18de8f9f0762c3a542b1122589edb8af859d9813 allows local users to cause a denial of service (segmentation fault) and execute arbitrary code via a crafted non-conformant Thor bitstream.
Categories: Security News

CVE-2018-10915

National Vulnerability Database - Thu, 08/09/2018 - 16:29
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
Categories: Security News

CVE-2018-10931

National Vulnerability Database - Thu, 08/09/2018 - 16:29
It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XMLRPC. A remote, unauthenticated attacker could use this flaw to gain high privileges within cobbler, upload files to arbitrary location in the context of the daemon.
Categories: Security News

CVE-2018-14735

National Vulnerability Database - Thu, 08/09/2018 - 16:29
An Information Exposure issue was discovered in Hitachi Command Suite 8.5.3. A remote attacker may be able to exploit a flaw in the permission of messaging that may allow for information exposure via a crafted message.
Categories: Security News

CVE-2018-15183

National Vulnerability Database - Thu, 08/09/2018 - 15:29
PHP Scripts Mall Myperfectresume / JobHero / Resume Clone Script 2.0.6 has Stored XSS via the Full Name and Title fields.
Categories: Security News

CVE-2018-15184

National Vulnerability Database - Thu, 08/09/2018 - 15:29
PHP Scripts Mall Naukri / Shine / Jobsite Clone Script 3.0.4 has Stored XSS via the USERNAME field, a related issue to CVE-2018-6795.
Categories: Security News

CVE-2018-10908

National Vulnerability Database - Thu, 08/09/2018 - 15:29
It was found that vdsm before version 4.20.37 invokes qemu-img on untrusted inputs without limiting resources. By uploading a specially crafted image, an attacker could cause the qemu-img process to consume unbounded amounts of memory of CPU time, causing a denial of service condition that could potentially impact other users of the host.
Categories: Security News

CVE-2018-15133

National Vulnerability Database - Thu, 08/09/2018 - 15:29
In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack.
Categories: Security News

CVE-2018-15181

National Vulnerability Database - Thu, 08/09/2018 - 15:29
JioFi 4G Hotspot M2S devices allow attackers to cause a denial of service (secure configuration outage) via an XSS payload in the SSID name and Security Key fields.
Categories: Security News

CVE-2018-15182

National Vulnerability Database - Thu, 08/09/2018 - 15:29
PHP Scripts Mall Car Rental Script 2.0.8 has XSS via the FirstName and LastName fields.
Categories: Security News

CVE-2018-6922

National Vulnerability Database - Thu, 08/09/2018 - 14:29
One of the data structures that holds TCP segments in all versions of FreeBSD prior to 11.2-RELEASE-p1, 11.1-RELEASE-p12, and 10.4-RELEASE-p10 uses an inefficient algorithm to reassemble the data. This causes the CPU time spent on segment processing to grow linearly with the number of segments in the reassembly queue. An attacker who has the ability to send TCP traffic to a victim system can degrade the victim system's network performance and/or consume excessive CPU by exploiting the inefficiency of TCP reassembly handling, with relatively small bandwidth cost.
Categories: Security News

Vuln: Multiple Medtronic Isulin Pumps Authentication Bypass and Information Disclosure Vulnerabilities

SecurityFocus Vulnerabilities - Thu, 08/09/2018 - 00:00
Multiple Medtronic Isulin Pumps Authentication Bypass and Information Disclosure Vulnerabilities
Categories: Security News

Bugtraq: [CVE-2018-12584] Heap overflow vulnerability in reSIProcate through 1.10.2

SecurityFocus Vulnerabilities - Wed, 08/08/2018 - 17:20
[CVE-2018-12584] Heap overflow vulnerability in reSIProcate through 1.10.2
Categories: Security News

Bugtraq: [CVE-2018-14429] man-cgi < 1.16 Local File Include

SecurityFocus Vulnerabilities - Wed, 08/08/2018 - 17:20
[CVE-2018-14429] man-cgi < 1.16 Local File Include
Categories: Security News

Bugtraq: CA20180802-01: Security Notice for CA API Developer Portal

SecurityFocus Vulnerabilities - Wed, 08/08/2018 - 17:20
CA20180802-01: Security Notice for CA API Developer Portal
Categories: Security News

Bugtraq: WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0006

SecurityFocus Vulnerabilities - Wed, 08/08/2018 - 17:20
WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0006
Categories: Security News

CVE-2018-3778

National Vulnerability Database - Wed, 08/08/2018 - 16:29
Improper authorization in aedes version <0.35.0 will publish a LWT in a channel when a client is not authorized.
Categories: Security News

CVE-2018-14526

National Vulnerability Database - Wed, 08/08/2018 - 15:29
An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
Categories: Security News

CVE-2018-11561

National Vulnerability Database - Wed, 08/08/2018 - 13:29
An integer overflow in the unprotected distributeToken function of a smart contract implementation for EETHER (EETHER), an Ethereum ERC20 token, will lead to an unauthorized increase of an attacker's digital assets.
Categories: Security News

Pages