News aggregator

CVE-2017-18104

National Vulnerability Database - Tue, 07/24/2018 - 09:29
The Webhooks component of Atlassian Jira before version 7.6.7 and from version 7.7.0 before version 7.11.0 allows remote attackers who are able to observe or otherwise intercept webhook events to learn information about changes in issues that should not be sent because they are not contained within the results of a specified JQL query.
Categories: Security News

CVE-2018-10600

National Vulnerability Database - Tue, 07/24/2018 - 09:29
SEL AcSELerator Architect version 2.2.24.0 and prior allows unsanitized input to be passed to the XML parser, which may allow disclosure and retrieval of arbitrary data, arbitrary code execution (in certain situations on specific platforms), and denial of service attacks.
Categories: Security News

CVE-2018-10604

National Vulnerability Database - Tue, 07/24/2018 - 09:29
SEL Compass version 3.0.5.1 and prior allows all users full access to the SEL Compass directory, which may allow modification or overwriting of files within the Compass installation folder, resulting in escalation of privilege and/or malicious code execution.
Categories: Security News

CVE-2018-10608

National Vulnerability Database - Tue, 07/24/2018 - 09:29
SEL AcSELerator Architect version 2.2.24.0 and prior can be exploited when the AcSELerator Architect FTP client connects to a malicious FTP server, which may cause denial of service via 100% CPU utilization. Restart of the application is required.
Categories: Security News

CVE-2018-10905

National Vulnerability Database - Tue, 07/24/2018 - 09:29
CloudForms Management Engine (cfme) is vulnerable to an improper security setting in the dRuby component of CloudForms. An attacker with access to an unprivileged local shell could use this flaw to execute commands as a high privileged user.
Categories: Security News

CVE-2018-13385

National Vulnerability Database - Tue, 07/24/2018 - 09:29
There was an argument injection vulnerability in Sourcetree for macOS via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for macOS from 1.0b2 before 2.7.6 are affected by this vulnerability.
Categories: Security News

CVE-2018-13386

National Vulnerability Database - Tue, 07/24/2018 - 09:29
There was an argument injection vulnerability in Sourcetree for Windows via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for Windows before version 2.6.9 are affected by this vulnerability.
Categories: Security News

CVE-2018-14335

National Vulnerability Database - Tue, 07/24/2018 - 09:29
An issue was discovered in H2 1.4.197. Insecure handling of permissions in the backup function allows attackers to read sensitive files (outside of their permissions) via a symlink to a fake database file.
Categories: Security News

Bugtraq: FINAL CALL FOR PAPERS - INTEL SECURITY CONFERENCE (iSecCon) 2018

SecurityFocus Vulnerabilities - Tue, 07/24/2018 - 07:20
FINAL CALL FOR PAPERS - INTEL SECURITY CONFERENCE (iSecCon) 2018
Categories: Security News

Bugtraq: [SECURITY] [DSA 4253-1] network-manager-vpnc security update

SecurityFocus Vulnerabilities - Tue, 07/24/2018 - 07:20
[SECURITY] [DSA 4253-1] network-manager-vpnc security update
Categories: Security News

Bugtraq: APPLE-SA-2018-7-23-5 Additional information for APPLE-SA-2018-06-01-5 watchOS 4.3.1

SecurityFocus Vulnerabilities - Tue, 07/24/2018 - 07:20
APPLE-SA-2018-7-23-5 Additional information for APPLE-SA-2018-06-01-5 watchOS 4.3.1
Categories: Security News

Bugtraq: APPLE-SA-2018-7-23-4 Additional information for APPLE-SA-2018-06-01-6 tvOS 11.4

SecurityFocus Vulnerabilities - Tue, 07/24/2018 - 07:20
APPLE-SA-2018-7-23-4 Additional information for APPLE-SA-2018-06-01-6 tvOS 11.4
Categories: Security News

Vuln: Google Chrome Prior to 68.0.3440.75 Multiple Security Vulnerabilities

SecurityFocus Vulnerabilities - Tue, 07/24/2018 - 00:00
Google Chrome Prior to 68.0.3440.75 Multiple Security Vulnerabilities
Categories: Security News

Vuln: Wireshark CVE-2018-14438 Security Bypass Vulnerability

SecurityFocus Vulnerabilities - Tue, 07/24/2018 - 00:00
Wireshark CVE-2018-14438 Security Bypass Vulnerability
Categories: Security News

CVE-2018-14573

National Vulnerability Database - Mon, 07/23/2018 - 19:29
A Local File Inclusion (LFI) vulnerability exists in the Web Interface API of TightRope Media Carousel Digital Signage before 7.3.5. The RenderingFetch API allows for the downloading of arbitrary files through the use of directory traversal sequences, aka CSL-1683.
Categories: Security News

CVE-2018-10912

National Vulnerability Database - Mon, 07/23/2018 - 18:29
keycloak before version 4.0.0.final is vulnerable to a infinite loop in session replacement. A Keycloak cluster with multiple nodes could mishandle an expired session replacement and lead to an infinite loop. A malicious authenticated user could use this flaw to achieve Denial of Service on the server.
Categories: Security News

CVE-2018-8031

National Vulnerability Database - Mon, 07/23/2018 - 18:29
The TomEE console (tomee-webapp) has a XSS vulnerability which could allow javascript to be executed if the user is given a malicious URL. This web application is typically used to add TomEE features to a Tomcat installation. The TomEE bundles do not ship with this application included. This issue can be mitigated by removing the application after TomEE is setup (if using the application to install TomEE), using one of the provided pre-configured bundles, or by upgrading to TomEE 7.0.5. This issue is resolve in this commit: b8bbf50c23ce97dd64f3a5d77f78f84e47579863.
Categories: Security News

CVE-2018-11451

National Vulnerability Database - Mon, 07/23/2018 - 17:29
A vulnerability has been identified in Firmware variant IEC 61850 for EN100 Ethernet module (All versions < V4.33), Firmware variant PROFINET IO for EN100 Ethernet module (All versions), Firmware variant Modbus TCP for EN100 Ethernet module (All versions), Firmware variant DNP3 TCP for EN100 Ethernet module (All versions), Firmware variant IEC104 for EN100 Ethernet module (All versions), SIPROTEC 5 relays with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.80), SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules (All versions). Specially crafted packets to port 102/tcp could cause a denial-of-service condition in the affected products. A manual restart is required to recover the EN100 module functionality of SIPROTEC 4 and SIPROTEC Compact relays. Successful exploitation requires an attacker with network access to send multiple packets to the affected products or modules. As a precondition the IEC 61850-MMS communication needs to be activated on the affected products or modules. No user interaction or privileges are required to exploit the vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the network functionality of the device, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known.
Categories: Security News

CVE-2018-11452

National Vulnerability Database - Mon, 07/23/2018 - 17:29
A vulnerability has been identified in Firmware variant IEC 61850 for EN100 Ethernet module (All versions < V4.33), Firmware variant PROFINET IO for EN100 Ethernet module (All versions), Firmware variant Modbus TCP for EN100 Ethernet module (All versions), Firmware variant DNP3 TCP for EN100 Ethernet module (All versions), Firmware variant IEC104 for EN100 Ethernet module (All versions). Specially crafted packets to port 102/tcp could cause a denial-of-service condition in the EN100 communication module if oscillographs are running. A manual restart is required to recover the EN100 module functionality. Successful exploitation requires an attacker with network access to send multiple packets to the EN100 module. As a precondition the IEC 61850-MMS communication needs to be activated on the affected EN100 modules. No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the network functionality of the device, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known.
Categories: Security News

CVE-2016-10728

National Vulnerability Database - Mon, 07/23/2018 - 16:29
An issue was discovered in Suricata before 3.1.2. If an ICMPv4 error packet is received as the first packet on a flow in the to_client direction, it confuses the rule grouping lookup logic. The toclient inspection will then continue with the wrong rule group. This can lead to missed detection.
Categories: Security News

Pages