Total
1208 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-1267 | 1 Cloudfoundry | 1 Silk-release | 2024-02-04 | 6.8 MEDIUM | 8.1 HIGH |
Cloud Foundry Silk CNI plugin, versions prior to 0.2.0, contains an improper access control vulnerability. If the platform is configured with an application security group (ASG) that overlaps with the Silk overlay network, any applications can reach any other application on the network regardless of the configured routing policies. | |||||
CVE-2018-1231 | 1 Pivotal Software | 1 Bosh Cli | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
Cloud Foundry BOSH CLI, versions prior to v3.0.1, contains an improper access control vulnerability. A user with access to an instance using the BOSH CLI can access the BOSH CLI configuration file and use its contents to perform authenticated requests to BOSH. | |||||
CVE-2018-12027 | 1 Phusion | 1 Passenger | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
An Insecure Permissions vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 causes information disclosure in the following situation: given a Passenger-spawned application process that reports that it listens on a certain Unix domain socket, if any of the parent directories of said socket are writable by a normal user that is not the application's user, then that non-application user can swap that directory with something else, resulting in traffic being redirected to a non-application user's process through an alternative Unix domain socket. | |||||
CVE-2018-11192 | 1 Quest | 1 Disk Backup | 2024-02-04 | 9.0 HIGH | 8.8 HIGH |
Quest DR Series Disk Backup software version before 4.0.3.1 allows privilege escalation (issue 4 of 6). | |||||
CVE-2018-1197 | 1 Pivotal Software | 1 Windows Stemcells | 2024-02-04 | 6.0 MEDIUM | 8.5 HIGH |
In Windows Stemcells versions prior to 1200.14, apps running inside containers in Windows on Google Cloud Platform are able to access the metadata endpoint. A malicious developer could use this access to gain privileged credentials. | |||||
CVE-2018-5342 | 1 Zohocorp | 1 Manageengine Desktop Central | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
An issue was discovered in Zoho ManageEngine Desktop Central 10.0.124 and 10.0.184: network services (Desktop Central and PostgreSQL) running with a superuser account. | |||||
CVE-2018-13122 | 1 Onefilecms | 1 Onefilecms | 2024-02-04 | 5.5 MEDIUM | 6.5 MEDIUM |
onefilecms.php in OneFileCMS through 2017-10-08 might allow attackers to delete arbitrary files via the Delete File(s) screen, as demonstrated by a ?i=var/www/html/&f=123.php&p=edit&p=deletefile URI. | |||||
CVE-2018-1115 | 2 Opensuse, Postgresql | 2 Leap, Postgresql | 2024-02-04 | 6.4 MEDIUM | 9.1 CRITICAL |
postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation. | |||||
CVE-2017-5456 | 2 Mozilla, Redhat | 8 Firefox, Firefox Esr, Enterprise Linux and 5 more | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
A mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system. This vulnerability affects Firefox ESR < 52.1 and Firefox < 53. | |||||
CVE-2018-12028 | 1 Phusion | 1 Passenger | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. If the malicious application then generates an error, it would cause Passenger's process manager to kill said reported arbitrary PID. | |||||
CVE-2018-10381 | 1 Mcafee | 1 Tunnelbear | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
TunnelBear 3.2.0.6 for Windows suffers from a SYSTEM privilege escalation vulnerability through the "TunnelBearMaintenance" service. This service establishes a NetNamedPipe endpoint that allows arbitrary installed applications to connect and call publicly exposed methods. The "OpenVPNConnect" method accepts a server list argument that provides attacker control of the OpenVPN command line. An attacker can specify a dynamic library plugin that should run for every new VPN connection attempt. This plugin will execute code in the context of the SYSTEM user. | |||||
CVE-2018-1354 | 1 Fortinet | 2 Fortianalyzer, Fortimanager | 2024-02-04 | 4.0 MEDIUM | 6.5 MEDIUM |
An improper access control vulnerability in Fortinet FortiManager 6.0.0, 5.6.5 and below versions, FortiAnalyzer 6.0.0, 5.6.5 and below versions allows a regular user edit the avatar picture of other users with arbitrary content. | |||||
CVE-2018-1203 | 1 Dell | 1 Emc Isilon Onefs | 2024-02-04 | 7.2 HIGH | 6.7 MEDIUM |
In Dell EMC Isilon OneFS, the compadmin is able to run tcpdump binary with root privileges. In versions between 8.1.0.0 - 8.1.0.1, 8.0.1.0 - 8.0.1.2, and 8.0.0.0 - 8.0.0.6, the tcpdump binary, being run with sudo, may potentially be used by compadmin to execute arbitrary code with root privileges. | |||||
CVE-2018-12335 | 1 Ecos | 1 System Management Appliance | 2024-02-04 | 4.1 MEDIUM | 7.3 HIGH |
Incorrect access control in ECOS System Management Appliance (aka SMA) 5.2.68 allows a user to compromise authentication keys, and access and manipulate security relevant configurations, via unrestricted database access during Easy Enrollment. | |||||
CVE-2018-10204 | 1 Purevpn | 1 Purevpn | 2024-02-04 | 9.0 HIGH | 8.8 HIGH |
PureVPN 6.0.1 for Windows suffers from a SYSTEM privilege escalation vulnerability in its "sevpnclient" service. When configured to use the OpenVPN protocol, the "sevpnclient" service executes "openvpn.exe" using the OpenVPN config file located at %PROGRAMDATA%\purevpn\config\config.ovpn. This file allows "Write" permissions to users in the "Everyone" group. An authenticated attacker may modify this file to specify a dynamic library plugin that should run for every new VPN connection attempt. This plugin will execute code in the context of the SYSTEM account. | |||||
CVE-2018-10646 | 1 Cyberghostvpn | 1 Cyberghost | 2024-02-04 | 7.2 HIGH | 7.8 HIGH |
CyberGhost 6.5.0.3180 for Windows suffers from a SYSTEM privilege escalation vulnerability through the "CG6Service" service. This service establishes a NetNamedPipe endpoint that allows arbitrary installed applications to connect and call publicly exposed methods. The "ConnectToVpnServer" method accepts a "connectionParams" argument that provides attacker control of the OpenVPN command line. An attacker can specify a dynamic library plugin that should run for every new VPN connection attempt. This plugin will execute code in the context of the SYSTEM user. | |||||
CVE-2017-7471 | 1 Qemu | 1 Qemu | 2024-02-04 | 7.7 HIGH | 9.0 CRITICAL |
Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host. | |||||
CVE-2018-11193 | 1 Quest | 1 Disk Backup | 2024-02-04 | 9.0 HIGH | 8.8 HIGH |
Quest DR Series Disk Backup software version before 4.0.3.1 allows privilege escalation (issue 5 of 6). | |||||
CVE-2018-1000621 | 2 Linux, Mycroft | 2 Linux Kernel, Mycroft-core | 2024-02-04 | 6.8 MEDIUM | 8.1 HIGH |
Mycroft AI mycroft-core version 18.2.8b and earlier contains a Incorrect Access Control vulnerability in Websocket configuration that can result in code execution. This impacts ONLY the Mycroft for Linux and "non-enclosure" installs - Mark 1 and Picroft unaffected. This attack appear to be exploitable remote access to the unsecured websocket server. This vulnerability appears to have been fixed in No fix currently available. | |||||
CVE-2017-4952 | 1 Vmware | 1 Xenon | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
VMware Xenon 1.x, prior to 1.5.4-CR7_1, 1.5.7_7, 1.5.4-CR6_2, 1.3.7-CR1_2, 1.1.0-CR0-3, 1.1.0-CR3_1,1.4.2-CR4_1, and 1.5.4_8, contains an authentication bypass vulnerability due to insufficient access controls for utility endpoints. Successful exploitation of this issue may result in information disclosure. |