Vulnerabilities (CVE)

Total 314408 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-16514 1 Mantisbt 1 Mantisbt 2024-11-21 2.6 LOW 4.7 MEDIUM
A cross-site scripting (XSS) vulnerability in the View Filters page (view_filters_page.php) and Edit Filter page (manage_filter_edit_page.php) in MantisBT 2.1.0 through 2.17.0 allows remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted PATH_INFO. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-13055.
CVE-2018-16513 4 Artifex, Canonical, Debian and 1 more 5 Ghostscript, Gpl Ghostscript, Ubuntu Linux and 2 more 2024-11-21 6.8 MEDIUM 7.8 HIGH
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
CVE-2018-16511 4 Artifex, Canonical, Debian and 1 more 9 Ghostscript, Ubuntu Linux, Debian Linux and 6 more 2024-11-21 6.8 MEDIUM 7.8 HIGH
An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.
CVE-2018-16510 2 Artifex, Canonical 3 Ghostscript, Gpl Ghostscript, Ubuntu Linux 2024-11-21 6.8 MEDIUM 7.8 HIGH
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the "CS" and "SC" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact.
CVE-2018-16509 4 Artifex, Canonical, Debian and 1 more 8 Ghostscript, Gpl Ghostscript, Ubuntu Linux and 5 more 2024-11-21 9.3 HIGH 7.8 HIGH
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.
CVE-2018-16499 1 Versa-networks 1 Versa Operating System 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
In VOS compromised, an attacker at network endpoints can possibly view communications between an unsuspecting user and the service using man-in-the-middle attacks. Usage of unapproved SSH encryption protocols or cipher suites also violates the Data Protection TSR (Technical Security Requirements).
CVE-2018-16498 1 Versa-networks 1 Versa Director 2024-11-21 2.1 LOW 5.5 MEDIUM
In Versa Director, the unencrypted backup files stored on the Versa deployment contain credentials stored within configuration files. These credentials are for various application components such as SNMP, and SSL and Trust keystores.
CVE-2018-16497 1 Versa-networks 1 Versa Analytics 2024-11-21 7.2 HIGH 7.8 HIGH
In Versa Analytics, the cron jobs are used for scheduling tasks by executing commands at specific dates and times on the server. If the job is run as the user root, there is a potential privilege escalation vulnerability. In this case, the job runs a script as root that is writable by users who are members of the versa group.
CVE-2018-16496 1 Versa-networks 1 Versa Director 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
In Versa Director, the un-authentication request found.
CVE-2018-16495 1 Versa-networks 1 Versa Operating System 2024-11-21 6.5 MEDIUM 8.8 HIGH
In VOS user session identifier (authentication token) is issued to the browser prior to authentication but is not changed after the user successfully logs into the application. Failing to issue a new session ID following a successful login introduces the possibility for an attacker to set up a trap session on the device the victim is likely to login with.
CVE-2018-16494 1 Versa-networks 1 Versa Operating System 2024-11-21 6.5 MEDIUM 8.8 HIGH
In VOS and overly permissive "umask" may allow for authorized users of the server to gain unauthorized access through insecure file permissions that can result in an arbitrary read, write, or execution of newly created files and directories. Insecure umask setting was present throughout the Versa servers.
CVE-2018-16493 1 Static-resource-server Project 1 Static-resource-server 2024-11-21 5.0 MEDIUM 7.5 HIGH
A path traversal vulnerability was found in module static-resource-server 1.7.2 that allows unauthorized read access to any file on the server by appending slashes in the URL.
CVE-2018-16492 1 Extend Project 1 Extend 2024-11-21 7.5 HIGH 9.8 CRITICAL
A prototype pollution vulnerability was found in module extend <2.0.2, ~<3.0.2 that allows an attacker to inject arbitrary properties onto Object.prototype.
CVE-2018-16491 1 Dreamerslab 1 Node.extend 2024-11-21 7.5 HIGH 9.8 CRITICAL
A prototype pollution vulnerability was found in node.extend <1.1.7, ~<2.0.1 that allows an attacker to inject arbitrary properties onto Object.prototype.
CVE-2018-16490 1 Mpath Project 1 Mpath 2024-11-21 5.0 MEDIUM 7.5 HIGH
A prototype pollution vulnerability was found in module mpath <0.5.1 that allows an attacker to inject arbitrary properties onto Object.prototype.
CVE-2018-16489 1 Just-extend Project 1 Just-extend 2024-11-21 7.5 HIGH 9.8 CRITICAL
A prototype pollution vulnerability was found in just-extend <4.0.0 that allows attack to inject properties onto Object.prototype through its functions.
CVE-2018-16487 1 Lodash 1 Lodash 2024-11-21 6.8 MEDIUM 5.6 MEDIUM
A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.
CVE-2018-16486 1 Defaults-deep Project 1 Defaults-deep 2024-11-21 7.5 HIGH 9.8 CRITICAL
A prototype pollution vulnerability was found in defaults-deep <=0.2.4 that would allow a malicious user to inject properties onto Object.prototype.
CVE-2018-16485 1 M-server Project 1 M-server 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Path Traversal vulnerability in module m-server <1.4.1 allows malicious user to access unauthorized content of any file in the directory tree e.g. /etc/passwd by appending slashes to the URL request.
CVE-2018-16484 1 M-server Project 1 M-server 2024-11-21 3.5 LOW 5.4 MEDIUM
A XSS vulnerability was found in module m-server <1.4.2 that allows malicious Javascript code or HTML to be executed, due to the lack of escaping for special characters in folder names.