CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In May 2018

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2009-5150 284 Exec Code 2018-05-11 2018-06-14
7.2
None Local Low Not required Complete Complete Complete
Absolute Computrace Agent V80.845 and V80.866 does not have a digital signature for the configuration block, which allows attackers to set up communication with a web site other than the intended search.namequery.com site by modifying data within a disk's inter-partition space. This allows a privileged local user to execute arbitrary code even after that user loses access and all disk partitions are reformatted.
2 CVE-2009-5151 284 Exec Code 2018-05-11 2018-06-14
7.2
None Local Low Not required Complete Complete Complete
The stub component of Absolute Computrace Agent V70.785 executes code from a disk's inter-partition space without requiring a digital signature for that code, which allows attackers to execute code on the BIOS. This allows a privileged local user to achieve persistent control of BIOS behavior, independent of later disk changes.
3 CVE-2009-5152 362 2018-05-11 2018-06-14
1.9
None Local Medium Not required None Partial None
Absolute Computrace Agent, as distributed on certain Dell Inspiron systems through 2009, has a race condition with the Dell Client Configuration Utility (DCCU), which allows privileged local users to change Computrace Agent's activation/deactivation status to the factory default via a crafted TaskResult.xml file.
4 CVE-2011-0704 20 DoS 2018-05-04 2018-06-07
4.3
None Remote Medium Not required None None Partial
389 Directory Server 1.2.7.5, when built with mozldap, allows remote attackers to cause a denial of service (replica crash) by sending an empty modify request.
5 CVE-2012-5628 275 DoS 2018-05-04 2018-06-07
3.6
None Local Low Not required None Partial Partial
gofer before 0.68 uses world-writable permissions for /var/lib/gofer/journal/watchdog, which allows local users to cause a denial of service by removing journal entries.
6 CVE-2013-0159 59 DoS 2018-05-01 2018-06-13
3.6
None Local Low Not required None Partial Partial
The fedora-business-cards package before 1-0.1.beta1.fc17 on Fedora 17 and before 1-0.1.beta1.fc18 on Fedora 18 allows local users to cause a denial of service or write to arbitrary files via a symlink attack on /tmp/fedora-business-cards-buffer.svg.
7 CVE-2013-0185 352 CSRF 2018-05-01 2018-06-13
6.8
None Remote Medium Not required Partial Partial Partial
Cross-site request forgery (CSRF) vulnerability in ManageIQ Enterprise Virtualization Manager (EVM) allows remote attackers to hijack the authentication of users for requests that have unspecified impact via unknown vectors.
8 CVE-2013-2049 384 2018-05-01 2018-06-13
5.0
None Remote Low Not required None Partial None
Red Hat CloudForms 2 Management Engine (CFME) allows remote attackers to conduct session tampering attacks by leveraging use of a static secret_token.rb secret.
9 CVE-2013-2233 320 2018-05-04 2018-06-07
5.8
None Remote Medium Not required Partial Partial None
Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle attacks by leveraging failure to cache SSH host keys.
10 CVE-2013-3018 200 +Info 2018-05-24 2018-06-28
5.0
None Remote Low Not required Partial None None
The AXIS webapp in deploy-tomcat/axis in IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 allows remote attackers to obtain sensitive configuration information via a direct request, as demonstrated by happyaxis.jsp. IBM X-Force ID: 84354.
11 CVE-2013-3023 200 +Info 2018-05-24 2018-06-28
4.3
None Remote Medium Not required Partial None None
IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 might allow remote attackers to obtain sensitive information about Tomcat credentials by sniffing the network for a session in which HTTP is used. IBM X-Force ID: 84361.
12 CVE-2013-3024 264 +Priv 2018-05-24 2018-06-25
7.2
None Local Low Not required Complete Complete Complete
IBM WebSphere Application Server (WAS) 8.5 through 8.5.0.2 on UNIX allows local users to gain privileges by leveraging improper process initialization. IBM X-Force ID: 84362.
13 CVE-2013-4035 310 2018-05-01 2018-06-07
4.1
None Local Network Low ??? Partial Partial None
IBM Sterling Connect:Direct for OpenVMS 3.4.00, 3.4.01, 3.5.00, 3.6.0, and 3.6.0.1 allow remote attackers to have unspecified impact by leveraging failure to reject client requests for an unencrypted session when used as the server in a TCP/IP session and configured for SSL encryption with the client. IBM X-Force ID: 86138.
14 CVE-2013-4040 275 +Info 2018-05-01 2018-06-13
2.1
None Local Low Not required Partial None None
IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2.x before 7.2.1.5 and 7.2.x before 7.2.2.0 on Unix use weak permissions (755) for unspecified configuration and log files, which allows local users to obtain sensitive information by reading the files. IBM X-Force ID: 86176.
15 CVE-2013-4201 275 2018-05-01 2018-06-13
4.0
None Remote Low ??? None Partial None
Katello allows remote authenticated users to call the "system remove_deletion" CLI command via vectors related to "remove system" permissions.
16 CVE-2013-4209 200 +Info 2018-05-01 2018-06-13
2.1
None Local Low Not required Partial None None
Automatic Bug Reporting Tool (ABRT) before 2.1.6 allows local users to obtain sensitive information about arbitrary files via vectors related to sha1sums.
17 CVE-2013-6272 284 Bypass 2018-05-02 2018-06-12
6.8
None Remote Medium Not required Partial Partial Partial
The NotificationBroadcastReceiver class in the com.android.phone process in Google Android 4.1.1 through 4.4.2 allows attackers to bypass intended access restrictions and consequently make phone calls to arbitrary numbers, send mmi or ussd codes, or hangup ongoing calls via a crafted application.
18 CVE-2014-10064 399 2018-05-31 2019-10-09
5.0
None Remote Low Not required None None Partial
The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condition, for example, in a web application, other requests would not be processed while this blocking is occurring.
19 CVE-2014-10065 79 XSS Bypass 2018-05-31 2019-10-09
4.3
None Remote Medium Not required None Partial None
Certain input when passed into remarkable before 1.4.1 will bypass the bad protocol check that disallows the javascript: scheme allowing for javascript: url's to be injected into the rendered content.
20 CVE-2014-10066 22 Dir. Trav. 2018-05-31 2020-03-13
5.0
None Remote Low Not required Partial None None
Versions less than 0.1.4 of the static file server module fancy-server are vulnerable to directory traversal. An attacker can provide input such as `../` to read files outside of the served directory.
21 CVE-2014-10067 287 2018-05-29 2018-07-09
4.3
None Remote Medium Not required Partial None None
paypal-ipn before 3.0.0 uses the `test_ipn` parameter (which is set by the PayPal IPN simulator) to determine if it should use the production PayPal site or the sandbox. With a bit of time, an attacker could craft a request using the simulator that would fool any application which does not explicitly check for test_ipn in production.
22 CVE-2014-10068 22 Dir. Trav. 2018-05-29 2019-10-09
5.0
None Remote Low Not required Partial None None
The inert directory handler in inert node module before 1.1.1 always allows files in hidden directories to be served, even when `showHidden` is false.
23 CVE-2015-1503 22 Dir. Trav. 2018-05-08 2018-06-12
7.8
None Remote Low Not required Complete None None
Multiple directory traversal vulnerabilities in IceWarp Mail Server before 11.2 allow remote attackers to read arbitrary files via a (1) .. (dot dot) in the file parameter to a webmail/client/skins/default/css/css.php page or .../. (dot dot dot slash dot) in the (2) script or (3) style parameter to webmail/old/calendar/minimizer/index.php.
24 CVE-2015-7610 352 CSRF 2018-05-30 2020-06-04
6.8
None Remote Medium Not required Partial Partial Partial
Cross-site request forgery (CSRF) vulnerability in the login form in Zimbra Collaboration Suite (aka ZCS) before 8.6.0 Patch 10, 8.7.x before 8.7.11 Patch 2, and 8.8.x before 8.8.8 Patch 1 allows remote attackers to hijack the authentication of unspecified victims by leveraging failure to use a CSRF token.
25 CVE-2015-8094 601 2018-05-22 2018-07-02
5.8
None Remote Medium Not required Partial Partial None
Open redirect vulnerability in Cloudera HUE before 3.10.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the next parameter.
26 CVE-2015-9235 327 Bypass 2018-05-29 2019-10-09
7.5
None Remote Low Not required Partial Partial Partial
In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).
27 CVE-2015-9236 200 +Info 2018-05-31 2019-10-09
5.0
None Remote Low Not required Partial None None
Hapi versions less than 11.0.0 implement CORS incorrectly and allowed for configurations that at best returned inconsistent headers and at worst allowed cross-origin activities that were expected to be forbidden. If the connection has CORS enabled but one route has it off, and the route is not GET, the OPTIONS prefetch request will return the default CORS headers and then the actual request will go through and return no CORS headers. This defeats the purpose of turning CORS on the route.
28 CVE-2015-9238 134 2018-05-31 2019-10-09
5.0
None Remote Low Not required None Partial None
secure-compare 3.0.0 and below do not actually compare two strings properly. compare was actually comparing the first argument with itself, meaning the check passed for any two strings of the same length.
29 CVE-2015-9239 20 DoS 2018-05-31 2019-10-09
5.0
None Remote Low Not required None None Partial
ansi2html is vulnerable to regular expression denial of service (ReDoS) when certain types of user input is passed in.
30 CVE-2015-9240 255 2018-05-29 2018-07-20
5.0
None Remote Low Not required None Partial None
Due to a bug in the the default sign in functionality in the keystone node module before 0.3.16, incomplete email addresses could be matched. A correct password is still required to complete sign in.
31 CVE-2015-9241 20 2018-05-29 2019-10-09
5.0
None Remote Low Not required None None Partial
Certain input passed into the If-Modified-Since or Last-Modified headers will cause an 'illegal access' exception to be raised. Instead of sending a HTTP 500 error back to the sender, hapi node module before 11.1.3 will continue to hold the socket open until timed out (default node timeout is 2 minutes).
32 CVE-2015-9242 20 DoS 2018-05-29 2019-10-09
5.0
None Remote Low Not required None None Partial
Certain input strings when passed to new Date() or Date.parse() in ecstatic node module before 1.4.0 will cause v8 to raise an exception. This leads to a crash and denial of service in ecstatic when this input is passed into the server via the If-Modified-Since header.
33 CVE-2015-9243 254 2018-05-29 2019-10-09
4.3
None Remote Medium Not required None Partial None
When server level, connection level or route level CORS configurations in hapi node module before 11.1.4 are combined and when a higher level config included security restrictions (like origin), a higher level config that included security restrictions (like origin) would have those restrictions overridden by less restrictive defaults (e.g. origin defaults to all origins `*`).
34 CVE-2015-9244 89 Sql 2018-05-29 2021-05-18
7.5
None Remote Low Not required Partial Partial Partial
Keys of objects in mysql node module v2.0.0-alpha7 and earlier are not escaped with `mysql.escape()` which could lead to SQL Injection.
35 CVE-2016-7076 77 Exec Code Bypass 2018-05-29 2020-09-30
7.2
None Local Low Not required Complete Complete Complete
sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
36 CVE-2016-8627 400 2018-05-11 2019-10-09
4.3
None Remote Medium Not required None None Partial
admin-cli before versions 3.0.0.alpha25, 2.2.1.cr2 is vulnerable to an EAP feature to download server log files that allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user's browser to request the log files consuming enough resources that normal server functioning could be impaired.
37 CVE-2016-8656 264 2018-05-22 2019-10-09
4.6
None Local Low Not required Partial Partial Partial
Jboss jbossas before versions 5.2.0-23, 6.4.13, 7.0.5 is vulnerable to an unsafe file handling in the jboss init script which could result in local privilege escalation.
38 CVE-2016-9335 798 2018-05-09 2019-10-09
10.0
None Remote Low Not required Complete Complete Complete
A hard-coded cryptographic key vulnerability was identified in Red Lion Controls Sixnet-Managed Industrial Switches running firmware Version 5.0.196 and Stride-Managed Ethernet Switches running firmware Version 5.0.190. Vulnerable versions of Stride-Managed Ethernet switches and Sixnet-Managed Industrial switches use hard-coded HTTP SSL/SSH keys for secure communication. Because these keys cannot be regenerated by users, all products use the same key. The attacker could disrupt communication or compromise the system. CVSS v3 base score: 10, CVSS vector string: (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). Red Lion Controls recommends updating to SLX firmware Version 5.3.174.
39 CVE-2016-10036 434 DoS Exec Code 2018-05-01 2018-06-13
7.5
None Remote Low Not required Partial Partial Partial
Unrestricted file upload vulnerability in ui/artifact/upload in JFrog Artifactory before 4.16 allows remote attackers to (1) deploy an arbitrary servlet application and execute arbitrary code by uploading a war file or (2) possibly write to arbitrary files and cause a denial of service by uploading an HTML file.
40 CVE-2016-10518 119 Overflow 2018-05-31 2019-10-09
5.0
None Remote Low Not required Partial None None
A vulnerability was found in the ping functionality of the ws module before 1.0.0 which allowed clients to allocate memory by sending a ping frame. The ping functionality by default responds with a pong frame and the previously given payload of the ping frame. This is exactly what you expect, but internally ws always transforms all data that we need to send to a Buffer instance and that is where the vulnerability existed. ws didn't do any checks for the type of data it was sending. With buffers in node when you allocate it when a number instead of a string it will allocate the amount of bytes.
41 CVE-2016-10519 200 +Info 2018-05-31 2019-10-09
5.0
None Remote Low Not required Partial None None
A security issue was found in bittorrent-dht before 5.1.3 that allows someone to send a specific series of messages to a listening peer and get it to reveal internal memory.
42 CVE-2016-10520 20 DoS 2018-05-31 2019-10-09
5.0
None Remote Low Not required None None Partial
jadedown is vulnerable to regular expression denial of service (ReDoS) when certain types of user input is passed in.
43 CVE-2016-10521 20 DoS 2018-05-31 2019-10-09
5.0
None Remote Low Not required None None Partial
jshamcrest is vulnerable to regular expression denial of service (ReDoS) when certain types of user input is passed in to the emailAddress validator.
44 CVE-2016-10523 119 Overflow 2018-05-31 2019-10-09
5.0
None Remote Low Not required None None Partial
MQTT before 3.4.6 and 4.0.x before 4.0.5 allows specifically crafted MQTT packets to crash the application, making a DoS attack feasible with very little bandwidth.
45 CVE-2016-10524 400 DoS 2018-05-31 2022-04-06
6.0
None Remote Medium ??? Partial Partial Partial
i18n-node-angular is a module used to interact between i18n and angular without using additional resources. A REST API endpoint that is used for development in i18n-node-angular before 1.4.0 was not disabled in production environments a malicious user could fill up the server causing a Denial of Service or content injection.
46 CVE-2016-10525 287 Bypass 2018-05-29 2018-07-02
7.5
None Remote Low Not required Partial Partial Partial
When attempting to allow authentication mode `try` in hapi, hapi-auth-jwt2 version 5.1.1 introduced an issue whereby people could bypass authentication.
47 CVE-2016-10526 255 2018-05-31 2019-10-09
5.0
None Remote Low Not required Partial None None
A common setup to deploy to gh-pages on every commit via a CI system is to expose a github token to ENV and to use it directly in the auth part of the url. In module versions < 0.9.1 the auth portion of the url is outputted as part of the grunt tasks logging function. If this output is publicly available then the credentials should be considered compromised.
48 CVE-2016-10527 399 2018-05-31 2019-10-09
5.0
None Remote Low Not required None None Partial
The riot-compiler version version 2.3.21 has an issue in a regex (Catastrophic Backtracking) thats make it unusable under certain conditions.
49 CVE-2016-10528 22 Dir. Trav. 2018-05-31 2019-10-09
4.0
None Remote Low ??? Partial None None
restafary is a REpresentful State Transfer API for Creating, Reading, Using, Deleting files on a server from the web. Restafary before 1.6.1 is able to set up a root path, which should only allow it to run inside of that root path it specified.
50 CVE-2016-10529 352 2018-05-31 2019-10-09
6.8
None Remote Medium Not required Partial Partial Partial
Droppy versions <3.5.0 does not perform any verification for cross-domain websocket requests. An attacker is able to make a specially crafted page that can send requests as the context of the currently logged in user. For example this means the malicious user could add a new admin account under his control and delete others.
Total number of vulnerabilities : 1165   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.