Category Archives: Science & Technology

Topics such as cyber security, severe weather, space, Earth, oceans, and scientific research.

SB18-050: Vulnerability Summary for the Week of February 12, 2018

Original release date: February 19, 2018

The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.

The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High – Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 – 10.0

  • Medium – Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 – 6.9

  • Low – Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 – 3.9

Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
There were no high vulnerabilities recorded this week.

Back to top

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
There were no medium vulnerabilities recorded this week.

Back to top

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
There were no low vulnerabilities recorded this week.

Back to top

Severity Not Yet Assigned

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
3s-smart — codesys_web_server A Stack-based Buffer Overflow issue was discovered in 3S-Smart CODESYS Web Server. Specifically: all Microsoft Windows (also WinCE) based CODESYS web servers running stand-alone Version 2.3, or as part of the CODESYS runtime system running prior to Version V1.1.9.19. A crafted request may cause a buffer overflow and could therefore execute arbitrary code on the web server or lead to a denial-of-service condition due to a crash in the web server. 2018-02-15 not yet calculated CVE-2018-5440
BID
MISC
advantech — webaccess The VBWinExec function in Node\AspVBObj.dll in Advantech WebAccess 8.3.0 allows remote attackers to execute arbitrary OS commands via a single argument (aka the command parameter). 2018-02-13 not yet calculated CVE-2018-6911
EXPLOIT-DB
apache — couchdb The Windows installer that the Apache CouchDB team provides was vulnerable to local privilege escalation. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service launcher, or CouchDB batch or binary files. A subsequent service or server restart will then run that binary with administrator privilege. This issue affected CouchDB 2.0.0 (Windows platform only) and was addressed in CouchDB 2.0.0.1. 2018-02-12 not yet calculated CVE-2016-8742
MLIST
BID
EXPLOIT-DB
apache — jmeter When using Distributed Test only (RMI based), Apache JMeter 2.x and 3.x uses an unsecured RMI connection. This could allow an attacker to get Access to JMeterEngine and send unauthorized code. 2018-02-13 not yet calculated CVE-2018-1297
MLIST
CONFIRM
apache — jmeter In Apache JMeter 2.X and 3.X, when using Distributed Test only (RMI based), jmeter server binds RMI Registry to wildcard host. This could allow an attacker to get Access to JMeterEngine and send unauthorized code. 2018-02-14 not yet calculated CVE-2018-1287
MLIST
apache — mod_nss Authentication bypass vulnerability in mod_nss 1.0.8 allows remote attackers to assume the identity of a valid user by using their certificate and entering ‘password’ as the password. 2018-02-15 not yet calculated CVE-2011-4973
CONFIRM
MLIST
apache — openwire When using the OpenWire protocol in ActiveMQ versions 5.14.0 to 5.15.2 it was found that certain system details (such as the OS and kernel version) are exposed as plain text. 2018-02-13 not yet calculated CVE-2017-15709
MISC
apache — qpid_dispatch_router A Denial of Service vulnerability was found in Apache Qpid Dispatch Router versions 0.7.0 and 0.8.0. To exploit this vulnerability, a remote user must be able to establish an AMQP connection to the Qpid Dispatch Router and send a specifically crafted AMQP frame which will cause it to segfault and shut down. 2018-02-13 not yet calculated CVE-2017-15699
CONFIRM
apache — thrift_go The Apache Thrift Go client library exposed the potential during code generation for command injection due to using an external formatting tool. Affected Apache Thrift 0.9.3 and older, Fixed in Apache Thrift 0.10.0. 2018-02-12 not yet calculated CVE-2016-5397
MLIST
BID
CONFIRM
arm_holdings — mbed_TLS In ARM mbed TLS before 2.7.0, there is a bounds-check bypass through an integer overflow in PSK identity parsing in the ssl_parse_client_psk_identity() function in library/ssl_srv.c. 2018-02-14 not yet calculated CVE-2017-18187
CONFIRM
CONFIRM
arm_holdings — mbed_TLS ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0, when the truncated HMAC extension and CBC are used, allows remote attackers to execute arbitrary code or cause a denial of service (heap corruption) via a crafted application packet within a TLS or DTLS session. 2018-02-13 not yet calculated CVE-2018-0488
CONFIRM
arm_holdings — mbed_TLS ARM mbed TLS before 1.3.22, before 2.1.10, and before 2.7.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via a crafted certificate chain that is mishandled during RSASSA-PSS signature verification within a TLS or DTLS session. 2018-02-13 not yet calculated CVE-2018-0487
CONFIRM
atlassian — bitbucket_server The download commit resource in Atlassian Bitbucket Server from version 5.1.0 before version 5.1.7, from version 5.2.0 before version 5.2.5, from version 5.3.0 before version 5.3.3 and from version 5.4.0 before version 5.4.1 allows remote attackers to write files to disk potentially allowing them to gain code execution, exploit CVE-2017-1000117 if a vulnerable version of git is in use, and or determine if an internal service exists via an argument injection vulnerability in the at parameter. 2018-02-15 not yet calculated CVE-2017-18087
BID
CONFIRM
atlassian — bitbucket_server Various plugin servlet resources in Atlassian Bitbucket Server before version 5.3.7 (the fixed version for 5.3.x), from version 5.4.0 before 5.4.6 (the fixed version for 5.4.x), from version 5.5.0 before 5.5.6 (the fixed version for 5.5.x), from version 5.6.0 before 5.6.3 (the fixed version for 5.6.x), from version 5.7.0 before 5.7.1 (the fixed version for 5.7.x) and before 5.8.0 allow remote attackers to conduct clickjacking attacks via framing various resources that lacked clickjacking protection. 2018-02-15 not yet calculated CVE-2017-18088
BID
CONFIRM
atlassian — crucible The view review history resource in Atlassian Crucible before version 4.4.3 (the fixed version for 4.4.x) and 4.5.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the invited reviewers for a review. 2018-02-16 not yet calculated CVE-2017-18089
CONFIRM
atlassian — fisheye Various resources in Atlassian Fisheye before version 4.5.1 (the fixed version for 4.5.x) and before version 4.6.0 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of a commit author. 2018-02-16 not yet calculated CVE-2017-18090
CONFIRM
atlassian — fisheye_and_crucible The admin backupprogress action in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and before 4.5.0 allows remote attackers with administrative privileges to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the filename of a backup. 2018-02-16 not yet calculated CVE-2017-18091
CONFIRM
CONFIRM
carbon_black — carbon_black cb.exe in Carbon Black 5.1.1.60603 allows attackers to cause a denial of service (out-of-bounds read, invalid pointer dereference, and application crash) by leveraging access to the NetMon named pipe. 2018-02-12 not yet calculated CVE-2016-9570
MISC
carbon_black — carbon_black The cbstream.sys driver in Carbon Black 5.1.1.60603 allows local users with admin privileges to cause a denial of service (out-of-bounds read and system crash) via a large counter value in an 0x62430028 IOCTL call. 2018-02-12 not yet calculated CVE-2016-9569
MISC
ccn-lite — ccn-lite CCN-lite 2.0.0 Beta allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact because the ccnl_ndntlv_prependBlob function in ccnl-pkt-ndntlv.c can be called with wrong arguments. Specifically, there is an incorrect integer data type causing a negative third argument in some cases of crafted TLV data with inconsistent length information. 2018-02-14 not yet calculated CVE-2018-7039
CONFIRM
ccn-lite — ccn-lite In CCN-lite 2, the function ccnl_prefix_to_str_detailed can cause a buffer overflow, when writing a prefix to the buffer buf. The maximal size of the prefix is CCNL_MAX_PREFIX_SIZE; the buffer has the size CCNL_MAX_PREFIX_SIZE. However, when NFN is enabled, additional characters are written to the buffer (e.g., the “NFN” and “R2C” tags). Therefore, sending an NFN-R2C packet with a prefix of size CCNL_MAX_PREFIX_SIZE can cause an overflow of buf inside ccnl_prefix_to_str_detailed. 2018-02-13 not yet calculated CVE-2018-6948
CONFIRM
ccn-lite — ccn-lite In CCN-lite 2, the Parser of NDNTLV does not verify whether a certain component’s length field matches the actual component length, which has a resultant buffer overflow and out-of-bounds memory accesses. 2018-02-13 not yet calculated CVE-2018-6953
CONFIRM
cloudme — cloudme An issue was discovered in CloudMe before 1.11.0. An unauthenticated remote attacker that can connect to the “CloudMe Sync” client application listening on port 8888 can send a malicious payload causing a buffer overflow condition. This will result in an attacker controlling the program’s execution flow and allowing arbitrary code execution. 2018-02-11 not yet calculated CVE-2018-6892
MISC
EXPLOIT-DB
cups — cups A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1). 2018-02-16 not yet calculated CVE-2017-18190
MISC
MISC
dayrui — finecms controllers/member/Api.php in dayrui FineCms 5.2.0 has SQL Injection: a request with s=member,c=api,m=checktitle, and the parameter ‘module’ with a SQL statement, lacks effective filtering. 2018-02-12 not yet calculated CVE-2018-6893
MISC
dedecms — dedecms DedeCMS 5.7 allows remote attackers to discover the full path via a direct request for include/downmix.inc.php or inc/inc_archives_functions.php. 2018-02-13 not yet calculated CVE-2018-6910
MISC
dell — emc_supportassist_enterprise Dell EMC SupportAssist Enterprise version 1.1 creates a local Windows user account named “OMEAdapterUser” with a default password as part of the installation process. This unnecessary user account also remains even after an upgrade from v1.1 to v1.2. Access to the management console can be achieved by someone with knowledge of the default password. If SupportAssist Enterprise is installed on a server running OpenManage Essentials (OME), the OmeAdapterUser user account is added as a member of the OmeAdministrators group for the OME. An unauthorized person with knowledge of the default password and access to the OME web console could potentially use this account to gain access to the affected installation of OME with OmeAdministrators privileges. This is fixed in version 1.2.1. 2018-02-12 not yet calculated CVE-2018-1214
MISC
ember.js — ember.js Ember.js 1.0.x before 1.0.1, 1.1.x before 1.1.3, 1.2.x before 1.2.1, 1.3.x before 1.3.1, and 1.4.x before 1.4.0-beta.2 allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging an application using the “{{group}}” Helper and a crafted payload. 2018-02-15 not yet calculated CVE-2014-0014
CONFIRM
CONFIRM
ember.js — ember.js Ember.js 1.0.x before 1.0.1, 1.1.x before 1.1.3, 1.2.x before 1.2.1, 1.3.x before 1.3.1, and 1.4.x before 1.4.0-beta.2 allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging an application that contains templates whose context is set to a user-supplied primitive value and also contain the `{{this}}` special Handlebars variable. 2018-02-15 not yet calculated CVE-2014-0013
CONFIRM
CONFIRM
empirecms — empirecms EmpireCMS 6.6 allows remote attackers to discover the full path via an array value for a parameter to admin/tool/ShowPic.php. 2018-02-11 not yet calculated CVE-2018-6881
MISC
empirecms — empirecms EmpireCMS 6.6 through 7.2 allows remote attackers to discover the full path via an array value for a parameter to class/connect.php. 2018-02-11 not yet calculated CVE-2018-6880
MISC
exiv2 — exiv2 In Exiv2 0.26, there is a reachable assertion in the readHeader function in bigtiffimage.cpp, which will lead to a remote denial of service attack via a crafted TIFF file. 2018-02-12 not yet calculated CVE-2017-17722
MISC
exiv2 — exiv2 In Exiv2 0.26, there is an integer overflow leading to a heap-based buffer over-read in the Exiv2::getULong function in types.cpp. Remote attackers can exploit the vulnerability to cause a denial of service via a crafted image file. Note that this vulnerability is different from CVE-2017-14864, which is an invalid memory address dereference. 2018-02-12 not yet calculated CVE-2017-17725
MISC
MISC
exiv2 — exiv2 In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::IptcData::printStructure function in iptc.cpp. Remote attackers can exploit this vulnerability to cause a denial of service via a crafted TIFF file. 2018-02-12 not yet calculated CVE-2017-17724
MISC
exiv2 — exiv2 In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::Image::byteSwap4 function in image.cpp. Remote attackers can exploit this vulnerability to disclose memory data or cause a denial of service via a crafted TIFF file. 2018-02-12 not yet calculated CVE-2017-17723
MISC
f-secure — radar F-Secure Radar (on-premises) before 2018-02-15 has XSS via vectors involving the Tags parameter in the JSON request body in an outbound request for the /api/latest/vulnerabilityscans/tags/batch resource, aka a “suggested metadata tags for assets” issue. 2018-02-15 not yet calculated CVE-2018-6189
MISC
f-secure — radar F-Secure Radar (on-premises) before 2018-02-15 has an Unvalidated Redirect via the ReturnUrl parameter that triggers upon a user login. 2018-02-15 not yet calculated CVE-2018-6324
MISC
ffmpeg — ffmpeg The decode_plane function in libavcodec/utvideodec.c in FFmpeg through 3.4.2 allows remote attackers to cause a denial of service (out of array read) via a crafted AVI file. 2018-02-11 not yet calculated CVE-2018-6912
CONFIRM
freetype — freetype An issue was discovered in FreeType 2 through 2.9. A NULL pointer dereference in the Ins_GETVARIATION() function within ttinterp.c could lead to DoS via a crafted font file. 2018-02-13 not yet calculated CVE-2018-6942
MISC
MISC
frontaccounting — frontaccounting FrontAccounting 2.4.3 suffers from a CSRF flaw, which leads to adding a user account via admin/users.php (aka the “add user” feature of the User Permissions page). 2018-02-15 not yet calculated CVE-2018-7176
MISC
gnome — librsvg GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim’s Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must process a specially crafted SVG file containing an UNC path on Windows. 2018-02-09 not yet calculated CVE-2018-1000041
CONFIRM
CONFIRM
MLIST
gnu — gnu An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a “mangled rename” issue. 2018-02-13 not yet calculated CVE-2018-6951
BID
MISC
MISC
gnu — gnu A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6. 2018-02-13 not yet calculated CVE-2018-6952
BID
MISC
gnu — gnu An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file. 2018-02-13 not yet calculated CVE-2016-10713
MISC
gnu_binutils — gnu_binutils In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object. 2018-02-17 not yet calculated CVE-2018-7208
CONFIRM
go — go The “go get” implementation in Go 1.9.4, when the -insecure command-line option is used, does not validate the import path (get/vcs.go only checks for “://” anywhere in the string), which allows remote attackers to execute arbitrary OS commands via a crafted web site. 2018-02-16 not yet calculated CVE-2018-7187
CONFIRM
google — android In function ih264d_ref_idx_reordering of libavc, there is an out-of-bounds write due to modCount being defined as an unsigned character. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69478425. 2018-02-12 not yet calculated CVE-2017-13228
BID
CONFIRM
google — android In DLSParser of the sonivox library, there is possible resource exhaustion due to a memory leak. This could lead to remote temporary denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68159767. 2018-02-12 not yet calculated CVE-2017-13234
BID
CONFIRM
google — android In hevc codec, there is an out-of-bounds write due to an incorrect bounds check with the i2_pic_width_in_luma_samples value. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-65483665. 2018-02-12 not yet calculated CVE-2017-13230
BID
CONFIRM
google — android A remote code execution vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. ID: A-68160703. 2018-02-12 not yet calculated CVE-2017-13229
BID
CONFIRM
google — android In libmediadrm, there is an out-of-bounds write due to improper input validation. This could lead to local elevation of privileges with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-67962232. 2018-02-12 not yet calculated CVE-2017-13231
BID
CONFIRM
google — android In audioserver, there is an out-of-bounds write due to a log statement using %s with an array that may not be NULL terminated. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68953950. 2018-02-12 not yet calculated CVE-2017-13232
BID
CONFIRM
google — android In the Pixel 2 bootloader, there is a missing permission check which bypasses carrier bootloader lock. This could lead to local elevation of privileges with user execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-71486645. 2018-02-12 not yet calculated CVE-2017-13247
BID
CONFIRM
google — android A information disclosure vulnerability in the Android framework (crypto framework). Product: Android. Versions: 8.0, 8.1. ID: A-68694819. 2018-02-12 not yet calculated CVE-2017-13240
BID
CONFIRM
google — android In xt_qtaguid.c, there is a race condition due to insufficient locking. This could lead to local elevation of privileges with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-65853158. 2018-02-14 not yet calculated CVE-2017-13273
CONFIRM
google — android A information disclosure vulnerability in the Android media framework (libstagefright_soft_avcenc). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. ID: A-69065651. 2018-02-12 not yet calculated CVE-2017-13241
BID
CONFIRM
google — android A elevation of privilege vulnerability in the Upstream kernel audio driver. Product: Android. Versions: Android kernel. ID: A-64315347. 2018-02-12 not yet calculated CVE-2017-13245
BID
CONFIRM
google — android A information disclosure vulnerability in the Android system (bluetooth). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. ID: A-62672248. 2018-02-12 not yet calculated CVE-2017-13242
BID
CONFIRM
google — android A information disclosure vulnerability in the Android framework (ui framework). Product: Android. Versions: 8.0. ID: A-66244132. 2018-02-12 not yet calculated CVE-2017-13239
BID
CONFIRM
google — android A elevation of privilege vulnerability in the Upstream kernel easel. Product: Android. Versions: Android kernel. ID: A-62678986. 2018-02-12 not yet calculated CVE-2017-13244
BID
CONFIRM
google — android A information disclosure vulnerability in the Android system (ui). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. ID: A-38258991. 2018-02-12 not yet calculated CVE-2017-13243
BID
CONFIRM
google — android A other vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. ID: A-68342866. 2018-02-12 not yet calculated CVE-2017-13235
CONFIRM
google — android In the KeyStore service, there is a permissions bypass that allows access to protected resources. This could lead to local escalation of privilege with system execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0, 8.1. Android ID: A-68217699. 2018-02-12 not yet calculated CVE-2017-13236
BID
CONFIRM
EXPLOIT-DB
google — android In ihevcd_ctb_boundary_strength_pbslice of libhevc, there is possible resource exhaustion. This could lead to a remote temporary denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-62851602. 2018-02-12 not yet calculated CVE-2017-13233
BID
CONFIRM
google — android In XBLRamDump mode, there is a debug feature that can be used to dump memory contents, if an attacker has physical access to the device. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-64610940. 2018-02-12 not yet calculated CVE-2017-13238
BID
CONFIRM
google — android A information disclosure vulnerability in the Upstream kernel network driver. Product: Android. Versions: Android kernel. ID: A-36279469. 2018-02-12 not yet calculated CVE-2017-13246
BID
CONFIRM
hpe — 2620_series_network_switches A Remote Cross Site Request Forgery (CSRF) vulnerability in HPE 2620 Series Network Switches version RA.15.05.0006 was found. 2018-02-15 not yet calculated CVE-2017-5796
BID
CONFIRM
hpe — aruba_airwave_glass A Remote Code Execution vulnerability in HPE Aruba AirWave Glass version v1.0.0 and 1.0.1 was found. 2018-02-15 not yet calculated CVE-2017-8946
BID
CONFIRM
hpe — aruba_clearpass_policy_manager A reflected cross site scripting vulnerability in HPE Aruba ClearPass Policy Manager version 6.6.x was found. 2018-02-15 not yet calculated CVE-2017-5827
BID
CONFIRM
hpe — aruba_clearpass_policy_manager An arbitrary command execution vulnerability in HPE Aruba ClearPass Policy Manager version 6.6.x was found. 2018-02-15 not yet calculated CVE-2017-5828
BID
CONFIRM
hpe — aruba_clearpass_policy_manager An authenticated remote code execution vulnerability in HPE Aruba ClearPass Policy Manager version 6.6.x was found. 2018-02-15 not yet calculated CVE-2017-5826
BID
CONFIRM
hpe — aruba_clearpass_policy_manager An unauthenticated remote code execution vulnerability in HPE Aruba ClearPass Policy Manager version 6.6.x was found. 2018-02-15 not yet calculated CVE-2017-5824
BID
CONFIRM
hpe — aruba_clearpass_policy_manager A privilege escalation vulnerability in HPE Aruba ClearPass Policy Manager version 6.6.x was found. 2018-02-15 not yet calculated CVE-2017-5825
BID
CONFIRM
hpe — aruba_clearpass_policy_manager An access restriction bypass vulnerability in HPE Aruba ClearPass Policy Manager version 6.6.x was found. 2018-02-15 not yet calculated CVE-2017-5829
BID
CONFIRM
hpe — cloud_optimizer A Remote Disclosure of Information vulnerability in HPE Cloud Optimizer version v3.0x was found. 2018-02-15 not yet calculated CVE-2017-8944
BID
CONFIRM
hpe — data_protector A Remote Arbitrary Code Execution vulnerability in HPE Data Protector version prior to 8.17 and 9.09 was found. 2018-02-15 not yet calculated CVE-2017-5809
BID
CONFIRM
hpe — data_protector A Remote Arbitrary Code Execution vulnerability in HPE Data Protector version prior to 8.17 and 9.09 was found. 2018-02-15 not yet calculated CVE-2017-5807
BID
CONFIRM
MISC
hpe — data_protector A Remote Arbitrary Code Execution vulnerability in HPE Data Protector version prior to 8.17 and 9.09 was found. 2018-02-15 not yet calculated CVE-2017-5808
BID
CONFIRM
MISC
hpe — diagnostics A Remote click jacking vulnerability in HPE Diagnostics version 9.24 IP1, 9.26 , 9.26IP1 was found. 2018-02-15 not yet calculated CVE-2016-8521
BID
SECTRACK
CONFIRM
hpe — diagnostics A cross-site scripting vulnerability in HPE Diagnostics version 9.24 IP1, 9.26 , 9.26IP1 was found. 2018-02-15 not yet calculated CVE-2016-8522
BID
SECTRACK
CONFIRM
hpe — helion_eucalyptus A Remote Escalation of Privilege vulnerability in HPE Helion Eucalyptus version 3.3.0 through 4.3.1 was found. 2018-02-15 not yet calculated CVE-2016-8528
BID
SECTRACK
CONFIRM
hpe — helion_eucalyptus HPE Helion Eucalyptus v4.3.0 and earlier does not correctly check IAM user’s permissions for accessing versioned objects and ACLs. In some cases, authenticated users with S3 permissions could also access versioned data. 2018-02-15 not yet calculated CVE-2016-8520
BID
CONFIRM
hpe — icewall_federation_agent A Remote Unauthorized Disclosure of Information vulnerability in HPE IceWall Federation Agent version 3.0 was found. 2018-02-15 not yet calculated CVE-2017-8945
BID
SECTRACK
CONFIRM
hpe — icewall_products A Remote Unauthorized Disclosure of Information vulnerability in HPE IceWall Products version MFA 4.0 proxy was found. 2018-02-15 not yet calculated CVE-2017-8978
CONFIRM
hpe — insight_control An improper input validation vulnerability in HPE Insight Control version 7.6 LR1 was found. 2018-02-15 not yet calculated CVE-2017-8969
BID
CONFIRM
hpe — integrated_lights-out Security vulnerabilities in the HPE Integrated Lights-Out 2 (iLO 2) firmware could be exploited remotely to allow authentication bypass, code execution, and denial of service. 2018-02-15 not yet calculated CVE-2017-8979
CONFIRM
hpe — integrated_lights-out A authentication bypass and execution of code vulnerability in HPE Integrated Lights-out 4 (iLO 4) version prior to 2.53 was found. 2018-02-15 not yet calculated CVE-2017-12542
BID
SECTRACK
CONFIRM
EXPLOIT-DB
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12492
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12527
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12501
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12536
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12499
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12539
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Deserialization of Untrusted Data vulnerability in Hewlett Packard Enterprise Intelligent Management Center (iMC) PLAT version 7.3 E0504P2 was found. 2018-02-15 not yet calculated CVE-2017-8964
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Denial of Service vulnerability in HPE Intelligent Management Center (iMC) PLAT version iMC Plat 7.3 E0504P2 was found. 2018-02-15 not yet calculated CVE-2017-12560
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A remote code execution vulnerability in HPE intelligent Management Center (iMC) PLAT version Plat 7.3 E0504P4 and earlier was found. 2018-02-15 not yet calculated CVE-2017-12561
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12540
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12537
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A remote arbitrary file download and disclosure of information vulnerability in HPE Intelligent Management Center (iMC) Service Operation Management (SOM) version IMC SOM 7.3 E0501 was found. 2018-02-15 not yet calculated CVE-2017-12555
SECTRACK
CONFIRM
MISC
hpe — intelligent_management_center_plat A remote code execution vulnerability in HPE intelligent Management Center (iMC) PLAT iMC Plat 7.3 E0504P2 and earlier was found. 2018-02-15 not yet calculated CVE-2017-12554
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE intelligent Management Center (iMC) PLAT version IMC Plat 7.3 E0504P2 and earlier was found. 2018-02-15 not yet calculated CVE-2017-12558
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12522
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12490
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A remote code execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0506P03 was found. 2018-02-15 not yet calculated CVE-2017-8984
BID
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE intelligent Management Center (iMC) PLAT version IMC Plat 7.3 E0504P2 and earlier was found. 2018-02-15 not yet calculated CVE-2017-12557
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE intelligent Management Center (iMC) PLAT version IMC Plat 7.3 E0504P2 and earlier was found. 2018-02-15 not yet calculated CVE-2017-12556
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12513
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12514
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12541
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12535
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Deserialization of Untrusted Data vulnerability in Hewlett Packard Enterprise Intelligent Management Center (iMC) PLAT version 7.3 E0504P2 was found. 2018-02-15 not yet calculated CVE-2017-8963
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12526
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12515
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12532
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Disclosure of Information vulnerability in HPE iMC PLAT version v7.2 E0403P06 and earlier was found. The problem was resolved in iMC PLAT 7.3 E0504 or subsequent version. 2018-02-15 not yet calculated CVE-2016-8525
BID
SECTRACK
CONFIRM
MISC
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12533
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 was found. 2018-02-15 not yet calculated CVE-2017-5817
SECTRACK
CONFIRM
EXPLOIT-DB
EXPLOIT-DB
hpe — intelligent_management_center_plat A directory traversal vulnerability in HPE Intelligent Management Center (IMC) PLAT 7.3 E0504P02 could allow remote code execution. 2018-02-15 not yet calculated CVE-2017-8961
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12525
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P4 was found. 2018-02-15 not yet calculated CVE-2017-8983
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12531
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12530
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12528
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12538
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Deserialization of Untrusted Data vulnerability in Hewlett Packard Enterprise Intelligent Management Center (iMC) PLAT version 7.3 E0504P2 was found. 2018-02-15 not yet calculated CVE-2017-8962
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12521
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Deserialization of Untrusted Data vulnerability in Hewlett Packard Enterprise Intelligent Management Center (iMC) PLAT version 7.3 E0504P2 was found. 2018-02-15 not yet calculated CVE-2017-8967
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12529
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12524
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12517
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12516
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12534
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12520
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12519
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12518
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12523
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Deserialization of Untrusted Data vulnerability in Hewlett Packard Enterprise Intelligent Management Center (iMC) PLAT version 7.3 E0504P2 was found. 2018-02-15 not yet calculated CVE-2017-8965
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12506
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12508
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 was found. 2018-02-15 not yet calculated CVE-2017-8956
CONFIRM
hpe — intelligent_management_center_plat A Remote Denial of Service vulnerability in HPE Intelligent Management Center (iMC) PLAT version iMC Plat 7.3 E0504P2 was found. 2018-02-15 not yet calculated CVE-2017-12559
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Local Arbitrary File Download vulnerability in HPE Intelligent Management Center (IMC) version PLAT 7.2 E0403P06 was found. 2018-02-15 not yet calculated CVE-2017-5795
BID
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12509
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 was found. 2018-02-15 not yet calculated CVE-2017-5815
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12491
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12487
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.2 was found. 2018-02-15 not yet calculated CVE-2017-8955
BID
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 was found. 2018-02-15 not yet calculated CVE-2017-5818
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.2 was found. 2018-02-15 not yet calculated CVE-2017-8957
BID
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12510
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12504
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12489
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 was found. 2018-02-15 not yet calculated CVE-2017-5823
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12503
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Authentication Restriction Bypass vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P4 was found. 2018-02-15 not yet calculated CVE-2017-8982
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 was found. 2018-02-15 not yet calculated CVE-2017-5820
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12512
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 was found. 2018-02-15 not yet calculated CVE-2017-5819
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.2 was found. 2018-02-15 not yet calculated CVE-2017-8954
BID
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12507
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 was found. 2018-02-15 not yet calculated CVE-2017-5821
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12495
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12511
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12500
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12488
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 was found. 2018-02-15 not yet calculated CVE-2017-5816
BID
SECTRACK
CONFIRM
EXPLOIT-DB
EXPLOIT-DB
hpe — intelligent_management_center_plat A Remote Arbitrary File Download vulnerability in HPE Intelligent Management Center (IMC) PLAT version 7.2 E0403P06 was found. 2018-02-15 not yet calculated CVE-2017-5794
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 and earlier was found. 2018-02-15 not yet calculated CVE-2017-8958
BID
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12496
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12502
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0506 was found. 2018-02-15 not yet calculated CVE-2017-8981
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12505
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P04 was found. 2018-02-15 not yet calculated CVE-2017-5822
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12497
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12498
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Disclosure of Information vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P2 was found. 2018-02-15 not yet calculated CVE-2017-8980
BID
CONFIRM
hpe — intelligent_management_center_plat A Deserialization of Untrusted Data vulnerability in Hewlett Packard Enterprise Intelligent Management Center (iMC) PLAT version 7.3 E0504P2 was found. 2018-02-15 not yet calculated CVE-2017-8966
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.2 was found. 2018-02-15 not yet calculated CVE-2017-5805
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.3 E0504P2 was found. 2018-02-15 not yet calculated CVE-2017-5792
BID
CONFIRM
CONFIRM
EXPLOIT-DB
MISC
MISC
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.2 was found. 2018-02-15 not yet calculated CVE-2017-5804
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12493
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A remote deserialization of untrusted data vulnerability in HPE Intelligent Management Center (IMC) PLAT version 7.2 E0403P06 was found. 2018-02-15 not yet calculated CVE-2017-5790
BID
CONFIRM
MISC
hpe — intelligent_management_center_plat A remote denial of service vulnerability in HPE iMC PLAT version v7.2 E0403P06 and earlier was found. The problem was resolved in iMC PLAT 7.3 E0504 or subsequent version. 2018-02-15 not yet calculated CVE-2016-8530
CONFIRM
MISC
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version 7.2 was found. 2018-02-15 not yet calculated CVE-2017-5806
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Arbitrary Code Execution vulnerability in HPE Intelligent Management Center (IMC) PLAT version 7.2 E0403P06 was found. 2018-02-15 not yet calculated CVE-2017-5793
CONFIRM
hpe — intelligent_management_center_plat A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. 2018-02-15 not yet calculated CVE-2017-12494
BID
SECTRACK
CONFIRM
hpe — intelligent_management_center_plat A Remote Unauthenticated Disclosure of Information vulnerability in HPE Intelligent Management Center (IMC) SOM version v7.3 (E0501) was found. 2018-02-15 not yet calculated CVE-2017-5797
BID
CONFIRM
hpe — loadrunner A Remote Cross-Site Scripting (XSS) vulnerability in HPE LoadRunner v12.53 and earlier and HPE Performance Center version v12.53 and earlier was found. 2018-02-15 not yet calculated CVE-2017-8953
SECTRACK
SECTRACK
CONFIRM
hpe — loadrunner_and_performance_center A Remote Code Execution vulnerability in all versions of HPE LoadRunner and Performance Center was found. 2018-02-15 not yet calculated CVE-2016-8512
CONFIRM
hpe — matrix_operating_environment A missing HSTS Header vulnerability in HPE Matrix Operating Environment version v7.6 was found. 2018-02-15 not yet calculated CVE-2017-5784
CONFIRM
hpe — matrix_operating_environment A remote priviledge escalation vulnerability in HPE Matrix Operating Environment version 7.6 was found. 2018-02-15 not yet calculated CVE-2016-8533
CONFIRM
hpe — matrix_operating_environment A remote information disclosure vulnerability in HPE Matrix Operating Environment version 7.6 was found. 2018-02-15 not yet calculated CVE-2016-8531
CONFIRM
hpe — matrix_operating_environment A remote unauthenticated disclosure of information vulnerability in HPE Matrix Operating Environment version 7.6 LR1 was found. 2018-02-15 not yet calculated CVE-2017-8970
BID
CONFIRM
hpe — matrix_operating_environment A remote information disclosure vulnerability in HPE Matrix Operating Environment version v7.6 was found. 2018-02-15 not yet calculated CVE-2017-5785
CONFIRM
hpe — matrix_operating_environment A remote HTTP parameter Pollution vulnerability in HPE Matrix Operating Environment version 7.6 was found. 2018-02-15 not yet calculated CVE-2016-8535
CONFIRM
hpe — matrix_operating_environment A remote privilege elevation vulnerability in HPE Matrix Operating Environment version 7.6 was found. 2018-02-15 not yet calculated CVE-2016-8534
CONFIRM
hpe — matrix_operating_environment A cross site scripting vulnerability in HPE Matrix Operating Environment version 7.6 was found. 2018-02-15 not yet calculated CVE-2016-8532
CONFIRM
hpe — matrix_operating_environment A remote clickjacking vulnerability in HPE Matrix Operating Environment version v7.6 was found. 2018-02-15 not yet calculated CVE-2017-5780
CONFIRM
hpe — matrix_operating_environment A clickjacking vulnerability in HPE Matrix Operating Environment version 7.6 LR1 was found. 2018-02-15 not yet calculated CVE-2017-8972
BID
CONFIRM
hpe — matrix_operating_environment A missing HSTS Header vulnerability in HPE Matrix Operating Environment version v7.6 was found. 2018-02-15 not yet calculated CVE-2017-5782
CONFIRM
hpe — matrix_operating_environment A CSRF vulnerability in HPE Matrix Operating Environment version v7.6 was found. 2018-02-15 not yet calculated CVE-2017-5781
CONFIRM
hpe — matrix_operating_environment A clickjacking vulnerability in HPE Matrix Operating Environment version 7.6 LR1 was found. 2018-02-15 not yet calculated CVE-2017-8971
BID
CONFIRM
hpe — matrix_operating_environment A remote clickjacking vulnerability in HPE Matrix Operating Environment version v7.6 was found. 2018-02-15 not yet calculated CVE-2017-5783
CONFIRM
hpe — matrix_operating_environment An improper input validation vulnerability in HPE Matrix Operating Environment version 7.6 LR1 was found. 2018-02-15 not yet calculated CVE-2017-8973
BID
CONFIRM
hpe — moonshot_provisioning_manager_appliance A Remote Code Execution vulnerability in Hewlett Packard Enterprise Moonshot Provisioning Manager Appliance version v1.20 was found. 2018-02-15 not yet calculated CVE-2017-8976
BID
CONFIRM
hpe — moonshot_provisioning_manager_appliance A Remote Denial of Service vulnerability in Hewlett Packard Enterprise Moonshot Provisioning Manager Appliance version v1.20 was found. 2018-02-15 not yet calculated CVE-2017-8977
BID
CONFIRM
hpe — moonshot_provisioning_manager_appliance A Remote Code Execution vulnerability in Hewlett Packard Enterprise Moonshot Provisioning Manager Appliance version v1.20 was found. 2018-02-15 not yet calculated CVE-2017-8975
BID
CONFIRM
hpe — moonshot_remote_console_administrator A remote disclosure of information vulnerability in Moonshot Remote Console Administrator Prior to 2.50, iLO4 prior to v2.53, iLO3 prior to v1.89 and iLO2 prior to v2.30 was found. 2018-02-15 not yet calculated CVE-2017-12543
BID
CONFIRM
hpe — msa_1040_and_msa_2040_san_storage An Authentication Bypass vulnerability in HPE MSA 1040 and HPE MSA 2040 SAN Storage in version GL220P008 and earlier and was found. 2018-02-15 not yet calculated CVE-2017-8959
CONFIRM
hpe — msa_1040_and_msa_2040_san_storage An Authentication Bypass vulnerability in HPE MSA 1040 and MSA 2040 SAN Storage IN version GL220P008 and earlier was found. 2018-02-15 not yet calculated CVE-2017-8960
CONFIRM
hpe — network_automation A remote code execution vulnerability in HPE Network Automation version 9.1x, 9.2x, 10.0x, 10.1x and 10.2x were found. 2018-02-15 not yet calculated CVE-2017-5811
BID
SECTRACK
CONFIRM
hpe — network_automation A Remote Code Execution vulnerability in HPE Network Automation using RPCServlet and Java Deserialization version v9.1x, v9.2x, v10.00, v10.00.01, v10.00.02, v10.10, v10.11, v10.11.01, v10.20 was found. 2018-02-15 not yet calculated CVE-2016-8511
BID
CONFIRM
MISC
hpe — network_automation A remote sql injection vulnerability in HPE Network Automation version 9.1x, 9.2x, 10.0x, 10.1x and 10.2x were found. 2018-02-15 not yet calculated CVE-2017-5810
BID
SECTRACK
CONFIRM
hpe — network_automation A remote unauthenticated access vulnerability in HPE Network Automation version 9.1x, 9.2x, 10.0x, 10.1x and 10.2x were found. 2018-02-15 not yet calculated CVE-2017-5813
BID
SECTRACK
CONFIRM
hpe — network_automation A remote sql information disclosure vulnerability in HPE Network Automation version 9.1x, 9.2x, 10.0x, 10.1x and 10.2x were found. 2018-02-15 not yet calculated CVE-2017-5812
BID
SECTRACK
CONFIRM
hpe — network_automation A remote sql injection authentication bypass in HPE Network Automation version 9.1x, 9.2x, 10.0x, 10.1x and 10.2x were found. 2018-02-15 not yet calculated CVE-2017-5814
BID
SECTRACK
CONFIRM
hpe — network_node_manager_i A Remote Bypass Security Restriction vulnerability in HPE Network Node Manager i (NNMi) Software versions v10.0x, v10.1x, v10.2x was found. 2018-02-15 not yet calculated CVE-2017-8948
BID
CONFIRM
hpe — nonstop_servers A Local Authentication Restriction Bypass vulnerability in HPE NonStop Server version L-Series: T6533L01 through T6533L01^ADN; J-Series and H-series: T6533H02 through T6533H04^ADF and T6533H05 through T6533H05^ADL was found. 2018-02-15 not yet calculated CVE-2017-8974
BID
CONFIRM
hpe — nonstop_servers A Remote Disclosure of Information vulnerability in HPE NonStop Servers using SSH Service version L series: T0801L02 through T0801L02^ABX; J and H series: T0801H01 through T0801H01^ACA was found. 2018-02-15 not yet calculated CVE-2017-5803
BID
SECTRACK
CONFIRM
hpe — nonstop_software_essentials A Local Disclosure of Sensitive Information vulnerability in HPE NonStop Software Essentials version T0894 T0894H02 through T0894H02^AAI was found. 2018-02-15 not yet calculated CVE-2017-5788
SECTRACK
CONFIRM
hpe — officeconnect_network_switches A local Unauthorized Data Modification vulnerability in HPE OfficeConnect Network Switches version PT.02.01 including PT.01.03 through PT.01.14 2018-02-15 not yet calculated CVE-2017-5786
BID
CONFIRM
hpe — opencall_media_platform A Remote Code Execution vulnerability in HPE OpenCall Media Platform (OCMP) was found. The vulnerability impacts OCMP versions prior to 3.4.2 RP201 (for OCMP 3.x), all versions prior to 4.4.7 RP702 (for OCMP 4.x). 2018-02-15 not yet calculated CVE-2017-5799
BID
CONFIRM
EXPLOIT-DB
hpe — opencall_media_platform A Remote Code Execution vulnerability in HPE OpenCall Media Platform (OCMP) was found. The vulnerability impacts OCMP versions prior to 3.4.2 RP201 (for OCMP 3.x), all versions prior to 4.4.7 RP702 (for OCMP 4.x). 2018-02-15 not yet calculated CVE-2017-5798
BID
CONFIRM
EXPLOIT-DB
hpe — operations_bridge_analytics A Remote Unauthorized Access to Data vulnerability in HPE Business Process Monitor version v09.2x, v09.30 was found. 2018-02-15 not yet calculated CVE-2017-5801
BID
SECTRACK
CONFIRM
hpe — operations_bridge_analytics A Remote Cross-Site Scripting (XSS) vulnerability in HPE Operations Bridge Analytics version v3.0 was found. 2018-02-15 not yet calculated CVE-2017-5800
BID
CONFIRM
hpe — operations_orchestration A remote code execution vulnerability in HPE Operations Orchestration Community edition and Enterprise edition prior to v10.70 was found. 2018-02-15 not yet calculated CVE-2016-8519
BID
SECTRACK
CONFIRM
MISC
hpe — project_and_portfolio_management A Remote Cross-Site Scripting vulnerability in HPE Project and Portfolio Management (PPM) version v9.30, v9.31, v9.32, v9.40 was found. 2018-02-15 not yet calculated CVE-2017-8993
BID
SECTRACK
CONFIRM
hpe — sitescope A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found. 2018-02-15 not yet calculated CVE-2017-8950
BID
SECTRACK
CONFIRM
hpe — sitescope A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found. 2018-02-15 not yet calculated CVE-2017-8949
BID
SECTRACK
CONFIRM
hpe — sitescope A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found. 2018-02-15 not yet calculated CVE-2017-8951
BID
SECTRACK
CONFIRM
hpe — sitescope A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found. 2018-02-15 not yet calculated CVE-2017-8952
BID
SECTRACK
CONFIRM
hpe — smart_storage_administrator A Remote Arbitrary Code Execution vulnerability in HPE Smart Storage Administrator version before v2.60.18.0 was found. 2018-02-15 not yet calculated CVE-2016-8523
BID
CONFIRM
EXPLOIT-DB
hpe — storevirtual A Remote Arbitrary Command Execution vulnerability in HPE StoreVirtual 4000 Storage and StoreVirtual VSA Software running LeftHand OS version v12.5 and earlier was found. The problem was resolved in LeftHand OS v12.6 or any subsequent version. 2018-02-15 not yet calculated CVE-2016-8529
BID
SECTRACK
CONFIRM
hpe — system_management_homepage A remote denial of service vulnerability in HPE System Management Homepage for Windows and Linux version prior to v7.6.1 was found. 2018-02-15 not yet calculated CVE-2017-12545
BID
SECTRACK
CONFIRM
MISC
hpe — system_management_homepage A local authentication bypass vulnerability in HPE System Management Homepage for Windows and Linux version prior to v7.6.1 was found. 2018-02-15 not yet calculated CVE-2017-12553
BID
SECTRACK
CONFIRM
hpe — system_management_homepage A local buffer overflow vulnerability in HPE System Management Homepage for Windows and Linux version prior to v7.6.1 was found. 2018-02-15 not yet calculated CVE-2017-12546
BID
SECTRACK
CONFIRM
hpe — system_management_homepage A local arbitrary command execution vulnerability in HPE System Management Homepage for Windows and Linux version prior to v7.6.1 was found. 2018-02-15 not yet calculated CVE-2017-12547
BID
SECTRACK
CONFIRM
hpe — system_management_homepage A cross-site scripting vulnerability in HPE System Management Homepage for Windows and Linux version prior to v7.6.1 was found. 2018-02-15 not yet calculated CVE-2017-12544
BID
SECTRACK
CONFIRM
hpe — system_management_homepage A local security misconfiguration vulnerability in HPE System Management Homepage for Windows and Linux version prior to v7.6.1 was found. 2018-02-15 not yet calculated CVE-2017-12550
BID
SECTRACK
CONFIRM
hpe — system_management_homepage A local authentication bypass vulnerability in HPE System Management Homepage for Windows and Linux version prior to v7.6.1 was found. 2018-02-15 not yet calculated CVE-2017-12549
BID
SECTRACK
CONFIRM
hpe — system_management_homepage A local arbitrary execution of commands vulnerability in HPE System Management Homepage for Windows and Linux version prior to v7.6.1 was found. 2018-02-15 not yet calculated CVE-2017-12552
BID
SECTRACK
CONFIRM
hpe — system_management_homepage A local arbitrary execution of commands vulnerability in HPE System Management Homepage for Windows and Linux version prior to v7.6.1 was found. 2018-02-15 not yet calculated CVE-2017-12551
BID
SECTRACK
CONFIRM
hpe — system_management_homepage A local arbitrary command execution vulnerability in HPE System Management Homepage for Windows and Linux version prior to v7.6.1 was found. 2018-02-15 not yet calculated CVE-2017-12548
BID
SECTRACK
CONFIRM
hpe — systems_insight_manager A remote denial of service vulnerability in HPE Systems Insight Manager in all versions prior to 7.6 was found. 2018-02-15 not yet calculated CVE-2016-8516
SECTRACK
CONFIRM
CONFIRM
CONFIRM
hpe — systems_insight_manager
 
A cross site scripting vulnerability in HPE Systems Insight Manager in all versions prior to 7.6 was found. 2018-02-15 not yet calculated CVE-2016-8517
SECTRACK
CONFIRM
CONFIRM
CONFIRM
hpe — systems_insight_manager
 
A remote denial of service vulnerability in HPE Systems Insight Manager in all versions prior to 7.6 was found. 2018-02-15 not yet calculated CVE-2016-8518
SECTRACK
CONFIRM
CONFIRM
CONFIRM
hpe — ucmdb A Remote Code Execution vulnerability in HPE UCMDB version v10.10, v10.11, v10.20, v10.21, v10.22, v10.30, v10.31 was found. 2018-02-15 not yet calculated CVE-2017-8947
BID
SECTRACK
CONFIRM
hpe — version_control_repository_manager A remote denial of service vulnerability in HPE Version Control Repository Manager (VCRM) in all versions prior to 7.6 was found. 2018-02-15 not yet calculated CVE-2017-5787
BID
CONFIRM
CONFIRM
hpe — version_control_repository_manager A Cross-Site Request Forgery (CSRF) vulnerability in HPE Version Control Repository Manager (VCRM) was found. The problem impacts all versions prior to 7.6. 2018-02-15 not yet calculated CVE-2016-8513
BID
SECTRACK
CONFIRM
CONFIRM
hpe — version_control_repository_manager
 
A remote information disclosure in HPE Version Control Repository Manager (VCRM) was found. The problem impacts all versions prior to 7.6. 2018-02-15 not yet calculated CVE-2016-8514
BID
SECTRACK
CONFIRM
CONFIRM
hpe — version_control_repository_manager
 
A remote malicious file upload vulnerability in HPE Version Control Repository Manager (VCRM) was found. The problem impacts all versions prior to 7.6. 2018-02-15 not yet calculated CVE-2016-8515
BID
SECTRACK
CONFIRM
CONFIRM
hpe — vertica_analytics_platform A Remote Gain Privileged Access vulnerability in HPE Vertica Analytics Platform version v4.1 and later was found. 2018-02-15 not yet calculated CVE-2017-5802
BID
CONFIRM
hpe — xp_storage HPE XP Storage using Hitachi Global Link Manager (HGLM) has a local authenticated information disclosure vulnerability in HGLM version HGLM 6.3.0-00 to 8.5.2-00. 2018-02-15 not yet calculated CVE-2017-8985
CONFIRM
huawei — ar3200_firmware Huawei AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30 has an integer overflow vulnerability. The software does not sufficiently validate certain field in SCTP messages, a remote unauthenticated attacker could send a crafted SCTP message to the device. Successful exploit could cause system reboot. 2018-02-15 not yet calculated CVE-2017-15344
CONFIRM
huawei — ar3200_firmware Huawei AR3200 with software V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30 has an integer overflow vulnerability. The software does not sufficiently validate certain field in SCTP messages, a remote unauthenticated attacker could send a crafted SCTP message to the device. Successful exploit could system reboot. 2018-02-15 not yet calculated CVE-2017-15343
CONFIRM
huawei — cloudengine_12800 Huawei CloudEngine 12800 V100R003C00, V100R005C00, V100R005C10, V100R006C00,CloudEngine 5800 V100R003C00, V100R005C00, V100R005C10, V100R006C00,CloudEngine 6800 V100R003C00, V100R005C00, V100R005C10, V100R006C00,CloudEngine 7800 V100R003C00, V100R005C00, V100R005C10, V100R006C00 have a memory leak vulnerability. An unauthenticated attacker may send specific Resource ReServation Protocol (RSVP) packets to the affected products. Due to not release the memory to handle the packets, successful exploit will result in memory leak of the affected products and lead to a DoS condition. 2018-02-15 not yet calculated CVE-2017-15349
CONFIRM
huawei — honor_v9_play_smart_phones The ‘Find Phone’ function in Huawei Honor V9 play smart phones with versions earlier than Jimmy-AL00AC00B135 has an authentication bypass vulnerability. Due to improper authentication realization in the ‘Find Phone’ function. An attacker may exploit the vulnerability to bypass the ‘Find Phone’ function in order to use the phone normally. 2018-02-15 not yet calculated CVE-2017-15351
CONFIRM
huawei — mate_9_pro_mobile_phones Huawei Mate 9 Pro mobile phones with software of versions earlier than LON-AL00BC00B235 have a use after free (UAF) vulnerability. An attacker tricks a user into installing a malicious application, and the application can riggers access memory after free it. A local attacker may exploit this vulnerability to cause the mobile phone to crash. 2018-02-15 not yet calculated CVE-2017-15347
CONFIRM
huawei — multiple_products The Common Open Policy Service Protocol (COPS) module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10,SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3206 V100R002C00, V100R002C10,USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50 haa a buffer overflow vulnerability. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted message to the affected products. The vulnerability is due to insufficient input validation of the message, which could result in a buffer overflow. Successful exploit may cause some services abnormal. 2018-02-15 not yet calculated CVE-2017-15350
CONFIRM
huawei — multiple_products Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have a out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send malformed SOAP packets to the target device. Successful exploit could make the device access invalid memory and might reset a process. 2018-02-15 not yet calculated CVE-2017-17185
CONFIRM
huawei — multiple_products Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have an integer overflow vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send malformed SOAP packets to the target device. Successful exploit could cause an integer overflow and might reset a process. 2018-02-15 not yet calculated CVE-2017-17183
CONFIRM
huawei — multiple_products Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have a out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send malformed SOAP packets to the target device. Successful exploit could make the device access invalid memory and might reset a process. 2018-02-15 not yet calculated CVE-2017-17182
CONFIRM
huawei — multiple_products Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R005C32, V200R007C00, V200R008C20, V200R008C30, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, NetEngine16EX V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bounds read vulnerability due to insufficient input validation. An unauthenticated, remote attacker could exploit this vulnerability by sending malformed Session Initiation Protocol(SIP) packets to the target device. Successful exploit could make the device read out of bounds and thus cause a service to be unavailable. 2018-02-15 not yet calculated CVE-2017-17202
CONFIRM
huawei — multiple_products Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have an integer overflow vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send malformed SOAP packets to the target device. Successful exploit could cause an integer overflow and might reset a process. 2018-02-15 not yet calculated CVE-2017-17184
CONFIRM
huawei — multiple_products IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions. 2018-02-15 not yet calculated CVE-2017-17156
CONFIRM
huawei — multiple_products Huawei DP300 V500R002C00, Secospace USG6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, TP3206 V100R002C00, VP9660 V500R002C00, V500R002C10 have a resource exhaustion vulnerability. The software does not process certain field of H.323 message properly, a remote unauthenticated attacker could send crafted H.323 message to the device, successful exploit could cause certain service unavailable since the stack memory is exhausted. 2018-02-15 not yet calculated CVE-2017-17166
CONFIRM
huawei — multiple_products Huawei DP300 V500R002C00, RP200 V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have a memory leak vulnerability. An authenticated, local attacker may craft and load some specific Certificate Revocation List(CRL) configuration files to the devices repeatedly. Due to not release allocated memory properly, successful exploit may result in memory leak and services abnormal. 2018-02-15 not yet calculated CVE-2017-17302
CONFIRM
huawei — multiple_products IPv6 function in Huawei Quidway S2700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, S2300 V200R003C00, V200R003C00SPC300T, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S2700 V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5300 V200R003C00, V200R003C00SPC300T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R005C05, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S5700 V200R003C00, V200R003C00SPC316T, V200R003C00SPC600, V200R003C02, V200R005C00, V200R005C01, V200R005C02, V200R005C03, V200R006C00, V200R007C00, V200R008C00, V200R009C00, S600-E V200R008C00, V200R009C00, S6300 V200R003C00, V200R005C00, V200R007C00, V200R008C00, V200R009C00, S6700 V200R003C00, V200R005C00, V200R005C01, V200R005C02, V200R007C00, V200R008C00, V200R009C00 has an out-of-bounds read vulnerability. An unauthenticated attacker may send crafted malformed IPv6 packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause device to reset. 2018-02-15 not yet calculated CVE-2017-17165
CONFIRM
huawei — multiple_products IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a DoS vulnerability due to insufficient input validation. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions. 2018-02-15 not yet calculated CVE-2017-17154
CONFIRM
huawei — multiple_products Huawei S12700 V200R008C00, V200R009C00, S5700 V200R007C00, V200R008C00, V200R009C00, S6700 V200R008C00, V200R009C00, S7700 V200R008C00, V200R009C00, S9700 V200R008C00, V200R009C00 have a numeric errors vulnerability. An unauthenticated, remote attacker may send specific TCP messages with keychain authentication option to the affected products. Due to the improper validation of the messages, it will cause numeric errors when handling the messages. Successful exploit will cause the affected products to reset. 2018-02-15 not yet calculated CVE-2017-17300
CONFIRM
huawei — multiple_products Huawei DP300 V500R002C00, TE60 V600R006C00, TP3106 V100R002C00, eSpace U1981 V200R003C30SPC100 have a denial of service vulnerability. The software does not correctly calculate the rest size in a buffer when handling SSL connections. A remote unauthenticated attacker could send a lot of crafted SSL messages to the device, successful exploit could cause no space in the buffer and then denial of service. 2018-02-15 not yet calculated CVE-2017-15342
CONFIRM
huawei — multiple_products Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00 have an out-of-bound read vulnerability. A remote attacker send specially crafted Session Initiation Protocol (SIP) messages to the affected products. Due to insufficient input validation, successful exploit will cause some services abnormal. 2018-02-15 not yet calculated CVE-2017-17283
CONFIRM
huawei — multiple_products IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has a memory leak vulnerability due to memory release failure resulted from insufficient input validation. An attacker could exploit it to cause memory leak, which may further lead to system exceptions. 2018-02-15 not yet calculated CVE-2017-17153
CONFIRM
huawei — multiple_products Huawei DP300, V500R002C00, RP200, V500R002C00, V600R006C00, RSE6500, V500R002C00, TE30, V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40, V500R002C00, V600R006C00, TE50, V500R002C00, V600R006C00, TE60, V100R001C01, V100R001C10, V500R002C00, V600R006C00, TX50, V500R002C00, V600R006C00, VP9660, V500R002C00, V500R002C10, ViewPoint 8660, V100R008C03, ViewPoint 9030, V100R011C02, V100R011C03, Viewpoint 8660, V100R008C03 have an out-of-bounds read vulnerability. An attacker has to control the peer device and send specially crafted messages to the affected products. Due to insufficient input validation, successful exploit may cause some service abnormal. 2018-02-15 not yet calculated CVE-2017-15353
CONFIRM
huawei — multiple_products Huawei DP300, V500R002C00, RP200, V600R006C00, TE30, V100R001C10, V500R002C00,V600R006C00, TE40, V500R002C00, V600R006C00, TE50, V500R002C00,V600R006C00, TE60, V100R001C10, V500R002C00, V600R006C00, TX50,V500R002C00, V600R006C00 have a buffer overflow vulnerability. An attacker may send specially crafted HTTP messages to the affected products. Due insufficient input validation of three different parameters in the messages, successful exploit may cause some service abnormal. 2018-02-15 not yet calculated CVE-2017-15356
CONFIRM
huawei — multiple_products IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds write vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory write, which may further lead to system exceptions. 2018-02-15 not yet calculated CVE-2017-17152
CONFIRM
huawei — multiple_products Huawei AR100, AR100-S, AR110-S, AR120, AR120-S, AR1200, AR1200-S, AR150, AR150-S, AR160, AR200, AR200-S, AR2200, AR2200-S, AR3200, AR510, DP300, NetEngine16EX, RP200, SRG1300, SRG2300, SRG3300, TE30, TE40, TE50, TE60, TP3106, TP3206, ViewPoint 8660, and ViewPoint 9030 have an insufficient validation vulnerability. Since packet validation is insufficient, an unauthenticated attacker may send special H323 packets to exploit the vulnerability. Successful exploit could allow the attacker to send malicious packets and result in DOS attacks. 2018-02-15 not yet calculated CVE-2017-17151
CONFIRM
huawei — multiple_products XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks. 2018-02-15 not yet calculated CVE-2017-15346
CONFIRM
huawei — multiple_products Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00 have a resource management error vulnerability. A remote attacker may send huge number of specially crafted SIP messages to the affected products. Due to improper handling of some value in the messages, successful exploit will cause some services abnormal. 2018-02-15 not yet calculated CVE-2017-17284
CONFIRM
huawei — multiple_products Huawei Smartphones with software LON-L29DC721B186 have a denial of service vulnerability. An attacker could make an loop exit condition that cannot be reached by sending the crafted 3GPP message. Successful exploit could cause the device to reboot. 2018-02-15 not yet calculated CVE-2017-15345
CONFIRM
huawei — multiple_products Huawei DP300, V500R002C00, RP200, V600R006C00, TE30, V100R001C10, V500R002C00,V600R006C00, TE40, V500R002C00, V600R006C00, TE50, V500R002C00,V600R006C00, TE60, V100R001C10, V500R002C00, V600R006C00, TX50,V500R002C00, V600R006C00 have a buffer overflow vulnerability. An attacker may send specially crafted HTTP messages to the affected products. Due insufficient input validation of three different parameters in the messages, successful exploit may cause some service abnormal. 2018-02-15 not yet calculated CVE-2017-15355
CONFIRM
huawei — multiple_products Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have an integer overflow vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send malformed SOAP packets to the target device. Successful exploit could cause an integer overflow and might reset a process. 2018-02-15 not yet calculated CVE-2017-17187
CONFIRM
huawei — multiple_products Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R005C32, V200R007C00, V200R008C20, V200R008C30, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30,AR2200 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, NetEngine16EX V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bound read vulnerability in some Huawei products. Due to insufficient input validation, a remote, unauthenticated attacker may send crafted signature to the affected products. Successful exploit may cause buffer overflow, services abnormal. 2018-02-15 not yet calculated CVE-2017-17287
CONFIRM
huawei — multiple_products Huawei DP300, V500R002C00, RP200, V600R006C00, TE30, V100R001C10, V500R002C00,V600R006C00, TE40, V500R002C00, V600R006C00, TE50, V500R002C00,V600R006C00, TE60, V100R001C10, V500R002C00, V600R006C00, TX50,V500R002C00, V600R006C00 have a buffer overflow vulnerability. An attacker may send specially crafted HTTP messages to the affected products. Due insufficient input validation of three different parameters in the messages, successful exploit may cause some service abnormal. 2018-02-15 not yet calculated CVE-2017-15354
CONFIRM
huawei — multiple_products Huawei IPS Module V500R001C00, NGFW Module V500R001C00, NIP6300 V500R001C00, NIP6600 V500R001C00, Secospace USG6300 V500R001C00, Secospace USG6500 V500R001C00, Secospace USG6600 V500R001C00, USG9500 V500R001C00 have an insufficient input validation vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset. 2018-02-15 not yet calculated CVE-2017-15348
CONFIRM
huawei — multiple_products Huawei Secospace USG6600 V500R001C30SPC100, Secospace USG6600 V500R001C30SPC200, Secospace USG6600 V500R001C30SPC300, USG9500 V500R001C30SPC100, USG9500 V500R001C30SPC200, USG9500 V500R001C30SPC300 have a memory leak vulnerability due to memory don’t be released when an local authenticated attacker execute special commands many times. An attacker could exploit it to cause memory leak, which may further lead to system exceptions. 2018-02-15 not yet calculated CVE-2017-17162
CONFIRM
huawei — multiple_products IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to incompliance with the 4-byte alignment requirement imposed by the MIPS CPU. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions. 2018-02-15 not yet calculated CVE-2017-17155
CONFIRM
huawei — multiple_products Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a memory leak vulnerability. An authenticated, local attacker may craft a specific XML file to the affected products. Due to not free the memory to parse the XML file, successful exploit will result in memory leak of the affected products. 2018-02-15 not yet calculated CVE-2017-17291
CONFIRM
huawei — multiple_products The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal. 2018-02-15 not yet calculated CVE-2017-15337
CONFIRM
huawei — multiple_products Huawei AR120-S V200R006C10, V200R007C00, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C02, AR1200-S V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C02, AR150-S V200R006C10, V200R007C00, AR160 V200R006C10, V200R006C12, V200R007C00S, V200R007C02, AR200 V200R006C10, V200R007C00, AR200-S V200R006C10, V200R007C00, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C02, AR2200-S V200R006C10, V200R007C00, V200R008C20, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C02, AR3600 V200R006C10, V200R007C00, AR510 V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, IPS Module V500R001C30, NIP6300 V500R001C30, NetEngine16EX V200R006C10, V200R007C00 have an insufficient input validation vulnerability. An unauthenticated, remote attacker may send crafted IKE V2 messages to the affected products. Due to the insufficient validation of the messages, successful exploit will cause invalid memory access and result in a denial of service on the affected products. 2018-02-15 not yet calculated CVE-2017-17299
CONFIRM
huawei — multiple_products XML parser in Huawei S12700 V200R005C00,S1700 V200R009C00, V200R010C00,S3700 V100R006C03, V100R006C05,S5700 V200R001C00, V200R002C00, V200R003C00, V200R003C02, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S6700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R005C02, V200R008C00, V200R009C00, V200R010C00,S7700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,S9700 V200R001C00, V200R002C00, V200R003C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, V200R009C00, V200R010C00,eCNS210_TD V100R004C10, V100R004C10SPC003, V100R004C10SPC100, V100R004C10SPC101, V100R004C10SPC102, V100R004C10SPC200, V100R004C10SPC221, V100R004C10SPC400 has a DOS vulnerability. An attacker may craft specific XML files to the affected products. Due to not check the specially XML file and to parse this file, successful exploit will result in DOS attacks. 2018-02-15 not yet calculated CVE-2017-15333
CONFIRM
huawei — multiple_products Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a denial of service vulnerability in the specific module. An authenticated, local attacker may craft a specific XML file to the affected products. Due to improper handling of input, successful exploit will cause some service abnormal. 2018-02-15 not yet calculated CVE-2017-17292
CONFIRM
huawei — multiple_products The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal. 2018-02-15 not yet calculated CVE-2017-15336
CONFIRM
huawei — multiple_products Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal. 2018-02-15 not yet calculated CVE-2017-17297
CONFIRM
huawei — multiple_products The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal. 2018-02-15 not yet calculated CVE-2017-15339
CONFIRM
huawei — multiple_products The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal. 2018-02-15 not yet calculated CVE-2017-15334
CONFIRM
huawei — multiple_products The SIP backup feature in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker may send specially crafted messages to the affected products. Due to the insufficient validation of some values for SIP messages, successful exploit may cause services abnormal. 2018-02-15 not yet calculated CVE-2017-15335
CONFIRM
huawei — multiple_products Huawei AR120-S V200R006C10, V200R007C00, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C02, AR1200-S V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C02, AR150-S V200R006C10, V200R007C00, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C02, AR200 V200R006C10, V200R007C00, AR200-S V200R006C10, V200R007C00, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C02, AR2200-S V200R006C10, V200R007C00, V200R008C20, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C02, AR3600 V200R006C10, V200R007C00, AR510 V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, NetEngine16EX V200R006C10, V200R007C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, SRG2300 V200R006C10, V200R007C00, V200R007C02, SRG3300 V200R006C10, V200R007C00 have a buffer overflow vulnerability due to incomplete range checks of the input data. An unauthenticated, remote attacker could exploit this vulnerability by sending malicious IKE packets to the targeted device. An exploit could allow the attacker to cause the device to write out of bound and restart. 2018-02-15 not yet calculated CVE-2017-17160
CONFIRM
huawei — multiple_products Huawei smartphones with software of TAG-AL00C92B168 have an information disclosure vulnerability. An attacker tricks the user to install a crafted application, this application simulate click action to back up data in a non-encrypted way using an Android assist function. Successful exploit could result in information disclosure. 2018-02-15 not yet calculated CVE-2017-15340
CONFIRM
huawei — multiple_products Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, ViewPoint 9030 V100R011C02, V100R011C03 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted certificates to the affected products. Due to insufficient validation of the certificates, successful exploit may cause buffer overflow and some service abnormal. 2018-02-15 not yet calculated CVE-2017-17298
CONFIRM
huawei — multiple_products The SIP module in Huawei DP300 V500R002C00, IPS Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, RP200 V500R002C00, V600R006C00, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, USG9500 V500R001C00, V500R001C20, V500R001C30, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V100R001C20, V200R003C00, V200R003C20, V200R003C30 has a buffer overflow vulnerability. An attacker would have to find a way to craft specific messages to the affected products. Due to the insufficient validation for SIP messages, successful exploit may cause services abnormal. 2018-02-15 not yet calculated CVE-2017-15338
CONFIRM
huawei — multiple_products Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have a memory leak vulnerability. The software does not release allocated memory properly when handling XML data. An authenticated, local attacker could upload crafted XML file repeatedly to cause memory leak and service abnormal. 2018-02-15 not yet calculated CVE-2017-17289
CONFIRM
huawei — multiple_products Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R005C32, V200R007C00, V200R008C20, V200R008C30, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, NetEngine16EX V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, V200R008C30 have an out-of-bound write vulnerability. Due to insufficient input validation, a remote, unauthenticated attacker may craft encryption key to the affected products. Successful exploit may cause buffer overflow, services abnormal. 2018-02-15 not yet calculated CVE-2017-17286
CONFIRM
huawei — multiple_products Huawei AR120-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR1200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR1200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR160 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR200 V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR2200 V200R005C20, V200R005C32, V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, AR2200-S V200R005C32, V200R006C10, V200R007C00, V200R008C20, AR3200 V200R005C32, V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R005C32, V200R006C10, V200R007C00, V200R008C20, CloudEngine 12800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 5800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 6800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, CloudEngine 7800 V100R003C00, V100R003C10, V100R005C00, V100R005C10, V100R006C00, V200R001C00, DP300 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, SRG1300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG2300 V200R005C32, V200R006C10, V200R007C00, V200R007C02, V200R008C20, SRG3300 V200R005C32, V200R006C10, V200R007C00, V200R008C20, TE30 V100R001C10, TE60 V100R003C00, V500R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, ViewPoint 8660 V100R008C02, V100R008C03, eSpace IAD V300R002C01, eSpace U1981 V200R003C20, V200R003C30, eSpace USM V100R001C01, V300R001C00 have a weak cryptography vulnerability. Due to not properly some values in the certificates, an unauthenticated remote attacker could forges a specific RSA certificate and exploits the vulnerability to pass identity authentication and logs into the target device to obtain permissions configured for the specific user name. 2018-02-15 not yet calculated CVE-2017-17301
CONFIRM
huawei — multiple_products Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a buffer overflow vulnerability. An authenticated, local attacker may craft a specific XML file to the affected products. Due to insufficient input validation, successful exploit will cause some service abnormal. 2018-02-15 not yet calculated CVE-2017-17293
CONFIRM
huawei — multiple_products Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a memory leak vulnerability. An unauthenticated, remote attacker may send specially crafted H323 packages to the affected products. Due to not release the allocated memory properly to handle the packets, successful exploit may cause memory leak and some services abnormal. 2018-02-15 not yet calculated CVE-2017-17296
CONFIRM
huawei — multiple_products The Flp Driver in some Huawei smartphones of the software Vicky-AL00AC00B124D, Vicky-AL00AC00B157D, Vicky-AL00AC00B167 has a double free vulnerability. An attacker can trick a user to install a malicious application which has a high privilege to exploit this vulnerability. Successful exploitation may cause denial of service (DoS) attack. 2018-02-15 not yet calculated CVE-2017-15330
CONFIRM
huawei — multiple_products IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to insufficient input validation. An attacker could exploit it to craft special packets to trigger out-of-bounds memory access, which may further lead to system exceptions. 2018-02-15 not yet calculated CVE-2017-17157
CONFIRM
huawei — multiple_products Huawei OceanStor 2800 V3, V300R003C00, V300R003C20, OceanStor 5300 V3, V300R003C00, V300R003C10, V300R003C20, OceanStor 5500 V3, V300R003C00, V300R003C10, V300R003C20, OceanStor 5600 V3, V300R003C00, V300R003C10, V300R003C20, OceanStor 5800 V3, V300R003C00, V300R003C10, V300R003C20 have an improper access control vulnerability. Due to incorrectly restrict access to a resource, an attacker with high privilege may exploit the vulnerability to query some information or send specific message to cause some service abnormal. 2018-02-15 not yet calculated CVE-2017-15352
CONFIRM
huawei — multiple_products Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have a memory leak vulnerability in H323 protocol. The vulnerability is due to insufficient verification of the packets. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets. A successful exploit could cause a memory leak and eventual denial of service (DoS) condition on an affected device. 2018-02-15 not yet calculated CVE-2017-15332
CONFIRM
huawei — multiple_products Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have an integer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted messages to the affected products. Due to insufficient input validation, successful exploit may cause integer overflow and some process abnormal. 2018-02-15 not yet calculated CVE-2017-17288
CONFIRM
huawei — multiple_products Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, MAX PRESENCE V100R001C00, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00SPC200, V600R006C00, RSE6500 V500R002C00, SMC2.0 V100R003C10, V100R005C00, V500R002C00, V500R002C00T, V600R006C00, V600R006C00T, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, have an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker may send crafted packets to the affected products. Due to insufficient verification of the packets, successful exploit will cause process reboot. 2018-02-15 not yet calculated CVE-2017-15331
CONFIRM
huawei — multiple_products Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, ViewPoint 9030 V100R011C02, V100R011C03, eSpace U1981 V200R003C20SPC900, V200R003C30SPC200 have a buffer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted SIP packages to the affected products. Due to the insufficient validation of some values for SIP packages, successful exploit may cause services abnormal. 2018-02-15 not yet calculated CVE-2017-17295
CONFIRM
huawei — multiple_products Huawei AR3200 V200R008C20, V200R008C30, TE40 V600R006C00, TE50 V600R006C00, TE60 V600R006C00 have a denial of service vulnerability. The software decodes X.509 certificate in an improper way. A remote unauthenticated attacker could send a crafted X.509 certificate to the device. Successful exploit could result in a denial of service on the device. 2018-02-15 not yet calculated CVE-2017-15341
CONFIRM
huawei — multiple_products Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have a DoS vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send malformed SOAP packets to the target device. Successful exploit could make some data overwritten, leak device memory and potentially reset a process. 2018-02-15 not yet calculated CVE-2017-17186
CONFIRM
huawei — multiple_products Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, V200R008C20, V200R008C30, DP300 V500R002C00, MAX PRESENCE V100R001C00, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RP200 V500R002C00, V600R006C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10 have a null pointer dereference vulnerability. Due to insufficient input validation, an authenticated, local attacker may craft a specific XML file to the affected products to cause null pointer dereference. Successful exploit will cause some service abnormal. 2018-02-15 not yet calculated CVE-2017-17294
CONFIRM
huawei — multiple_smartphones Some huawei smartphones with software BTV-DL09C233B350, Berlin-L21HNC432B360, Berlin-L22HNC636B360, Berlin-L24HNC567B360, Berlin-L21C10B130, Berlin-L21C185B132, Berlin-L21C464B130, Berlin-L22C346B140, Berlin-L22C636B160, Berlin-L23C605B131, Berlin-L23DOMC109B160, MHA-AL00AC00B125 have a DoS vulnerability. Due to insufficient input validation, an attacker could trick a user to execute a malicious application, which could be exploited by attacker to launch DoS attacks. 2018-02-15 not yet calculated CVE-2017-17201
CONFIRM
huawei — multiple_smartphones Bluetooth module in some Huawei mobile phones with software LON-AL00BC00B229 and earlier versions has a buffer overflow vulnerability. Due to insufficient input validation, an unauthenticated attacker may craft Bluetooth AVDTP/AVCTP messages after successful paring, causing buffer overflow. Successful exploit may cause code execution. 2018-02-15 not yet calculated CVE-2017-17285
CONFIRM
huawei — multiple_smartphones Some Huawei smart phones with software of NXT-AL10C00B386, NXT-CL00C92B386, NXT-DL00C17B386, NXT-TL00C01B386SP01, NTS-AL00C00B535 have a DoS vulnerability due to insufficient input validation. An unauthenticated attacker could send malformed System Information(SI) messages to the smart phone within radio range by special wireless device. Successful exploit could make the smart phone restart. 2018-02-15 not yet calculated CVE-2017-17159
CONFIRM
huawei — multiple_smartphones The ‘Find Phone’ function in some Huawei smart phones with software earlier than Duke-L09C10B186 versions, earlier than Duke-L09C432B187 versions, earlier than Duke-L09C636B186 versions has an authentication bypass vulnerability. Due to improper authentication realization in the ‘Find Phone’ function. An attacker may exploit the vulnerability to bypass the ‘Find Phone’ function in order to use the phone normally. 2018-02-15 not yet calculated CVE-2017-17161
CONFIRM
huawei — secospace Huawei Secospace USG6600 V500R001C30SPC100 has an Out-of-Bounds memory access vulnerability due to insufficient verification. An authenticated local attacker can make processing crash by executing some commands. The attacker can exploit this vulnerability to cause a denial of service. 2018-02-15 not yet calculated CVE-2017-17163
CONFIRM
huawei — secospace Huawei Secospace AntiDDoS8000 V500R001C20SPC500 have a memory leak vulnerability due to memory don’t be released when the system open some function. An attacker could exploit it to cause memory leak, which may further lead to system exceptions. 2018-02-15 not yet calculated CVE-2017-17164
CONFIRM
huawei — te60 The Light Directory Access Protocol (LDAP) clients of Huawei TE60 with software V600R006C00, ViewPoint 9030 with software V100R011C02, V100R011C03 have a resource management errors vulnerability. An unauthenticated, remote attacker may make the LDAP server not respond to the client’s request by controlling the LDAP server. Due to improper management of LDAP connection resource, a successful exploit may cause the connection resource exhausted of the LDAP client. 2018-02-15 not yet calculated CVE-2017-17290
CONFIRM
huawei — uma Huawei UMA V200R001C00 has a SQL injection vulnerability in the operation and maintenance module. An attacker logs in to the system as a common user and sends crafted HTTP requests that contain malicious SQL statements to the affected system. Due to a lack of input validation on HTTP requests that contain user-supplied input, successful exploitation may allow the attacker to execute arbitrary SQL queries. 2018-02-15 not yet calculated CVE-2017-15329
CONFIRM
ibm — aix A software logic bug creates a vulnerability in an AIX 6.1, 7.1, and 7.2 daemon which could allow a user with root privileges on one system, to obtain root access on another machine. IBM X-force ID: 138117. 2018-02-13 not yet calculated CVE-2018-1383
CONFIRM
MISC
BID
SECTRACK
MISC
ibm — connections IBM Connections 4.0, 4.5, 5.0, 5.5, and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 134004. 2018-02-14 not yet calculated CVE-2017-1682
CONFIRM
MISC
ibm — inotes IBM iNotes 8.5 and 9.0 SUService can be misguided into running malicious code from a DLL masquerading as a windows DLL in the temp directory. IBM X-Force ID: 134532. 2018-02-13 not yet calculated CVE-2017-1711
CONFIRM
CONFIRM
MISC
ibm — maximo_asset_management IBM Maximo Asset Management 7.5 and 7.6 could allow a remote attacker to include arbitrary files, which could allow the attacker to execute arbitrary code on the vulnerable Web server. IBM X-Force ID: 129106. 2018-02-14 not yet calculated CVE-2017-1499
CONFIRM
MISC
ibm — notes IBM Notes 8.5 and 9.0 could allow a local attacker to execute arbitrary commands by carefully crafting a command line sent via the shared memory IPC. IBM X-Force ID: 134807. 2018-02-13 not yet calculated CVE-2017-1720
CONFIRM
CONFIRM
MISC
ibm — notes_and_domino_nsd IBM Notes and Domino NSD 8.5 and 9.0 could allow an authenticated local user without administrative privileges to gain System privilege. IBM X-Force ID: 134633. 2018-02-13 not yet calculated CVE-2017-1714
CONFIRM
CONFIRM
MISC
ibm — security_guardium_database_activity_monitor IBM Security Guardium Database Activity Monitor 9.0, 9.1, and 9.5 could allow a local user with low privileges to view report pages and perform some actions that only an admin should be performing, so there is risk that someone not authorized can change things that they are not suppose to. IBM X-Force ID: 137765. 2018-02-09 not yet calculated CVE-2018-1368
CONFIRM
SECTRACK
MISC
ibm — websphere_portal IBM WebSphere Portal 7.0, 8.0, 8.5, and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 136005. 2018-02-09 not yet calculated CVE-2017-1761
CONFIRM
SECTRACK
MISC
ibm — websphere_portal IBM WebSphere Portal 8.0, 8.5, and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 138437. 2018-02-09 not yet calculated CVE-2018-1401
BID
SECTRACK
MISC
CONFIRM
idashboards — idashboards An issue was discovered in iDashboards 9.6b. The SSO implementation is affected by a weak obfuscation library, allowing man-in-the-middle attackers to discover credentials. 2018-02-17 not yet calculated CVE-2018-7211
MISC
idashboards — idashboards An issue was discovered in iDashboards 9.6b. It allows remote attackers to obtain sensitive information via a direct request for the idb/config?CMD=installLicense URI, as demonstrated by intranet IP addresses and names of guest accounts. 2018-02-17 not yet calculated CVE-2018-7210
MISC
idashboards — idashboards An issue was discovered in iDashboards 9.6b. It allows remote attackers to obtain sensitive information via a direct request for the idashboards/config.xml URI, as demonstrated by intranet URLs for reports. 2018-02-17 not yet calculated CVE-2018-7209
MISC
imagemagick — imagemagick THe OLEProperty class in ole/oleprop.cpp in libfpx 1.3.1-10, as used in ImageMagick 7.0.7-22 Q16 and other products, allows remote attackers to cause a denial of service (stack-based buffer under-read) via a crafted bmp image. 2018-02-09 not yet calculated CVE-2018-6876
BID
MISC
imagemagick — imagemagick A stack-based buffer over-read in the ComputeResizeImage function in the MagickCore/accelerate.c file of ImageMagick 7.0.7-22 allows a remote attacker to cause a denial of service (application crash) via a maliciously crafted pict file. 2018-02-13 not yet calculated CVE-2018-6930
MISC
infinispan — infinispan It was found that the Hotrod client in Infinispan before 9.2.0.CR1 would unsafely read deserialized data on information from the cache. An authenticated attacker could inject a malicious object into the data cache and attain deserialization on the client, and possibly conduct further attacks. 2018-02-15 not yet calculated CVE-2017-15089
SECTRACK
REDHAT
CONFIRM
info-zip — unzip An out-of-bounds read exists in Info-Zip UnZip version 6.10c22 that allows an attacker to perform a denial of service and read sensitive memory. 2018-02-09 not yet calculated CVE-2018-1000034
MISC
info-zip — unzip A heap-based buffer overflow exists in Info-Zip UnZip version 6.10c22 that allows an attacker to perform a denial of service or to possibly achieve code execution. 2018-02-09 not yet calculated CVE-2018-1000031
MISC
info-zip — unzip A heap-based buffer overflow exists in Info-Zip UnZip version 6.10c22 that allows an attacker to perform a denial of service or to possibly achieve code execution. 2018-02-09 not yet calculated CVE-2018-1000032
MISC
info-zip — unzip A heap-based buffer overflow exists in Info-Zip UnZip version <= 6.00 in the processing of password-protected archives that allows an attacker to perform a denial of service or to possibly achieve code execution. 2018-02-09 not yet calculated CVE-2018-1000035
MISC
info-zip — unzip An out-of-bounds read exists in Info-Zip UnZip version 6.10c22 that allows an attacker to perform a denial of service and read sensitive memory. 2018-02-09 not yet calculated CVE-2018-1000033
BID
MISC
irssi — irssi An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. When the number of windows exceeds the available space, a crash due to a NULL pointer dereference would occur. 2018-02-15 not yet calculated CVE-2018-7052
CONFIRM
CONFIRM
irssi — irssi An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. Certain nick names could result in out-of-bounds access when printing theme strings. 2018-02-15 not yet calculated CVE-2018-7051
CONFIRM
CONFIRM
irssi — irssi An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. There is a use-after-free when SASL messages are received in an unexpected order. 2018-02-15 not yet calculated CVE-2018-7053
CONFIRM
CONFIRM
irssi — irssi An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. A NULL pointer dereference occurs for an “empty” nick. 2018-02-15 not yet calculated CVE-2018-7050
CONFIRM
CONFIRM
irssi — irssi An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. There is a use-after-free when a server is disconnected during netsplits. 2018-02-15 not yet calculated CVE-2018-7054
CONFIRM
CONFIRM
ivanti — endpoint_security Ivanti Endpoint Security (formerly HEAT Endpoint Management and Security Suite) 8.5 Update 1 and earlier allows an authenticated user with low privileges and access to the local network to bypass application whitelisting when using the Application Control module on Ivanti Endpoint Security in lockdown mode. 2018-02-15 not yet calculated CVE-2018-6316
CONFIRM
jboss — jboss-remoting A vulnerability was found in the way RemoteMessageChannel, introduced in jboss-remoting versions 3.3.10, reads from an empty buffer. An attacker could use this flaw to cause denial of service via high CPU caused by an infinite loop. 2018-02-15 not yet calculated CVE-2018-1041
SECTRACK
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM
jenkins — jenkins Jenkins Pipeline: Supporting APIs Plugin 2.17 and earlier have an arbitrary code execution due to incomplete sandbox protection: Methods related to Java deserialization like readResolve implemented in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code. This could be exploited e.g. by regular Jenkins users with the permission to configure Pipelines in Jenkins, or by trusted committers to repositories containing Jenkinsfiles. 2018-02-09 not yet calculated CVE-2018-1000058
BID
CONFIRM
jenkins — jenkins An improper input validation vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to access plugin resource files in the META-INF and WEB-INF directories that should not be accessible, if the Jenkins home directory is on a case-insensitive file system. 2018-02-15 not yet calculated CVE-2018-1000068
CONFIRM
jenkins — jenkins An improper authorization vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to have Jenkins submit HTTP GET requests and get limited information about the response. 2018-02-15 not yet calculated CVE-2018-1000067
CONFIRM
joomla! — joomla! SQL Injection exists in the Staff Master through 1.0 RC 1 component for Joomla! via the name parameter in a view=staff request. 2018-02-17 not yet calculated CVE-2018-5992
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the JomEstate PRO through 3.7 component for Joomla! via the id parameter in a task=detailed action. 2018-02-17 not yet calculated CVE-2018-6368
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the Google Map Landkarten through 4.2.3 component for Joomla! via the cid or id parameter in a layout=form_markers action, or the map parameter in a layout=default action. 2018-02-17 not yet calculated CVE-2018-6396
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the Pinterest Clone Social Pinboard 2.0 component for Joomla! via the pin_id or user_id parameter in a task=getlikeinfo action, the ends parameter in a view=gift action, the category parameter in a view=home action, the uid parameter in a view=pindisplay action, the searchVal parameter in a view=search action, or the uid parameter in a view=likes action. 2018-02-17 not yet calculated CVE-2018-5987
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the JTicketing 2.0.16 component for Joomla! via a view=events action with a filter_creator or filter_events_cat parameter. 2018-02-17 not yet calculated CVE-2018-6585
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the Timetable Responsive Schedule 1.5 component for Joomla! via a view=event&alias= request. 2018-02-17 not yet calculated CVE-2018-6583
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the Form Maker 3.6.12 component for Joomla! via the id, from, or to parameter in a view=stats request, a different vulnerability than CVE-2015-2798. 2018-02-17 not yet calculated CVE-2018-5991
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the InviteX 3.0.5 component for Joomla! via the invite_type parameter in a view=invites action. 2018-02-17 not yet calculated CVE-2018-6394
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the Realpin through 1.5.04 component for Joomla! via the pinboard parameter. 2018-02-17 not yet calculated CVE-2018-6005
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the ccNewsletter 2.x component for Joomla! via the id parameter in a task=removeSubscriber action, a related issue to CVE-2011-5099. 2018-02-17 not yet calculated CVE-2018-5989
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the File Download Tracker 3.0 component for Joomla! via the dynfield[phone] or sess parameter. 2018-02-17 not yet calculated CVE-2018-6004
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the JS Autoz 1.0.9 component for Joomla! via the vtype, pre, or prs parameter. 2018-02-17 not yet calculated CVE-2018-6006
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the Saxum Numerology 3.0.4 component for Joomla! via the publicid parameter. 2018-02-17 not yet calculated CVE-2018-7177
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the JS Jobs 1.1.9 component for Joomla! via the zipcode parameter in a newest-jobs request, or the ta parameter in a view_resume request. 2018-02-17 not yet calculated CVE-2018-5994
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the DT Register 3.2.7 component for Joomla! via a task=edit&id= request. 2018-02-17 not yet calculated CVE-2018-6584
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the Saxum Picker 3.2.10 component for Joomla! via the publicid parameter. 2018-02-17 not yet calculated CVE-2018-7178
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the SimpleCalendar 3.1.9 component for Joomla! via the catid array parameter. 2018-02-17 not yet calculated CVE-2018-5974
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the Saxum Astro 4.0.14 component for Joomla! via the publicid parameter. 2018-02-17 not yet calculated CVE-2018-7180
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the SquadManagement 1.0.3 component for Joomla! via the id parameter. 2018-02-17 not yet calculated CVE-2018-7179
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the Solidres 2.5.1 component for Joomla! via the direction parameter in a hub.search action. 2018-02-17 not yet calculated CVE-2018-5980
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the Advertisement Board 3.1.0 component for Joomla! via a task=show_rss_categories&catname= request. 2018-02-17 not yet calculated CVE-2018-5982
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the JquickContact 1.3.2.2.1 component for Joomla! via a task=refresh&sid= request. 2018-02-17 not yet calculated CVE-2018-5983
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the Gallery WD 1.3.6 component for Joomla! via the tag_id parameter or gallery_id parameter. 2018-02-17 not yet calculated CVE-2018-5981
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the Smart Shoutbox 3.0.0 component for Joomla! via the shoutauthor parameter to the archive URI. 2018-02-17 not yet calculated CVE-2018-5975
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the Fastball 2.5 component for Joomla! via the season parameter in a view=player action. 2018-02-17 not yet calculated CVE-2018-6373
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the NeoRecruit 4.1 component for Joomla! via the (1) PATH_INFO or (2) name of a .html file under the all-offers/ URI. 2018-02-17 not yet calculated CVE-2018-6370
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the Aist through 2.0 component for Joomla! via the id parameter in a view=showvacancy request. 2018-02-17 not yet calculated CVE-2018-5993
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the MediaLibrary Free 4.0.12 component for Joomla! via the id parameter or the mid array parameter. 2018-02-17 not yet calculated CVE-2018-5971
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the JB Bus 2.3 component for Joomla! via the order_number parameter. 2018-02-17 not yet calculated CVE-2018-6372
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the AllVideos Reloaded 1.2.x component for Joomla! via the divid parameter. 2018-02-17 not yet calculated CVE-2018-5990
EXPLOIT-DB
joomla! — joomla! SQL Injection exists in the JGive 2.0.9 component for Joomla! via the filter_org_ind_type or campaign_countries parameter. 2018-02-17 not yet calculated CVE-2018-5970
EXPLOIT-DB
leptonica — leptonica Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions. 2018-02-16 not yet calculated CVE-2018-7186
MISC
MISC
MISC
libreoffice — libreoffice LibreOffice through 6.0.1 allows remote attackers to read arbitrary files via =WEBSERVICE calls in a document, which use the COM.MICROSOFT.WEBSERVICE function. 2018-02-09 not yet calculated CVE-2018-6871
MISC
DEBIAN
EXPLOIT-DB
linux — linux_kernel The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value. 2018-02-12 not yet calculated CVE-2018-6927
MISC
BID
MISC
MISC
linux — linux_kernel In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free. 2018-02-11 not yet calculated CVE-2017-18174
MISC
MISC
MISC
MISC
microsoft — chakracore ChakraCore allows remote code execution, due to how the ChakraCore scripting engine handles objects in memory, aka “Scripting Engine Memory Corruption Vulnerability”. This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866. 2018-02-14 not yet calculated CVE-2018-0858
BID
SECTRACK
CONFIRM
microsoft — edge Microsoft Edge in Microsoft Windows 10 1703 and 1709 allows information disclosure, due to how Edge handles objects in memory, aka “Microsoft Edge Information Disclosure Vulnerability”. This CVE ID is unique from CVE-2018-0839. 2018-02-14 not yet calculated CVE-2018-0763
BID
SECTRACK
CONFIRM
microsoft — edge Microsoft Edge in Microsoft Windows 10 1703 allows information disclosure, due to how Edge handles objects in memory, aka “Microsoft Edge Information Disclosure Vulnerability”. This CVE ID is unique from CVE-2018-0763. 2018-02-14 not yet calculated CVE-2018-0839
BID
SECTRACK
CONFIRM
microsoft — edge Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows a security feature bypass, due to how Edge handles different-origin requests, aka “Microsoft Edge Security Feature Bypass”. 2018-02-14 not yet calculated CVE-2018-0771
BID
SECTRACK
CONFIRM
microsoft — edge Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka “Scripting Engine Memory Corruption Vulnerability”. This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, and CVE-2018-0866. 2018-02-14 not yet calculated CVE-2018-0861
BID
SECTRACK
CONFIRM
microsoft — edge_and_chakracore Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka “Scripting Engine Memory Corruption Vulnerability”. This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866. 2018-02-14 not yet calculated CVE-2018-0838
BID
SECTRACK
CONFIRM
EXPLOIT-DB
microsoft — edge_and_chakracore Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka “Scripting Engine Memory Corruption Vulnerability”. This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866. 2018-02-14 not yet calculated CVE-2018-0857
BID
SECTRACK
CONFIRM
microsoft — edge_and_chakracore Microsoft Edge and ChakraCore in Microsoft Windows 10 1703 and 1709 allows remote code execution, due to how the scripting engine handles objects in memory, aka “Scripting Engine Memory Corruption Vulnerability”. This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866. 2018-02-14 not yet calculated CVE-2018-0836
BID
SECTRACK
CONFIRM
microsoft — edge_and_chakracore Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka “Scripting Engine Memory Corruption Vulnerability”. This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0861, and CVE-2018-0866. 2018-02-14 not yet calculated CVE-2018-0860
BID
SECTRACK
CONFIRM
EXPLOIT-DB
microsoft — edge_and_chakracore Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka “Scripting Engine Memory Corruption Vulnerability”. This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866. 2018-02-14 not yet calculated CVE-2018-0837
BID
SECTRACK
CONFIRM
EXPLOIT-DB
microsoft — edge_and_chakracore Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka “Scripting Engine Memory Corruption Vulnerability”. This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866. 2018-02-14 not yet calculated CVE-2018-0859
BID
SECTRACK
CONFIRM
microsoft — edge_and_chakracore Microsoft Edge and ChakraCore in Microsoft Windows 10 1703 and 1709 allows remote code execution, due to how the scripting engine handles objects in memory, aka “Scripting Engine Memory Corruption Vulnerability”. This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866. 2018-02-14 not yet calculated CVE-2018-0856
BID
SECTRACK
CONFIRM
microsoft — internet_explorer Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka “Scripting Engine Memory Corruption Vulnerability”. This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, and CVE-2018-0861. 2018-02-14 not yet calculated CVE-2018-0866
BID
SECTRACK
SECTRACK
CONFIRM
microsoft — internet_explorer Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Internet Explorer and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka “Scripting Engine Memory Corruption Vulnerability”. This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866. 2018-02-14 not yet calculated CVE-2018-0840
BID
SECTRACK
SECTRACK
CONFIRM
EXPLOIT-DB
microsoft — internet_explorer Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow information disclosure, due to how Internet Explorer handles objects in memory, aka “Internet Explorer Information Disclosure Vulnerability”. 2018-02-14 not yet calculated CVE-2018-0847
BID
SECTRACK
CONFIRM
microsoft — office Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1 and RT SP1, Microsoft Outlook 2016, and Microsoft Office 2016 Click-to-Run (C2R) allow a remote code execution vulnerability, due to how Outlook handles objects in memory, aka “Microsoft Office Memory Corruption Vulnerability”. This CVE is unique from CVE-2018-0851. 2018-02-14 not yet calculated CVE-2018-0852
BID
SECTRACK
CONFIRM
microsoft — office Microsoft Office 2010 SP2, Microsoft Office 2013 SP1 and RT SP1, Microsoft Office 2016, and Microsoft Office 2016 Click-to-Run (C2R) allow an information disclosure vulnerability, due to how Office initializes the affected variable, aka “Microsoft Office Information Disclosure Vulnerability”. 2018-02-14 not yet calculated CVE-2018-0853
BID
SECTRACK
CONFIRM
microsoft — office Microsoft Office 2007 SP2, Microsoft Office Word Viewer, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1 and RT SP1, Microsoft Office 2016, and Microsoft Office 2016 Click-to-Run (C2R) allow a remote code execution vulnerability, due to how Office handles objects in memory, aka “Microsoft Office Memory Corruption Vulnerability”. This CVE is unique from CVE-2018-0852. 2018-02-14 not yet calculated CVE-2018-0851
BID
SECTRACK
CONFIRM
microsoft — office_2016_click-to-run Microsoft Office 2016 Click-to-Run allows a remote code execution vulnerability due to how objects are handled in memory, aka “Office Remote Code Execution Vulnerability” 2018-02-14 not yet calculated CVE-2018-0841
BID
SECTRACK
CONFIRM
microsoft — outlook Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, Microsoft Outlook 2016, and Microsoft Office 2016 Click-to-Run allow an elevation of privilege vulnerability due to how the format of incoming message is validated, aka “Microsoft Outlook Elevation of Privilege Vulnerability”. 2018-02-14 not yet calculated CVE-2018-0850
BID
SECTRACK
CONFIRM
microsoft — sharepoint SharePoint Server 2016 allows an elevation of privilege vulnerability due to how web requests are handled, aka “Microsoft SharePoint Elevation of Privilege Vulnerability”. 2018-02-14 not yet calculated CVE-2018-0869
BID
SECTRACK
CONFIRM
microsoft — sharepoint SharePoint Project Server 2013 and SharePoint Enterprise Server 2016 allow an information disclosure vulnerability due to how web requests are handled, aka “Microsoft SharePoint Information Disclosure Vulnerability”. 2018-02-14 not yet calculated CVE-2018-0864
BID
SECTRACK
CONFIRM
microsoft — windows The Windows Common Log File System (CLFS) driver in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how objects in memory are handled, aka “Windows Common Log File System Driver Elevation Of Privilege Vulnerability”. This CVE is unique from CVE-2018-0844. 2018-02-14 not yet calculated CVE-2018-0846
BID
SECTRACK
CONFIRM
microsoft — windows AppContainer in Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way constrained impersonations are handled, aka “Windows AppContainer Elevation Of Privilege Vulnerability”. 2018-02-14 not yet calculated CVE-2018-0821
BID
SECTRACK
CONFIRM
microsoft — windows Windows Scripting Host (WSH) in Windows 10 versions 1703 and 1709 and Windows Server, version 1709 allows a Device Guard security feature bypass vulnerability due to the way objects are handled in memory, aka “Windows Security Feature Bypass Vulnerability”. 2018-02-14 not yet calculated CVE-2018-0827
BID
SECTRACK
CONFIRM
microsoft — windows Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka “Scripting Engine Memory Corruption Vulnerability”. This CVE ID is unique from CVE-2018-0834, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866. 2018-02-14 not yet calculated CVE-2018-0835
BID
SECTRACK
CONFIRM
EXPLOIT-DB
microsoft — windows The Named Pipe File System in Windows 10 version 1709 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way the Named Pipe File System handles objects, aka “Named Pipe File System Elevation of Privilege Vulnerability”. 2018-02-14 not yet calculated CVE-2018-0823
BID
SECTRACK
CONFIRM
microsoft — windows Windows Storage Services in Windows 10 versions 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka “Windows Storage Services Elevation of Privilege Vulnerability”. 2018-02-14 not yet calculated CVE-2018-0826
BID
SECTRACK
CONFIRM
microsoft — windows The Microsoft Windows Embedded OpenType (EOT) font engine in Microsoft Windows 7 SP1 and Windows Server 2008 R2 allows information disclosure, due to how the Windows EOT font engine handles embedded fonts, aka “Windows EOT Font Engine Information Disclosure Vulnerability”. This CVE ID is unique from CVE-2018-0755, CVE-2018-0760, and CVE-2018-0761. 2018-02-14 not yet calculated CVE-2018-0855
BID
SECTRACK
CONFIRM
microsoft — windows Windows 10 version 1607 and Windows Server 2016 allow an elevation of privilege vulnerability due to how the MultiPoint management account password is stored, aka “Windows Elevation of Privilege Vulnerability”. 2018-02-14 not yet calculated CVE-2018-0828
BID
SECTRACK
CONFIRM
microsoft — windows NTFS in Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way NTFS handles objects, aka “Windows NTFS Global Reparse Point Elevation of Privilege Vulnerability”. 2018-02-14 not yet calculated CVE-2018-0822
BID
SECTRACK
CONFIRM
microsoft — windows The Windows Common Log File System (CLFS) driver in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how objects in memory are handled, aka “Windows Common Log File System Driver Elevation Of Privilege Vulnerability”. This CVE is unique from CVE-2018-0846. 2018-02-14 not yet calculated CVE-2018-0844
BID
SECTRACK
CONFIRM
microsoft — windows StructuredQuery in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how objects are handled in memory, aka “StructuredQuery Remote Code Execution Vulnerability”. 2018-02-14 not yet calculated CVE-2018-0825
BID
SECTRACK
CONFIRM
microsoft — windows The Microsoft Server Message Block 2.0 and 3.0 (SMBv2/SMBv3) client in Windows 8.1 and RT 8.1 and Windows Server 2012 R2 allows a denial of service vulnerability due to how specially crafted requests are handled, aka “SMBv2/SMBv3 Null Dereference Denial of Service Vulnerability”. 2018-02-14 not yet calculated CVE-2018-0833
BID
SECTRACK
CONFIRM
microsoft — windows Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka “Scripting Engine Memory Corruption Vulnerability”. This CVE ID is unique from CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866. 2018-02-14 not yet calculated CVE-2018-0834
BID
SECTRACK
CONFIRM
EXPLOIT-DB
microsoft — windows_embedded_opentype_font_engine The Microsoft Windows Embedded OpenType (EOT) font engine in Microsoft Windows 7 SP1, Windows Server 2008 R2, and Windows Server 2012 allows information disclosure, due to how the Windows EOT font engine handles embedded fonts, aka “Windows EOT Font Engine Information Disclosure Vulnerability”. This CVE ID is unique from CVE-2018-0755, CVE-2018-0761, and CVE-2018-0855. 2018-02-14 not yet calculated CVE-2018-0760
BID
SECTRACK
CONFIRM
microsoft — windows_embedded_opentype_font_engine The Microsoft Windows Embedded OpenType (EOT) font engine in Microsoft Windows 7 SP1 and Windows Server 2008 R2 allows information disclosure, due to how the Windows EOT font engine handles embedded fonts, aka “Windows EOT Font Engine Information Disclosure Vulnerability”. This CVE ID is unique from CVE-2018-0760, CVE-2018-0761, and CVE-2018-0855. 2018-02-14 not yet calculated CVE-2018-0755
BID
SECTRACK
CONFIRM
microsoft — windows_embedded_opentype_font_engine The Microsoft Windows Embedded OpenType (EOT) font engine in Microsoft Windows 7 SP1 and Windows Server 2008 R2 allows information disclosure, due to how the Windows EOT font engine handles embedded fonts, aka “Windows EOT Font Engine Information Disclosure Vulnerability”. This CVE ID is unique from CVE-2018-0755, CVE-2018-0760, and CVE-2018-0855. 2018-02-14 not yet calculated CVE-2018-0761
BID
SECTRACK
CONFIRM
microsoft — windows_kernel The Windows kernel in Windows 10 versions 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how objects in memory are handled, aka “Windows Kernel Elevation of Privilege Vulnerability”. 2018-02-14 not yet calculated CVE-2018-0831
BID
SECTRACK
CONFIRM
microsoft — windows_kernel The Windows kernel in Windows 8.1 and RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to how objects in memory are handled, aka “Windows Information Disclosure Vulnerability”. This CVE is unique from CVE-2018-0829 and CVE-2018-0830. 2018-02-14 not yet calculated CVE-2018-0832
BID
SECTRACK
CONFIRM
microsoft — windows_kernel The Windows kernel in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to how objects in memory are handled, aka “Windows Information Disclosure Vulnerability”. This CVE is unique from CVE-2018-0829 and CVE-2018-0832. 2018-02-14 not yet calculated CVE-2018-0830
BID
SECTRACK
CONFIRM
microsoft — windows_kernel The Windows kernel in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to how objects in memory are handled, aka “Windows Information Disclosure Vulnerability”. This CVE is unique from CVE-2018-0830 and CVE-2018-0832. 2018-02-14 not yet calculated CVE-2018-0829
BID
SECTRACK
CONFIRM
microsoft — windows_kernel Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allow an elevation of privilege vulnerability due to how objects in memory are handled, aka “Windows Kernel Elevation of Privilege Vulnerability”. 2018-02-14 not yet calculated CVE-2018-0842
BID
SECTRACK
CONFIRM
microsoft — windows_kernel The Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2, and Windows Server 2012 allows an information disclosure vulnerability due to the way memory is initialized, aka “Windows Kernel Information Disclosure Vulnerability”. This CVE is unique from CVE-2018-0757. 2018-02-14 not yet calculated CVE-2018-0810
BID
SECTRACK
CONFIRM
microsoft — windows_kernel The Windows kernel in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka “Windows Kernel Elevation of Privilege Vulnerability”. This CVE is unique from CVE-2018-0756. CVE-2018-0809, CVE-2018-0820 and CVE-2018-0843. 2018-02-14 not yet calculated CVE-2018-0742
BID
SECTRACK
CONFIRM
microsoft — windows_kernel The Windows kernel in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka “Windows Kernel Elevation Of Privilege Vulnerability”. This CVE is unique from CVE-2018-0742, CVE-2018-0756, CVE-2018-0809 and CVE-2018-0843. 2018-02-14 not yet calculated CVE-2018-0820
BID
SECTRACK
CONFIRM
microsoft — windows_kernel The Windows kernel in Windows 10 version 1709 and Windows Server, version 1709 allows an information disclosure vulnerability due to how objects in memory are handled, aka “Windows Kernel Information Disclosure Vulnerability”. This CVE is unique from CVE-2018-0742, CVE-2018-0756, CVE-2018-0809 and CVE-2018-0820. 2018-02-14 not yet calculated CVE-2018-0843
BID
SECTRACK
CONFIRM
microsoft — windows_kernel The Windows kernel in Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka “Windows Kernel Elevation of Privilege Vulnerability”. This CVE is unique from CVE-2018-0742, CVE-2018-0809, CVE-2018-0820 and CVE-2018-0843. 2018-02-14 not yet calculated CVE-2018-0756
BID
SECTRACK
CONFIRM
microsoft — windows_kernel The Windows kernel in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way objects are handled in memory, aka “Windows Kernel Information Disclosure Vulnerability”. This CVE is unique from CVE-2018-0810. 2018-02-14 not yet calculated CVE-2018-0757
BID
SECTRACK
CONFIRM
microsoft — windows_kernel The Windows kernel in Windows 10, versions 1703 and 1709, and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka “Windows Elevation of Privilege Vulnerability”. This CVE is unique from CVE-2018-0742, CVE-2018-0756, CVE-2018-0820 and CVE-2018-0843. 2018-02-14 not yet calculated CVE-2018-0809
BID
SECTRACK
CONFIRM
minibb — minibb Cross-Site Scripting (XSS) exists in the Add Forum feature in the Administrative Panel in miniBB 3.2.2 via crafted use of an onload attribute of an SVG element in the supertitle field. 2018-02-11 not yet calculated CVE-2018-6506
MISC
misp — misp In app/Controller/ServersController.php in MISP 2.4.87, a server setting permitted the override of a path variable on certain Red Hed Enterprise Linux and CentOS systems (where rh_shell_fix was enabled), and consequently allowed site admins to inject arbitrary OS commands. The impact is limited by the setting being only accessible to the site administrator. 2018-02-12 not yet calculated CVE-2018-6926
CONFIRM
myrepos — myrepos webcheckout in myrepos through 1.20171231 does not sanitize URLs that are passed to git clone, allowing a malicious website operator or a MitM attacker to take advantage of it for arbitrary code execution, as demonstrated by an “ext::sh -c” attack or an option injection attack. 2018-02-14 not yet calculated CVE-2018-7032
MISC
national_payments_corporation_of_india — bharat_interface_for_money National Payments Corporation of India (NPCI) Bharat Interface for Money (aka BHIM) 1.4.1 sends messages to undocumented telephone numbers in conjunction with logout/login actions, which allows remote attackers to obtain sensitive information. 2018-02-17 not yet calculated CVE-2018-7207
MISC
nippon_telegraph_and_telephone_east_corporation — flet’s_address_selection_tool Untrusted search path vulnerability in FLET’S v4 / v6 address selection tool allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. 2018-02-16 not yet calculated CVE-2018-0516
MISC
JVN
nippon_telegraph_and_telephone_east_corporation — flet’s_azukeru_backup_tool Untrusted search path vulnerability in “FLET’S Azukeru Backup Tool” version 1.5.2.6 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. 2018-02-16 not yet calculated CVE-2018-0515
MISC
JVN
october_cms — october_cms October CMS through 1.0.431 allows XSS by entering HTML on the Add Posts page. 2018-02-17 not yet calculated CVE-2018-7198
MISC
openrc — opentmpfiles OpenRC opentmpfiles through 0.1.3, when the fs.protected_hardlinks sysctl is turned off, allows local users to obtain ownership of arbitrary files by creating a hard link inside a directory on which “chown -R” will be run. 2018-02-14 not yet calculated CVE-2017-18188
MISC
php_scripts_mall — bitcoin_mlm_software Cross Site Scripting (XSS) exists in PHP Scripts Mall Bitcoin MLM Software 1.0.2 via a profile field. 2018-02-11 not yet calculated CVE-2018-6862
EXPLOIT-DB
php_scripts_mall — facebook_clone_script Cross Site Scripting (XSS) exists in PHP Scripts Mall Facebook Clone Script. 2018-02-11 not yet calculated CVE-2018-6858
EXPLOIT-DB
php_scripts_mall — lawyer_search_script Cross Site Scripting (XSS) exists in PHP Scripts Mall Lawyer Search Script 1.0.2 via a profile update parameter. 2018-02-11 not yet calculated CVE-2018-6861
EXPLOIT-DB
php_scripts_mall — multi_language_olx_clone_script PHP Scripts Mall Multi Language Olx Clone Script 2.0.6 has XSS via the Leave Comment field. 2018-02-11 not yet calculated CVE-2018-6845
EXPLOIT-DB
php_scripts_mall — multi_religion_responsive_matrimonial Cross Site Scripting (XSS) exists in PHP Scripts Mall Multi religion Responsive Matrimonial 4.7.2 via a user profile update parameter. 2018-02-11 not yet calculated CVE-2018-6864
EXPLOIT-DB
php_scripts_mall — news_website_script PHP Scripts Mall News Website Script 2.0.4 has SQL Injection via a search term. 2018-02-13 not yet calculated CVE-2018-6928
EXPLOIT-DB
php_scripts_mall — schools_alert_management_script Arbitrary File Upload and Remote Code Execution exist in PHP Scripts Mall Schools Alert Management Script 2.0.2 via a profile picture. 2018-02-11 not yet calculated CVE-2018-6860
EXPLOIT-DB
php_scripts_mall — select_your_college_script SQL Injection exists in PHP Scripts Mall Select Your College Script 2.0.2 via a Login Parameter. 2018-02-11 not yet calculated CVE-2018-6863
EXPLOIT-DB
pluck — pluck An issue was discovered in Pluck through 4.7.4. A stored cross-site scripting (XSS) vulnerability allows remote unauthenticated users to inject arbitrary web script or HTML into admin/blog Reaction Comments via a crafted URL. 2018-02-17 not yet calculated CVE-2018-7197
MISC
postgresql — postgresql Memory disclosure vulnerability in table partitioning was found in postgresql 10.x before 10.2, allowing an authenticated attacker to read arbitrary bytes of server memory via purpose-crafted insert to a partitioned table. 2018-02-09 not yet calculated CVE-2018-1052
BID
CONFIRM
postgresql — postgresql In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file. 2018-02-09 not yet calculated CVE-2018-1053
BID
MLIST
CONFIRM
progress — sitefinity Progress Sitefinity 9.1 has XSS via the Content Management Template Configuration (aka Templateconfiguration), as demonstrated by the src attribute of an IMG element. This is fixed in 10.1. 2018-02-12 not yet calculated CVE-2017-18175
MISC
MISC
progress — sitefinity Progress Sitefinity 9.1 has XSS via the Last name, First name, and About fields on the New User Creation Page. This is fixed in 10.1. 2018-02-12 not yet calculated CVE-2017-18177
MISC
MISC
progress — sitefinity Authenticate/SWT in Progress Sitefinity 9.1 has an open redirect issue in which an authentication token is sent to the redirection target, if the target is specified using a certain %40 syntax. This is fixed in 10.1. 2018-02-12 not yet calculated CVE-2017-18178
MISC
MISC
progress — sitefinity Progress Sitefinity 9.1 uses wrap_access_token as a non-expiring authentication token that remains valid after a password change or a session termination. Also, it is transmitted as a GET parameter. This is fixed in 10.1. 2018-02-12 not yet calculated CVE-2017-18179
MISC
MISC
progress — sitefinity Progress Sitefinity 9.1 has XSS via file upload, because JavaScript code in an HTML file has the same origin as the application’s own code. This is fixed in 10.1. 2018-02-12 not yet calculated CVE-2017-18176
MISC
MISC
project_jupyterhub — jupyterhub An issue was discovered in Project Jupyter JupyterHub OAuthenticator 0.6.x before 0.6.2 and 0.7.x before 0.7.3. When using JupyterHub with GitLab group whitelisting for access control, group membership was not checked correctly, allowing members not in the whitelisted groups to create accounts on the Hub. (Users were not allowed to access other users’ accounts, but could create their own accounts on the Hub linked to their GitLab account. GitLab authentication not using gitlab_group_whitelist is unaffected. No other Authenticators are affected.) 2018-02-17 not yet calculated CVE-2018-7206
CONFIRM
puppet_enterprise — puppet_enterprise Puppet Enterprise 2017.3.x prior to 2017.3.3 are vulnerable to a remote execution bug when a specially crafted string was passed into the facter_task or puppet_conf tasks. This vulnerability only affects tasks in the affected modules, if you are not using puppet tasks you are not affected by this vulnerability. 2018-02-09 not yet calculated CVE-2018-6508
BID
CONFIRM
qpdf — qpdf An issue was discovered in QPDF before 7.0.0. There is a large heap-based out-of-bounds read in the Pl_Buffer::write function in Pl_Buffer.cc. It is caused by an integer overflow in the PNG filter. 2018-02-13 not yet calculated CVE-2017-18185
MISC
MISC
qpdf — qpdf An issue was discovered in QPDF before 7.0.0. There is an infinite loop due to looping xref tables in QPDF.cc. 2018-02-13 not yet calculated CVE-2017-18186
MISC
MISC
qpdf — qpdf An issue was discovered in QPDF before 7.0.0. There is an infinite loop in the QPDFWriter::enqueueObject() function in libqpdf/QPDFWriter.cc. 2018-02-13 not yet calculated CVE-2017-18183
MISC
MISC
qpdf — qpdf An issue was discovered in QPDF before 7.0.0. There is a stack-based out-of-bounds read in the function iterate_rc4 in QPDF_encryption.cc. 2018-02-13 not yet calculated CVE-2017-18184
MISC
MISC
qpdf– qpdf An issue was discovered in QPDF before 7.0.0. Endless recursion causes stack exhaustion in QPDFTokenizer::resolveLiteral() in QPDFTokenizer.cc, related to the QPDF::resolve function in QPDF.cc. 2018-02-13 not yet calculated CVE-2015-9252
MISC
MISC
ruckus_networks — solo_aps_firmware Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus Networks SZ managed APs firmware releases R5.x or before contain authenticated Root Command Injection in the web-GUI that could allow authenticated valid users to execute privileged commands on the respective systems. 2018-02-14 not yet calculated CVE-2017-6230
CONFIRM
ruckus_networks — unleashed_ap_firmware Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems. 2018-02-14 not yet calculated CVE-2017-6229
CONFIRM
saml — saml The SAML 2.0 service provider of SAP Netweaver AS Java Web Application, 7.50, does not sufficiently encode user controlled inputs, which results in Cross-Site Scripting (XSS) vulnerability. 2018-02-14 not yet calculated CVE-2018-2371
BID
CONFIRM
CONFIRM
sap — central_management_console_and_bi_launchpad_and_fiori_bi_launchpad Server Side Request Forgery (SSRF) vulnerability in SAP Central Management Console, BI Launchpad and Fiori BI Launchpad, 4.10, from 4.20, from 4.30, could allow a malicious user to use common techniques to determine which ports are in use on the backend server. 2018-02-14 not yet calculated CVE-2018-2370
BID
CONFIRM
CONFIRM

sap — crm_webclient_ui

SAP CRM WebClient UI 7.01, 7.31, 7.46, 7.47, 7.48, 8.00, 8.01, S4FND 1.02, does not sufficiently validate and/or encode hidden fields, resulting in Cross-Site Scripting (XSS) vulnerability. 2018-02-14 not yet calculated CVE-2018-2364
BID
CONFIRM
CONFIRM
sap — erp_financials_information_system SAP ERP Financials Information System (SAP_APPL 6.00, 6.02, 6.03, 6.04, 6.05, 6.06, 6.16; SAP_FIN 6.17, 6.18, 7.00, 7.20, 7.30 S4CORE 1.00, 1.01, 1.02) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. 2018-02-14 not yet calculated CVE-2018-2381
BID
CONFIRM
CONFIRM

sap — hana

Under certain conditions SAP HANA, 1.00, 2.00, allows an unauthenticated attacker to access information which would otherwise be restricted. An attacker can misuse the authentication function of the SAP HANA server on its SQL interface and disclose 8 bytes of the server process memory. The attacker cannot influence or predict the location of the leaked memory. 2018-02-14 not yet calculated CVE-2018-2369
BID
CONFIRM
CONFIRM
sap — hana_extended_application_services In SAP HANA Extended Application Services, 1.0, a controller user who has SpaceAuditor authorization in a specific space could retrieve sensitive application data like service bindings within that space. 2018-02-14 not yet calculated CVE-2018-2374
BID
CONFIRM
CONFIRM
sap — hana_extended_application_services In SAP HANA Extended Application Services, 1.0, a controller user who has SpaceAuditor authorization in a specific space could retrieve application environments within that space. 2018-02-14 not yet calculated CVE-2018-2375
CONFIRM
CONFIRM
sap — hana_extended_application_services In SAP HANA Extended Application Services, 1.0, some general server statistics and status information could be retrieved by unauthorized users. 2018-02-14 not yet calculated CVE-2018-2377
CONFIRM
CONFIRM
sap — hana_extended_application_services In SAP HANA Extended Application Services, 1.0, an unauthenticated user could test if a given username is valid by evaluating error messages of a specific endpoint. 2018-02-14 not yet calculated CVE-2018-2379
CONFIRM
CONFIRM
sap — hana_extended_application_services A plain keystore password is written to a system log file in SAP HANA Extended Application Services, 1.0, which could endanger confidentiality of SSL communication. 2018-02-14 not yet calculated CVE-2018-2372
CONFIRM
CONFIRM
sap — hana_extended_application_services In SAP HANA Extended Application Services, 1.0, a controller user who has SpaceAuditor authorization in a specific space could retrieve application environments within that space. 2018-02-14 not yet calculated CVE-2018-2376
CONFIRM
CONFIRM
sap — hana_extended_application_services In SAP HANA Extended Application Services, 1.0, unauthorized users can read statistical data about deployed applications including resource consumption. 2018-02-14 not yet calculated CVE-2018-2378
CONFIRM
CONFIRM
sap — hana_extended_application_services Under certain circumstances, a specific endpoint of the Controller’s API could be misused by unauthenticated users to execute SQL statements that deliver information about system configuration in SAP HANA Extended Application Services, 1.0. 2018-02-14 not yet calculated CVE-2018-2373
CONFIRM
CONFIRM
sap — internet_graphics_server Reflected cross-site scripting vulnerability in SAP internet Graphics Server, 7.20, 7.20EXT, 7.45, 7.49, 7.53. 2018-02-14 not yet calculated CVE-2018-2383
CONFIRM
CONFIRM
sap — internet_graphics_server Under certain conditions a malicious user may retrieve information on SAP Internet Graphic Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, overwrite existing image or corrupt other type of files. 2018-02-14 not yet calculated CVE-2018-2395
BID
CONFIRM
CONFIRM
sap — internet_graphics_server Stored cross-site scripting vulnerability in SAP internet Graphics Server, 7.20, 7.20EXT, 7.45, 7.49, 7.53. 2018-02-14 not yet calculated CVE-2018-2388
CONFIRM
CONFIRM
sap — internet_graphics_server Under certain conditions an unauthenticated malicious user can prevent legitimate users from accessing the SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, services and/or system files. 2018-02-14 not yet calculated CVE-2018-2394
CONFIRM
CONFIRM
sap — internet_graphics_server Under certain conditions a malicious user can inject log files of SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, hiding important information in the log file. 2018-02-14 not yet calculated CVE-2018-2389
CONFIRM
CONFIRM
sap — internet_graphics_server Under certain conditions SAP Internet Graphics Server (IGS) 7.20, 7.20EXT, 7.45, 7.49, 7.53, fails to validate XML External Entity appropriately causing the SAP Internet Graphics Server (IGS) to become unavailable. 2018-02-14 not yet calculated CVE-2018-2392
CONFIRM
CONFIRM
sap — internet_graphics_server A vulnerability in the SAP internet Graphics Server, 7.20, 7.20EXT, 7.45, 7.49, 7.53, could allow a malicious user to store graphics in a controlled area and as such gain information from system area, which is not available to the user otherwise. 2018-02-14 not yet calculated CVE-2018-2382
CONFIRM
CONFIRM
sap — internet_graphics_server Under certain conditions a malicious user provoking a divide by zero crash can prevent legitimate users from accessing the SAP Internet Graphics Server, 7.20, 7.20EXT, 7.45, 7.49, 7.53, and its services. 2018-02-14 not yet calculated CVE-2018-2385
CONFIRM
CONFIRM
sap — internet_graphics_server Under certain conditions a malicious user provoking a Null Pointer dereference can prevent legitimate users from accessing the SAP Internet Graphics Server, 7.20, 7.20EXT, 7.45, 7.49, 7.53, and its services. 2018-02-14 not yet calculated CVE-2018-2384
CONFIRM
CONFIRM
sap — internet_graphics_server Under certain conditions a malicious user can prevent legitimate users from accessing the SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, via IGS portwatcher service. 2018-02-14 not yet calculated CVE-2018-2391
CONFIRM
CONFIRM
sap — internet_graphics_server Under certain conditions SAP Internet Graphics Server (IGS) 7.20, 7.20EXT, 7.45, 7.49, 7.53, fails to validate XML External Entity appropriately causing the SAP Internet Graphics Server (IGS) to become unavailable. 2018-02-14 not yet calculated CVE-2018-2393
CONFIRM
CONFIRM
sap — internet_graphics_server Under certain conditions a malicious user provoking an out of bounds buffer overflow can prevent legitimate users from accessing the SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53. 2018-02-14 not yet calculated CVE-2018-2386
CONFIRM
CONFIRM
sap — internet_graphics_server Under certain conditions a malicious user can prevent legitimate users from accessing the SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, via IGS Chart service. 2018-02-14 not yet calculated CVE-2018-2390
CONFIRM
CONFIRM
sap — internet_graphics_server Under certain conditions a malicious user can prevent legitimate users from accessing the SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, using IGS Interpreter service. 2018-02-14 not yet calculated CVE-2018-2396
CONFIRM
CONFIRM
sap — internet_graphics_server A vulnerability in the SAP internet Graphics Server, 7.20, 7.20EXT, 7.45, 7.49, 7.53, could allow a malicious user to obtain information on ports, which is not available to the user otherwise. 2018-02-14 not yet calculated CVE-2018-2387
CONFIRM
CONFIRM
saperion — web_client Remote Code Execution in Saperion Web Client version 7.5.2 83166. 2018-02-13 not yet calculated CVE-2018-6292
MISC
MISC
saperion — web_client Arbitrary File Read in Saperion Web Client version 7.5.2 83166. 2018-02-13 not yet calculated CVE-2018-6293
MISC
MISC
schneider_electric — igss_mobile_application An information disclosure vulnerability exists in Schneider Electric’s IGSS Mobile application version 3.01 and prior. Passwords are stored in clear text in the configuration which can result in exposure of sensitive information. 2018-02-12 not yet calculated CVE-2017-9969
BID
MISC
CONFIRM
schneider_electric — igss_mobile_application A security misconfiguration vulnerability exists in Schneider Electric’s IGSS Mobile application versions 3.01 and prior in which a lack of certificate pinning during the TLS/SSL connection establishing process can result in a man-in-the-middle attack. 2018-02-12 not yet calculated CVE-2017-9968
BID
MISC
CONFIRM
schneider_electric — igss_scada_software A security misconfiguration vulnerability exists in Schneider Electric’s IGSS SCADA Software versions 12 and prior. Security configuration settings such as Address Space Layout Randomization (ASLR) and Data Execution prevention (DEP) were not properly configured resulting in weak security. 2018-02-12 not yet calculated CVE-2017-9967
BID
CONFIRM
schneider_electric — powerscada A cross-site request forgery vulnerability exists on the Secure Gateway component of Schneider Electric’s PowerSCADA Anywhere v1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 and Citect Anywhere version 1.0 for multiple state-changing requests. This type of attack requires some level of social engineering in order to get a legitimate user to click on or access a malicious link/site containing the CSRF attack. 2018-02-12 not yet calculated CVE-2017-9963
CONFIRM
MISC
schneider_electric — struxureon_gateway A remote code execution vulnerability exists in Schneider Electric’s StruxureOn Gateway versions 1.1.3 and prior. Uploading a zip which contains carefully crafted metadata allows for the file to be uploaded to any directory on the host machine information which could lead to remote code execution. 2018-02-12 not yet calculated CVE-2017-9970
BID
MISC
CONFIRM
smiths_medical — medfusion_4000_wireless_syringe_infusion_pump An Out-of-bounds Read issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. A third-party component used in the pump reads memory out of bounds, causing the communications module to crash. Smiths Medical assesses that the crash of the communications module would not impact the operation of the therapeutic module. 2018-02-15 not yet calculated CVE-2017-12722
BID
BID
MISC
smiths_medical — medfusion_4000_wireless_syringe_infusion_pump An Improper Certificate Validation issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. The pump does not validate host certificates, leaving the pump vulnerable to a man-in-the-middle (MITM) attack. 2018-02-15 not yet calculated CVE-2017-12721
BID
MISC
smiths_medical — medfusion_4000_wireless_syringe_infusion_pump A Password in Configuration File issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. The pump stores some passwords in the configuration file, which are accessible if the pump is configured to allow external communications. 2018-02-15 not yet calculated CVE-2017-12723
BID
MISC
smiths_medical — medfusion_4000_wireless_syringe_infusion_pump A Use of Hard-coded Credentials issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. The FTP server on the pump contains hardcoded credentials, which are not fully initialized. The FTP server is only accessible if the pump is configured to allow FTP connections. 2018-02-15 not yet calculated CVE-2017-12724
BID
MISC
smiths_medical — medfusion_4000_wireless_syringe_infusion_pump A Classic Buffer Overflow issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. A third-party component used in the pump does not verify input buffer size prior to copying, leading to a buffer overflow, allowing remote code execution on the target device. The pump receives the potentially malicious input infrequently and under certain conditions, increasing the difficulty of exploitation. 2018-02-15 not yet calculated CVE-2017-12718
BID
BID
MISC
EXPLOIT-DB
smiths_medical — medfusion_4000_wireless_syringe_infusion_pump An Improper Access Control issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. The FTP server on the pump does not require authentication if the pump is configured to allow FTP connections. 2018-02-15 not yet calculated CVE-2017-12720
BID
MISC
smiths_medical — medfusion_4000_wireless_syringe_infusion_pump A Use of Hard-coded Credentials issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. The pump with default network configuration uses hard-coded credentials to automatically establish a wireless network connection. The pump will establish a wireless network connection even if the pump is Ethernet connected and active; however, if the wireless association is established and the Ethernet cable is attached, the pump does not attach the network stack to the wireless network. In this scenario, all network traffic is instead directed over the wired Ethernet connection. 2018-02-15 not yet calculated CVE-2017-12725
BID
MISC
smiths_medical — medfusion_4000_wireless_syringe_infusion_pump A Use of Hard-coded Password issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. Telnet on the pump uses hardcoded credentials, which can be used if the pump is configured to allow external communications. Smiths Medical assesses that it is not possible to upload files via Telnet and the impact of this vulnerability is limited to the communications module. 2018-02-15 not yet calculated CVE-2017-12726
BID
MISC
sound_exchange_project — sound_exchange In the startread function in xa.c in Sound eXchange (SoX) through 14.4.2, a corrupt header specifying zero channels triggers an infinite loop with a resultant NULL pointer dereference, which may allow a remote attacker to cause a denial-of-service. 2018-02-15 not yet calculated CVE-2017-18189
MISC
MISC
squid_software_foundation — squid_http_caching_proxy The Squid Software Foundation Squid HTTP Caching Proxy version 3.0 to 3.5.27, 4.0 to 4.0.22 contains a Incorrect Pointer Handling vulnerability in ESI Response Processing that can result in Denial of Service for all clients using the proxy.. This attack appear to be exploitable via Remote server delivers an HTTP response payload containing valid but unusual ESI syntax.. This vulnerability appears to have been fixed in 4.0.23 and later. 2018-02-09 not yet calculated CVE-2018-1000024
CONFIRM
MISC
MLIST
squid_software_foundation — squid_http_caching_proxy The Squid Software Foundation Squid HTTP Caching Proxy version prior to version 4.0.23 contains a NULL Pointer Dereference vulnerability in HTTP Response X-Forwarded-For header processing that can result in Denial of Service to all clients of the proxy. This attack appear to be exploitable via Remote HTTP server responding with an X-Forwarded-For header to certain types of HTTP request. This vulnerability appears to have been fixed in 4.0.23 and later. 2018-02-09 not yet calculated CVE-2018-1000027
CONFIRM
CONFIRM
CONFIRM
CONFIRM
MLIST
MLIST
steelcase — roomwizard RoomWizard before 4.4.x allows XSS via the HelpAction.action pageName parameter. 2018-02-15 not yet calculated CVE-2018-7057
MISC
steelcase — roomwizard RoomWizard before 4.4.x allows remote attackers to obtain potentially sensitive information about IP addresses via /getGroupTimeLineJSON.action. 2018-02-15 not yet calculated CVE-2018-7056
MISC
steelcase — roomwizard GroupViewProxyServlet in RoomWizard before 4.4.x allows SSRF via the url parameter. 2018-02-15 not yet calculated CVE-2018-7055
MISC
systemd — systemd systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on. 2018-02-13 not yet calculated CVE-2018-6954
MISC
systemd — systemd In systemd prior to 234 a race condition exists between .mount and .automount units such that automount requests from kernel may not be serviced by systemd resulting in kernel holding the mountpoint and any processes that try to use said mount will hang. A race condition like this may lead to denial of service, until mount points are unmounted. 2018-02-16 not yet calculated CVE-2018-1049
REDHAT
CONFIRM
tenda — ac15_ router An issue was discovered on Tenda AC15 V15.03.1.16_multi devices. A remote, unauthenticated attacker can gain remote code execution on the device with a crafted password parameter for the COOKIE header. 2018-02-15 not yet calculated CVE-2018-5767
MISC
tiki — tiki An XSS vulnerability (via an SVG image) in Tiki before 18 allows an authenticated user to gain administrator privileges if an administrator opens a wiki page with a malicious SVG image, related to lib/filegals/filegallib.php. 2018-02-16 not yet calculated CVE-2018-7188
MISC
MISC
trend_micro — interscan_messaging_security_virtual_appliance A vulnerability in the Trend Micro InterScan Messaging Security Virtual Appliance 9.0 and 9.1 management portal could allow an unauthenticated user to access sensitive information in a particular log file that could be used to bypass authentication on vulnerable installations. 2018-02-16 not yet calculated CVE-2018-3609
MISC
MISC
CONFIRM
trend_micro — user-mode_hooking_module A DLL Hijacking vulnerability in Trend Micro’s User-Mode Hooking Module (UMH) could allow an attacker to run arbitrary code on a vulnerable system. 2018-02-16 not yet calculated CVE-2018-6218
JVN
MISC
CONFIRM
trendnet — multiple_devices TRENDnet TEW-751DR v1.03B03, TEW-752DRU v1.03B01, and TEW733GR v1.03B01 devices allow authentication bypass via an AUTHORIZED_GROUP=1 value, as demonstrated by a request for getcfg.php. 2018-02-14 not yet calculated CVE-2018-7034
MISC
trixbox — trixbox trixbox 2.8.0.4 has XSS via the PATH_INFO to /maint/index.php or /user/includes/language/langChooser.php. 2018-02-15 not yet calculated CVE-2017-14536
BID
MISC
trixbox — trixbox trixbox 2.8.0.4 has path traversal via the xajaxargs array parameter to /maint/index.php?packages or the lang parameter to /maint/modules/home/index.php. 2018-02-15 not yet calculated CVE-2017-14537
BID
MISC
trixbox — trixbox trixbox 2.8.0.4 has OS command injection via shell metacharacters in the lang parameter to /maint/modules/home/index.php. 2018-02-15 not yet calculated CVE-2017-14535
BID
MISC
MISC
MISC
typesetter — typesetter An issue was discovered in Typesetter 5.1. The User Permissions page (aka Admin/Users) suffers from critical flaw of Cross Site Request forgery: using a forged HTTP request, a malicious user can lead a user to unknowingly create / delete or modify a user account due to the lack of an anti-CSRF token. 2018-02-11 not yet calculated CVE-2018-6888
MISC
typesetter — typesetter An issue was discovered in Typesetter 5.1. It suffers from a Host header injection vulnerability, Using this attack, a malicious user can poison the web cache or perform advanced password reset attacks or even trigger arbitrary user re-direction. 2018-02-11 not yet calculated CVE-2018-6889
MISC
ubuntu — shadow An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used “group blacklisting” (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation. 2018-02-15 not yet calculated CVE-2018-7169
MISC
wago — pfc200_series_3s_codesys_runtime An Improper Authentication issue was discovered in WAGO PFC200 Series 3S CoDeSys Runtime versions 2.3.X and 2.4.X. An attacker can execute different unauthenticated remote operations because of the CoDeSys Runtime application, which is available via network by default on Port 2455. An attacker could execute some unauthenticated commands such as reading, writing, or deleting arbitrary files, or manipulate the PLC application during runtime by sending specially-crafted TCP packets to Port 2455. 2018-02-13 not yet calculated CVE-2018-5459
MISC
wordpress — wordpress Bookly #1 WordPress Booking Plugin Lite before 14.5 has XSS via a jQuery.ajax request to ng-payment_details_dialog.js. 2018-02-11 not yet calculated CVE-2018-6891
MISC
MISC
wordpress — wordpress core/lib/upload/um-file-upload.php in the UltimateMember plugin 2.0 for WordPress has a cross-site scripting vulnerability because it fails to properly sanitize user input passed to the $temp variable. 2018-02-16 not yet calculated CVE-2018-6944
MISC
wordpress — wordpress core/lib/upload/um-image-upload.php in the UltimateMember plugin 2.0 for WordPress has a cross-site scripting vulnerability because it fails to properly sanitize user input passed to the $temp variable. 2018-02-16 not yet calculated CVE-2018-6943
MISC
xpdf — xpdf A large loop in JBIG2Stream::readSymbolDictSeg in xpdf 4.00 allows an attacker to cause denial of service via a specific file due to inappropriate decoding. 2018-02-15 not yet calculated CVE-2018-7173
MISC
xpdf — xpdf An issue was discovered in xpdf 4.00. A NULL pointer dereference in readCodestream allows an attacker to cause denial of service via a JPX image with zero components. 2018-02-15 not yet calculated CVE-2018-7175
MISC
xpdf — xpdf An issue was discovered in xpdf 4.00. An infinite loop in XRef::Xref allows an attacker to cause denial of service because loop detection exists only for tables, not streams. 2018-02-15 not yet calculated CVE-2018-7174
MISC
zziplib — zziplib In ZZIPlib 0.13.68, there is an uncontrolled memory allocation and a crash in the __zzip_parse_root_directory function of zzip/zip.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file. 2018-02-09 not yet calculated CVE-2018-6869
BID
MISC

Back to top


This product is provided subject to this Notification and this Privacy & Use policy.

TOXICOLOGY OF MALE REPRODUCTIVE DEVELOPMENT: PROFILING 774 CHEMICALS FOR MOLECULAR TARGETS AND ADVERSE OUTCOMES (SOT)

Adverse trends in male reproductive health have been reported for increased rates of testicular germ cell tumor, low semen quality, cryptorchidism, and hypospadias. An association with prenatal environmental exposure has been inferred from human and animal studies underlying male reproductive developmental defects. The present study established the links between environmental chemicals, molecular targets, and adverse outcomes using U.S. EPA animal study (ToxRefDB) and high-throughput screening (HTS; ToxCast) databases. This systems-based approach revealed a phenotypic hierarchy of testicular atrophy, sperm effects, tumors, and malformations across 63 of 774 (8%) chemicals in ToxRefDB, resembling what might be expected in testicular dysgenesis syndrome (TDS) in humans; 48 of these 63 chemicals had ToxCast data, interacting with 126 of 286 (44%) molecular targets in HTS. Although estrogenic and anti-androgenic activities have been extensively studied in TDS, the present study showed these receptor targets to be only a subset of the potential landscape of molecular targets. A variety of chemical (e.g. phthalates, conazoles, carbamates, and phenol compounds) and bioactivity (e.g. nuclear receptors, vascular remodeling proteins, and cytochrome-P450 reductases) clusters further suggested multiple pathways leading to the adverse outcomes. This points to the need for multi-scale systems models to predict whether the occurrence of one adverse outcome may increase the risk of another.

Better Water Demand and Pipe Description Improve the Distribution Network Better Water Demand and Pipe Description Improve the Distribution Network Modeling Results

Distribution system modeling simplifies pipe network in skeletonization and simulates the flow and water quality by using generalized water demand patterns. While widely used, the approach has not been examined fully on how it impacts the modeling fidelity. This study intends to evaluate these consequences in a typical water distribution system. We first analyzed tracer test data at 13 locations using a calibrated EPANET model with generalized water demand patterns. Modeling results agree with actual measurements in six locations with high water demand and flow velocity near the storage tank, while fail to replicate the variations in network abundant of dead-ends and Tee/Cross junctions. Then we further investigated the causes of model inaccuracy using real-time water demand data covering ~35% water users. This paper compares several levels of pipe skeletonization and water demand aggregation in water age simulation, and shows significant impacts on water age results because of discrete water demand at pipe nodes. The analysis reveals varying flow properties and the movement of highly aged water parcels in two types of pipe configurations. These results have the implications on network modeling and further studies of water quality simulations.

Overview of the Inhalation Carcinogenicity of Ethylene Oxide (EtO)

The presentation will cover the following topics as they relate to the ethylene oxide IRIS assessment: Background
Regulatory Considerations
IRIS Assessment History
IRIS Assessment Scope
Cancer Hazard Characterization
Mode of Action Analysis
Dose-Response Assessment
IRIS Assessment Summary
Only information on the ethylene oxide assessment that is publicly available on IRIS will be presented and discussed during this presentation.

Does the study fit? Matching economic analyses to coastal management questions and communication needs

In managing U.S. estuaries, as well as throughout ocean and coastal governance, there is an increasing call for economic research to inform decisions and to communicate the values of environmental resources to local communities, policy makers, and other stakeholders. Watershed managers implement economic studies to: 1) better communicate the value of estuarine resources to the wider community, 2) determine the most cost-effective management actions, and 3) compare the costs and benefits of actions to improve water quality. In order to better understand how economic studies are applied and their usefulness in coastal management, we interviewed managers from six National Estuary Programs (NEPs) and two watershed organizations that have commissioned economic studies. We also reviewed the analyses performed in the studies, focusing on the lessons learned from the use of those studies for coastal management and how well the studies matched the stated needs and desires of the managers. We found there is often a disconnect between what managers said they wanted from the economic analyses and what they actually got. Yet, almost universally, the managers found their studies to be useful tools for communication and raising awareness. In this presentation, we discuss key takeaways from our interviews with the coastal watershed managers. We make suggestions for how managers undertaking studies in the future might better articulate their needs to determine the most appropriate economic approaches, and avoid some of the pitfalls faced by other managers in conducting and communicating economic analyses. Additionally, our findings may help economists understand the needs of estuary managers, and help them better provide economic research that can contribute effectively to coastal management.

Human Dimensions of Water Quality: Aligning Human Use and Perceptions with Biophysical Measurements

Nutrient overenrichment is a significant problem in coastal waterbodies, particularly estuaries, across the United States. At the Atlantic Ecology Division of the U.S. EPA, we are working on an interdisciplinary project to understand the impacts of nutrient overenrichment on Cape Cod’s estuaries to both the biophysical environment and to humans’ use of their estuarine systems. A key component of understanding changes in use because of water quality improvement or degradation is identifying the relationship between human perceptions and biophysical measurements of water quality across a range of coastal access points. Qualitative focus groups and content analysis were conducted to gauge perceptions of water quality and to identify biophysical metrics that are representative of human perceptions of estuarine and marine water quality. Finally, we conducted synchronous field sampling of recreational use at coastal access points across a range of water quality parameters, including nutrients. For the more than 300 access points on Cape Cod we tested several methods for parceling ecological data into spatial zones that correspond to human use, including aggregating and mapping coastal access points and breaking up the coastline based on social and biophysical features and data availability. Collectively, this work helps us to better connect human perceptions and biophysical metrics of water quality with efforts to restore good water quality in coastal systems.

New Data from EPA’s Exposure Forecasting (ExpoCast) Project (ISES meeting)

The health risks posed by the chemicals in our environment depends on both chemical hazard and exposure. However, relatively few chemicals have estimates of exposure intake, limiting risk estimations for thousands of chemicals. The U.S. EPA Exposure Forecasting (ExpoCast) project aims to provide rapid, provisional exposure predictions for these thousands of chemicals. In order to provide rapid predictions of human and ecological exposure for thousands of chemicals that have little exposure-related information, the EPA is developing mathematical models, organizing and analyzing extant data, and using new tools such as screening-mode mass spectrometry (MS) to collect new data on chemical properties, use, and occurrence. The pilot phase of the ExpoCast data collection has focused on four activities: 1) high throughput physicochemical property measurements, 2) new biomonitoring data, 3) chemical emissivity data for articles of commerce, and 4) chemical deformulation of consumer products and articles of commerce. As an example of ExpoCast data collection, a selection of 100 objects that might be found in the home was screened using gas chromatography (GC) x GC time of flight MS, and 3803 unique chemical signatures were observed in test objects. 1608 of the signatures could be confirmed or tentatively identified. Only 184 of the 1608 chemicals had previously been known to have potential proximate or “near field” sources of exposure. The new data streams will be used to expand the domain of applicability, and to refine, and validate existing ExpoCast models. This abstract does not necessarily reflect U.S. EPA policy.

Hydrologic Landscape Classification to Estimate Bristol Bay Watershed Hydrology

The use of hydrologic landscapes has proven to be a useful tool for broad scale assessment and classification of landscapes across the United States. These classification systems help organize larger geographical areas into areas of similar hydrologic characteristics based on climate, terrain and underlying geology. Such characterization of landscapes into areas of common hydrologic character is particularly instructive where site specific hydrologic data is sparse or spatially incomplete. Within Bristol Bay, much of the region remains understudied with many areas having minimal to nonexistent hydrologic data, and those areas that are well studied limited to individual reaches or small watersheds. By using broad scale landscape metrics to organize the landscape into discrete, characterized units, natural resources managers can gain valuable understanding of the region’s hydrologic character and how locations may be differentially affected by a variety of environmental stressors ranging from land use change to climate change. The heterogeneity of aquatic habitats and undisturbed hydrologic regimes within Bristol Bay watershed are a known principal driver for its overall fisheries stability and the use of hydrologic landscapes offers the ability to better characterize the hydrologic and landscape influences on structuring biotic populations at a regional scale. Here we classify the entire Bristol Bay region into discrete hydrologic landscape units based on indices of annual climate and seasonality, terrain, and geology. Areas of available gauged records were grouped into river basin type based on visual differentiation of hydrograph shape in regards to baseflow contribution, timing and magnitude of peak flows and resident hydrologic landscape distributions therein compared. Finally, using these observed relationships between river basin type and hydrologic landscape composition, we estimate hydrologic condition in locations where streamflow data is lacking, but with known hydrologic landscape distribution. This demonstration of hydrologic landscapes in Bristol Bay, Alaska shows the utility of using large-scale datasets on climate, terrain and geology to infer broad scale hydrologic character within a data poor area. Disclaimer: The authors views expressed here do not necessarily reflect views or policies of U.S. EPA.

HexSim: a modeling environment for ecology and conservation.

HexSim is a powerful and flexible new spatially-explicit, individual based modeling environment intended for use in ecology, conservation, genetics, epidemiology, toxicology, and other disciplines. We describe HexSim, illustrate past applications that contributed to our >10 year development effort, and discuss types of future investigations for which we expect the platform to make a significant contribution. The HexSim model, documentation, worked examples, and other materials can be freely obtained from the website www.hexsim.net.

Toxicological Tipping Points: Learning Boolean Networks from High-Content Imaging Data. (BOSC meeting)

The objective of this work is to elucidate biological networks underlying cellular tipping points using time-course data. We discretized the high-content imaging (HCI) data and inferred Boolean networks (BNs) that could accurately predict dynamic cellular trajectories. We found three main classes of BNs including: cell recovery, adaptation, and injury. We believe biological network analysis can predict critical chemical exposures and mechanisms underlying cellular tipping points.

Virtual Embryo: Cell-Agent Based Modeling of Developmental Processes and Toxicities (CSS BOSC)

Spatial regulation of cellular dynamics is fundamental to morphological development. As such, chemical disruption of spatial dynamics is a determinant of developmental toxicity. Incorporating spatial dynamics into AOPs for developmental toxicity is desired but constrained by the lack of a suitable computational environment for in silico embryogenesis. EPA’s ‘Virtual Embryo’ provides a heuristic platform that translates in vitro data from ToxCast bioactivity profiles into probabilities of a predicted adverse outcome. Models delivered to date include angiogenesis, urethrogenesis, palatogenesis, and limb outgrowth. Models under development include neurovascular development and heart development. Design, development and implementation of a Virtual Tissue Laboratory System infrastucture will enable high-performance computing and engage translation. These biologically-relevant in silico models translate mechanistic information generated at a basic level of research (ToxCast) into recognizable phenotypes (cybermorphs) predicted at a higher level. Systems represented dynamically bring AOPs to ‘life,’ which in a Children’s Environmental Health setting can be used for mechanism-specific developmental toxicity as part of an Integrated Testing Strategy for rapid screening purposes. (Disclaimer: this poster does not reflect EPA policy).

Generalized Read-Across (GenRA) prediction using chemical and biological information (BOSC)

Read-across is a popular data gap filling technique within category and analogue approaches for regulatory purposes. Acceptance of read-across remains a challenge with several efforts underway for identifying and addressing uncertainties. To date, these approaches have been qualitative in nature. Here, an algorithmic approach to facilitate read-across using ToxCast in vitro bioactivity data in conjunction with chemical descriptor information to predict in vivo outcomes in guideline (and guideline-like) testing studies from ToxRefDB is demonstrated. The read-across prediction for a given chemical is based on the similarity weighted endpoint outcomes of its nearest neighbors, calculated using in vitro bioactivity and chemical structure descriptors, called Generalized Read-across (GenRA). GenRA is a first step in systemizing read-across by providing performance metrics and enabling the scientific confidence of a prediction to be objectively assessed.

RapidTox – Tools for Rapid Risk Assessments (BOSC)

Risk assessments are needed for hundreds to thousands of chemicals, many of which do not have the rich data sets required, for instance, for IRIS or PPRTV assessments. EPA program offices and groups (OLEM, OPP Inerts, OPPT and others) still need to carry out to risk assessments for data poor chemicals. To support these efforts, the RapidTox project will – Provide easy access to high-quality (high-tier) data as inputs to risk assessments, when available; Provide lower tier data when higher-tier is not available; Develop and provide modeled inputs when even lower-tier data in not available; Make all data and models made available through theRapidTox Dashboard; Provide client-specific data, models and dashboards