CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In February 2018

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
101 CVE-2018-7339 119 DoS Overflow 2018-02-23 2018-03-18
6.8
None Remote Medium Not required Partial Partial Partial
The MP4Atom class in mp4atom.cpp in MP4v2 through 2.0.0 mishandles Entry Number validation for the MP4 Table Property, which allows remote attackers to cause a denial of service (overflow, insufficient memory allocation, and segmentation fault) or possibly have unspecified other impact via a crafted mp4 file.
102 CVE-2018-7337 2018-02-23 2020-08-24
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4, the DOCSIS protocol dissector could crash. This was addressed in plugins/docsis/packet-docsis.c by removing the recursive algorithm that had been used for concatenated PDUs.
103 CVE-2018-7336 476 2018-02-23 2020-08-24
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the FCP protocol dissector could crash. This was addressed in epan/dissectors/packet-fcp.c by checking for a NULL pointer.
104 CVE-2018-7335 2018-02-23 2020-08-24
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the IEEE 802.11 dissector could crash. This was addressed in epan/crypt/airpdcap.c by rejecting lengths that are too small.
105 CVE-2018-7334 2018-02-23 2020-08-24
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the UMTS MAC dissector could crash. This was addressed in epan/dissectors/packet-umts_mac.c by rejecting a certain reserved value.
106 CVE-2018-7333 835 2018-02-23 2019-10-03
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.
107 CVE-2018-7332 835 2018-02-23 2019-10-03
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-reload.c had an infinite loop that was addressed by validating a length.
108 CVE-2018-7331 835 2018-02-23 2019-10-03
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-ber.c had an infinite loop that was addressed by validating a length.
109 CVE-2018-7330 835 2018-02-23 2019-10-03
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thread.c had an infinite loop that was addressed by using a correct integer data type.
110 CVE-2018-7329 193 2018-02-23 2019-10-03
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-s7comm.c had an infinite loop that was addressed by correcting off-by-one errors.
111 CVE-2018-7328 835 2018-02-23 2019-10-03
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-usb.c had an infinite loop that was addressed by rejecting short frame header lengths.
112 CVE-2018-7327 835 2018-02-23 2019-10-03
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-openflow_v6.c had an infinite loop that was addressed by validating property lengths.
113 CVE-2018-7326 835 2018-02-23 2019-10-03
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-lltd.c had an infinite loop that was addressed by using a correct integer data type.
114 CVE-2018-7325 835 2018-02-23 2019-10-03
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field.
115 CVE-2018-7324 835 2018-02-23 2019-10-03
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-sccp.c had an infinite loop that was addressed by using a correct integer data type.
116 CVE-2018-7323 834 2018-02-23 2020-08-24
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-wccp.c had a large loop that was addressed by ensuring that a calculated length was monotonically increasing.
117 CVE-2018-7322 835 2018-02-23 2019-10-03
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-dcm.c had an infinite loop that was addressed by checking for integer wraparound.
118 CVE-2018-7321 834 2018-02-23 2020-08-24
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type.
119 CVE-2018-7320 2018-02-23 2020-08-24
5.0
None Remote Low Not required None None Partial
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the SIGCOMP protocol dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by validating operand offsets.
120 CVE-2018-7319 89 Sql 2018-02-22 2018-03-02
7.5
None Remote Low Not required Partial Partial Partial
SQL Injection exists in the OS Property Real Estate 3.12.7 component for Joomla! via the cooling_system1, heating_system1, or laundry parameter.
121 CVE-2018-7318 89 Sql 2018-02-22 2021-01-30
7.5
None Remote Low Not required Partial Partial Partial
SQL Injection exists in the CheckList 1.1.1 component for Joomla! via the title_search, tag_search, name_search, description_search, or filter_order parameter.
122 CVE-2018-7317 200 +Info 2018-02-22 2018-03-13
5.0
None Remote Low Not required Partial None None
Backup Download exists in the Proclaim 9.1.1 component for Joomla! via a direct request for a .sql file under backup/.
123 CVE-2018-7316 434 2018-02-22 2018-03-13
7.5
None Remote Low Not required Partial Partial Partial
Arbitrary File Upload exists in the Proclaim 9.1.1 component for Joomla! via a mediafileform action.
124 CVE-2018-7315 89 Sql 2018-02-22 2020-06-03
7.5
None Remote Low Not required Partial Partial Partial
SQL Injection exists in the Ek Rishta 2.9 component for Joomla! via the gender, age1, age2, religion, mothertounge, caste, or country parameter.
125 CVE-2018-7314 89 Sql 2018-02-22 2018-03-06
7.5
None Remote Low Not required Partial Partial Partial
SQL Injection exists in the PrayerCenter 3.0.2 component for Joomla! via the sessionid parameter, a different vulnerability than CVE-2008-6429.
126 CVE-2018-7313 89 Sql 2018-02-22 2018-03-05
7.5
None Remote Low Not required Partial Partial Partial
SQL Injection exists in the CW Tags 2.0.6 component for Joomla! via the searchtext array parameter.
127 CVE-2018-7312 89 Sql 2018-02-22 2018-03-02
7.5
None Remote Low Not required Partial Partial Partial
SQL Injection exists in the Alexandria Book Library 3.1.2 component for Joomla! via the letter parameter.
128 CVE-2018-7311 732 Exec Code 2018-02-21 2020-05-04
9.0
None Remote Low ??? Complete Complete Complete
** DISPUTED ** PrivateVPN 2.0.31 for macOS suffers from a root privilege escalation vulnerability. The software installs a privileged helper tool that runs as the root user. This privileged helper tool is installed as a LaunchDaemon and implements an XPC service. The XPC service is responsible for handling new VPN connection operations via the main PrivateVPN application. The privileged helper tool creates new VPN connections by executing the openvpn binary located in the /Applications/PrivateVPN.app/Contents/Resources directory. The openvpn binary can be overwritten by the default user, which allows an attacker that has already installed malicious software as the default user to replace the binary. When a new VPN connection is established, the privileged helper tool will launch this malicious binary, thus allowing an attacker to execute code as the root user. NOTE: the vendor has reportedly indicated that this behavior is "an acceptable part of their software."
129 CVE-2018-7308 352 CSRF 2018-02-21 2018-03-16
6.8
None Remote Medium Not required Partial Partial Partial
A CSRF issue was found in var/www/html/files.php in DanWin hosting through 2018-02-11 that allows arbitrary remote users to add/delete/modify any files in any hosting account.
130 CVE-2018-7305 352 CSRF 2018-02-21 2020-08-24
4.0
None Remote Low ??? None Partial None
MyBB 1.8.14 is not checking for a valid CSRF token, leading to arbitrary deletion of user accounts.
131 CVE-2018-7304 1236 2018-02-21 2020-08-24
6.5
None Remote Low ??? Partial Partial Partial
Tiki 17.1 does not validate user input for special characters; consequently, a CSV Injection attack can open a CMD.EXE or Calculator window on the victim machine to perform malicious activity, as demonstrated by an "=cmd|' /C calc'!A0" payload during User Creation.
132 CVE-2018-7303 79 XSS 2018-02-21 2018-03-13
3.5
None Remote Medium ??? None Partial None
The Calendar component in Tiki 17.1 allows HTML injection.
133 CVE-2018-7302 79 XSS 2018-02-21 2018-03-12
3.5
None Remote Medium ??? None Partial None
Tiki 17.1 allows upload of a .PNG file that actually has SVG content, leading to XSS.
134 CVE-2018-7301 306 2018-02-22 2018-03-18
7.5
None Remote Low Not required Partial Partial Partial
eQ-3 AG HomeMatic CCU2 2.29.22 devices have an open XML-RPC port without authentication. This can be exploited by sending arbitrary XML-RPC requests to control the attached BidCos devices.
135 CVE-2018-7300 22 Exec Code Dir. Trav. 2018-02-22 2020-04-14
10.0
None Remote Low Not required Complete Complete Complete
Directory Traversal / Arbitrary File Write / Remote Code Execution in the User.setLanguage method in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to write arbitrary files to the device's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.
136 CVE-2018-7299 Exec Code 2018-02-22 2019-10-03
5.2
None Local Network Low ??? Partial Partial Partial
Remote Code Execution in the addon installation process in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows authenticated attackers to create or overwrite arbitrary files or install malicious software on the device.
137 CVE-2018-7298 319 2018-02-22 2019-10-03
9.3
None Remote Medium Not required Complete Complete Complete
In /usr/local/etc/config/addons/mh/loopupd.sh on eQ-3 AG HomeMatic CCU2 2.29.22 devices, software update packages are downloaded via the HTTP protocol, which does not provide any cryptographic protection of the downloaded contents. An attacker with a privileged network position (which could be obtained via DNS spoofing of www.meine-homematic.de or other approaches) can exploit this issue in order to provide arbitrary malicious firmware updates to the CCU2. This can result in a full system compromise.
138 CVE-2018-7297 Exec Code 2018-02-22 2019-10-03
10.0
None Remote Low Not required Complete Complete Complete
Remote Code Execution in the TCL script interpreter in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to obtain read/write access and execute system commands on the device. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.
139 CVE-2018-7296 22 Dir. Trav. 2018-02-22 2019-10-03
5.0
None Remote Low Not required Partial None None
Directory Traversal / Arbitrary File Read in User.getLanguage method in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to read the first line of an arbitrary file on the CCU2's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.
140 CVE-2018-7289 172 Bypass 2018-02-21 2018-03-17
4.3
None Remote Medium Not required None Partial None
An issue was discovered in armadito-windows-driver/src/communication.c in Armadito 0.12.7.2. Malware with filenames containing pure UTF-16 characters can bypass detection. The user-mode service will fail to open the file for scanning after the conversion is done from Unicode to ANSI. This happens because characters that cannot be converted from Unicode are replaced with '?' characters.
141 CVE-2018-7287 754 2018-02-22 2019-10-03
4.3
None Remote Medium Not required None None Partial
An issue was discovered in res_http_websocket.c in Asterisk 15.x through 15.2.1. If the HTTP server is enabled (default is disabled), WebSocket payloads of size 0 are mishandled (with a busy loop).
142 CVE-2018-7286 2018-02-22 2019-10-03
4.0
None Remote Low ??? None None Partial
An issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. res_pjsip allows remote authenticated users to crash Asterisk (segmentation fault) by sending a number of SIP INVITE messages on a TCP or TLS connection and then suddenly closing the connection.
143 CVE-2018-7285 476 2018-02-22 2018-03-21
5.0
None Remote Low Not required None None Partial
A NULL pointer access issue was discovered in Asterisk 15.x through 15.2.1. The RTP support in Asterisk maintains its own registry of dynamic codecs and desired payload numbers. While an SDP negotiation may result in a codec using a different payload number, these desired ones are still stored internally. When an RTP packet was received, this registry would be consulted if the payload number was not found in the negotiated SDP. This registry was incorrectly consulted for all packets, even those which are dynamic. If the payload number resulted in a codec of a different type than the RTP stream (for example, the payload number resulted in a video codec but the stream carried audio), a crash could occur if no stream of that type had been negotiated. This was due to the code incorrectly assuming that a stream of that type would always exist.
144 CVE-2018-7284 119 Overflow 2018-02-22 2019-03-01
5.0
None Remote Low Not required None None Partial
A Buffer Overflow issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. When processing a SUBSCRIBE request, the res_pjsip_pubsub module stores the accepted formats present in the Accept headers of the request. This code did not limit the number of headers it processed, despite having a fixed limit of 32. If more than 32 Accept headers were present, the code would write outside of its memory and cause a crash.
145 CVE-2018-7281 Exec Code 2018-02-21 2020-05-04
9.0
None Remote Low ??? Complete Complete Complete
CactusVPN 5.3.6 for macOS contains a root privilege escalation vulnerability through a setuid root binary called runme. The binary takes a single command line argument and passes this argument to a system() call, thus allowing low privileged users to execute commands as root.
146 CVE-2018-7280 79 XSS 2018-02-21 2018-03-05
4.3
None Remote Medium Not required None Partial None
The Ninja Forms plugin before 3.2.14 for WordPress has XSS.
147 CVE-2018-7278 79 XSS 2018-02-21 2018-03-21
4.3
None Remote Medium Not required None Partial None
An issue was discovered on RLE Protocol Converter FDS-PC / FDS-PC-DP 2.1 devices. Persistent XSS exists in the web server. Remote attackers can inject malicious JavaScript code using the device's BACnet implementation. This is similar to a Cross Protocol Injection with SNMP.
148 CVE-2018-7277 79 XSS 2018-02-21 2018-03-21
4.3
None Remote Medium Not required None Partial None
An issue was discovered on RLE Wi-MGR/FDS-Wi 6.2 devices. Persistent XSS exists in the web server. Remote attackers can inject malicious JavaScript code using the device's BACnet implementation. This is similar to a Cross Protocol Injection with SNMP.
149 CVE-2018-7276 200 +Info 2018-02-21 2018-03-18
5.0
None Remote Low Not required Partial None None
An issue was discovered on Lutron Quantum BACnet Integration 2.0 (firmware 3.2.243) devices. Remote attackers can obtain potentially sensitive information via a /DbXmlInfo.xml request, as demonstrated by the Latitude/Longitude of the device.
150 CVE-2018-7274 79 XSS 2018-02-21 2019-10-07
4.3
None Remote Medium Not required None Partial None
Yab Quarx through 2.4.3 is prone to multiple persistent cross-site scripting vulnerabilities: Blog (Title), FAQ (Question), Pages (Title), Widgets (Name), and Menus (Name).
Total number of vulnerabilities : 1328   Page : 1 2 3 (This Page)4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.