CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In August 2018

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
201 CVE-2018-15528 79 XSS 2018-08-21 2018-10-16
4.3
None Remote Medium Not required None Partial None
Reflected Cross-Site Scripting exists in the Java System Solutions SSO plugin 4.0.13.1 for BMC MyIT. A remote attacker can abuse this issue to inject client-side scripts into the "select_sso()" function. The payload is triggered when the victim opens a prepared /ux/jss-sso/arslogin?[XSS] link and then clicks the "Login" button.
202 CVE-2018-15505 476 DoS 2018-08-18 2018-10-19
5.0
None Remote Low Not required None None Partial
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ']' character in an IPv6 address.
203 CVE-2018-15504 476 2018-08-18 2018-10-19
5.0
None Remote Low Not required None None Partial
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.
204 CVE-2018-15503 502 2018-08-18 2018-11-08
5.0
None Remote Low Not required None None Partial
The unpack implementation in Swoole version 4.0.4 lacks correct size checks in the deserialization process. An attacker can craft a serialized object to exploit this vulnerability and cause a SEGV.
205 CVE-2018-15501 125 2018-08-18 2018-10-12
5.0
None Remote Low Not required None None Partial
In ng_pkt in transports/smart_pkt.c in libgit2 before 0.26.6 and 0.27.x before 0.27.4, a remote attacker can send a crafted smart-protocol "ng" packet that lacks a '\0' byte to trigger an out-of-bounds read that leads to DoS.
206 CVE-2018-15499 362 DoS 2018-08-24 2018-11-06
4.7
None Local Medium Not required None None Complete
GEAR Software products that include GEARAspiWDM.sys, 2.2.5.0, allow local users to cause a denial of service (Race Condition and BSoD on Windows) by not checking that user-mode memory is available right before writing to it. A check is only performed at the beginning of a long subroutine.
207 CVE-2018-15495 22 Dir. Trav. 2018-08-18 2018-10-19
5.0
None Remote Low Not required Partial None None
/filemanager/upload.php in Responsive FileManager before 9.13.3 allows Directory Traversal and SSRF because the url parameter is used directly in a curl_exec call, as demonstrated by a file:///etc/passwd value.
208 CVE-2018-15494 116 2018-08-18 2020-08-24
7.5
None Remote Low Not required Partial Partial Partial
In Dojo Toolkit before 1.14, there is unescaped string injection in dojox/Grid/DataGrid.
209 CVE-2018-15492 405 2018-08-18 2018-10-23
5.0
None Remote Low Not required None None Partial
A vulnerability in the lservnt.exe component of Sentinel License Manager version 8.5.3.35 (fixed in 8.5.3.2403) causes UDP amplification.
210 CVE-2018-15491 798 2018-08-18 2019-10-03
5.0
None Remote Low Not required None Partial None
A vulnerability in the permission and encryption implementation of Zemana Anti-Logger 1.9.3.527 and prior (fixed in 1.9.3.602) allows an attacker to take control of the whitelisting feature (MyRules2.ini under %LOCALAPPDATA%\Zemana\ZALSDK) to permit execution of unauthorized applications (such as ones that record keystrokes).
211 CVE-2018-15482 732 2018-08-17 2019-10-03
7.5
None Remote Low Not required Partial Partial Partial
Certain LG devices based on Android 6.0 through 8.1 have incorrect access control for MLT application intents. The LG ID is LVE-SMP-180006.
212 CVE-2018-15481 78 2018-08-21 2019-10-03
6.5
None Remote Low ??? Partial Partial Partial
Improper input sanitization within the restricted administration shell on UCOPIA Wireless Appliance devices using firmware version 5.1.x before 5.1.13 allows authenticated remote attackers to escape the shell and escalate their privileges by adding a LocalCommand to the SSH configuration file in the user home folder.
213 CVE-2018-15480 2018-08-30 2019-10-03
6.5
None Remote Low ??? Partial Partial Partial
An issue was discovered in myStrom WiFi Switch V1 before 2.66, WiFi Switch V2 before 3.80, WiFi Switch EU before 3.80, WiFi Bulb before 2.58, WiFi LED Strip before 3.80, WiFi Button before 2.73, and WiFi Button Plus before 2.73. The cloud API had a hidden parameter, which allowed an authenticated user to reconfigure the server URL for a device registered to their account. In combination with an insecure device registration vulnerability, this allowed an attacker to reconfigure a maliciously registered device to their own rogue replica of the myStrom API and issue commands to the device, including firmware update commands.
214 CVE-2018-15479 287 2018-08-30 2018-11-09
6.4
None Remote Low Not required Partial Partial None
An issue was discovered in myStrom WiFi Switch V1 before 2.66, WiFi Switch V2 before 3.80, WiFi Switch EU before 3.80, WiFi Bulb before 2.58, WiFi LED Strip before 3.80, WiFi Button before 2.73, and WiFi Button Plus before 2.73. Devices did not authenticate themselves to the cloud in device to cloud communication. This lack of device authentication allowed an attacker to impersonate any device by guessing or learning their MAC address.
215 CVE-2018-15478 287 2018-08-30 2019-10-03
6.8
None Remote Medium Not required Partial Partial Partial
An issue was discovered in myStrom WiFi Switch V1 before 2.66, WiFi Switch V2 before 3.80, WiFi Switch EU before 3.80, WiFi Bulb before 2.58, WiFi LED Strip before 3.80, WiFi Button before 2.73, and WiFi Button Plus before 2.73. The process of registering a device with a cloud account was based on an activation code derived from the device MAC address. By guessing valid MAC addresses or using MAC addresses printed on devices in shops and reverse engineering the protocol, an attacker would have been able to register previously unregistered devices to their account. When the rightful owner would have connected them after purchase to their WiFi network, the devices would not have registered with their account, would subsequently not have been controllable from the owner's mobile app, and would not have been visible in the owner's account. Instead, they would have been under control of the attacker.
216 CVE-2018-15477 78 2018-08-30 2018-11-09
10.0
None Remote Low Not required Complete Complete Complete
myStrom WiFi Switch V1 devices before 2.66 did not sanitize a parameter received from the cloud that was used in an OS command. Malicious servers were able to run operating system commands on the device.
217 CVE-2018-15476 295 2018-08-30 2018-11-09
9.3
None Remote Medium Not required Complete Complete Complete
An issue was discovered in myStrom WiFi Switch V1 before 2.66, WiFi Switch V2 before 3.80, WiFi Switch EU before 3.80, WiFi Bulb before 2.58, WiFi LED Strip before 3.80, WiFi Button before 2.73, and WiFi Button Plus before 2.73. The SSL/TLS server certificate in the device to cloud communication was not verified by the device. As a result, an attacker in control of the network traffic of a device could have taken control of a device by intercepting and modifying commands issued from the server to the device in a Man-in-the-Middle attack. This included the ability to inject firmware update commands into the communication and cause the device to install maliciously modified firmware.
218 CVE-2018-15473 362 2018-08-17 2020-08-24
5.0
None Remote Low Not required Partial None None
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
219 CVE-2018-15471 125 DoS Overflow +Info 2018-08-17 2020-08-24
6.8
None Local Low ??? Complete Complete Complete
An issue was discovered in xenvif_set_hash_mapping in drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used in Xen through 4.11.x and other products. The Linux netback driver allows frontends to control mapping of requests to request queues. When processing a request to set or change this mapping, some input validation (e.g., for an integer overflow) was missing or flawed, leading to OOB access in hash handling. A malicious or buggy frontend may cause the (usually privileged) backend to make out of bounds memory accesses, potentially resulting in one or more of privilege escalation, Denial of Service (DoS), or information leaks.
220 CVE-2018-15470 400 2018-08-17 2018-11-13
4.9
None Local Low Not required None None Complete
An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.
221 CVE-2018-15469 400 2018-08-17 2019-03-08
4.9
None Local Low Not required None None Complete
An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash).
222 CVE-2018-15468 863 DoS 2018-08-17 2019-10-03
4.9
None Local Low Not required None None Complete
An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.
223 CVE-2018-15364 200 Exec Code +Info 2018-08-30 2018-11-08
1.9
None Local Medium Not required Partial None None
A Named Pipe Request Processing Out-of-Bounds Read Information Disclosure vulnerability in Trend Micro OfficeScan XG (12.0) could allow a local attacker to disclose sensitive information on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability.
224 CVE-2018-15363 125 Exec Code 2018-08-30 2019-10-03
7.2
None Local Low Not required Complete Complete Complete
An Out-of-Bounds Read Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) products could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability.
225 CVE-2018-15360 798 2018-08-17 2019-10-03
7.5
None Remote Low Not required Partial Partial Partial
An attacker without authentication can login with default credentials for privileged users in Eltex ESP-200 firmware version 1.2.0.
226 CVE-2018-15359 2018-08-17 2019-10-03
6.5
None Remote Low ??? Partial Partial Partial
An authenticated attacker with low privileges can use insecure sudo configuration to expand attack surface in Eltex ESP-200 firmware version 1.2.0.
227 CVE-2018-15358 20 2018-08-17 2018-10-12
6.5
None Remote Low ??? Partial Partial Partial
An authenticated attacker with low privileges can activate high privileged user and use it to expand attack surface in Eltex ESP-200 firmware version 1.2.0.
228 CVE-2018-15357 200 +Info 2018-08-17 2018-10-12
4.0
None Remote Low ??? Partial None None
An authenticated attacker with low privileges can extract password hash information for all users in Eltex ESP-200 firmware version 1.2.0.
229 CVE-2018-15356 77 Exec Code 2018-08-17 2019-10-03
6.5
None Remote Low ??? Partial Partial Partial
An authenticated attacker can execute arbitrary code using command ejection in Eltex ESP-200 firmware version 1.2.0.
230 CVE-2018-15355 327 2018-08-17 2019-10-03
4.3
None Remote Medium Not required Partial None None
Usage of SSLv2 and SSLv3 leads to transmitted data decryption in Kraftway 24F2XG Router firmware 3.5.30.1118.
231 CVE-2018-15354 119 DoS Overflow 2018-08-17 2018-10-12
5.0
None Remote Low Not required None None Partial
A Buffer Overflow exploited through web interface by remote attacker can cause denial of service in Kraftway 24F2XG Router firmware 3.5.30.1118.
232 CVE-2018-15353 119 Exec Code Overflow 2018-08-17 2018-10-15
10.0
None Remote Low Not required Complete Complete Complete
A Buffer Overflow exploited through web interface by remote attacker can cause remote code execution in Kraftway 24F2XG Router firmware 3.5.30.1118.
233 CVE-2018-15352 DoS 2018-08-17 2021-06-17
4.0
None Remote Low ??? None None Partial
An attacker with low privileges can cause denial of service in Kraftway 24F2XG Router firmware version 3.5.30.1118.
234 CVE-2018-15351 59 DoS 2018-08-17 2018-10-15
7.1
None Remote Medium Not required None None Complete
Denial of service via crafting malicious link and sending it to a privileged user can cause Denial of Service in Kraftway 24F2XG Router firmware version 3.5.30.1118.
235 CVE-2018-15350 1188 2018-08-17 2019-10-03
10.0
None Remote Low Not required Complete Complete Complete
Router Default Credentials in Kraftway 24F2XG Router firmware version 3.5.30.1118 allow remote attackers to get privileged access to the router.
236 CVE-2018-15209 787 DoS Overflow 2018-08-08 2020-08-24
6.8
None Remote Medium Not required Partial Partial Partial
ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf.
237 CVE-2018-15203 352 CSRF 2018-08-08 2018-10-09
4.3
None Remote Medium Not required None Partial None
An issue was discovered in Ignited CMS through 2017-02-19. ign/index.php/admin/pages/add_page allows a CSRF attack to add pages.
238 CVE-2018-15202 352 CSRF 2018-08-08 2018-10-18
6.8
None Remote Medium Not required Partial Partial Partial
An issue was discovered in Juunan06 eCommerce through 2018-08-05. There is a CSRF vulnerability in ee/eBoutique/app/template/includes/crudTreatment.php that can add new users and add products.
239 CVE-2018-15199 79 XSS 2018-08-08 2018-10-04
3.5
None Remote Medium ??? None Partial None
AuraCMS 2.3 allows XSS via a Bukutamu -> AddGuestbook action.
240 CVE-2018-15198 352 CSRF 2018-08-08 2018-10-04
6.8
None Remote Medium Not required Partial Partial Partial
An issue was discovered in OneThink v1.1. There is a CSRF vulnerability in admin.php?s=/User/add.html that can add a user.
241 CVE-2018-15197 352 CSRF 2018-08-08 2018-10-04
6.8
None Remote Medium Not required Partial Partial Partial
An issue was discovered in OneThink v1.1. There is a CSRF vulnerability in admin.php?s=/AuthManager/addToGroup.html that can endow administrator privileges.
242 CVE-2018-15193 352 CSRF 2018-08-08 2018-10-05
6.8
None Remote Medium Not required Partial Partial Partial
A CSRF vulnerability in the admin panel in Gogs through 0.11.53 allows remote attackers to execute admin operations via a crafted issue / link.
243 CVE-2018-15192 918 2018-08-08 2018-10-18
5.0
None Remote Low Not required Partial None None
An SSRF vulnerability in webhooks in Gitea through 1.5.0-rc2 and Gogs through 0.11.53 allows remote attackers to access intranet services.
244 CVE-2018-15191 119 DoS Overflow 2018-08-10 2018-10-06
4.0
None Remote Low ??? None None Partial
PHP Scripts Mall hotel-booking-script 2.0.4 allows remote attackers to cause a denial of service via crafted JavaScript code in the First Name, Last Name, or Address field.
245 CVE-2018-15190 79 XSS 2018-08-10 2018-10-06
3.5
None Remote Medium ??? None Partial None
PHP Scripts Mall hotel-booking-script 2.0.4 allows XSS via the First Name, Last Name, or Address field.
246 CVE-2018-15189 79 XSS 2018-08-10 2018-10-05
3.5
None Remote Medium ??? None Partial None
PHP Scripts Mall advanced-real-estate-script has XSS via the Name field of a profile.
247 CVE-2018-15188 119 DoS Overflow 2018-08-10 2018-10-09
5.5
None Remote Low ??? None Partial Partial
PHP Scripts Mall advanced-real-estate-script 4.0.9 allows remote attackers to cause a denial of service (page structure loss) via crafted JavaScript code in the Name field of a profile.
248 CVE-2018-15187 352 CSRF 2018-08-10 2018-10-05
6.0
None Remote Medium ??? Partial Partial Partial
PHP Scripts Mall advanced-real-estate-script 4.0.9 has CSRF via edit-profile.php.
249 CVE-2018-15186 352 CSRF 2018-08-10 2018-10-09
6.8
None Remote Medium Not required Partial Partial Partial
PHP Scripts Mall Chartered Accountant : Auditor Website 2.0.1 has CSRF via client/auditor/updprofile.php.
250 CVE-2018-15185 20 DoS 2018-08-10 2018-10-09
5.5
None Remote Low ??? None Partial Partial
PHP Scripts Mall Naukri / Shine / Jobsite Clone Script 3.0.4 allows remote attackers to cause a denial of service (page update outage) via crafted PHP and JavaScript code in the "Current Position" field.
Total number of vulnerabilities : 1019   Page : 1 2 3 4 5 (This Page)6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.