[기계학습 방식 의료기기의 특성]

 

 

 

 

*** 출처: [IITP 정보통신기술진흥센터] 국내 인공지능(AI) 의료기기 현황 및 규제 이슈 - 정원준 연구원

*** 문서:

file5451393364513108696-183101.pdf

 

 

 

 

I. 서론

 

 

- 인공지능은 인지, 학습, 추론, 판단 등 인간사고 과정의 전반을 알고리즘 설계로 구현하는 SW 기술로서, 특정 산업에 한정하지 않고 전 산업 영역에 걸쳐 생산성을 획기적으로 개선하는 범용기술(General Technology)의 특징을 가진다. 이에 따라 의료 분야를 비롯하여 제조, 금융, 교육, 농업, 항공 등 지식이 활용될 수 있는 광범위한 도메인(영역)에서 획기적이고 혁신적인 응용 제품 및 서비스가 등장하고 있다.

 

 

 

II. 인공지능(AI) 의료기기 개념 및 국내 동향

 

 

1. 인공지능(AI) 의료기기 개념 및 특징

 

- 인공지능(AI)기반의 의료 서비스는 분석 대상이 되는 데이터의 유형에 따라 3가지 정도로 구분

 

① 전자의무기록이나 차트에 저장된 환자 진료 기록, 유전체 데이터 등의 복잡한 의료 데이터를 분석하는 인공지능

 

② X-Ray, CT, MRI 등 의료 영상을 판독하는 인공지능

 

③ 환자의 임상 데이터 등 연속적 의료 데이터를 모니터링하여 질병을 예측하는 인공지능

 

 

- 빅데이터, 인공지능(AI)이 적용된 의료기기: 의료용 빅데이터를 분석하여 질병을 진단·예측하는 독립형 SW 형태의 의료기기를 의미한다.

 

 

 

2. 국내 AI 의료기기 시장 동향

 

 

가. IBM Watson for Oncology(종양학)

 

- Watson의 인지시스템(cognitive system)을 통해 환자 데이터와 의학전문자료 등 광범위한 임상 데이터를 분석하여 환자와 의사에게 적합한 치료 옵션과 관련 정보를 제공하는 서비스

 

- 미국 MSK와 협력. 종양학 논문 4만 건, 300개 이상의 의학저널, 200여 종의 의학 교과서, 1,500만 페이지가 넘는 의학전문자료 등 방대한 규모의 학습 데이터를 활용

 

- 치료 시점에 환자에게 적용할 수 있는 치료법과 전문지식을 제공한다는 점에서 의미 있다.

 

- 환자 데이터를 입력하면 적절한 치료법을 '추천', '고려', '비추천'으로 나누어 제시하며 이에 대한 의료진의 판단결과(peer review 방식)를 딥러닝 기술로 학습하여 알고리즘의 정확도를 점차 증진 시키는 원리

 

- 국내 적용 병원: 길병원, 부산대병원, 건양대병원, 계명대동산의료원, 대구카톨릭대병원, 서울중앙보훈병원, 조선대병원

 

 

 

나. 삼성메디슨 S-Ditect

 

- 1만 개에 달하는 유방 조직 관련 빅데이터를 바탕으로 병변 경계 지정, 선택 부위 조직 특성 추출, 악성 여부 판정 단계 등 진단과정 전반에 딥러닝 기술을 적용하여 정확도를 향상 시키고 있음

 

 

 

다. 뷰노 VunoNet, VunoMed, 본에이지

 

-  VunoNet: 딥러닝 엔진

 

- VunoMed: 질병 부문별 의료 데이터 분석 플랫폼

 

- 본에이지: 골 연령 및 폐질환 진단보조 프로그램

 

 

 

라. 루닛, 루닛 인사이트

 

- 선도적인 기술을 가진 의료 영상 진단 분야의 스타트업

 

- 루닛: 의료영상진단 SW. 폐암, 폐렴, 결핵, 기흉 등 4대 폐질환을 감별하는 용도

 

- 루닛 인사이트: 웹사이트를 통해 일반인들이 무료로 사용할 수 있는 실시간 의료 영상 분석을 위한 클라우드 기반 인공지능 솔루션

 

 

 

마. JLK Inspection, JBS-01K

 

- 딥러닝 알고리즘을 기반으로 환국인 뇌경색 환자 MRI 빅데이터를 3차원화 하여 분석하는 프로그램

 

- 뇌경색, 뇌출혈의 진단 및 유형 분류를 보조하는 역할을 하며, 진단에 있어 정량적 판단 기준을 제시하여 뇌질환 환자에 대한 맞춤형 진단과 적절한 치료 전략을 수립하는 보조 프로그램

 

 

 

 

III. AI의료기기 관련 규제 이슈

 

 

1. 허가, 심사 제도

 

나. AI의료기기 허가, 심사 가이드라인의 해석상 문제점 및 개선 사항

 

① 'IBM Watson for Oncology'를 의료기기로 인정할 수 있을지의 문제

 

- 가이드라인에 따르면, "의료인에게 환자의 건강정보 또는 진료정보를 정리 및 추적하는 툴을 제공하거나 의학정보에 쉽게 접근하도록 도움을 주는 소프트웨어"에 해당하여 "비(非)의료기기"로 분류된다.

 

- 해당 서비스가 단순히 기존의 치료법을 추천하는 수준을 넘어 완전히 새로운 치료법을 제안하는 형태로 진화한다면, 환자의 안전에 영향을 미칠 수 있어 추후 의료기기 해당 여부 논란이 재개될 수 있을 것이다.

 

 

② 명확성 측면에서 구체적이지 못한 부분들

 

- 질병진단법, 치료법, 의약품 정보 등 빅데이터 분석에 기반하는 정보검색 SW는 의료기기 허가 대상에서 제외하고 있으나, 허가 대상인 의료영상분석장치 소프트웨어 2등급(분석) 의료기기와의 구별 기준이 해석상 모호한 측면이 있다.

 

 

③ 버전 관리 규정

 

- "작용원리 변경, 사용목적 변경, 성능 변경(학습데이터 변경에 의한 성능 변경은 허가 시 기재된 성능(정확도)의 범위를 벗어날 경우만 해당)"을 변경 허가 대상으로 하고 있는데, 학습 데이터를 변경하는 대부분의 경우 정확도 변경이 일어날 가능성이 크고 정확도 범위를 정량적으로 특정하는 것이 쉽지 않아 변경 허가 범위가 지나치게 확장될 우려가 있다.

 

 

 

2. AI의료기기 민형사상 책임 문제

 

- AI의료기기에서 '인공지능'은 인간의 사고 과정과 유사한 자율적 판단을 수행하는 주체이지만, 사람을 대상으로하는 법적 책임 주체는 될 수 없다. 이로 인해 AI의료기기를 활용하여 진료하는 과정에서 좋지않은 결과 즉, 사람의 생명, 신체 및 재산권에 침해가 발생하는 경우 SW개발자, 의료기기 제조업자, 의사, 병원, 환자 등 어느 주체가 책임을 질 것인지 불분명하다.

 

 

가. 민사상 책임 문제

 

- AI는 무체물인 SW 형태로 구현되며, 이를 유체물을 대상으로 하는 제조물법상 '제조물'과 민법상 '동산'의 개념에 포섭시킬 수 있는지 여부

 

 

나. 형사상 책임 문제

 

- AI의 형법상 책임 귀속과 관련한 법적 문제가 제기된다. 인공지능의 형사처벌을 위해 "법인에 대한 양벌규정"과 같은 형태로 부분적인 형벌능력을 고려해 볼 수 있으나, 이는 법인이 소유한 재산에 대한 제재를 가하는 취지의 규정으로 재산을 소유할 수 없는 AI에 동일하게 적용하는 것은 어렵다고 본다.

 

- AI의 형사상 주체성은 인정할 수 없다 하더라도 불법적 행위를 야기한 결과에 대한 책임을 지는 것은 법리적으로 충분히 가능하다고 판단된다. 즉 AI의 설계자, 생산자, 판매자, 관리자, 이용자 등 배후의 주체에게 형사상 책임을 부여하는 것이다.

 

 

Posted by manga0713

[이지미출처: Youtube "In The Garden (Lyrics Video) By: Brad Paisley"]

 

 

 

본문말씀 : 이사야 44장 6-11절

6.이스라엘의 왕인 여호와, 이스라엘의 구원자인 만군의 여호와가 이같이 말하노라 나는 처음이요 나는 마지막이라 나 외에 다른 신이 없느니라 7.내가 영원한 백성을 세운 이후로 나처럼 외치며 알리며 나에게 설명할 자가 누구냐 있거든 될 일과 장차 올 일을 그들에게 알릴지어다 8.너희는 두려워하지 말며 겁내지 말라 내가 예로부터 너희에게 듣게 하지 아니하였느냐 알리지 아니하였느냐 너희는 나의 증인이라 나 외에 신이 있겠느냐 과연 반석은 없나니 다른 신이 있음을 내가 알지 못하노라 9.우상을 만드는 자는 다 허망하도다 그들이 원하는 것들은 무익한 것이거늘 그것들의 증인들은 보지도 못하며 알지도 못하니 그러므로 수치를 당하리라 10.신상을 만들며 무익한 우상을 부어 만든 자가 누구냐 11.보라 그와 같은 무리들이 다 수치를 당할 것이라 그 대장장이들은 사람일 뿐이라 그들이 다 모여 서서 두려워하며 함께 수치를 당할 것이니라

복된 인생을 만드는 길 (이사야 44장 6-11절)

1. 삶을 두려워하지 말라

 하나님은 처음이자 마지막인 유일하신 참 하나님으로서 미래의 될 일과 장차 올 일을 알고 계신다(6-7절). 역사를 주관하시는 하나님만 믿고 그 반석 위에 굳게 서서 두려워하거나 겁내지 말라(8절). 용기가 없으면 자기 분복으로 주어진 축복을 소유할 기회가 줄어든다. 왜 삶에 두려움이 생기는가? 하나님 이외의 것에 삶의 기초를 두려고 하기 때문이다. 하나님만 바라보면 하나님은 그 믿음을 배반하지 않으신다.

 로마서 8장 28잘에 이런 말씀이 있다. “우리가 알거니와 하나님을 사랑하는 자 곧 그의 뜻대로 부르심을 입은 자들에게는 모든 것이 합력하여 선을 이루느니라.” 이 말씀은 자주 접하는 말씀이지만 깊이 음미해보면 정말로 복된 말씀이다. 어려움이 있고 일이 잘 안 풀려도 낙심하지 말라. 하나님이 그 상황도 허락하셨음을 믿고 나가면 하나님은 모든 일에 합력하여 결국은 선을 이루어내신다.

 로마서 8장 28절 말씀을 거꾸로 하면 이런 두려운 말씀이 된다. “우리가 알거니와 하나님을 사랑하지 않는 자 곧 그의 뜻대로 살지 않는 자들에게는 모든 것이 합력하여 악을 이루느니라.” 하나님을 사랑하지 않고 모든 것을 자기 뜻대로 하면 잠시 잘되는 것 같아도 결국은 망한다. 반면에 하나님의 뜻대로 하나님만 바라보며 살면 과정에서는 문제와 어려움이 있어도 반드시 최후의 승리자가 된다. 어떤 상황도 두려워하지 말라. 하나님의 뜻을 추구하며 나아가면 고난조차도 합력하여 선을 이루는 재료가 될 것이다.

2. 우상숭배에 빠지지 말라

 우상을 만들면 허망한 존재가 된다. 우상의 무익함을 모르면 수치를 당한다(9절). 왜 우상숭배를 금해야 하는가? 신상과 무익한 우상을 만드는 자가 바로 사람이기 때문이다(10-11절). 사람이 만든 것을 섬김의 대상으로 삼는 것이 얼마나 어리석인 일인가? 우상을 만들면 주도자뿐만 아니라 그 일의 동참자까지 두려움에 빠지고 수치를 당한다.

 사람은 창조주 하나님의 형상을 따라 창조되었다. 무엇이 하나님을 닮았는가? 영적이고 인격적이고 도덕적인 존재라는 점이 하나님을 닮았다. 그래서 사람은 하나님과 교통할 수 있고 하나님의 뜻을 따라 다른 피조물들 관리하는 위치에 있게 되었다(창 1:26-28). 그러므로 하나님 외에 어떤 것도 숭배하면 안 된다.

 사람은 사람답게 행동해야 한다. 사람다운 행동을 깨뜨리는 가장 대표적인 행동이 바로 나무와 돌로 만든 형상을 숭배하는 것이다. 사람이 하나님 외에 다른 것을 숭배하는 것은 하나님을 멸시하고 자신의 인간성과 책임을 부인하는 죄다. 또한 우상숭배에 빠지면 하나님의 형상을 잃기에 도덕적인 타락이 따른다. 그러므로 크고 작은 우상숭배에 빠지지 말고 오직 하나님만 바라보라.

3. 하나님의 사랑을 확신하라

 가끔 이런 생각이 든다. “내가 이런 모습으로 하나님 앞에 나아가 하나님의 은혜를 받을 수 있을까?” 인간적으로는 가망이 없어도 중요한 것은 복음을 가졌느냐 여부다. 아무리 부족한 죄인도 하나님을 붙잡으면 그의 허물을 도말하고 그의 죄를 기억하지 않는다고 하셨다(사 43:25). 현재의 모습이나 현실만 바라보지 말고 하나님을 붙잡으라. 환경과 생각을 초월한 의지적인 믿음이 있으면 그때부터 복되고 유익한 인생이 펼쳐진다.

 예수님은 요한복음 16장 33절에서 분명히 말씀했다. “세상에서는 너희가 환난을 당하나 담대하라 내가 세상을 이기었노라.” 세상을 이기신 예수님을 믿으면 그도 ‘세상을 이긴 자’가 된다. ‘세상을 이긴 자’보다 강한 자가 어디에 있겠는가? 자신이 약해보여도 실제로는 놀라운 가능성을 가진 강자라고 확신하라. 눈에 보이는 현실로 인해 고민하지 말라. 하나님은 강하다고 하셨고 두려워하지 말고 용기를 내라고 하셨다. 그 말씀은 말장난이나 단순한 격려가 아니라 하나님의 약속의 말씀이다.

 하나님의 사랑을 확신하라. 진심으로 회개하면 하나님은 이전의 죄와 허물을 도말하시고 기억치 아니하신다. 하나님은 지금도 은혜를 주시려고 기다리고 계신다. 그 은혜를 추구하는 것에 대해 너무 죄송해하지 말라. 부모에게는 부모의 사랑을 많이 받고 감사하는 아이가 죄송하다면서 부모의 사랑을 거절하고 “저는 부모님이 필요 없어요.”라고 말하며 독립하려는 아이보다 훨씬 예쁘고 사랑스럽게 보임을 잊지 말라.

ⓒ 이한규목사  http://www.john316.or.kr

 

Posted by manga0713

[인공지능 알고리즘 오작동 유발 스티커 - Adversarial Patch]

 

 

[Adversarial Patch로 인한 인공지능 사물인식 오작동 사례]

 

 

[Adversarial Patch로 인한 스마트폰 앱의 오작동 사례]

 

 

 

 

*** 출처: [IITP 정보통신기술진흥센터] 구글 리서치 그룹 인공지능 알고리즘 오작동 유발 스티커 - Adversarial Patch 발표

*** 문서:

file4775797984478447653-183103.pdf

 

 

 

 

■ 구글 리서치 그룹, 이미지 인식 인공지능(AI) 알고리즘을 오작동 시킬 수 있는 스티커 발표

 

- 애드버세리얼 패치(Adversarial Patch, 적대적 스티커)라 불리우는 원형 스티커를 사물 옆에 붙여 두면 이미지 인식 알고리즘이 제대로 작동하지 않게 된다고 함

 

- 이 스티커를 바나나 옆에 붙이면 바나나를 토스터로 잘못 인식하게 되는데, 만약 이를 길거리에 붙여 둔다면 자율운전자동차가 객체를 오인식해 제대로 주행할 수 없게 될 우려가 있음

 

 

 

■ 애드버세리얼 패치의 발표에 주목해야 하는 이유

 

- 구글이 공개한 이 스티커는 누구나 인쇄하여 자신의 스마트 폰에 설치된 이미지 인식 앱을 교란할 수 있는지 실제 실험해 볼 수 있음

 

- 이미지 인식 기능의 근간인 신경망을 쉽게 속일 수 있다는 문제 제기는 그 동안 많았지만, 구글의 스티커는 실생활에서 손쉽게 피해를 야기할 수 있다는 점에서 매우 심각함

 

- 2017년 7월 워싱턴 대학의 한 연구팀은 교통 표지판에 정교하게 만든 스티커를 붙여 넣으면 이미지 인식 알고리즘이 '정지' 표지판을 '속도제한' 표지판으로 오인식한다고 발표한다 있음. 구글의 스티커는 이 보다 훨씬 더 간단하게 오작동 유도가 가능함

 

 

 

■ 이처럼 이미지 인식 알고리즘이 인식하는 데이터(example)에 노이즈를 추가해 오류를 일으키는 공격 기법을 "애드버세리얼 이그잼플(Adversarial Example, 적대적 사례)"이라 하며, 구글의 스티커는 이 공격을 누구나 쉽게 할 수 있는 환경이 되었음을 의미함

 

 

 

■ 구글 리서치 그룹은 논문을 통해 스티커 제작 방법도 공개 함

 

- 스티커의 효과는 디자인뿐만 아니라, 객체에서의 위치, 스티커 방향, 스티커 크기 등에 따라 달라짐

 

- 애드버세리얼 패치는 '큰 변화량(large perturbation)'을 활용. 작은 변화량의 감지에 초점을 맞추고 있는 현재의 방어 기술들은 이런 큰 변화량에 대해 오히려 방어 기제로 작동하지 못하게 됨

 

- 스티커는 "변신에 대한 기대(Expectation Over Transformation)"라고 불리는 특수한 알고리즘으로 생성되며, 스티커를 붙일 객체의 위치, 크기 등의 조건을 감안하여 교란 효과가 최대로 되도록 스티커 생성 알고리즘을 교육함

 

- 스티커는 "화이트박스-앙상블(Whitebox-Ensemble)"이라는 방식으로 생성

 

 

 

■ 구글 리서치 그룹이 스티커와 해당 논문을 공개한 이유

 

- 인공지능(AI)를 이용한 공격의 위험성을 경고하고, 이에 대한 방어를 위해 이미지 인식 알고리즘의 개선을 촉구하기 위함

 

- 대규모 연산 환경의 제공이 어려운 엣지(Edge)의 경우 오작동 가능성이 높아 실시간으로 정확한 객체 판정을 할 수 있는 알고리즘과 이를 지원할 고급 인공지능(AI) 전용 프로세서의 개발 필요 강조

Posted by manga0713

[사이버복원력 평가서 작성 예시]

 

 

 

 

*** 출처: [KIF 한국금융연구원] 사이버복원력 평가지침서 - Cyber Resilience Assessment Methoodology

*** 문서:

 

131612269971654415_사이버복원력+평가지침서_F5.pdf


 

 

 

■ 목차

 

 

1. 지배구조 (Governance)

2. 식별 (Identification)

3. 보호 (Protection)

4. 탐지 (Detection)

5. 대응 및 복구 (Response and recovery)

6. 테스트 (Testing)

7. 상황인지 (Situational awareness)

8. 학습 및 발전 (Learning & evolving)

9. 부록

- 사이버복원력 관련 PFMI(Principles for Financial Market Infrastructures) 핵심 고려사항

 

 

 

 

Posted by manga0713

 

 

 

*** 출처: [KISA 한국인터넷진흥원] 2018 개인정보보호 7대 이슈 전망

*** 문서:

 

2018_개인정보보호_7대_이슈_전망.pdf


 

 

 

1. EU, 일반개인정보보호규정(GDPR) 본격시행

 

- 유럽연합(EU)의 일반개인정보보호규정(GDPR), 2018년 5월 25일 본격 시행. 국내 개인정보 법ㆍ제도와 조율 및 기업 등 처리자의 준비 시급

 

 

2. 데이터에 미래가 있다. 디지털 경제 시대의 원유 Data!

 

- 데이터가 미래를 결정하는 데이터 경제의 시대 도래. 데이터 경제의 우위 선점을 위해 데이터 활용의 걸림돌 제거 급선무

 

 

3. Privacy by Design! 개인정보 활용은 정보주체의 안심이 우선

 

- 개인정보 활용 시 정보주체들이 안심할 수 있도록 ‘Privacy by Design’ 적용. 개인정보 적용 설계 선진사례 발굴ㆍ보급을 통한 혁신 유도 필요

 

 

4. 데이터 무역 활성화! 개인정보 국외이전/데이터 국지화 제도정비 시급

 

- 데이터 무역 활성화로 개인정보 국외이전 및 데이터 국지화 논의 활발. 개인정보 국경 간 이동 급증, 자국민 개인정보 및 산업 보호 이슈 심화

 

 

5. 개인정보 안전한 활용, 4차 산업혁명 선도의 핵심

 

- 4차 산업혁명 시대를 선도하기 위해 개인정보의 안전한 활용 중요성 부각. 서비스별 맞춤형 개인정보 활용가이드(Code of Conduct) 활성화 필요

 

 

6. 사업장 감시 vs. 근로자 프라이버시

 

- 사업장 감시와 근로자의 프라이버시 침해 문제 상충으로 관련 민원 급증. 영상정보(CCTV 등) 등을 통한 사업장 전자 감시, 민주적 노사관계의 걸림돌

 

 

7. 바이오정보 빅데이터 시대 커지는 개인정보 침해 위협

 

- 바이오정보 빅데이터 시대가 도래하면서 개인정보 침해 위협이 커지고 있음. 바이오인증, 정밀의료 등 바이오정보 이용 활성화 대비 개인정보 보호 뒷전

 

Posted by manga0713

 

 

 

 

*** 출처: [US-CERT: Bulletin(SB18-029)] 2018년 1월 22일까지 발표된 보안 취약점

 

 

 

 

The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0

  • Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9

  • Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9

Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

High Vulnerabilities

Primary
Vendor -- Product
Description Published CVSS Score Source & Patch Info
There were no high vulnerabilities recorded this week.
Back to top

Medium Vulnerabilities

Primary
Vendor -- Product
Description Published CVSS Score Source & Patch Info
There were no medium vulnerabilities recorded this week.
Back to top

Low Vulnerabilities

Primary
Vendor -- Product
Description Published CVSS Score Source & Patch Info
There were no low vulnerabilities recorded this week.
Back to top

Severity Not Yet Assigned

Primary
Vendor -- Product
Description Published CVSS Score Source & Patch Info
389-ds-base -- 389-ds-base It was found that 389-ds-base since 1.3.6.1 up to and including 1.4.0.3 did not always handle internal hash comparison operations correctly during the authentication process. A remote, unauthenticated attacker could potentially use this flaw to bypass the authentication process under very rare and specific circumstances. 2018-01-24 not yet calculated CVE-2017-15135
BID(link is external)
CONFIRM(link is external)
advantech -- webaccess/scada A SQL Injection issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. WebAccess/SCADA does not properly sanitize its inputs for SQL commands. 2018-01-24 not yet calculated CVE-2018-5443
BID(link is external)
MISC
advantech -- webaccess/scada A Path Traversal issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. An attacker has read access to files within the directory structure of the target device. 2018-01-24 not yet calculated CVE-2018-5445
BID(link is external)
MISC
affiligator -- affiliate_webshop_management_system SQL Injection exists in Affiligator Affiliate Webshop Management System 2.1.0 via a search/?q=&price_type=range&price= request. 2018-01-24 not yet calculated CVE-2018-5977
EXPLOIT-DB(link is external)
apache -- hadoop The YARN NodeManager in Apache Hadoop 2.7.3 and 2.7.4 can leak the password for credential store provider used by the NodeManager to YARN Applications. 2018-01-24 not yet calculated CVE-2017-15718
MLIST
apache -- nifi A malicious X-ProxyContextPath or X-Forwarded-Context header containing external resources or embedded code could cause remote code execution. The fix to properly handle these headers was applied on the Apache NiFi 1.5.0 release. Users running a prior 1.x release should upgrade to the appropriate release. 2018-01-23 not yet calculated CVE-2017-15697
CONFIRM
apache -- nifi Any authenticated user (valid client certificate but without ACL permissions) could upload a template which contained malicious code and caused a denial of service via Java deserialization attack. The fix to properly handle Java deserialization was applied on the Apache NiFi 1.4.0 release. Users running a prior 1.x release should upgrade to the appropriate release. 2018-01-25 not yet calculated CVE-2017-15703
CONFIRM
apache -- nifi A malicious host header in an incoming HTTP request could cause NiFi to load resources from an external server. The fix to sanitize host headers and compare to a controlled whitelist was applied on the Apache NiFi 1.5.0 release. Users running a prior 1.x release should upgrade to the appropriate release. 2018-01-23 not yet calculated CVE-2017-12632
CONFIRM
artifex -- mujs jsparse.c in Artifex MuJS through 1.0.2 does not properly maintain the AST depth for binary expressions, which allows remote attackers to cause a denial of service (excessive recursion) via a crafted file. 2018-01-24 not yet calculated CVE-2018-5759
MISC(link is external)
MISC(link is external)
artifex -- mujs In Artifex MuPDF 1.12.0, there is a heap-based buffer overflow vulnerability in the do_pdf_save_document function in the pdf/pdf-write.c file. Remote attackers could leverage the vulnerability to cause a denial of service via a crafted pdf file. 2018-01-24 not yet calculated CVE-2018-6187
MISC(link is external)
artifex -- mujs The js_strtod function in jsdtoa.c in Artifex MuJS through 1.0.2 has an integer overflow because of incorrect exponent validation. 2018-01-24 not yet calculated CVE-2018-6191
MISC(link is external)
MISC(link is external)
artifex -- mupdf Heap-based buffer overflow in the ensure_solid_xref function in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 allows a remote attacker to potentially execute arbitrary code via a crafted PDF file, because xref subsection object numbers are unrestricted. 2018-01-22 not yet calculated CVE-2017-17858
MISC(link is external)
MISC(link is external)
MISC(link is external)
artifex -- mupdf In Artifex MuPDF 1.12.0, the pdf_read_new_xref function in pdf/pdf-xref.c allows remote attackers to cause a denial of service (segmentation violation and application crash) via a crafted pdf file. 2018-01-24 not yet calculated CVE-2018-6192
MISC(link is external)
asus -- asuswrt An issue was discovered in AsusWRT before 3.0.0.4.384_10007. The do_vpnupload_post function in router/httpd/web.c in vpnupload.cgi provides functionality for setting NVRAM configuration values, which allows attackers to set the admin password and launch an SSH daemon (or enable infosvr command mode), and consequently obtain remote administrative access, via a crafted request. This is available to unauthenticated attackers in conjunction with CVE-2018-5999. 2018-01-22 not yet calculated CVE-2018-6000
MISC(link is external)
MISC(link is external)
MISC(link is external)
EXPLOIT-DB(link is external)
asus -- asuswrt An issue was discovered in AsusWRT before 3.0.0.4.384_10007. In the handle_request function in router/httpd/httpd.c, processing of POST requests continues even if authentication fails. 2018-01-22 not yet calculated CVE-2018-5999
MISC(link is external)
MISC(link is external)
MISC(link is external)
EXPLOIT-DB(link is external)
atlassian -- sourcetree Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability 2018-01-25 not yet calculated CVE-2017-14593
CONFIRM(link is external)
CONFIRM(link is external)
atlassian -- sourcetree Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability. 2018-01-25 not yet calculated CVE-2017-14592
CONFIRM(link is external)
CONFIRM(link is external)
axtls -- axtls axTLS version 1.5.3 has a coding error in the ASN.1 parser resulting in the year (19)50 of UTCTime being misinterpreted as 2050. 2018-01-22 not yet calculated CVE-2017-1000416
MISC
MISC(link is external)
bigtree -- bigtree Cross-site scripting (XSS) in BigTree 4.2.19 allows any remote users to inject arbitrary web script or HTML via the directory parameter. This issue exists in core/admin/ajax/developer/extensions/file-browser.php. 2018-01-22 not yet calculated CVE-2018-6013
MISC(link is external)
biscom -- biscom_secure_file_transfer Biscom Secure File Transfer (SFT) 5.0.1000 through 5.0.1048 does not validate the dataFieldId value, and uses sequential numbers, which allows remote authenticated users to overwrite or read files via crafted requests. Version 5.0.1050 contains the fix. 2018-01-25 not yet calculated CVE-2016-10710
MISC(link is external)
brace-expansion -- brace-expansion index.js in brace-expansion before 1.1.7 is vulnerable to Regular Expression Denial of Service (ReDoS) attacks, as demonstrated by an expand argument containing many comma characters. 2018-01-27 not yet calculated CVE-2017-18077
MISC
MISC(link is external)
MISC(link is external)
MISC(link is external)
bylancer -- classified_ads_cms_quickad SQL Injection exists in Classified Ads CMS Quickad 4.0 via the keywords, placeid, cat, or subcat parameter to the listing URI. 2018-01-24 not yet calculated CVE-2018-5972
EXPLOIT-DB(link is external)
bylancer -- wchat SQL Injection exists in Wchat Fully Responsive PHP AJAX Chat Script 1.5 via the login.php User field. 2018-01-24 not yet calculated CVE-2018-5979
EXPLOIT-DB(link is external)
bylancer -- zechat SQL Injection exists in Facebook Style Php Ajax Chat Zechat 1.5 via the login.php User field. 2018-01-24 not yet calculated CVE-2018-5978
EXPLOIT-DB(link is external)
centos-webpanel.com -- centos_web_panel CentOS-WebPanel.com (aka CWP) CentOS Web Panel through v0.9.8.12 has XSS via the `module` value of the `index.php` file. 2018-01-21 not yet calculated CVE-2018-5961
MISC(link is external)
centos-webpanel.com -- centos_web_panel index.php in CentOS-WebPanel.com (aka CWP) CentOS Web Panel through v0.9.8.12 has XSS via the id parameter to the phpini_editor module or the email_address parameter to the mail_add-new module. 2018-01-21 not yet calculated CVE-2018-5962
MISC(link is external)
clamav -- clamav The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations (mbox.c operations on bounce messages). If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition. 2018-01-26 not yet calculated CVE-2017-12374
CONFIRM(link is external)
CONFIRM(link is external)
clamav -- clamav ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause a handle_pdfname (in pdf.c) buffer overflow when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code. 2018-01-26 not yet calculated CVE-2017-12376
CONFIRM(link is external)
CONFIRM(link is external)
clamav -- clamav ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in the message parsing function on an affected system. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a messageAddArgument (in message.c) buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition or execute arbitrary code on an affected device. 2018-01-26 not yet calculated CVE-2017-12379
CONFIRM(link is external)
CONFIRM(link is external)
clamav -- clamav The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions (the rfc2047 function in mbox.c). An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device. 2018-01-26 not yet calculated CVE-2017-12375
CONFIRM(link is external)
CONFIRM(link is external)
clamav -- clamav ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device. 2018-01-26 not yet calculated CVE-2017-12378
CONFIRM(link is external)
CONFIRM(link is external)
clamav -- clamav ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition. 2018-01-26 not yet calculated CVE-2017-12380
CONFIRM(link is external)
CONFIRM(link is external)
clamav -- clamav ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap-based buffer over-read condition in mew.c when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device. 2018-01-26 not yet calculated CVE-2017-12377
CONFIRM(link is external)
CONFIRM(link is external)
cms_made_simple -- cms_made_simple CMS Made Simple (CMSMS) 2.2.5 has XSS in admin/addbookmark.php via the title parameter. 2018-01-25 not yet calculated CVE-2018-5963
MISC(link is external)
FULLDISC
MISC(link is external)
cms_made_simple -- cms_made_simple CMS Made Simple (CMSMS) 2.2.5 has XSS in admin/moduleinterface.php via the m1_messages parameter. 2018-01-25 not yet calculated CVE-2018-5964
MISC(link is external)
FULLDISC
MISC(link is external)
cms_made_simple -- cms_made_simple CMS Made Simple (CMSMS) 2.2.5 has XSS in admin/moduleinterface.php via the m1_errors parameter. 2018-01-25 not yet calculated CVE-2018-5965
MISC(link is external)
FULLDISC
MISC(link is external)
cpp-ethereum -- cpp-ethereum An exploitable improper authorization vulnerability exists in admin_addPeer API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization bypass. An attacker can send JSON to trigger this vulnerability. 2018-01-19 not yet calculated CVE-2017-12112
BID(link is external)
MISC(link is external)
cpp-ethereum -- cpp-ethereum An exploitable improper authorization vulnerability exists in miner_setGasPrice API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization bypass. An attacker can send JSON to trigger this vulnerability. 2018-01-19 not yet calculated CVE-2017-12116
BID(link is external)
MISC(link is external)
cpp-ethereum -- cpp-ethereum An exploitable improper authorization vulnerability exists in miner_stop API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). An attacker can send JSON to trigger this vulnerability. 2018-01-19 not yet calculated CVE-2017-12118
BID(link is external)
MISC(link is external)
cpp-ethereum -- cpp-ethereum An exploitable information leak/denial of service vulnerability exists in the libevm (Ethereum Virtual Machine) `create2` opcode handler of CPP-Ethereum. A specially crafted smart contract code can cause an out-of-bounds read leading to memory disclosure or denial of service. An attacker can create/send malicious a smart contract to trigger this vulnerability. 2018-01-19 not yet calculated CVE-2017-14457
BID(link is external)
MISC(link is external)
cpp-ethereum -- cpp-ethereum
 
An exploitable improper authorization vulnerability exists in admin_nodeInfo API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization bypass. An attacker can send JSON to trigger this vulnerability. 2018-01-19 not yet calculated CVE-2017-12113
BID(link is external)
MISC(link is external)
cpp-ethereum -- cpp-ethereum
 
An exploitable improper authorization vulnerability exists in admin_peers API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization bypass. An attacker can send JSON to trigger this vulnerability. 2018-01-19 not yet calculated CVE-2017-12114
BID(link is external)
MISC(link is external)
cpp-ethereum -- cpp-ethereum
 
An exploitable unhandled exception vulnerability exists in multiple APIs of CPP-Ethereum JSON-RPC. Specially crafted JSON requests can cause an unhandled exception resulting in denial of service. An attacker can send malicious JSON to trigger this vulnerability. 2018-01-19 not yet calculated CVE-2017-12119
BID(link is external)
MISC(link is external)
cpp-ethereum -- cpp-ethereum
 
An exploitable improper authorization vulnerability exists in miner_setEtherbase API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization bypass. 2018-01-19 not yet calculated CVE-2017-12115
BID(link is external)
MISC(link is external)
cpp-ethereum -- cpp-ethereum
 
An exploitable improper authorization vulnerability exists in miner_start API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization bypass. An attacker can send JSON to trigger this vulnerability. 2018-01-19 not yet calculated CVE-2017-12117
BID(link is external)
MISC(link is external)
dasan -- gpon_ont_wifi_router_h640x Buffer overflow on Dasan GPON ONT WiFi Router H640X 12.02-01121 2.77p1-1124 and 3.03p2-1146 devices allows remote attackers to execute arbitrary code via a long POST request to the login_action function in /cgi-bin/login_action.cgi (aka cgipage.cgi). 2018-01-21 not yet calculated CVE-2017-18046
MISC(link is external)
dell_emc -- rsa_authentication_manager The Security Console in EMC RSA Authentication Manager 8.2 SP1 P6 and earlier is affected by a blind SQL injection vulnerability. Authenticated malicious users could potentially exploit this vulnerability to read any unencrypted data from the database. 2018-01-24 not yet calculated CVE-2017-15546
CONFIRM
SECTRACK(link is external)
desigo – desigo_automation_controllers_and_operator_unit_pxm20-e A vulnerability has been identified in Desigo Automation Controllers Compact PXC12/22/36-E.D, Desigo Automation Controllers Modular PXC00/50/100/200-E.D, Desigo Automation Controllers PXC00/64/128-U with Web module, Desigo Automation Controllers for Integration PXC001-E.D, Desigo Operator Unit PXM20-E. A remote attacker with network access to the device could potentially upload a new firmware image to the devices without prior authentication. 2018-01-24 not yet calculated CVE-2018-4834
MISC
CONFIRM(link is external)
dnsmasq -- dnsmasq A vulnerability was found in the implementation of DNSSEC in Dnsmasq up to and including 2.78. Wildcard synthesized NSEC records could be improperly interpreted to prove the non-existence of hostnames that actually exist. 2018-01-23 not yet calculated CVE-2017-15107
MLIST
BID(link is external)
dovecot -- dovecot A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot's auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion. 2018-01-25 not yet calculated CVE-2017-15132
CONFIRM(link is external)
CONFIRM(link is external)
dyw -- flexible_poll SQL Injection exists in Flexible Poll 1.2 via the id parameter to mobile_preview.php or index.php. 2018-01-24 not yet calculated CVE-2018-5988
EXPLOIT-DB(link is external)
e.i_hi-tech -- professional_local_directory_script SQL Injection exists in Professional Local Directory Script 1.0 via the sellers_subcategories.php IndustryID parameter, or the suppliers.php IndustryID or CategoryID parameter. 2018-01-25 not yet calculated CVE-2018-5973
MISC(link is external)
EXPLOIT-DB(link is external)
easycarscript.com -- easy_car_script_2014 SQL Injection exists in Easy Car Script 2014 via the s_order or s_row parameter to site_search.php. 2018-01-24 not yet calculated CVE-2018-5986
EXPLOIT-DB(link is external)
electron -- electron GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16. 2018-01-24 not yet calculated CVE-2018-1000006
BID(link is external)
CONFIRM(link is external)
MISC(link is external)
EXPLOIT-DB(link is external)
electrum -- electrum The Python console in Electrum through 2.9.4 and 3.x through 3.0.5 supports arbitrary Python code without considering (1) social-engineering attacks in which a user pastes code that they do not understand and (2) code pasted by a physically proximate attacker at an unattended workstation, which makes it easier for attackers to steal Bitcoin via hook code that runs at a later time when the wallet password has been entered, a different vulnerability than CVE-2018-1000022. 2018-01-27 not yet calculated CVE-2018-6353
MISC(link is external)
MISC(link is external)
f5 -- big-ip_advanced_firewall_manager X509 certificate verification was not correctly implemented in the early access "user id" feature in the F5 BIG-IP Advanced Firewall Manager versions 13.0.0, 12.1.0-12.1.2, and 11.6.0-11.6.2, and thus did not properly validate the remote server's identity on certain versions of BIG-IP. 2018-01-19 not yet calculated CVE-2017-6142
SECTRACK(link is external)
CONFIRM(link is external)
fasterxml -- jackson-databind FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via two different gadgets that bypass a blacklist. 2018-01-21 not yet calculated CVE-2018-5968
MISC(link is external)
flets -- virus_clear Untrusted search path vulnerability in FLET'S VIRUS CLEAR Easy Setup & Application Tool ver.11 and earlier versions, FLET'S VIRUS CLEAR v6 Easy Setup & Application Tool ver.11 and earlier versions allow an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. 2018-01-26 not yet calculated CVE-2018-0507
JVN(link is external)
flexense -- multiple_products A buffer overflow vulnerability lies in the web server component of Dup Scout Enterprise 9.9.14, Disk Savvy Enterprise 9.9.14, Sync Breeze Enterprise 9.9.16, and Disk Pulse Enterprise 9.9.16 where an attacker can craft a malicious GET request and exploit the web server component. Successful exploitation of the software will allow an attacker to gain complete access to the system with NT AUTHORITY / SYSTEM level privileges. The vulnerability lies due to improper handling and sanitization of the incoming request. 2018-01-24 not yet calculated CVE-2017-13696
EXPLOIT-DB(link is external)
EXPLOIT-DB(link is external)
EXPLOIT-DB(link is external)
EXPLOIT-DB(link is external)
MISC(link is external)
flexsense -- sysguage The server in Flexense SysGauge 3.6.18 operating on port 9221 can be exploited remotely with the attacker gaining system-level access because of a Buffer Overflow. 2018-01-23 not yet calculated CVE-2018-5359
MISC(link is external)
EXPLOIT-DB(link is external)
formspree -- formspree templates/forms/thanks.html in Formspree before 2018-01-23 allows XSS related to the _next parameter. 2018-01-27 not yet calculated CVE-2018-6354
MISC(link is external)
freesshd -- freesshd FreeSSHd 1.3.1 version is vulnerable to an Unquoted Path Service allowing local users to launch processes with elevated privileges. 2018-01-24 not yet calculated CVE-2017-1000475
MISC(link is external)
gitstack -- gitstack An issue was discovered in GitStack through 2.3.10. User controlled input is not sufficiently filtered, allowing an unauthenticated attacker to add a user to the server via the username and password fields to the rest/user/ URI. 2018-01-21 not yet calculated CVE-2018-5955
MISC(link is external)
gnu -- bitutils The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. 2018-01-26 not yet calculated CVE-2018-6323
CONFIRM
gnu -- libtasn1 An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS. 2018-01-22 not yet calculated CVE-2018-6003
CONFIRM
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
google -- android Buffer overflow in the Qualcomm radio driver in Android before 2017-01-05 on Android One devices allows local users to gain privileges via a crafted application, aka Android internal bug 32639452 and Qualcomm internal bug CR1079713. 2018-01-22 not yet calculated CVE-2016-5345
BID(link is external)
CONFIRM(link is external)
CONFIRM
groupsession -- groupsession Open redirect vulnerability in GroupSession version 4.7.0 and earlier allows an attacker to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. 2018-01-26 not yet calculated CVE-2017-2166
JVN(link is external)
hp -- designjet_and_latex_printers HP has identified a potential security vulnerability before IG_11_00_00.10 for DesignJet T790, T795, T1300, T2300, before MRY_04_05_00.5 for DesignJet T920, T930, T1500, T1530, T2500, T2530, before AENEAS_03_04_00.9 for DesignJet T3500, before NEXUS_01_12_00.11 for Latex 310, 330, 360, 370, before NEXUS_03_12_00.15 for Latex 315, 335, 365, 375, before STORM_00_05_01.6 for Latex 560, 570 and Latex 110 that may expose the credentials of the SMTP server configured to receive and process emails generated by the printers. 2018-01-23 not yet calculated CVE-2017-2747
HP(link is external)
hp -- jetadvantage_security_manager Potential security vulnerabilities have been identified with HP JetAdvantage Security Manager before 3.0.1. The vulnerabilities could potentially be exploited to allow stored cross-site scripting which could allow a hacker to create a denial of service. 2018-01-23 not yet calculated CVE-2017-2746
HP(link is external)
hp -- jetadvantage_security_manager Potential security vulnerabilities have been identified with HP JetAdvantage Security Manager before 3.0.1. The vulnerabilities could potentially be exploited to allow stored cross-site scripting which could allow a hacker to execute scripts in a user's browser. 2018-01-23 not yet calculated CVE-2017-2745
HP(link is external)
hp -- multiple_printers Insufficient Solution DLL Signature Validation allows potential execution of arbitrary code in HP LaserJet Enterprise printers, HP PageWide Enterprise printers, HP LaserJet Managed printers, HP OfficeJet Enterprise printers before 2308937_578479, 2405087_018548, and other firmware versions. 2018-01-23 not yet calculated CVE-2017-2750
BID(link is external)
HP(link is external)
hp -- multiple_printers HP has identified a potential security vulnerability with HP Enterprise LaserJet Printers and MFPs, HP OfficeJet Enterprise Color Printers and MFP, HP PageWide Color Printers and MPS before 2308214_000901, 2308214_000900, and other firmware versions. The vulnerability could be exploited to perform a cross site scripting (XSS) attack. 2018-01-23 not yet calculated CVE-2017-2743
HP(link is external)
hp -- pagewide_and_officejet_pro_printers A potential security vulnerability has been identified with HP PageWide Printers, HP OfficeJet Pro Printers, with firmware before 1708D. This vulnerability could potentially be exploited to execute arbitrary code. 2018-01-23 not yet calculated CVE-2017-2741
HP(link is external)
EXPLOIT-DB(link is external)
hp -- support_assistant The vulnerability allows attacker to extract binaries into protected file system locations in HP Support Assistant before 12.7.26.1. 2018-01-23 not yet calculated CVE-2017-2744
HP(link is external)
hp -- thinpro_operating_system A potential security vulnerability has been identified with the command line shell of the HP ThinPro operating system 6.1, 5.2.1, 5.2, 5.1, 5.0, and 4.4. The vulnerability could result in a local unauthorized elevation of privilege on an HP thin client device. 2018-01-23 not yet calculated CVE-2017-2740
HP(link is external)
hp -- web_jetadmin A potential security vulnerability has been identified with HP Web Jetadmin before 10.4 SR2. This vulnerability could potentially be exploited to create a denial of service. 2018-01-23 not yet calculated CVE-2017-2742
SECTRACK(link is external)
HP(link is external)
ibm -- business_process_manager IBM Business Process Manager 8.6 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 136783. 2018-01-24 not yet calculated CVE-2017-1769
CONFIRM(link is external)
BID(link is external)
MISC(link is external)
ibm -- cognos_tm1 IBM Cognos TM1 10.2 and 10.2.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 129617. 2018-01-26 not yet calculated CVE-2017-1506
CONFIRM(link is external)
MISC(link is external)
ibm -- doors_web_access IBM Doors Web Access 9.5 and 9.6 could allow an attacker with physical access to the system to log into the application using previously stored credentials. IBM X-Force ID: 130914. 2018-01-26 not yet calculated CVE-2017-1545
CONFIRM(link is external)
MISC(link is external)
ibm -- doors_web_access IBM Doors Web Access 9.5 and 9.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 131763. 2018-01-26 not yet calculated CVE-2017-1563
CONFIRM(link is external)
MISC(link is external)
ibm -- doors_web_access IBM Doors Web Access 9.5 and 9.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 130808. 2018-01-26 not yet calculated CVE-2017-1540
CONFIRM(link is external)
MISC(link is external)
ibm -- doors_web_access IBM Doors Web Access 9.5 and 9.6 could allow an authenticated user to obtain sensitive information from HTTP internal server error responses. IBM X-Force ID: 129825. 2018-01-26 not yet calculated CVE-2017-1515
CONFIRM(link is external)
MISC(link is external)
ibm -- doors_web_access IBM Doors Web Access 9.5 and 9.6 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 129826. 2018-01-26 not yet calculated CVE-2017-1516
CONFIRM(link is external)
MISC(link is external)
ibm -- doors_web_access IBM Doors Web Access 9.5 and 9.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-ForceID: 131769. 2018-01-26 not yet calculated CVE-2017-1567
CONFIRM(link is external)
MISC(link is external)
ibm -- doors_web_access IBM DOORS 9.5 and 9.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 130411. 2018-01-26 not yet calculated CVE-2017-1532
CONFIRM(link is external)
MISC(link is external)
ibm -- integration_bus IBM Integration Bus 9.0 and 10.0 could allow an attacker that has captured a valid session id to hijack another users session during a small timeframe before the session times out. IBM X-Force ID: 134164. 2018-01-19 not yet calculated CVE-2017-1693
CONFIRM(link is external)
BID(link is external)
MISC(link is external)

ibm -- jazz_foundation

IBM Jazz Foundation (IBM Rational Collaborative Lifecycle Management 6.0.x) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 133268. 2018-01-26 not yet calculated CVE-2017-1653
CONFIRM(link is external)
MISC(link is external)
ibm -- tealeaf_customer_experience IBM Tealeaf Customer Experience 8.7, 8.8, and 9.0.2 contains hard-coded credentials. A remote attacker could exploit this vulnerability to gain access to the system. IBM X-Force ID: 123740. 2018-01-26 not yet calculated CVE-2017-1204
CONFIRM(link is external)
CONFIRM(link is external)
MISC(link is external)
ibm -- tealeaf_customer_experience IBM Tealeaf Customer Experience 8.7, 8.8, and 9.0.2 could allow a remote attacker under unusual circumstances to read operational data or TLS session state for any active sessions, cause denial of service, or bypass security. IBM X-Force ID: 113999. 2018-01-26 not yet calculated CVE-2016-2983
CONFIRM(link is external)
CONFIRM(link is external)
MISC(link is external)
ibm -- tealeaf_customer_experience IBM Tealeaf Customer Experience 8.7, 8.8, and 9.0.2 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 124757. 2018-01-26 not yet calculated CVE-2017-1279
CONFIRM(link is external)
MISC(link is external)
impulseadventure -- jpegsnoop ImpulseAdventure JPEGsnoop version 1.7.5 is vulnerable to a division by zero in the JFIF decode handling resulting denial of service. 2018-01-25 not yet calculated CVE-2017-1000414
CONFIRM(link is external)
CONFIRM(link is external)
ipswitch -- whatsup_gold An issue was discovered in Ipswitch WhatsUp Gold before 2017 Plus SP1 (17.1.1). Remote clients can take advantage of a misconfiguration in the TFTP server that could allow attackers to execute arbitrary commands on the TFTP server via unspecified vectors. 2018-01-24 not yet calculated CVE-2018-5777
CONFIRM(link is external)
ipswitch -- whatsup_gold An issue was discovered in Ipswitch WhatsUp Gold before 2017 Plus SP1 (17.1.1). Multiple SQL injection vulnerabilities are present in the legacy .ASP pages, which could allow attackers to execute arbitrary SQL commands via unspecified vectors. 2018-01-24 not yet calculated CVE-2018-5778
CONFIRM(link is external)
jbmc -- directadmin JBMC DirectAdmin before 1.52, when the email_ftp_password_change setting is nonzero, allows remote attackers to obtain access or cause a denial of service (segfault) via an unspecified request. 2018-01-21 not yet calculated CVE-2017-18045
CONFIRM(link is external)
jboss -- jboss_enterprise_application_platform It was found that the AJP connector in undertow, as shipped in Jboss EAP 7.1.0.GA, does not use the ALLOW_ENCODED_SLASH option and thus allow the the slash / anti-slash characters encoded in the url which may lead to path traversal and result in the information disclosure of arbitrary local files. 2018-01-24 not yet calculated CVE-2018-1048
CONFIRM(link is external)
jenkins -- jenkins Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations. 2018-01-25 not yet calculated CVE-2017-1000387
BID(link is external)
CONFIRM(link is external)
jenkins -- jenkins The Jenkins Delivery Pipeline Plugin version 1.0.7 and earlier used the unescaped content of the query parameter 'fullscreen' in its JavaScript, resulting in a cross-site scripting vulnerability through specially crafted URLs. 2018-01-25 not yet calculated CVE-2017-1000404
BID(link is external)
CONFIRM(link is external)
jenkins -- jenkins The Jenkins 2.73.1 and earlier, 2.83 and earlier remote API at /job/(job-name)/api contained information about upstream and downstream projects. This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and the API now only lists upstream and downstream projects that the current user has access to. 2018-01-25 not yet calculated CVE-2017-1000400
CONFIRM(link is external)
jenkins -- jenkins The Jenkins 2.73.1 and earlier, 2.83 and earlier remote API at /queue/item/(ID)/api showed information about tasks in the queue (typically builds waiting to start). This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and the API endpoint is now only available for tasks that the current user has access to. 2018-01-25 not yet calculated CVE-2017-1000399
CONFIRM(link is external)
jenkins -- jenkins Jenkins 2.73.1 and earlier, 2.83 and earlier bundled a version of the commons-fileupload library with the denial-of-service vulnerability known as CVE-2016-3092. The fix for that vulnerability has been backported to the version of the library bundled with Jenkins. 2018-01-25 not yet calculated CVE-2017-1000394
CONFIRM(link is external)
jenkins -- jenkins Jenkins Dependency Graph Viewer plugin 0.12 and earlier did not perform permission checks for the API endpoint that modifies the dependency graph, allowing anyone with Overall/Read permission to modify this data. 2018-01-25 not yet calculated CVE-2017-1000388
CONFIRM(link is external)
jenkins -- jenkins The remote API in Jenkins 2.73.1 and earlier, 2.83 and earlier at /computer/(agent-name)/api showed information about tasks (typically builds) currently running on that agent. This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and the API now only shows information about accessible tasks. 2018-01-25 not yet calculated CVE-2017-1000398
CONFIRM(link is external)
jenkins -- jenkins In Jenkins Script Security Plugin version 1.36 and earlier, users with the ability to configure sandboxed Groovy scripts are able to use a type coercion feature in Groovy to create new `File` objects from strings. This allowed reading arbitrary files on the Jenkins master file system. Such a type coercion is now subject to sandbox protection and considered to be a call to the `new File(String)` constructor for the purpose of in-process script approval. 2018-01-25 not yet calculated CVE-2017-1000505
CONFIRM(link is external)
jenkins -- jenkins Jenkins 2.73.1 and earlier, 2.83 and earlier bundled a version of the commons-httpclient library with the vulnerability CVE-2012-6153 that incorrectly verified SSL certificates, making it susceptible to man-in-the-middle attacks. This library is widely used as a transitive dependency in Jenkins plugins. The fix for CVE-2012-6153 was backported to the version of commons-httpclient that is bundled in core and made available to plugins. 2018-01-25 not yet calculated CVE-2017-1000396
CONFIRM(link is external)
jenkins -- jenkins The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files. Form validation for <f:password/> is now always sent via POST, which is typically not logged. 2018-01-25 not yet calculated CVE-2017-1000401
CONFIRM(link is external)
jenkins -- jenkins Jenkins Speaks! Plugin, all current versions, allows users with Job/Configure permission to run arbitrary Groovy code inside the Jenkins JVM, effectively elevating privileges to Overall/Run Scripts. 2018-01-25 not yet calculated CVE-2017-1000403
CONFIRM(link is external)
jenkins -- jenkins Jenkins 2.88 and earlier; 2.73.2 and earlier Autocompletion suggestions for text fields were not escaped, resulting in a persisted cross-site scripting vulnerability if the source for the suggestions allowed specifying text that includes HTML metacharacters like less-than and greater-than characters. 2018-01-25 not yet calculated CVE-2017-1000392
CONFIRM(link is external)
jenkins -- jenkins Jenkins 2.73.1 and earlier, 2.83 and earlier provides information about Jenkins user accounts which is generally available to anyone with Overall/Read permissions via the /user/(username)/api remote API. This included e.g. Jenkins users' email addresses if the Mailer Plugin is installed. The remote API now no longer includes information beyond the most basic (user ID and name) unless the user requesting it is a Jenkins administrator. 2018-01-25 not yet calculated CVE-2017-1000395
CONFIRM(link is external)
jenkins -- jenkins Some URLs provided by Jenkins global-build-stats plugin version 1.4 and earlier returned a JSON response that contained request parameters. These responses had the Content Type: text/html, so could have been interpreted as HTML by clients, resulting in a potential reflected cross-site scripting vulnerability. Additionally, some URLs provided by global-build-stats plugin that modify data did not require POST requests to be sent, resulting in a potential cross-site request forgery vulnerability. 2018-01-25 not yet calculated CVE-2017-1000389
CONFIRM(link is external)
jenkins -- jenkins Jenkins Active Choices plugin version 1.5.3 and earlier allowed users with Job/Configure permission to provide arbitrary HTML to be shown on the 'Build With Parameters' page through the 'Active Choices Reactive Reference Parameter' type. This could include, for example, arbitrary JavaScript. Active Choices now sanitizes the HTML inserted on the 'Build With Parameters' page if and only if the script is executed in a sandbox. As unsandboxed scripts are subject to administrator approval, it is up to the administrator to allow or disallow problematic script output. 2018-01-25 not yet calculated CVE-2017-1000386
BID(link is external)
CONFIRM(link is external)
jenkins -- jenkins Jenkins Maven Plugin 2.17 and earlier bundled a version of the commons-httpclient library with the vulnerability CVE-2012-6153 that incorrectly verified SSL certificates, making it susceptible to man-in-the-middle attacks. Maven Plugin 3.0 no longer has a dependency on commons-httpclient. 2018-01-25 not yet calculated CVE-2017-1000397
CONFIRM(link is external)
jenkins -- jenkins Jenkins Checkstyle Plugin 3.49 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks. 2018-01-23 not yet calculated CVE-2018-1000009
CONFIRM(link is external)
jenkins -- jenkins A race condition during Jenkins 2.94 and earlier; 2.89.1 and earlier startup could result in the wrong order of execution of commands during initialization. There is a very short window of time after startup during which Jenkins may no longer show the 'Please wait while Jenkins is getting ready to work' message but Cross-Site Request Forgery (CSRF) protection may not yet be effective. 2018-01-24 not yet calculated CVE-2017-1000504
CONFIRM(link is external)
jenkins -- jenkins Jenkins PMD Plugin 3.49 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks. 2018-01-23 not yet calculated CVE-2018-1000008
CONFIRM(link is external)
jenkins -- jenkins Jenkins Multijob plugin version 1.25 and earlier did not check permissions in the Resume Build action, allowing anyone with Job/Read permission to resume the build. 2018-01-25 not yet calculated CVE-2017-1000390
CONFIRM(link is external)
jenkins -- jenkins Jenkins Release Plugin 2.9 and earlier did not require form submissions to be submitted via POST, resulting in a CSRF vulnerability allowing attackers to trigger release builds. 2018-01-23 not yet calculated CVE-2018-1000013
CONFIRM(link is external)
jenkins -- jenkins On Jenkins instances with Authorize Project plugin, the authentication associated with a build may lack the Computer/Build permission on some agents. This did not prevent the execution of Pipeline `node` blocks on those agents due to incorrect permissions checks in Pipeline: Nodes and Processes plugin 2.17 and earlier. 2018-01-23 not yet calculated CVE-2018-1000015
CONFIRM(link is external)
jenkins -- jenkins Users with permission to create or configure agents in Jenkins 1.37 and earlier could configure an EC2 agent to run arbitrary shell commands on the master node whenever the agent was supposed to be launched. Configuration of these agents now requires the 'Run Scripts' permission typically only granted to administrators. 2018-01-24 not yet calculated CVE-2017-1000502
CONFIRM(link is external)
jenkins -- jenkins Jenkins DRY Plugin 2.49 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks. 2018-01-23 not yet calculated CVE-2018-1000010
CONFIRM(link is external)
jenkins -- jenkins A race condition during Jenkins 2.81 through 2.94 (inclusive); 2.89.1 startup could result in the wrong order of execution of commands during initialization. This could in rare cases result in failure to initialize the setup wizard on the first startup. This resulted in multiple security-related settings not being set to their usual strict default. 2018-01-24 not yet calculated CVE-2017-1000503
CONFIRM(link is external)
jenkins -- jenkins Jenkins versions 2.88 and earlier and 2.73.2 and earlier stores metadata related to 'people', which encompasses actual user accounts, as well as users appearing in SCM, in directories corresponding to the user ID on disk. These directories used the user ID for their name without additional escaping, potentially resulting in problems like overwriting of unrelated configuration files. 2018-01-25 not yet calculated CVE-2017-1000391
CONFIRM(link is external)
jenkins -- jenkins Jenkins FindBugs Plugin 4.71 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks. 2018-01-23 not yet calculated CVE-2018-1000011
CONFIRM(link is external)
jenkins -- jenkins Jenkins 2.73.1 and earlier, 2.83 and earlier users with permission to create or configure agents in Jenkins could configure a launch method called 'Launch agent via execution of command on master'. This allowed them to run arbitrary shell commands on the master node whenever the agent was supposed to be launched. Configuration of this launch method now requires the Run Scripts permission typically only granted to administrators. 2018-01-25 not yet calculated CVE-2017-1000393
CONFIRM(link is external)
jenkins -- jenkins Jenkins Swarm Plugin Client 3.4 and earlier bundled a version of the commons-httpclient library with the vulnerability CVE-2012-6153 that incorrectly verified SSL certificates, making it susceptible to man-in-the-middle attacks. 2018-01-25 not yet calculated CVE-2017-1000402
CONFIRM(link is external)
jenkins -- jenkins Jenkins Translation Assistance Plugin 1.15 and earlier did not require form submissions to be submitted via POST, resulting in a CSRF vulnerability allowing attackers to override localized strings displayed to all users on the current Jenkins instance if the victim is a Jenkins administrator. 2018-01-23 not yet calculated CVE-2018-1000014
BID(link is external)
CONFIRM(link is external)
jenkins -- jenkins Jenkins Warnings Plugin 4.64 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks. 2018-01-23 not yet calculated CVE-2018-1000012
CONFIRM(link is external)
joomla! -- joomla! SQL Injection exists in the Tumder (An Arcade Games Platform) 2.1 component for Joomla! via the PATH_INFO to the category/ URI. 2018-01-24 not yet calculated CVE-2018-5984
EXPLOIT-DB(link is external)
joomla! -- joomla! SQL Injection exists in the LiveCRM SaaS Cloud 1.0 component for Joomla! via an r=site/login&company_id= request. 2018-01-24 not yet calculated CVE-2018-5985
EXPLOIT-DB(link is external)
kingsoft -- wps_office The WStr::_alloc_iostr_data() function in kso.dll in Kingsoft WPS Office 10.1.0.7106 and 10.2.0.5978 allows remote attackers to cause a denial of service (application crash) via a crafted (a) web page, (b) office document, or (c) .rtf file. 2018-01-25 not yet calculated CVE-2018-6217
MISC(link is external)
knot_resolver -- knot_resolver Improper input validation bugs in DNSSEC validators components in Knot Resolver (prior version 1.5.2) allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay. 2018-01-22 not yet calculated CVE-2018-1000002
CONFIRM(link is external)
labf -- nfsaxe Buffer Overflow in the FTP client in LabF nfsAxe 3.7 allows remote FTP servers to execute arbitrary code via a long reply. 2018-01-21 not yet calculated CVE-2017-18047
EXPLOIT-DB(link is external)
EXPLOIT-DB(link is external)
EXPLOIT-DB(link is external)
lenovo -- fingerprint_manager_pro Sensitive data stored by Lenovo Fingerprint Manager Pro, version 8.01.86 and earlier, including users' Windows logon credentials and fingerprint data, is encrypted using a weak algorithm, contains a hard-coded password, and is accessible to all users with local non-administrative access to the system in which it is installed. 2018-01-25 not yet calculated CVE-2017-3762
CONFIRM(link is external)
lenovo -- integrated_management_module_2 An unprivileged attacker with connectivity to the IMM2 could cause a denial of service attack on the IMM2 (Versions earlier than 4.4 for Lenovo System x and earlier than 6.4 for IBM System x). Flooding the IMM2 with a high volume of authentication failures via the Common Information Model (CIM) used by LXCA and OneCLI and other tools can exhaust available system memory which can cause the IMM2 to reboot itself until the requests cease. 2018-01-26 not yet calculated CVE-2017-3768
CONFIRM(link is external)
libcurl -- libcurl libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something. 2018-01-24 not yet calculated CVE-2018-1000005
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
DEBIAN
libcurl -- libcurl libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value. Sending the same set of headers to subsequest hosts is in particular a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy sensitive information or data that could allow others to impersonate the libcurl-using client's request. 2018-01-24 not yet calculated CVE-2018-1000007
SECTRACK(link is external)
CONFIRM(link is external)
DEBIAN
libming -- libming The printDefineFont2 function (util/listfdb.c) in libming through 0.4.8 is vulnerable to a heap-based buffer overflow, which may allow attackers to cause a denial of service or unspecified other impact via a crafted FDB file. 2018-01-27 not yet calculated CVE-2018-6358
CONFIRM(link is external)
libming -- libming The decompileIF function (util/decompile.c) in libming through 0.4.8 is vulnerable to a use-after-free, which may allow attackers to cause a denial of service or unspecified other impact via a crafted SWF file. 2018-01-27 not yet calculated CVE-2018-6359
CONFIRM(link is external)
libming -- libming The outputSWF_TEXT_RECORD function (util/outputscript.c) in libming through 0.4.8 is vulnerable to an integer overflow and resultant out-of-bounds read, which may allow attackers to cause a denial of service or unspecified other impact via a crafted SWF file. 2018-01-25 not yet calculated CVE-2018-6315
CONFIRM(link is external)
libvirt -- libvirt qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply. 2018-01-25 not yet calculated CVE-2018-5748
MLIST(link is external)
linux -- linux_kernel On multiple SR-IOV cars it is possible for VF's assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4f87e3cad35063f1c17de5 and the DPDK before commit 3f12b9f23b6499ff66ec8b0de941fb469297e5d0, additionally Multiple vendor NIC firmware is affected. 2018-01-23 not yet calculated CVE-2015-1142857
MLIST
CONFIRM(link is external)
MISC
linux -- linux_kernel The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel through 4.14.15 allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call. 2018-01-26 not yet calculated CVE-2018-5750
CONFIRM
linux – linux_kernel crypto/pcrypt.c in the Linux kernel before 4.14.13 mishandles freeing instances, allowing a local user able to access the AF_ALG-based AEAD interface (CONFIG_CRYPTO_USER_API_AEAD) and pcrypt (CONFIG_CRYPTO_PCRYPT) to cause a denial of service (kfree of an incorrect pointer) or possibly have unspecified other impact by executing a crafted sequence of system calls. 2018-01-24 not yet calculated CVE-2017-18075
CONFIRM
BID(link is external)
CONFIRM(link is external)
CONFIRM
mailman -- mailman Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. 2018-01-23 not yet calculated CVE-2018-5950
MLIST
mariadb_and_percona -- mariadb_ and_percona_xtradb_cluster sql/event_data_objects.cc in MariaDB before 10.1.30 and 10.2.x before 10.2.10 and Percona XtraDB Cluster before 5.6.37-26.21-3 and 5.7.x before 5.7.19-29.22-3 allows remote authenticated users with SQL access to bypass intended access restrictions and replicate data definition language (DDL) statements to cluster nodes by leveraging incorrect ordering of DDL replication and ACL checking. 2018-01-25 not yet calculated CVE-2017-15365
CONFIRM(link is external)
CONFIRM(link is external)
FEDORA
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
matrixssl -- matrixssl MatrixSSL version 3.7.2 adopts a collision-prone OID comparison logic resulting in possible spoofing of OIDs (e.g. in ExtKeyUsage extension) on X.509 certificates. 2018-01-22 not yet calculated CVE-2017-1000417
MISC(link is external)
MISC
MISC(link is external)
maxsecure -- maxsecure_antivirus In Max Secure Anti Virus 19.0.3.019,, the driver file (MaxProtector32.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x220011. 2018-01-24 not yet calculated CVE-2018-6206
MISC(link is external)
maxsecure -- maxsecure_antivirus In Max Secure Anti Virus 19.0.3.019,, the driver file (MaxProtector32.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x22000d. 2018-01-24 not yet calculated CVE-2018-6208
MISC(link is external)
maxsecure -- maxsecure_antivirus In Max Secure Anti Virus 19.0.3.019,, the driver file (MaxProtector32.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x220019. 2018-01-24 not yet calculated CVE-2018-6207
MISC(link is external)
maxsecure -- maxsecure_antivirus In Max Secure Anti Virus 19.0.3.019,, the driver file (MaxProtector32.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x220009. 2018-01-24 not yet calculated CVE-2018-6205
MISC(link is external)
maxsecure -- maxsecure_antivirus In Max Secure Anti Virus 19.0.3.019,, the driver file (SDActMon.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x220019. 2018-01-24 not yet calculated CVE-2018-6204
MISC(link is external)
maxsecure -- maxsecure_antivirus In Max Secure Anti Virus 19.0.3.019,, the driver file (MaxCryptMon.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x220019. 2018-01-24 not yet calculated CVE-2018-6209
MISC(link is external)
microsoft -- office Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807. 2018-01-22 not yet calculated CVE-2018-0845
BID(link is external)
CONFIRM(link is external)
microsoft -- office Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807. 2018-01-22 not yet calculated CVE-2018-0848
BID(link is external)
CONFIRM(link is external)
microsoft -- office Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807. 2018-01-22 not yet calculated CVE-2018-0862
BID(link is external)
CONFIRM(link is external)
microsoft -- office Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807. 2018-01-22 not yet calculated CVE-2018-0849
BID(