***출처: [NIA] 지능화 시대 'Civic Tech'의 발전과 디지털 사회혁신 전략 - 신은희 책임

***문서:

7._지능화_시대_Civic_Tech의_발전과_디지털_사회혁신_전략.pdf

 

 

 

 

■ Civic Tech, 일반적으로 시민이 ICT를 활용하여 사회현안을 공동 해결하려는 노력을 의미

 

 

- 사회 전체를 지능적·긍정적으로 변화시키고, 정보 활용 및 사회 참여 권한을 시민에게 돌려주는 대표적인
사람중심 기술 활용의 혁신적 대안으로 발전할 전망

 

- 커뮤니티 활동(Community Action)과 열린 정부(Open Government)로 구분

 

 

 

 

 

 

■ 시민의 의사결정 참여 방식 변화와 오픈데이터 추진 등으로 Civic Tech 등장

 

■ 4차 산업혁명 시대 Civic Tech 변화 방향, Design for All

 

 

- (자동화) 데이터 빅뱅, 인공지능 기술은 상황을 단순히 모니터링 하는 시스템에서 상황 맞춤형 자동화 시스템으로 발전시킬 것


- (연결성) Connectivity 혁명은 자동화의 범위를 확대하고 데이터의 이동 시간과 비용을 감소시켜 더 많은 연결과 가치를 창출

 

 

 

■ 국내외에서 시민이 직접 참여·주도하는 온라인 플랫폼 개발·운영 활발

 

- 디지털 기술을 통해 시민이 의견을 직접 제안함으로써 정부가 효율적·효과적으로 정책 활동 가능한 환경 조성

 

 

 

■ 해외 Civic Tech 사례

 

 

○ (네덜란드) 로테르담 공중육교 건설을 통한 도시재생 추진 시민 크라우드 펀딩 프로젝트 ‘내가 만드는 로테르담(I Make Rotterdam)’

 

 

- 크라우드 펀딩에 참여한 시민은 육교 상판 나무에 이름과 메시지를 새길 수 있도록 하여 시민참여를 유도

- 프로젝트 시작 3달 만에 목표액 10만 유로의 1/3을 달성하였고 이에 동력을 얻어 지자체가 예산을 지원하며 도시재생 프로젝트를 추진한 시민 크라우드 펀딩의 성공 사례

 

 

 

○ (미국) 시민이 지도에서 소화전 위치를 확인하고 집 앞 소화전을 직접 관리하는 서비스 ‘소화전 입양하기(Adopt a Hydrant)’

 

 

- 구글지도 위에 소화전 위치를 표시하여 이것을 시민이 입양해 갈 수 있도록 하고, 소화전을 입양한 시민은 주인의식을 갖고 소화전에 쌓인 눈을 치우면서 문제를 해결


- 이 서비스는 오픈소스로서 2012년 여름 하와이 호놀룰루에서 쓰나미를 대비하여 사이렌 배터리를 관리하는 용도로 재활용되었으며, 오클랜드와 시애틀에서는 배수구 입양 서비스로 재활용

 

 

 

○ (이스라엘) 도로상황 정보를 공유하여 실시간 교통지도를 제공 하는 사용자 참여형 지도 ‘웨이즈(Waze)’

 

 

- GPS가 장착된 스마트폰을 사용하는 웨이즈 사용자들로부터 교통 정체·사고, 속도감지 카메라 위치 등 다양한 교통정보를 크라우드 소싱 방식으로 수집해 맞춤형 내비게이션 서비스를 제공


- 사용자들은 지도에 표시되지 않은 막다른 길에 들어섰을 때 웨이즈에 접속하여 해당 정보를 지도상에 표시함으로써 다음 방문자들에게 올바른 길 정보 제공 가능

 

 

 

○ (아일랜드) 남은 음식을 공유하여 기아 문제 해결을 모색한 O2O 서비스 애플리케이션 ‘푸드클라우드(FoodCloud)’

 

 

- 슈퍼마켓, 빵집 등 업체들이 푸드클라우드 회원으로 등록하여 매일 영업 종료 후 기부할 음식의 세부 정보를 앱에 입력


- 업체들이 입력한 정보는 자선단체에 전달되고 자선단체가 직접 기부 음식을 수거

 

 

 

○ (스페인) 시민이 시의 재정과 입법, 행정 과정에 직접 참여 가능한 시민참여 웹사이트 ‘디사이드 마드리드(Decide Madrid)’

 

 

- 도시발전과 환경, 주거 등의 각 부서들이 시민의 제안이나 의견들을 모아 부서의 예산을 집행하는데 적극적으로 활용

 

 

 

○ (캐나다) 시민이 질 좋은 정보를 쉽게 찾을 수 있도록 오픈 데이터를 제공하는 비영리단체 ‘오픈노스(OpenNorth)’

 

 

- 정치, 행정에 관련된 각종 정보를 제공하여, 정부의 투명성과 시민참여를 위한 백과사전 역할


- 데이터 표준 개발, 정보공개, 입법 감시와 관련된 서비스를 제공하며 그룹과 개인의 의사결정을 지원

 

 

 

○ (뉴질랜드) 의사결정구조의 비효율성과 정보 격차를 해결하는 협력적·수평적 온라인 의사결정 플랫폼 ‘루미오(Loomio)’

 

 

- 루미오를 통해 누구나 의견을 제시할 수 있으며 다른 참여자들과의 토의를 통해 하나의 합의점에 도달


- 개인의 의견이 집단적 결정으로 이어질 수 있도록 징검다리 역할을 수행


- 루미오는 오픈소스이며 뉴질랜드는 물론 헝가리, 스페인 등 전세계 90여 개국에서 시민 합의 도출 과정에 이상적으로 활용

 

 

 

○ (아르헨티나) 시민이 직접 토론과 투표로 의견을 제시할 수 있는 온라인 시민참여 시스템 ‘데모크라시 OS(Democracy OS)’

 

 

- 스마트폰을 이용해 지역구 의원이 제출한 법안에 의견을 개진하고 찬반투표를 할 수 있도록 만든 앱


- 기술을 통해 시민과 유권자 간 양방향 대화를 시도하였으나 정치 문화적 문제로 실현이 어려워지자 Partido de la Red (Net Party, 네트워크 정당)라는 정당을 창당

 

 

 

 

■ 한국 Civic Tech 사례

 

 

○ 충청북도 보은군에 있는 초등학교의 폐교를 막기 위해 추진한 ‘삼가마을 도서관 짓기 마을주민프로젝트’

 

 

- 폐교 위기에 처한 삼가분교를 지키기 위해 크라우드 펀딩으로 322만 원(목표액 200만 원) 모금액을 달성하여 삼가분교 내 창고를 개조하여 도서관을 설립


- 펀딩 성공이후 설립된 도서관은 지역사회 커뮤니티 활성화에 기여하고 있으며, 기업의 도서 기증 등 협력사업으로 확장

 

 

 

○ 시민이 정책제안, 결정, 실행까지 전 과정에 참여할 수 있는 온라인 창구 ‘민주주의 서울’

 

 

- 시민이 정책을 제안하고 토론, 투표할 뿐 아니라 서울시가 시민의 의견을 묻는 창구도 마련되어 있어, 시민의 다양한 의견을 정책수립에 중요 자료로 활용 가능


- 채택된 제안에 대해서는 현금, 상품권, 마일리지 등 보상을 지급함으로써 시민의 참여 독려

 

 

 

○ 투명한 안전보건정보를 제공하기 위해 국민이 직접 나서 정보를 수집·게시한 ‘메르스 확산지도(Mers Map)’

 

 

- ‘메르스 확산지도’는 메르스 정부 포털 개설 등으로 2015년 6월 10일 서비스 종료

 

 

 

○ 시민이 물건, 재능, 공간 등을 공동체화폐를 활용하여 자유롭게 교환하는 ‘서울 e품앗이’

 

 

- 거래 가능 품목 : ① (재능) 돌봄(영유아, 산모, 노인 등), 학습지도, 상담(법률, 세무, 의료, 청소년 등), 수리·제작 등, ② (물품) 식품, 의류, 가구, 전자, 도서, 자동차 등

 

- 거래 수단인 공동체화폐는 서울 e품앗이 내에서만 사용 가능

 

 

 

○ 데이터를 활용하여 지방선거 후보자 정보를 수집·분석하여 유권자에게 보여주는 정치인 정보 제공 앱 ‘우리동네 후보’

 

- 시민에게 거주 지역 후보자와 비례대표 목록, 후보자의 약력, 공약, 범죄전과 등 정보를 쉽고 객관적으로 알려주는 플랫폼


- 선거철 유권자와 후보 간 의사소통을 돕겠다는 것이 설립 취지


- 국내 스타트업 스테이영이 개발(`14)하여 미국 법률서비스 스타트업 피스컬노트에 피인수(`15), 아시아 시장으로 사업 확장 추진 중

 

 

 

○ 데이터의 시각화를 통하여 정부 활동을 투명하게 감시할 수 있는 ‘예산지도(Budget Map)’

 

 

- 특정 사회이슈에 관련된 사업 목록 및 예산정보를 보여줌으로써 국민이 내는 세금이 잘 사용되고 있는지 직접 확인 가능

 

 

 

○ 시민이 적극적으로 정치에 참여할 수 있도록 지원하는 온라인 시민입법 플랫폼 ‘국회톡톡’

 

 

- 시민이 직접 입법을 제안하고 1,000명 이상의 지지를 얻은 제안은 국회의원들에게 전달

- 국회의원이 참여 제안을 수용하면 시민과 국회의원을 매칭한 입법 드림팀은 입법 활동을 추진하고 그 활동을 투명하게 공개

 

 

 

■ 지능정보기술의 Civic Tech 활용 전략

 

 

○ (인공지능) 인공지능의 3대 주요 기술은 학습, 추론, 인식으로 사람의 사고능력을 모방한 기술

 

 

- 사용자가 원하는 시기에 원하는 형식의 올바른 정보를 제공 해줌으로써 사용자에게 상황에 맞춤화된 뛰어난 경험을 제공

 

 

 

○ (데이터) 폭증하는 데이터 양과 위치정보, SNS 등 데이터 종류 다양화를 통해 사람들의 행동, 의견 등 분석 및 미래 예측 가능

 

 

- 데이터 수집, 공유, 저장관리, 처리, 분석, 지식시각화의 요소 기술로 구성되며, 다른 분야 데이터 간 조합·비교분석을 통해 새로운 가치 창출 가능

 

 

 

○ (로봇) 외부환경 인식 및 자율적 상황 판단을 통해 자율적으로 동작하거나 사람과 상호작용하며 다양한 서비스를 제공

 

 

- 인공지능, 인지기술, 운동 및 조작 기능을 기반으로 하며 사람과 상호작용이 필요한 분야뿐 아니라 사람이 접근하기 어려운 분야까지 활용 가능

 

 

 

○ (IoT) 사람, 사물, 서비스 세 가지 분산된 환경요소가 상호 협력적으로 센싱, 네트워킹, 정보처리 등의 관계를 형성하는 사물 공간 연결 인프라

 

 

- 진보된 인터넷 네트워크와 만물정보를 바탕으로 한 양방향 통신으로 발전하며, 정보 유통 연결성을 확장

 

 

 

○ (블록체인) 데이터의 위·변조를 어렵게 하는 데이터 분산저장 기술로서 특정 중앙 서버가 아닌 P2P 네트워크에 데이터를 분산하여 참여자가 데이터를 공동 기록·관리

 

 

- 블록체인을 주목해야하는 이유는 블록체인이 가지는 정보공유, 투명성, 효율성, 안전성에 기반을 둔 신뢰 구조의 확장성에 기인함

 

 

 

○ (3D프린팅) 디지털 디자인 데이터를 활용하여 소재를 층층이 쌓거나 뿌려서 짧은 시간 내에 3차원 물체를 제조하는 프로세스

 

 

- 다양한 아이디어를 수렴하고 오픈소스를 활용하여 즉시적으로 제품을 구현해봄으로써 아이디어의 실효성 검증 및 확산 시간 단축 가능

저작자 표시 비영리 변경 금지
신고
Posted by manga0713

 

 

 

 

 

 

[이미지캡처: "달빠, 자기 생각을 알아듣기 쉽게 인간에게 설명할 수 있는 인공지능 개발 추진"

저작자 표시 비영리 변경 금지
신고
Posted by manga0713

 

 

 

*** 출처: [US-CERT: Bulletin(SB17-324)] 2017년 11월 13일까지 발표된 보안 취약점

 

 

 

The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0

  • Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9

  • Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9

Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

 

High Vulnerabilities

Primary
Vendor -- Product
Description Published CVSS Score Source & Patch Info
There were no high vulnerabilities recorded this week.
Back to top

 

Medium Vulnerabilities

Primary
Vendor -- Product
Description Published CVSS Score Source & Patch Info
There were no medium vulnerabilities recorded this week.
Back to top

 

Low Vulnerabilities

Primary
Vendor -- Product
Description Published CVSS Score Source & Patch Info
There were no low vulnerabilities recorded this week.
Back to top

 

Severity Not Yet Assigned

Primary
Vendor -- Product
Description Published CVSS Score Source & Patch Info
alchemist.vim -- alchemist.vim
 
Elixir's vim plugin, alchemist.vim is vulnerable to remote code execution in the bundled alchemist-server. A malicious website can execute requests against an ephemeral port on localhost that are then evaluated as elixir code. 2017-11-17 not yet calculated CVE-2017-1000212
CONFIRM(link is external)
altavault -- ost
 
AltaVault OST Plug-in versions prior to 1.2.2 may allow attackers to obtain sensitive information via unspecified vectors. All users are urged to move to a fixed version and change passwords used by Veritas NetBackup to access the OST shares on the NetApp AltaVault as a precaution. 2017-11-16 not yet calculated CVE-2017-15517
CONFIRM(link is external)
amazon -- key
 
Amazon Key through 2017-11-16 mishandles Cloud Cam 802.11 deauthentication frames during the delivery process, which makes it easier for (1) delivery drivers to freeze a camera and re-enter a house for unfilmed activities or (2) attackers to freeze a camera and enter a house if a delivery driver failed to ensure a locked door before leaving. 2017-11-16 not yet calculated CVE-2017-16867
MISC(link is external)
MISC(link is external)
MISC(link is external)
apache -- camel
 
The camel-castor component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws. 2017-11-15 not yet calculated CVE-2017-12634
CONFIRM
BID(link is external)
CONFIRM
apache -- camel
 
The camel-hessian component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws. 2017-11-15 not yet calculated CVE-2017-12633
CONFIRM
BID(link is external)
CONFIRM
apache -- couchdb
 
Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges. 2017-11-14 not yet calculated CVE-2017-12635
BID(link is external)
MLIST
apache -- couchdb
 
CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet. 2017-11-14 not yet calculated CVE-2017-12636
MLIST
apache -- cxf
 
Apache CXF supports sending and receiving attachments via either the JAX-WS or JAX-RS specifications. It is possible to craft a message attachment header that could lead to a Denial of Service (DoS) attack on a CXF web service provider. Both JAX-WS and JAX-RS services are vulnerable to this attack. From Apache CXF 3.2.1 and 3.1.14, message attachment headers that are greater than 300 characters will be rejected by default. This value is configurable via the property "attachment-max-header-size". 2017-11-14 not yet calculated CVE-2017-12624
CONFIRM
BID(link is external)
apache -- hadoop
 
In Apache Hadoop versions 2.6.1 to 2.6.5, 2.7.0 to 2.7.3, and 3.0.0-alpha1, if a file in an encryption zone with access permissions that make it world readable is localized via YARN's localization mechanism, that file will be stored in a world-readable location and can be shared freely with any application that requests to localize that file. 2017-11-13 not yet calculated CVE-2017-3166
MLIST
apache -- karaf
 
Apache Karaf enables a shutdown port on the loopback interface, which allows local users to cause a denial of service (shutdown) by sending a shutdown command to all listening high ports. 2017-11-15 not yet calculated CVE-2014-0219
BID(link is external)
CONFIRM(link is external)
apache -- openoffice
 
An installer defect known as an "unquoted Windows search path vulnerability" affected the Apache OpenOffice before 4.1.3 installers for Windows. The PC must have previously been infected by a Trojan Horse application (or user) running with administrative privilege. Any installer with the unquoted search path vulnerability becomes a delayed trigger for the exploit. 2017-11-13 not yet calculated CVE-2016-6803
BID(link is external)
SECTRACK(link is external)
CONFIRM
apple -- ios An issue was discovered in certain Apple products. iOS before 11.1 is affected. The issue involves the "UIKit" component. It allows attackers to bypass intended read restrictions for secure text fields via vectors involving a focus-change event. 2017-11-12 not yet calculated CVE-2017-7113
SECTRACK(link is external)
CONFIRM(link is external)
apple -- ios
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. The issue involves the "Siri" component. It allows physically proximate attackers to obtain sensitive information via a Siri request for private-content notifications that should not have been available in the lock-screen state. 2017-11-12 not yet calculated CVE-2017-13805
SECTRACK(link is external)
CONFIRM(link is external)
apple -- ios
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. The issue involves the "Messages" component. It allows physically proximate attackers to view arbitrary photos via a Reply With Message action in the lock-screen state. 2017-11-12 not yet calculated CVE-2017-13844
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos An issue was discovered in certain Apple products, macOS before 10.13.1 is affected. The issue involves the "libarchive" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted archive file. 2017-11-12 not yet calculated CVE-2017-13816
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Audio" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted QuickTime file. 2017-11-12 not yet calculated CVE-2017-13807
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the third-party "PCRE" product. Versions before 8.40 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. 2017-11-12 not yet calculated CVE-2017-13846
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos An issue was discovered in certain Apple products, macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. 2017-11-12 not yet calculated CVE-2017-13818
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Sandbox" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. 2017-11-12 not yet calculated CVE-2017-13838
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a /dev/dtracehelper attack involving the dtrace_dif_variable and dtrace_getarg functions. 2017-11-12 not yet calculated CVE-2017-13782
SECTRACK(link is external)
MISC(link is external)
CONFIRM(link is external)
apple -- macos An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. 2017-11-12 not yet calculated CVE-2017-13842
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "802.1X" component. It allows attackers to have an unspecified impact by leveraging TLS 1.0 support. 2017-11-12 not yet calculated CVE-2017-13832
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "AppleScript" component. It allows remote attackers to execute arbitrary code via a crafted AppleScript file that is mishandled by osadecompile. 2017-11-12 not yet calculated CVE-2017-13809
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Fonts" component. It allows remote attackers to spoof the user interface via crafted text. 2017-11-12 not yet calculated CVE-2017-13828
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted mach binary. 2017-11-12 not yet calculated CVE-2017-13834
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "ImageIO" component. It allows remote attackers to obtain sensitive information or cause a denial of service via a crafted image. 2017-11-12 not yet calculated CVE-2017-13831
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products, macOS before 10.13.1 is affected. The issue involves the "ATS" component. It allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption) via a crafted font. 2017-11-12 not yet calculated CVE-2017-13820
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products, macOS before 10.13.1 is affected. The issue involves the "HelpViewer" component. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML by bypassing the Same Origin Policy for quarantined HTML documents. 2017-11-12 not yet calculated CVE-2017-13819
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "CFString" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. 2017-11-12 not yet calculated CVE-2017-13821
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Dictionary Widget" component. It allows attackers to read local files if pasted text is used in a search. 2017-11-12 not yet calculated CVE-2017-13801
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "ImageIO" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted image file. 2017-11-12 not yet calculated CVE-2017-13814
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "CoreText" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted font file. 2017-11-12 not yet calculated CVE-2017-13825
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products, macOS before 10.13.1 is affected. The issue involves the third-party "file" product. Versions before 5.31 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. 2017-11-12 not yet calculated CVE-2017-13815
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "QuickTime" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. 2017-11-12 not yet calculated CVE-2017-13823
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Quick Look" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. 2017-11-12 not yet calculated CVE-2017-13822
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. 2017-11-12 not yet calculated CVE-2017-13843
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. 2017-11-12 not yet calculated CVE-2017-13840
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "libarchive" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted archive file. 2017-11-12 not yet calculated CVE-2017-13812
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An out-of-bounds read issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows local users to bypass intended memory-read restrictions. 2017-11-12 not yet calculated CVE-2017-13817
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products, macOS before 10.13.1 is affected. The issue involves the "HFS" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. 2017-11-12 not yet calculated CVE-2017-13830
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products, macOS before 10.13.1 is affected. The issue involves the "Open Scripting Architecture" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted AppleScript file that is mishandled by osadecompile. 2017-11-12 not yet calculated CVE-2017-13824
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products, macOS before 10.13.1 is affected. The issue involves the "CFNetwork" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. 2017-11-12 not yet calculated CVE-2017-13829
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products, macOS before 10.13.1 is affected. The issue involves the "CFNetwork" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. 2017-11-12 not yet calculated CVE-2017-13833
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. 2017-11-12 not yet calculated CVE-2017-13841
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. 2017-11-12 not yet calculated CVE-2017-13836
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "APFS" component. It does not properly restrict the DMA mapping time of FileVault decryption buffers, which allows attackers to read cleartext APFS data via a crafted Thunderbolt adapter. 2017-11-12 not yet calculated CVE-2017-13786
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows local users to obtain sensitive information by leveraging an error in packet counters. 2017-11-12 not yet calculated CVE-2017-13810
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Remote Management" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. 2017-11-12 not yet calculated CVE-2017-13808
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "libarchive" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted archive file. 2017-11-12 not yet calculated CVE-2017-13813
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "APFS" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. 2017-11-12 not yet calculated CVE-2017-13800
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products, macOS before 10.13.1 is affected. The issue involves the "fsck_msdos" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. 2017-11-12 not yet calculated CVE-2017-13811
SECTRACK(link is external)
CONFIRM(link is external)
apple -- macos
 
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Quick Look" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted Office document. 2017-11-12 not yet calculated CVE-2017-7132
SECTRACK(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. macOS before 10.13.1 is affected. tvOS before 11.1 is affected. watchOS before 4.1 is affected. The issue involves the "Kernel" component. It allows attackers to monitor arbitrary apps via a crafted app that accesses process information at a high rate. 2017-11-12 not yet calculated CVE-2017-13852
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. tvOS before 11.1 is affected. watchOS before 4.1 is affected. The issue involves the "CoreText" component. It allows remote attackers to cause a denial of service (application crash) via a crafted text file. 2017-11-12 not yet calculated CVE-2017-13849
BID(link is external)
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13783
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. macOS before 10.13.1 is affected. tvOS before 11.1 is affected. watchOS before 4.1 is affected. The issue involves the "StreamingZip" component. It allows remote attackers to write to unintended pathnames via a crafted ZIP archive. 2017-11-12 not yet calculated CVE-2017-13804
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13784
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13794
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13793
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13802
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13798
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13797
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13796
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13795
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13785
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13788
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13803
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13791
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13792
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- multiple_products
 
An issue was discovered in certain Apple products. iOS before 11.1 is affected. macOS before 10.13.1 is affected. tvOS before 11.1 is affected. watchOS before 4.1 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. 2017-11-12 not yet calculated CVE-2017-13799
SECTRACK(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
apple -- safari
 
An issue was discovered in certain Apple products. Safari before 11.0.1 is affected. The issue involves the "Safari" component. It allows remote attackers to spoof the address bar via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13789
SECTRACK(link is external)
CONFIRM(link is external)
apple -- safari
 
An issue was discovered in certain Apple products. Safari before 11.0.1 is affected. The issue involves the "Safari" component. It allows remote attackers to spoof the address bar via a crafted web site. 2017-11-12 not yet calculated CVE-2017-13790
SECTRACK(link is external)
CONFIRM(link is external)
arris -- arris_tg1682g_devices
 
Arris TG1682G devices with Comcast TG1682_2.0s7_PRODse 10.0.59.SIP.PC20.CT software allow Unauthenticated Stored XSS via the actionHandler/ajax_managed_services.php service parameter. 2017-11-15 not yet calculated CVE-2017-16836
MISC(link is external)
EXPLOIT-DB(link is external)
automationdirect -- click_programming
 
An Uncontrolled Search Path Element issue was discovered in AutomationDirect CLICK Programming Software (Part Number C0-PGMSW) versions 2.10 and prior, C-More Programming Software (Part Number EA9-PGMSW) versions 6.30 and prior, C-More Micro (Part Number EA-PGMSW) versions 4.20.01.0 and prior, GS Drives Configuration Software (Part Number GSOFT) versions 4.0.6 and prior, and SL-SOFT SOLO Temperature Controller Configuration Software (Part Number SL-SOFT) versions 1.1.0.5 and prior. An uncontrolled search path element (DLL Hijacking) vulnerability has been identified. To exploit this vulnerability, an attacker could rename a malicious DLL to meet the criteria of the application, and the application would not verify that the DLL is correct. Once loaded by the application, the DLL could run malicious code at the privilege level of the application. 2017-11-13 not yet calculated CVE-2017-14020
BID(link is external)
MISC
b3log -- symphony
 
b3log Symphony (aka Sym) 2.2.0 has XSS in processor/AdminProcessor.java in the admin console, as demonstrated by a crafted X-Forwarded-For HTTP header that is mishandled during display of a client IP address in /admin/user/userid. 2017-11-14 not yet calculated CVE-2017-16821
CONFIRM(link is external)
b3log -- symphony
 
b3log Symphony (aka Sym) 2.2.0 does not properly address XSS in JSON objects, as demonstrated by a crafted userAvatarURL value to /settings/avatar, related to processor/AdminProcessor.java, processor/ArticleProcessor.java, processor/UserProcessor.java, service/ArticleQueryService.java, service/AvatarQueryService.java, and service/CommentQueryService.java. 2017-11-18 not yet calculated CVE-2017-16881
CONFIRM(link is external)
big-ip -- big-ip
 
On BIG-IP versions 11.6.0-11.6.2 (fixed in 11.6.2 HF1), 12.0.0-12.1.2 HF1 (fixed in 12.1.2 HF2), or 13.0.0-13.0.0 HF2 (fixed in 13.0.0 HF3) a virtual server configured with a Client SSL profile may be vulnerable to an Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) against RSA, which when exploited, may result in plaintext recovery of encrypted messages and/or a Man-in-the-middle (MiTM) attack, despite the attacker not having gained access to the server's private key itself. 2017-11-17 not yet calculated CVE-2017-6168
SECTRACK(link is external)
CONFIRM(link is external)
blackberry -- qnx_software_development_platform
 
In BlackBerry QNX Software Development Platform (SDP) 6.6.0 and 6.5.0 SP1 and earlier, an information disclosure vulnerability in the default configuration of the QNX SDP could allow an attacker to gain information relating to memory layout of higher privileged processes by manipulating environment variables that influence the loader. 2017-11-14 not yet calculated CVE-2017-9369
CONFIRM(link is external)
blackberry -- qnx_software_development_platform
 
In BlackBerry QNX Software Development Platform (SDP) 6.6.0, the default configuration of the QNX SDP system did not in all circumstances prevent attackers from modifying the GOT or PLT tables with buffer overflow attacks. 2017-11-14 not yet calculated CVE-2017-3893
CONFIRM(link is external)
blackberry -- qnx_software_development_platform
 
In BlackBerry QNX Software Development Platform (SDP) 6.6.0, an information disclosure vulnerability in the default configuration of the QNX SDP could allow an attacker to gain information relating to memory layout that could be used in a blended attack by executing commands targeting procfs resources. 2017-11-14 not yet calculated CVE-2017-3892
CONFIRM(link is external)
blackberry -- qnx_software_development_platform
 
In BlackBerry QNX Software Development Platform (SDP) 6.6.0, an elevation of privilege vulnerability in the default configuration of the QNX SDP with QNet enabled on networks comprising two or more QNet nodes could allow an attacker to access local and remote files or take ownership of files on other QNX nodes regardless of permissions by executing commands targeting arbitrary nodes from a secondary QNX 6.6.0 QNet node. 2017-11-14 not yet calculated CVE-2017-3891
CONFIRM(link is external)
blackberry -- qnx_software_development_platform
 
In BlackBerry QNX Software Development Platform (SDP) 6.6.0 and 6.5.0 SP1 and earlier, a loss of integrity vulnerability in the default configuration of the QNX SDP could allow an attacker being able to reduce the entropy of the PRNG, making other blended attacks more practical by gaining control over environmental factors that influence seed generation. 2017-11-14 not yet calculated CVE-2017-9371
CONFIRM(link is external)
book_walker -- book_walker
 
Untrusted search path vulnerability in BOOK WALKER for Windows Ver.1.2.9 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. 2017-11-17 not yet calculated CVE-2017-10887
CONFIRM(link is external)
JVN(link is external)
book_walker -- book_walker
 
BOOK WALKER for Windows Ver.1.2.9 and earlier, BOOK WALKER for Mac Ver.1.2.5 and earlier allow an attacker to access local files via unspecified vectors. 2017-11-17 not yet calculated CVE-2017-10888
CONFIRM(link is external)
JVN(link is external)
british_columbia_institute_of_technology -- codeigniter
 
British Columbia Institute of Technology CodeIgniter 3.1.3 is vulnerable to HTTP Header Injection in the set_status_header() common function under Apache resulting in HTTP Header Injection flaws. 2017-11-16 not yet calculated CVE-2017-1000247
MISC(link is external)
ca_technologies -- ca_identity_governance
 
A stored cross-site scripting vulnerability in CA Identity Governance 12.6 allows remote authenticated attackers to display HTML or execute script in the context of another user. 2017-11-14 not yet calculated CVE-2017-9394
BID(link is external)
CONFIRM(link is external)
cacti -- cacti
 
Cacti 1.1.27 has reflected XSS via the PATH_INFO to host.php. 2017-11-10 not yet calculated CVE-2017-16785
SECTRACK(link is external)
MISC(link is external)
cacti -- cacti
 
Cacti before 1.0.0 allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object, related to calling unserialize(stripslashes()). 2017-11-15 not yet calculated CVE-2014-4000
CONFIRM(link is external)
CONFIRM
GENTOO
CONFIRM(link is external)
cern -- root
 
ROOT version 6.9.03 and below is vulnerable to an authenticated shell metacharacter injection in the rootd daemon resulting in remote code execution 2017-11-17 not yet calculated CVE-2017-1000203
CONFIRM(link is external)
cern -- root
 
ROOT xrootd version 4.6.0 and below is vulnerable to an unauthenticated shell command injection resulting in remote code execution 2017-11-17 not yet calculated CVE-2017-1000215
MISC(link is external)
CONFIRM(link is external)
CONFIRM(link is external)
cisco -- asa_next-generation_firewall_services
 
A vulnerability exists in the process of creating default IP blocks during device initialization for Cisco ASA Next-Generation Firewall Services that could allow an unauthenticated, remote attacker to send traffic to the local IP address of the device, bypassing any filters that are configured to deny local IP management traffic. The vulnerability is due to an implementation error that exists in the process of creating default IP blocks when the device is initialized, and the way in which those IP blocks interact with user-configured filters for local IP management traffic (for example, SSH to the device). An attacker could exploit this vulnerability by sending traffic to the local IP address of the targeted device. A successful exploit could allow the attacker to connect to the local IP address of the device even when there are filters configured to deny the traffic. Cisco Bug IDs: CSCvd97962. 2017-11-16 not yet calculated CVE-2017-12299
CONFIRM(link is external)
cisco -- asyncos
 
A vulnerability in the Advanced Malware Protection (AMP) file filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured AMP file filtering rule. The file types affected are zipped or archived file types. The vulnerability is due to incorrect and different file hash values when AMP scans the file. An attacker could exploit this vulnerability by sending a crafted email file attachment through the targeted device. An exploit could allow the attacker to bypass a configured AMP file filter. Cisco Bug IDs: CSCvf52943. 2017-11-16 not yet calculated CVE-2017-12303
SECTRACK(link is external)
CONFIRM(link is external)
cisco -- email_security_appliance
 
A vulnerability in the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to conduct a HTTP response splitting attack. The vulnerability is due to the failure of the application or its environment to properly sanitize input values. An attacker could exploit this vulnerability by injecting malicious HTTP headers, controlling the response body, or splitting the response into multiple responses. An exploit could allow the attacker to perform cross-site scripting attacks, cross-user defacement, web cache poisoning, and similar exploits. Cisco Bug IDs: CSCvf16705. 2017-11-16 not yet calculated CVE-2017-12309
SECTRACK(link is external)
CONFIRM(link is external)
cisco -- findit_network_discovery_utility
 
A vulnerability in the Cisco FindIT Network Discovery Utility could allow an authenticated, local attacker to perform a DLL preloading attack, potentially causing a partial impact to the device availability, confidentiality, and integrity, aka Insecure Library Loading. The vulnerability is due to the application loading a malicious copy of a specific, nondefined DLL file instead of the DLL file it was expecting. An attacker could exploit this vulnerability by placing an affected DLL within the search path of the host system. An exploit could allow the attacker to load a malicious DLL file into the system, thus partially compromising confidentiality, integrity, and availability on the device. Cisco Bug IDs: CSCvf37955. 2017-11-16 not yet calculated CVE-2017-12314
CONFIRM(link is external)
cisco -- firepower_system_software
 
A vulnerability in the SNORT detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the Server Message Block Version 2 (SMB2) protocol. The vulnerability is due to the incorrect detection of an SMB2 file when the detection is based on the length of the file. An attacker could exploit this vulnerability by sending a crafted SMB2 transfer request through the targeted device. A successful exploit could allow the attacker to bypass filters that are configured to block SMB2 traffic. Cisco Bug IDs: CSCve58398. 2017-11-16 not yet calculated CVE-2017-12300
BID(link is external)
CONFIRM(link is external)
cisco -- hyperflex_system
 
A vulnerability in system logging when replication is being configured with the Cisco HyperFlex System could allow an authenticated, local attacker to view sensitive information that should be restricted in the system log files. The attacker would have to be authenticated as an administrative user to conduct this attack. The vulnerability is due to lack of proper masking of sensitive information in system log files. An attacker could exploit this vulnerability by authenticating to the targeted device and viewing the system log file. An exploit could allow the attacker to view sensitive system information that should have been restricted. The attacker could use this information to conduct additional reconnaissance attacks. Cisco Bug IDs: CSCvg31472. 2017-11-16 not yet calculated CVE-2017-12315
BID(link is external)
CONFIRM(link is external)
cisco -- identity_services_engine
 
A vulnerability in the Guest Portal login page of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to perform multiple login attempts in excess of the configured login attempt limit. The vulnerability is due to insufficient server-side login attempt limit enforcement. An attacker could exploit this vulnerability by sending modified login attempts to the Guest Portal login page. An exploit could allow the attacker to perform brute-force password attacks on the ISE Guest Portal. Cisco Bug IDs: CSCve98518. 2017-11-16 not yet calculated CVE-2017-12316
SECTRACK(link is external)
CONFIRM(link is external)
cisco -- immunet_antimalware_installer
 
An untrusted search path (aka DLL Preloading) vulnerability in the Cisco Immunet antimalware installer could allow an authenticated, local attacker to execute arbitrary code via DLL hijacking if a local user with administrative privileges executes the installer in the current working directory where a crafted DLL has been placed by an attacker. The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. An attacker would need valid user credentials to exploit this vulnerability. Cisco Bug IDs: CSCvf23928. 2017-11-16 not yet calculated CVE-2017-12312
CONFIRM(link is external)
cisco -- ios_and_ios_xe
 
A vulnerability in the IOS daemon (IOSd) web-based management interface of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface on an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the web-based management interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvf60862. 2017-11-16 not yet calculated CVE-2017-12304
BID(link is external)
SECTRACK(link is external)
CONFIRM(link is external)
cisco -- ip_phone_8800_series
 
A vulnerability in the debug interface of Cisco IP Phone 8800 series could allow an authenticated, local attacker to execute arbitrary commands, aka Debug Shell Command Injection. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting additional command input to the affected parameter in the debug shell. Cisco Bug IDs: CSCvf80034. 2017-11-16 not yet calculated CVE-2017-12305
BID(link is external)
SECTRACK(link is external)
CONFIRM(link is external)
cisco -- meeting_server A vulnerability in the H.264 decoder function of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a Cisco Meeting Server media process to restart unexpectedly when it receives an illegal H.264 frame. The vulnerability is triggered by an H.264 frame that has an invalid picture parameter set (PPS) value. An attacker could exploit this vulnerability by sending a malformed H.264 frame to the targeted device. An exploit could allow the attacker to cause a denial of service (DoS) condition because the media process could restart. The media session should be re-established within a few seconds, during which there could be a brief interruption in service. Cisco Bug IDs: CSCvg12559. 2017-11-16 not yet calculated CVE-2017-12311
BID(link is external)
SECTRACK(link is external)
CONFIRM(link is external)
cisco -- network_academy_packet_tracer
 
An untrusted search path (aka DLL Preload) vulnerability in the Cisco Network Academy Packet Tracer software could allow an authenticated, local attacker to execute arbitrary code via DLL hijacking if a local user with administrative privileges executes the installer in the current working directory where a crafted DLL has been placed by an attacker. The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. An attacker would need valid user credentials to exploit this vulnerability. 2017-11-16 not yet calculated CVE-2017-12313
BID(link is external)
CONFIRM(link is external)
cisco -- registered_envelope_service
 
Multiple vulnerabilities in the web interface of the Cisco Registered Envelope Service (a cloud-based service) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack or redirect a user of the affected service to an undesired web page. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit these vulnerabilities by persuading a user to click a malicious link or by sending an HTTP request that could cause the affected service to redirect the request to a specified malicious URL. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface of the affected system or allow the attacker to access sensitive browser-based information on the affected system. These types of exploits could also be used in phishing attacks that send users to malicious websites without their knowledge. Cisco Bug IDs: CSCve77195, CSCve90978, CSCvf42310, CSCvf42703, CSCvf42723, CSCvf46169, CSCvf49999. 2017-11-16 not yet calculated CVE-2017-12323
BID(link is external)
CONFIRM(link is external)
cisco -- registered_envelope_service
 
Multiple vulnerabilities in the web interface of the Cisco Registered Envelope Service (a cloud-based service) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack or redirect a user of the affected service to an undesired web page. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit these vulnerabilities by persuading a user to click a malicious link or by sending an HTTP request that could cause the affected service to redirect the request to a specified malicious URL. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface of the affected system or allow the attacker to access sensitive browser-based information on the affected system. These types of exploits could also be used in phishing attacks that send users to malicious websites without their knowledge. Cisco Bug IDs: CSCve77195, CSCve90978, CSCvf42310, CSCvf42703, CSCvf42723, CSCvf46169, CSCvf49999. 2017-11-16 not yet calculated CVE-2017-12290
BID(link is external)
CONFIRM(link is external)
cisco -- registered_envelope_service
 
Multiple vulnerabilities in the web interface of the Cisco Registered Envelope Service (a cloud-based service) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack or redirect a user of the affected service to an undesired web page. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit these vulnerabilities by persuading a user to click a malicious link or by sending an HTTP request that could cause the affected service to redirect the request to a specified malicious URL. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface of the affected system or allow the attacker to access sensitive browser-based information on the affected system. These types of exploits could also be used in phishing attacks that send users to malicious websites without their knowledge. Cisco Bug IDs: CSCve77195, CSCve90978, CSCvf42310, CSCvf42703, CSCvf42723, CSCvf46169, CSCvf49999. 2017-11-16 not yet calculated CVE-2017-12320
BID(link is external)
CONFIRM(link is external)
cisco -- registered_envelope_service
 
Multiple vulnerabilities in the web interface of the Cisco Registered Envelope Service (a cloud-based service) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack or redirect a user of the affected service to an undesired web page. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit these vulnerabilities by persuading a user to click a malicious link or by sending an HTTP request that could cause the affected service to redirect the request to a specified malicious URL. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface of the affected system or allow the attacker to access sensitive browser-based information on the affected system. These types of exploits could also be used in phishing attacks that send users to malicious websites without their knowledge. Cisco Bug IDs: CSCve77195, CSCve90978, CSCvf42310, CSCvf42703, CSCvf42723, CSCvf46169, CSCvf49999. 2017-11-16 not yet calculated CVE-2017-12292
BID(link is external)
CONFIRM(link is external)
cisco -- registered_envelope_service
 
Multiple vulnerabilities in the web interface of the Cisco Registered Envelope Service (a cloud-based service) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack or redirect a user of the affected service to an undesired web page. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit these vulnerabilities by persuading a user to click a malicious link or by sending an HTTP request that could cause the affected service to redirect the request to a specified malicious URL. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface of the affected system or allow the attacker to access sensitive browser-based information on the affected system. These types of exploits could also be used in phishing attacks that send users to malicious websites without their knowledge. Cisco Bug IDs: CSCve77195, CSCve90978, CSCvf42310, CSCvf42703, CSCvf42723, CSCvf46169, CSCvf49999. 2017-11-16 not yet calculated CVE-2017-12322
BID(link is external)
CONFIRM(link is external)
cisco -- registered_envelope_service
 
Multiple vulnerabilities in the web interface of the Cisco Registered Envelope Service (a cloud-based service) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack or redirect a user of the affected service to an undesired web page. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit these vulnerabilities by persuading a user to click a malicious link or by sending an HTTP request that could cause the affected service to redirect the request to a specified malicious URL. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface of the affected system or allow the attacker to access sensitive browser-based information on the affected system. These types of exploits could also be used in phishing attacks that send users to malicious websites without their knowledge. Cisco Bug IDs: CSCve77195, CSCve90978, CSCvf42310, CSCvf42703, CSCvf42723, CSCvf46169, CSCvf49999. 2017-11-16 not yet calculated CVE-2017-12321
BID(link is external)
CONFIRM(link is external)
cisco -- registered_envelope_service
 
Multiple vulnerabilities in the web interface of the Cisco Registered Envelope Service (a cloud-based service) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack or redirect a user of the affected service to an undesired web page. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit these vulnerabilities by persuading a user to click a malicious link or by sending an HTTP request that could cause the affected service to redirect the request to a specified malicious URL. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface of the affected system or allow the attacker to access sensitive browser-based information on the affected system. These types of exploits could also be used in phishing attacks that send users to malicious websites without their knowledge. Cisco Bug IDs: CSCve77195, CSCve90978, CSCvf42310, CSCvf42703, CSCvf42723, CSCvf46169, CSCvf49999. 2017-11-16 not yet calculated CVE-2017-12291
BID(link is external)
CONFIRM(link is external)
cisco -- rf_gateway
 
A vulnerability in the TCP state machine of Cisco RF Gateway 1 devices could allow an unauthenticated, remote attacker to prevent an affected device from delivering switched digital video (SDV) or video on demand (VoD) streams, resulting in a denial of service (DoS) condition. The vulnerability is due to a processing error with TCP connections to the affected device. An attacker could exploit this vulnerability by establishing a large number of TCP connections to an affected device and not actively closing those TCP connections. A successful exploit could allow the attacker to prevent the affected device from delivering SDV or VoD streams to set-top boxes. Cisco Bug IDs: CSCvf19887. 2017-11-16 not yet calculated CVE-2017-12318
BID(link is external)
CONFIRM(link is external)
cisco -- spark_board
 
A vulnerability in the upgrade process of Cisco Spark Board could allow an authenticated, local attacker to install an unverified upgrade package, aka Signature Verification Bypass. The vulnerability is due to insufficient upgrade package validation. An attacker could exploit this vulnerability by providing the upgrade process with an upgrade package that the attacker controls. An exploit could allow the attacker to install custom firmware to the Spark Board. Cisco Bug IDs: CSCvf84502. 2017-11-16 not yet calculated CVE-2017-12306
CONFIRM(link is external)
cisco -- umbrella_insights_virtual_appliances
 
A vulnerability in Cisco Umbrella Insights Virtual Appliances 2.1.0 and earlier could allow an authenticated, local attacker to log in to an affected virtual appliance with root privileges. The vulnerability is due to the presence of default, static user credentials for an affected virtual appliance. An attacker could exploit this vulnerability by using the hypervisor console to connect locally to an affected system and then using the static credentials to log in to an affected virtual appliance. A successful exploit could allow the attacker to log in to the affected appliance with root privileges. Cisco Bug IDs: CSCvg31220. 2017-11-16 not yet calculated CVE-2017-12350
BID(link is external)
CONFIRM(link is external)
MISC(link is external)
cisco -- unified_communications_manager
 
A vulnerability in the Cisco Unified Communications Manager SQL database interface could allow an authenticated, remote attacker to impact the confidentiality of the system by executing arbitrary SQL queries, aka SQL Injection. The vulnerability is due to a lack of input validation on user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending crafted URLs that contain malicious SQL statements to the affected system. An exploit could allow the attacker to determine the presence of certain values in the database. Cisco Bug IDs: CSCvf36682. 2017-11-16 not yet calculated CVE-2017-12302
BID(link is external)
SECTRACK(link is external)
CONFIRM(link is external)
cisco -- voice_operating_system
 
A vulnerability in the upgrade mechanism of Cisco collaboration products based on the Cisco Voice Operating System software platform could allow an unauthenticated, remote attacker to gain unauthorized, elevated access to an affected device. The vulnerability occurs when a refresh upgrade (RU) or Prime Collaboration Deployment (PCD) migration is performed on an affected device. When a refresh upgrade or PCD migration is completed successfully, an engineering flag remains enabled and could allow root access to the device with a known password. If the vulnerable device is subsequently upgraded using the standard upgrade method to an Engineering Special Release, service update, or a new major release of the affected product, this vulnerability is remediated by that action. Note: Engineering Special Releases that are installed as COP files, as opposed to the standard upgrade method, do not remediate this vulnerability. An attacker who can access an affected device over SFTP while it is in a vulnerable state could gain root access to the device. This access could allow the attacker to compromise the affected system completely. Cisco Bug IDs: CSCvg22923, CSCvg55112, CSCvg55128, CSCvg55145, CSCvg58619, CSCvg64453, CSCvg64456, CSCvg64464, CSCvg64475, CSCvg68797. 2017-11-16 not yet calculated CVE-2017-12337
BID(link is external)
SECTRACK(link is external)
SECTRACK(link is external)
SECTRACK(link is external)
SECTRACK(link is external)
SECTRACK(link is external)
SECTRACK(link is external)
SECTRACK(link is external)
SECTRACK(link is external)
CONFIRM(link is external)
cloud_foundry -- foundation_grootfs
 
Cloud Foundry Foundation GrootFS release 0.3.x versions prior to 0.30.0 do not validate DiffIDs, allowing specially crafted images to poison the grootfs volume cache. For example, this could allow an attacker to provide an image layer that GrootFS would consider to be the Ubuntu base layer. 2017-11-13 not yet calculated CVE-2017-14388
CONFIRM
cms_made_simple -- cms_made_simple
 
In CMS Made Simple 2.2.3.1, in modules/New/action.addcategory.php, stored XSS is possible via the m1_name parameter to admin/moduleinterface.php during addition of a category, a related issue to CVE-2010-3882. 2017-11-12 not yet calculated CVE-2017-16799
MISC(link is external)
cms_made_simple -- cms_made_simple
 
In CMS Made Simple 2.2.3.1, the is_file_acceptable function in modules/FileManager/action.upload.php only blocks file extensions that begin or end with a "php" substring, which allows remote attackers to bypass intended access restrictions or trigger XSS via other extensions, as demonstrated by .phtml, .pht, .html, or .svg. 2017-11-12 not yet calculated CVE-2017-16798
MISC(link is external)
codiad -- codiad
 
Codiad(full version) is vulnerable to write anything to configure file in the installation resulting upload a webshell. 2017-11-17 not yet calculated CVE-2017-1000125
MISC(link is external)
confire -- confire
 
An exploitable vulnerability exists in the YAML parsing functionality in config.py in Confire 0.2.0. Due to the user-specific configuration being loaded from "~/.confire.yaml" using the yaml.load function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability. 2017-11-10 not yet calculated CVE-2017-16763
CONFIRM(link is external)
MISC(link is external)
MISC(link is external)
creolabs -- gravity
 
Creolabs Gravity Version: 1.0 Use-After-Free Possible code execution. An example of a Heap-Use-After-Free after the 'sublexer' pointer has been freed. Line 542 of gravity_lexer.c. 'lexer' is being used to access a variable but 'lexer' has already been freed, creating a Heap Use-After-Free condition. 2017-11-16 not yet calculated CVE-2017-1000172
MISC(link is external)
creolabs -- gravity
 
Creolabs Gravity Version: 1.0 Heap Overflow Potential Code Execution. By creating a large loop whiling pushing data to a buffer, we can break out of the bounds checking of that buffer. When list.join is called on the data it will read past a buffer resulting in a Heap-Buffer-Overflow. 2017-11-16 not yet calculated CVE-2017-1000173
MISC(link is external)
cs-cart -- cs-cart
 
Cross-site scripting vulnerability in CS-Cart Japanese Edition v4.3.10 and earlier (excluding v2 and v3), CS-Cart Multivendor Japanese Edition v4.3.10 and earlier (excluding v2 and v3) allows an attacker to inject arbitrary web script or HTML via unspecified vectors. 2017-11-17 not yet calculated CVE-2017-10886
CONFIRM(link is external)
JVN(link is external)
cyberduck -- cyberduck
 
Cyberduck before 4.4.4 on Windows does not properly validate X.509 certificate chains, which allows man-in-the-middle attackers to spoof FTP-SSL servers via a certificate issued by an arbitrary root Certification Authority. 2017-11-15 not yet calculated CVE-2014-2845
SECUNIA(link is external)
BUGTRAQ(link is external)
CONFIRM(link is external)
cygnux -- syspass
 
Cygnux sysPass version 2.1.7 and older is vulnerable to a Local File Inclusion in the functionality of javascript files inclusion. The attacker can read the configuration files that contain the login and password from the database, private encryption key, as well as other sensitive information. 2017-11-17 not yet calculated CVE-2017-1000192
CONFIRM(link is external)
d-link -- dcs-936l_devices
 
D-Link DCS-936L devices with firmware before 1.05.07 have an inadequate CSRF protection mechanism that requires the device's IP address to be a substring of the HTTP Referer header. 2017-11-15 not yet calculated CVE-2017-7851
MISC
MISC(link is external)

dahua_technology -- network_video_recorders

Authentication vulnerability found in Dahua NVR models NVR50XX, NVR52XX, NVR54XX, NVR58XX with software before DH_NVR5xxx_Eng_P_V2.616.0000.0.R.20171102. Attacker could exploit this vulnerability to gain access to additional operations by means of forging json message. 2017-11-13 not yet calculated CVE-2017-9314
CONFIRM(link is external)
dayrui_finecms -- dayrui_finecms
 
dayrui FineCms 5.2.0 before 2017.11.16 has Cross Site Scripting (XSS) in core/M_Controller.php via the DR_URI field. 2017-11-16 not yet calculated CVE-2017-16866
CONFIRM(link is external)
debian -- postgresql
 
The Debian pg_ctlcluster, pg_createcluster, and pg_upgradecluster scripts, as distributed in the Debian postgresql-common package before 181+deb9u1 for PostgreSQL (and other packages related to Debian and Ubuntu), handled symbolic links insecurely, which could result in local denial of service by overwriting arbitrary files. 2017-11-13 not yet calculated CVE-2017-8806
CONFIRM
BID(link is external)
CONFIRM(link is external)
CONFIRM
django_make_app -- django_make_app
 
An exploitable vulnerability exists in the YAML parsing functionality in the read_yaml_file method in io_utils.py in django_make_app 0.1.3. A YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability. 2017-11-10 not yet calculated CVE-2017-16764
MISC(link is external)
MISC(link is external)
ellislab -- expressionengine
 
EllisLab ExpressionEngine 3.4.2 is vulnerable to cross-site scripting resulting in PHP code injection 2017-11-17 not yet calculated CVE-2017-1000160
MISC(link is external)
exiv2 -- exiv2
 
exiv2 0.26 contains a Stack out of bounds read in webp parser 2017-11-17 not yet calculated CVE-2017-1000126
MLIST(link is external)
exiv2 -- exiv2
 
Exiv2 0.26 contains a heap buffer overflow in tiff parser 2017-11-17 not yet calculated CVE-2017-1000127
MLIST(link is external)
exiv2 -- exiv2
 
Exiv2 0.26 contains a stack out of bounds read in JPEG2000 parser 2017-11-17 not yet calculated CVE-2017-1000128
MLIST(link is external)
filp_whoops -- filp_whoops
 
The dump function in Util/TemplateHelper.php in filp whoops before 2.1.13 has XSS. 2017-11-17 not yet calculated CVE-2017-16880
CONFIRM(link is external)
fortinet -- fortios
 
A reflected Cross-site Scripting (XSS) vulnerability in web proxy disclaimer response web pages in Fortinet FortiOS 5.6.0, 5.4.0 to 5.4.5, 5.2.0 to 5.2.11 allows an unauthenticated attacker to inject arbitrary web script or HTML in the context of the victim's browser via sending a maliciously crafted URL to the victim. 2017-11-13 not yet calculated CVE-2017-7739
BID(link is external)
SECTRACK(link is external)
CONFIRM(link is external)
freebsd -- freebsd
 
In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p4, 11.0-RELEASE-p15, 10.4-STABLE, 10.4-RELEASE-p3, and 10.3-RELEASE-p24, not all information in the struct ptrace_lwpinfo is relevant for the state of any thread, and the kernel does not fill the irrelevant bytes or short strings. Since the structure filled by the kernel is allocated on the kernel stack and copied to userspace, a leak of information of the kernel stack of the thread is possible from the debugger. As a result, some bytes from the kernel stack of the thread using ptrace (PT_LWPINFO) call can be observed in userspace. 2017-11-16 not yet calculated CVE-2017-1086
BID(link is external)
SECTRACK(link is externa