Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 6.1

    MEDIUM
    CVE-2018-10939

    Zimbra Web Client (ZWC) in Zimbra Collaboration Suite 8.8 before 8.8.8.Patch4 and 8.7 before 8.7.11.Patch4 has Persistent XSS via a contact group.... Read more

    • Published: May. 30, 2018
    • Modified: Nov. 21, 2024
  • 7.1

    HIGH
    CVE-2018-10938

    A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a... Read more

    Affected Products : linux_kernel ubuntu_linux debian_linux
    • Published: Aug. 27, 2018
    • Modified: Nov. 21, 2024
  • 5.4

    MEDIUM
    CVE-2018-10937

    A cross site scripting flaw exists in the tetonic-console component of Openshift Container Platform 3.11. An attacker with the ability to create pods can use this flaw to perform actions on the K8s API as the victim.... Read more

    Affected Products : openshift_container_platform
    • Published: Sep. 11, 2018
    • Modified: Nov. 21, 2024
  • 8.1

    HIGH
    CVE-2018-10936

    A weakness was found in postgresql-jdbc before version 42.2.5. It was possible to provide an SSL Factory and not check the host name if a host name verifier was not provided to the driver. This could lead to a condition where a man-in-the-middle attacker ... Read more

    • Published: Aug. 30, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2018-10935

    A flaw was found in the 389 Directory Server that allows users to cause a crash in the LDAP server using ldapsearch with server side sort.... Read more

    • Published: Sep. 11, 2018
    • Modified: Nov. 21, 2024
  • 5.4

    MEDIUM
    CVE-2018-10934

    A cross-site scripting (XSS) vulnerability was found in the JBoss Management Console versions before 7.1.6.CR1, 7.1.6.GA. Users with roles that can create objects in the application can exploit this to attack other privileged users.... Read more

    • Published: Mar. 27, 2019
    • Modified: Nov. 21, 2024
  • 9.1

    CRITICAL
    CVE-2018-10933

    A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.... Read more

    • Published: Oct. 17, 2018
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2018-10932

    lldptool version 1.0.1 and older can print a raw, unsanitized attacker controlled buffer when mngAddr information is displayed. This may allow an attacker to inject shell control characters into the buffer and impact the behavior of the terminal.... Read more

    Affected Products : lldptool
    • Published: Aug. 21, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2018-10931

    It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XMLRPC. A remote, unauthenticated attacker could use this flaw to gain high privileges within cobbler, upload files to arbitrary location in the context of th... Read more

    Affected Products : satellite cobbler cobbler
    • Published: Aug. 09, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2018-10930

    A flaw was found in RPC request using gfs3_rename_req in glusterfs server. An authenticated attacker could use this flaw to write to a destination outside the gluster volume.... Read more

    • Published: Sep. 04, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10929

    A flaw was found in RPC request using gfs2_create_req in glusterfs server. An authenticated attacker could use this flaw to create arbitrary files and execute arbitrary code on glusterfs server nodes.... Read more

    • Published: Sep. 04, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10928

    A flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing anywhere... Read more

    • Published: Sep. 04, 2018
    • Modified: Nov. 21, 2024
  • 8.1

    HIGH
    CVE-2018-10927

    A flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated attacker could use this flaw to leak information and execute remote denial of service by crashing gluster brick process.... Read more

    • Published: Sep. 04, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2018-10926

    A flaw was found in RPC request using gfs3_mknod_req supported by glusterfs server. An authenticated attacker could use this flaw to write files to an arbitrary location via path traversal and execute arbitrary code on a glusterfs server node.... Read more

    • Published: Sep. 04, 2018
    • Modified: Nov. 21, 2024
  • 8.1

    HIGH
    CVE-2018-10925

    It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could expl... Read more

    Affected Products : ubuntu_linux debian_linux postgresql
    • Published: Aug. 09, 2018
    • Modified: Nov. 21, 2024
  • 6.8

    MEDIUM
    CVE-2018-10924

    It was discovered that fsync(2) system call in glusterfs client code leaks memory. An authenticated attacker could use this flaw to launch a denial of service attack by making gluster clients consume memory of the host machine.... Read more

    Affected Products : glusterfs
    • Published: Sep. 04, 2018
    • Modified: Nov. 21, 2024
  • 8.1

    HIGH
    CVE-2018-10923

    It was found that the "mknod" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server... Read more

    • Published: Sep. 04, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-10922

    An input validation flaw exists in ttembed. With a crafted input file, an attacker may be able to trigger a denial of service condition due to ttembed trusting attacker controlled values.... Read more

    Affected Products : ttembed
    • Published: Aug. 02, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-10921

    Certain input files may trigger an integer overflow in ttembed input file processing. This overflow could potentially lead to corruption of the input file due to a lack of checking return codes of fgetc/fputc function calls.... Read more

    Affected Products : ttembed
    • Published: Aug. 02, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2018-10920

    Improper input validation bug in DNS resolver component of Knot Resolver before 2.4.1 allows remote attacker to poison cache.... Read more

    Affected Products : knot_resolver
    • Published: Aug. 02, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 294068 Results