Latest CVE Feed
-
8.8
HIGHCVE-2018-1000093
CryptoNote version version 0.8.9 and possibly later contain a local RPC server which does not require authentication, as a result the walletd and the simplewallet RPC daemons will process any commands sent to them, resulting in remote command execution an... Read more
Affected Products : cryptonote- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-1000092
CMS Made Simple version versions 2.2.5 contains a Cross ite Request Forgery (CSRF) vulnerability in Admin profile page that can result in Details can be found here http://dev.cmsmadesimple.org/bug/view/11715. This attack appear to be exploitable via A spe... Read more
Affected Products : cms_made_simple- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-1000091
KadNode version version 2.2.0 contains a Buffer Overflow vulnerability in Arguments when starting up the binary that can result in Control of program execution flow, leading to remote code execution.... Read more
Affected Products : kadnode- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2018-1000090
textpattern version version 4.6.2 contains a XML Injection vulnerability in Import XML feature that can result in Denial of service in context to the web server by exhausting server memory resources. This attack appear to be exploitable via Uploading a sp... Read more
Affected Products : textpattern- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
7.4
HIGHCVE-2018-1000089
Anymail django-anymail version version 0.2 through 1.3 contains a CWE-532, CWE-209 vulnerability in WEBHOOK_AUTHORIZATION setting value that can result in An attacker with access to error logs could fabricate email tracking events. This attack appear to b... Read more
Affected Products : django-anymail- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2018-1000088
Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will ... Read more
Affected Products : doorkeeper- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
4.8
MEDIUMCVE-2018-1000087
WolfCMS version version 0.8.3.1 contains a Reflected Cross Site Scripting vulnerability in "Create New File" and "Create New Directory" input box from 'files' Tab that can result in Session Hijacking, Spread Worms,Control the browser remotely. . This atta... Read more
Affected Products : wolf_cms- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-1000086
NPR Visuals Team Pym.js version versions 0.4.2 up to 1.3.1 contains a Cross ite Request Forgery (CSRF) vulnerability in Pym.js _onNavigateToMessage function. https://github.com/nprapps/pym.js/blob/master/src/pym.js#L573 that can result in Arbitrary javasc... Read more
Affected Products : pym.js- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2018-1000085
ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victi... Read more
- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2018-1000084
WOlfCMS WolfCMS version version 0.8.3.1 contains a Stored Cross-Site Scripting vulnerability in Layout Name (from Layout tab) that can result in low privilege user can steal the cookie of admin user and compromise the admin account. This attack appear to ... Read more
Affected Products : wolf_cms- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2018-1000083
Ajenti version version 2 contains a Improper Error Handling vulnerability in Login JSON request that can result in The requisition leaks a path of the server. This attack appear to be exploitable via By sending a malformed JSON, the tool responds with a t... Read more
Affected Products : ajenti- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-1000082
Ajenti version version 2 contains a Cross ite Request Forgery (CSRF) vulnerability in the command execution panel of the tool used to manage the server. that can result in Code execution on the server . This attack appear to be exploitable via Being a CSR... Read more
Affected Products : ajenti- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2018-1000081
Ajenti version version 2 contains a Input Validation vulnerability in ID string on Get-values POST request that can result in Server Crashing. This attack appear to be exploitable via An attacker can freeze te server by sending a giant string to the ID pa... Read more
Affected Products : ajenti- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-1000080
Ajenti version version 2 contains a Insecure Permissions vulnerability in Plugins download that can result in The download of any plugins as being a normal user. This attack appear to be exploitable via By knowing how the requisition is made, and sending ... Read more
Affected Products : ajenti- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2018-1000079
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in gem installation... Read more
- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2018-1000078
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Cross Site Scripting (XSS) vulnerability in gem serve... Read more
- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2018-1000077
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Input Validation vulnerability in ruby gems ... Read more
- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2018-1000076
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Verification of Cryptographic Signature vuln... Read more
- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2018-1000075
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a infinite loop caused by negative size vulnerability i... Read more
- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2018-1000074
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in ow... Read more
- Published: Mar. 13, 2018
- Modified: Nov. 21, 2024