Show filters
287 Total Results
Displaying 51-60 of 287
Sort by:
Attacker Value
Unknown

CVE-2018-10664

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
An issue was discovered in the httpd process in multiple models of Axis IP Cameras. There is Memory Corruption.
0
Attacker Value
Unknown

CVE-2018-10662

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
An issue was discovered in multiple models of Axis IP Cameras. There is an Exposed Insecure Interface.
0
Attacker Value
Unknown

CVE-2017-7658

Disclosure Date: June 26, 2018 (last updated November 08, 2023)
In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.
Attacker Value
Unknown

CVE-2017-7657

Disclosure Date: June 26, 2018 (last updated November 08, 2023)
In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.
Attacker Value
Unknown

CVE-2018-1000180

Disclosure Date: June 05, 2018 (last updated November 08, 2023)
Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later.
0
Attacker Value
Unknown

CVE-2013-3023

Disclosure Date: May 24, 2018 (last updated November 26, 2024)
IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 might allow remote attackers to obtain sensitive information about Tomcat credentials by sniffing the network for a session in which HTTP is used. IBM X-Force ID: 84361.
0
Attacker Value
Unknown

CVE-2013-4040

Disclosure Date: May 01, 2018 (last updated November 26, 2024)
IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2.x before 7.2.1.5 and 7.2.x before 7.2.2.0 on Unix use weak permissions (755) for unspecified configuration and log files, which allows local users to obtain sensitive information by reading the files. IBM X-Force ID: 86176.
0
Attacker Value
Unknown

CVE-2015-5016

Disclosure Date: March 27, 2018 (last updated November 26, 2024)
IBM Maximo Asset Management 7.1, 7.5, and 7.6; Maximo Asset Management Essentials 7.1 and 7.5; Control Desk 7.5 and 7.6; Tivoli Asset Management for IT 7.1 and 7.2; and certain other IBM products allow remote authenticated users to bypass intended access restrictions and read arbitrary ticket worklog entries via unspecified vectors. IBM X-Force ID: 106460.
0
Attacker Value
Unknown

CVE-2017-15719

Disclosure Date: March 12, 2018 (last updated November 26, 2024)
In Wicket jQuery UI 6.28.0 and earlier, 7.9.1 and earlier, and 8.0.0-M8 and earlier, a security issue has been discovered in the WYSIWYG editor that allows an attacker to submit arbitrary JS code to WYSIWYG editor.
0
Attacker Value
Unknown

CVE-2017-9663

Disclosure Date: January 09, 2018 (last updated November 26, 2024)
An Cleartext Storage of Sensitive Information issue was discovered in General Motors (GM) and Shanghai OnStar (SOS) SOS iOS Client 7.1. Successful exploitation of this vulnerability may allow a remote attacker to access an encryption key that is stored in cleartext in memory.
0