CVE-2018-2637 – OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998)
https://notcve.org/view.php?id=CVE-2018-2637
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. • http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.securityfocus.com/bid/102576 http://www.securitytracker.com/id/1040203 https://access.redhat.com/errata/RHSA-2018:0095 https://access.redhat.com/errata/RHSA-2018:0099 https://access.redhat.com/errata/RHSA-2018:0100 https://access.redhat.com/errata/RHSA-2018:0115 https://access.redhat.com/errata/RHSA-2018:0349 https://access.redhat.com/errata/RHSA-2018:0351 https://access.redhat.com/errata/ • CWE-502: Deserialization of Untrusted Data •
CVE-2017-9965
https://notcve.org/view.php?id=CVE-2017-9965
An exposure of sensitive information vulnerability exists in Schneider Electric's Pelco VideoXpert Enterprise versions 2.0 and prior. Using a directory traversal attack, an unauthorized person can view web server files. Existe una vulnerabilidad de exposición de información sensible en Schneider Electric's Pelco VideoXpert Enterprise, en versiones 2.0 y anteriores. Mediante un ataque de salto de directorio, una persona sin autorización podría ver archivos del servidor web. • http://www.securityfocus.com/bid/102338 https://ics-cert.us-cert.gov/advisories/ICSA-17-355-02 https://www.schneider-electric.com/en/download/document/SEVD-2017-339-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2017-9966
https://notcve.org/view.php?id=CVE-2017-9966
A privilege escalation vulnerability exists in Schneider Electric's Pelco VideoXpert Enterprise versions 2.0 and prior. By replacing certain files, an unauthorized user can obtain system privileges and the inserted code would execute at an elevated privilege level. Existe una vulnerabilidad de escalado de privilegios en Schneider Electric's Pelco VideoXpert Enterprise, en versiones 2.0 y anteriores. Al reemplazar ciertos archivos, un usuario no autorizado podría obtener privilegios del sistema; por lo tanto, el código insertado se ejecutaría a un nivel de privilegios elevado. • http://www.securityfocus.com/bid/102338 https://ics-cert.us-cert.gov/advisories/ICSA-17-355-02 https://www.schneider-electric.com/en/download/document/SEVD-2017-339-01 •
CVE-2017-9964
https://notcve.org/view.php?id=CVE-2017-9964
A Path Traversal issue was discovered in Schneider Electric Pelco VideoXpert Enterprise all versions prior to 2.1. By sniffing communications, an unauthorized person can execute a directory traversal attack resulting in authentication bypass or session hijack. Se descubrió un problema de salto de directorio en todas las versiones anteriores a la 2.1 de Schneider Electric Pelco VideoXpert Enterprise. Al rastrear las comunicaciones, una persona no autorizada puede ejecutar un ataque de salto de directorio, resultando en una omisión de autenticación o de secuestro de sesión. • http://www.securityfocus.com/bid/102338 https://ics-cert.us-cert.gov/advisories/ICSA-17-355-02 https://www.schneider-electric.com/en/download/document/SEVD-2017-339-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2017-14024
https://notcve.org/view.php?id=CVE-2017-14024
A Stack-based Buffer Overflow issue was discovered in Schneider Electric InduSoft Web Studio v8.0 SP2 Patch 1 and prior versions, and InTouch Machine Edition v8.0 SP2 Patch 1 and prior versions. The stack-based buffer overflow vulnerability has been identified, which may allow remote code execution with high privileges. Se descubrió un problema de desbordamiento de búfer basado en pila en Schneider Electric InduSoft Web Studio v8.0 SP2 Patch 1 o anterior y en InTouch Machine Edition v8.0 SP2 Patch 1 o anterior. La vulnerabilidad de desbordamiento de búfer basado en pila ha sido identificada. Podría permitir la ejecución remota de código con altos privilegios. • http://www.securityfocus.com/bid/101779 https://ics-cert.us-cert.gov/advisories/ICSA-17-313-02 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •