All tracked items across vulnerabilities, news, research, incidents, and regulatory updates.
X-Pack Machine Learning (a tool for automated data analysis in Elasticsearch) versions before 6.2.4 and 5.6.9 contained a cross-site scripting vulnerability (XSS, a flaw where attackers inject malicious code into web pages). An attacker could inject harmful data into a database index being analyzed by the machine learning tool, and when another user views the results, the attacker could steal sensitive information or perform actions as that user.
Fix: Update X-Pack Machine Learning to version 6.2.4 or 5.6.9 or later.
NVD/CVE DatabaseX-Pack Machine Learning (a tool for building predictive models in Elastic) versions before 6.2.4 and 5.6.9 contained a cross-site scripting vulnerability (XSS, where attackers inject malicious code that runs in users' browsers). Users with manage_ml permissions could hide malicious data in job configurations that would execute when other users viewed the results, allowing attackers to steal sensitive information or perform harmful actions on behalf of those users.
AirWatch Agent for iOS versions before 5.8.1 have a data protection vulnerability where files and keychain entries (secure storage for sensitive data like passwords) are not encrypted, leaving them exposed to unauthorized access. This means an attacker with access to a device could potentially read sensitive information stored by the app.
CVE-2017-2627 is a security flaw in Red Hat OpenStack Enterprise 10 and 11 where the sudoers file (a configuration file that controls who can run privileged commands) is too permissive. It allows directory traversal attacks (bypassing folder restrictions using '..' to access unauthorized directories) for the mistral user and grants full passwordless root access to the validations user, creating serious security risks.
CVE-2018-13435 is a vulnerability in LINE version 8.8.0 for iOS where the Passcode feature (a security lock using a numeric code) can be bypassed through runtime manipulation (changing how the app behaves while it's running), allowing someone to disable passcode authentication. However, the vendor has stated this is not a realistic concern for their security model since it only affects jailbroken iOS devices (phones where the operating system's protections have been intentionally removed).
The LINE app version 8.8.0 for iOS had a flaw in how it checked fingerprints for login. An attacker could bypass fingerprint authentication (authentication bypass, where someone gains access without proper verification) by tricking the system into accepting any fingerprint, because the app didn't use proper security protections. However, the LINE company stated this flaw only matters on jailbroken iPhones (devices where the iOS security system has been compromised), which they don't consider a serious threat.
CVE-2017-7464 is a vulnerability in JBoss EAP 7.0's XML parsing component that allows attackers to exploit XXE flaws (XXE is XML External Entity injection, a technique where malicious XML input tricks a parser into revealing sensitive data or accessing internal systems). An attacker who can provide XML content for the system to parse could cause denial of service (making the system unavailable), SSRF (server-side request forgery, where the server is tricked into making requests to unintended targets), or leak sensitive information.
CVE-2018-13555 is an integer overflow (a bug where a number gets too large and wraps around to an incorrect value) in the mintToken function of JaxBox, an Ethereum token smart contract (a self-executing program on the blockchain). This vulnerability allows the contract owner to arbitrarily change any user's account balance to any value they want.
CVE-2018-13108 is a local root jailbreak vulnerability (a flaw that lets attackers gain the highest level of system access) affecting all ADB broadband gateways and routers using the Epicentro platform. Attackers exploiting this vulnerability can extract sensitive data like VoIP credentials (phone service login information) or launch attacks against the ISP's internal network.
CVE-2017-7465 is a code injection vulnerability in JBoss EAP 7.0's XSLT processing (a language for transforming XML documents). An attacker who can provide XSLT content for the system to process could execute arbitrary code (run commands they shouldn't be able to run) on the affected server.
A security flaw in Dropbox version 100.2 for iOS allows attackers to bypass fingerprint authentication (TouchID, which uses biometric scanning) by manipulating the authentication system to always return 'true' rather than actually verifying the user's fingerprint. The vulnerability exists because the app doesn't use proper protection mechanisms to ensure the fingerprint validation is genuine, though Dropbox stated this is not a concern for their security model since it only affects jailbroken devices (iPhones that have been modified to remove Apple's security restrictions).
CVE-2018-6968 is a remote code execution vulnerability (where an attacker can run malicious code on a system they don't own) in VMware AirWatch Agent for Android before version 8.2 and Windows Mobile before version 6.5.2. A malicious administrator could exploit the File Manager feature to create and run unauthorized files in the app's sandbox (an isolated storage area) and publicly accessible directories like SD cards.
A vulnerability in Oracle Java SE's JAXP (XML processing library) component allows an unauthenticated attacker with network access to partially disrupt Java services, affecting multiple Java versions including 7u171, 8u162, 10, and others. The flaw can be exploited through web applications, Java applets, or by sending malicious data directly to affected APIs, with a CVSS score (a 0-10 rating of how severe a vulnerability is) of 5.3 indicating moderate severity.
CVE-2018-5314 is a command injection vulnerability (a security flaw where an attacker can run unauthorized system commands) in Citrix NetScaler ADC and NetScaler Gateway versions 11.0, 11.1, and 12.0, as well as certain NetScaler Load Balancing instances. Remote attackers can exploit this vulnerability through an SSH login prompt to execute system commands or read files they shouldn't have access to.
CVE-2017-14868 is a vulnerability in Restlet Framework versions before 2.3.11 that allows attackers to read any file from a server using an XXE attack (XML external entity injection, where an attacker tricks the system into loading files from the server by embedding malicious XML code) when the SimpleXMLProvider component is used in REST API requests. This affects applications using the Jax-rs extension of the framework.
CVE-2017-5719 is a vulnerability in Intel Deep Learning Training Tool Beta 1 that allows a network attacker to remotely execute code (run commands on a system without authorization) as a local user. The vulnerability has a CVSS score (a 0-10 rating of how severe a vulnerability is) of 4.0. The specific weakness type could not be determined from available information.
Apache CXF (a framework for building web services) has a vulnerability where specially crafted message attachment headers can crash or disable a web service through a DoS attack (denial of service, temporarily making a service unavailable). This affects both JAX-WS and JAX-RS (two different specifications for web services) that use CXF.
TRITON AP-EMAIL version 8.2 before 8.2 IB has a security flaw where it does not properly restrict file access in an unspecified directory, meaning unauthorized users might be able to read or access files they shouldn't be able to. The vulnerability is caused by improper input validation (failure to check that incoming data is safe before using it).
A vulnerability in JAX-WS (a Java component for web services) affects Java SE versions 7u151, 8u144, and 9, allowing an attacker on the network to partially disable the service without needing to log in. This mainly impacts users running untrusted Java applications downloaded from the internet in sandboxed environments (isolated, restricted execution spaces), not servers running trusted administrator-installed code, with a severity rating of 5.3 out of 10.
A vulnerability in Oracle Java SE's JAXP component (a tool for processing XML, a common data format) allows attackers to partially disable Java programs over the network without needing to log in. This mainly affects Java applications running in sandboxes (isolated environments) that execute untrusted code from the internet, and does not affect servers running only trusted code.
Fix: Update X-Pack Machine Learning to version 6.2.4 or 5.6.9 or later. The source references a security update at https://discuss.elastic.co/t/elastic-stack-6-2-4-and-5-6-9-security-update/128422.
NVD/CVE DatabaseFix: Update AirWatch Agent for iOS to version 5.8.1 or later.
NVD/CVE DatabaseFix: Set the FEATURE_SECURE_PROCESSING feature to 'true' in the javax.xml.transform.TransformerFactory (the component that processes XSLT transformations) to mitigate this vulnerability.
NVD/CVE DatabaseFix: Update VMware AirWatch Agent for Android to version 8.2 or later, and AirWatch Agent for Windows Mobile to version 6.5.2 or later.
NVD/CVE DatabaseFix: Update Restlet Framework to version 2.3.11 or later.
NVD/CVE DatabaseFix: From Apache CXF version 3.2.1 and 3.1.14 onwards, message attachment headers larger than 300 characters are rejected by default. This limit can be adjusted using the configuration property 'attachment-max-header-size'.
NVD/CVE Database