aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDataset
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

Browse All

All tracked items across vulnerabilities, news, research, incidents, and regulatory updates.

to
Export CSV
3438 items

CVE-2018-3824: X-Pack Machine Learning versions before 6.2.4 and 5.6.9 had a cross-site scripting (XSS) vulnerability. If an attacker i

mediumvulnerability
security
Sep 19, 2018
CVE-2018-3824

X-Pack Machine Learning (a tool for automated data analysis in Elasticsearch) versions before 6.2.4 and 5.6.9 contained a cross-site scripting vulnerability (XSS, a flaw where attackers inject malicious code into web pages). An attacker could inject harmful data into a database index being analyzed by the machine learning tool, and when another user views the results, the attacker could steal sensitive information or perform actions as that user.

Fix: Update X-Pack Machine Learning to version 6.2.4 or 5.6.9 or later.

NVD/CVE Database

CVE-2018-3823: X-Pack Machine Learning versions before 6.2.4 and 5.6.9 had a cross-site scripting (XSS) vulnerability. Users with manag

mediumvulnerability
security
Sep 19, 2018
CVE-2018-3823

X-Pack Machine Learning (a tool for building predictive models in Elastic) versions before 6.2.4 and 5.6.9 contained a cross-site scripting vulnerability (XSS, where attackers inject malicious code that runs in users' browsers). Users with manage_ml permissions could hide malicious data in job configurations that would execute when other users viewed the results, allowing attackers to steal sensitive information or perform harmful actions on behalf of those users.

CVE-2018-6975: The AirWatch Agent for iOS prior to 5.8.1 contains a data protection vulnerability whereby the files and keychain entrie

infovulnerability
security
Sep 11, 2018
CVE-2018-6975

AirWatch Agent for iOS versions before 5.8.1 have a data protection vulnerability where files and keychain entries (secure storage for sensitive data like passwords) are not encrypted, leaving them exposed to unauthorized access. This means an attacker with access to a device could potentially read sensitive information stored by the app.

CVE-2017-2627: A flaw was found in openstack-tripleo-common as shipped with Red Hat Openstack Enterprise 10 and 11. The sudoers file as

infovulnerability
security
Aug 22, 2018
CVE-2017-2627

CVE-2017-2627 is a security flaw in Red Hat OpenStack Enterprise 10 and 11 where the sudoers file (a configuration file that controls who can run privileged commands) is too permissive. It allows directory traversal attacks (bypassing folder restrictions using '..' to access unauthorized directories) for the mistral user and grants full passwordless root access to the validations user, creating serious security risks.

CVE-2018-13435: An issue was discovered in the LINE jp.naver.line application 8.8.0 for iOS. The Passcode feature allows authentication

infovulnerability
security
Aug 16, 2018
CVE-2018-13435

CVE-2018-13435 is a vulnerability in LINE version 8.8.0 for iOS where the Passcode feature (a security lock using a numeric code) can be bypassed through runtime manipulation (changing how the app behaves while it's running), allowing someone to disable passcode authentication. However, the vendor has stated this is not a realistic concern for their security model since it only affects jailbroken iOS devices (phones where the operating system's protections have been intentionally removed).

CVE-2018-13434: An issue was discovered in the LINE jp.naver.line application 8.8.0 for iOS. The LAContext class for Biometric (TouchID)

infovulnerability
security
Aug 16, 2018
CVE-2018-13434

The LINE app version 8.8.0 for iOS had a flaw in how it checked fingerprints for login. An attacker could bypass fingerprint authentication (authentication bypass, where someone gains access without proper verification) by tricking the system into accepting any fingerprint, because the app didn't use proper security protections. However, the LINE company stated this flaw only matters on jailbroken iPhones (devices where the iOS security system has been compromised), which they don't consider a serious threat.

CVE-2017-7464: It was found that the JAXP implementation used in JBoss EAP 7.0 for SAX and DOM parsing is vulnerable to certain XXE fla

infovulnerability
security
Jul 27, 2018
CVE-2017-7464

CVE-2017-7464 is a vulnerability in JBoss EAP 7.0's XML parsing component that allows attackers to exploit XXE flaws (XXE is XML External Entity injection, a technique where malicious XML input tricks a parser into revealing sensitive data or accessing internal systems). An attacker who can provide XML content for the system to parse could cause denial of service (making the system unavailable), SSRF (server-side request forgery, where the server is tricked into making requests to unintended targets), or leak sensitive information.

CVE-2018-13555: The mintToken function of a smart contract implementation for JaxBox, an Ethereum token, has an integer overflow that al

infovulnerability
security
Jul 9, 2018
CVE-2018-13555

CVE-2018-13555 is an integer overflow (a bug where a number gets too large and wraps around to an incorrect value) in the mintToken function of JaxBox, an Ethereum token smart contract (a self-executing program on the blockchain). This vulnerability allows the contract owner to arbitrarily change any user's account balance to any value they want.

CVE-2018-13108: All ADB broadband gateways / routers based on the Epicentro platform are affected by a local root jailbreak vulnerabilit

infovulnerability
security
Jul 6, 2018
CVE-2018-13108

CVE-2018-13108 is a local root jailbreak vulnerability (a flaw that lets attackers gain the highest level of system access) affecting all ADB broadband gateways and routers using the Epicentro platform. Attackers exploiting this vulnerability can extract sensitive data like VoIP credentials (phone service login information) or launch attacks against the ISP's internal network.

CVE-2017-7465: It was found that the JAXP implementation used in JBoss EAP 7.0 for XSLT processing is vulnerable to code injection. An

infovulnerability
security
Jun 27, 2018
CVE-2017-7465

CVE-2017-7465 is a code injection vulnerability in JBoss EAP 7.0's XSLT processing (a language for transforming XML documents). An attacker who can provide XSLT content for the system to process could execute arbitrary code (run commands they shouldn't be able to run) on the affected server.

CVE-2018-12271: An issue was discovered in the com.getdropbox.Dropbox app 100.2 for iOS. The LAContext class for Biometric (TouchID) val

infovulnerability
security
Jun 13, 2018
CVE-2018-12271

A security flaw in Dropbox version 100.2 for iOS allows attackers to bypass fingerprint authentication (TouchID, which uses biometric scanning) by manipulating the authentication system to always return 'true' rather than actually verifying the user's fingerprint. The vulnerability exists because the app doesn't use proper protection mechanisms to ensure the fingerprint validation is genuine, though Dropbox stated this is not a concern for their security model since it only affects jailbroken devices (iPhones that have been modified to remove Apple's security restrictions).

CVE-2018-6968: The VMware AirWatch Agent for Android prior to 8.2 and AirWatch Agent for Windows Mobile prior to 6.5.2 contain a remote

infovulnerability
security
Jun 11, 2018
CVE-2018-6968

CVE-2018-6968 is a remote code execution vulnerability (where an attacker can run malicious code on a system they don't own) in VMware AirWatch Agent for Android before version 8.2 and Windows Mobile before version 6.5.2. A malicious administrator could exploit the File Manager feature to create and run unauthorized files in the app's sandbox (an isolated storage area) and publicly accessible directories like SD cards.

CVE-2018-2799: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported vers

mediumvulnerability
security
Apr 19, 2018
CVE-2018-2799

A vulnerability in Oracle Java SE's JAXP (XML processing library) component allows an unauthenticated attacker with network access to partially disrupt Java services, affecting multiple Java versions including 7u171, 8u162, 10, and others. The flaw can be exploited through web applications, Java applets, or by sending malicious data directly to affected APIs, with a CVSS score (a 0-10 rating of how severe a vulnerability is) of 5.3 indicating moderate severity.

CVE-2018-5314: Command injection vulnerability in Citrix NetScaler ADC and NetScaler Gateway 11.0 before build 70.16, 11.1 before build

infovulnerability
security
Mar 1, 2018
CVE-2018-5314

CVE-2018-5314 is a command injection vulnerability (a security flaw where an attacker can run unauthorized system commands) in Citrix NetScaler ADC and NetScaler Gateway versions 11.0, 11.1, and 12.0, as well as certain NetScaler Load Balancing instances. Remote attackers can exploit this vulnerability through an SSH login prompt to execute system commands or read files they shouldn't have access to.

CVE-2017-14868: Restlet Framework before 2.3.11, when using SimpleXMLProvider, allows remote attackers to access arbitrary files via an

infovulnerability
security
Nov 30, 2017
CVE-2017-14868

CVE-2017-14868 is a vulnerability in Restlet Framework versions before 2.3.11 that allows attackers to read any file from a server using an XXE attack (XML external entity injection, where an attacker tricks the system into loading files from the server by embedding malicious XML code) when the SimpleXMLProvider component is used in REST API requests. This affects applications using the Jax-rs extension of the framework.

CVE-2017-5719: A vulnerability in the Intel Deep Learning Training Tool Beta 1 allows a network attacker to remotely execute code as a

highvulnerability
security
Nov 21, 2017
CVE-2017-5719

CVE-2017-5719 is a vulnerability in Intel Deep Learning Training Tool Beta 1 that allows a network attacker to remotely execute code (run commands on a system without authorization) as a local user. The vulnerability has a CVSS score (a 0-10 rating of how severe a vulnerability is) of 4.0. The specific weakness type could not be determined from available information.

CVE-2017-12624: Apache CXF supports sending and receiving attachments via either the JAX-WS or JAX-RS specifications. It is possible to

infovulnerability
security
Nov 14, 2017
CVE-2017-12624

Apache CXF (a framework for building web services) has a vulnerability where specially crafted message attachment headers can crash or disable a web service through a DoS attack (denial of service, temporarily making a service unavailable). This affects both JAX-WS and JAX-RS (two different specifications for web services) that use CXF.

CVE-2017-11177: TRITON AP-EMAIL 8.2 before 8.2 IB does not properly restrict file access in an unspecified directory.

infovulnerability
security
Nov 6, 2017
CVE-2017-11177

TRITON AP-EMAIL version 8.2 before 8.2 IB has a security flaw where it does not properly restrict file access in an unspecified directory, meaning unauthorized users might be able to read or access files they shouldn't be able to. The vulnerability is caused by improper input validation (failure to check that incoming data is safe before using it).

CVE-2017-10350: Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAX-WS). Supported versions th

mediumvulnerability
security
Oct 19, 2017
CVE-2017-10350

A vulnerability in JAX-WS (a Java component for web services) affects Java SE versions 7u151, 8u144, and 9, allowing an attacker on the network to partially disable the service without needing to log in. This mainly impacts users running untrusted Java applications downloaded from the internet in sandboxed environments (isolated, restricted execution spaces), not servers running trusted administrator-installed code, with a severity rating of 5.3 out of 10.

CVE-2017-10349: Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that

mediumvulnerability
security
Oct 19, 2017
CVE-2017-10349

A vulnerability in Oracle Java SE's JAXP component (a tool for processing XML, a common data format) allows attackers to partially disable Java programs over the network without needing to log in. This mainly affects Java applications running in sandboxes (isolated environments) that execute untrusted code from the internet, and does not affect servers running only trusted code.

Previous165 / 172Next

Fix: Update X-Pack Machine Learning to version 6.2.4 or 5.6.9 or later. The source references a security update at https://discuss.elastic.co/t/elastic-stack-6-2-4-and-5-6-9-security-update/128422.

NVD/CVE Database

Fix: Update AirWatch Agent for iOS to version 5.8.1 or later.

NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database

Fix: Set the FEATURE_SECURE_PROCESSING feature to 'true' in the javax.xml.transform.TransformerFactory (the component that processes XSLT transformations) to mitigate this vulnerability.

NVD/CVE Database
NVD/CVE Database

Fix: Update VMware AirWatch Agent for Android to version 8.2 or later, and AirWatch Agent for Windows Mobile to version 6.5.2 or later.

NVD/CVE Database
NVD/CVE Database
NVD/CVE Database

Fix: Update Restlet Framework to version 2.3.11 or later.

NVD/CVE Database
NVD/CVE Database

Fix: From Apache CXF version 3.2.1 and 3.1.14 onwards, message attachment headers larger than 300 characters are rejected by default. This limit can be adjusted using the configuration property 'attachment-max-header-size'.

NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database