[{"identifier":"59815","title":"SQLite FTS5 Prefix Queries Heap-based Buffer Over-Read Vulnerability","version":"1","firstPublished":"2019-03-22T21:12:29.560+0000","lastPublished":"2019-03-22T21:12:29.560+0000","workflowStatus":null,"id":6,"name":"Vulnerability Alert","url":"https://tools.cisco.com/security/center/viewAlert.x?alertId=59815","status":"New","summary":"A vulnerability in SQLite could allow an authenticated, remote attacker to access sensitive information on a targeted system.The vulnerability is due to a heap-based buffer over-read condition that could occur in the affected software when the FTS5 extension is enabled. An attacker could exploit this vulnerability by executing prefix queries within a transaction that submit malicious input to the targeted system. A successful exploit could trigger a heap-based buffer over-read condition, which could allow the attacker to access sensitive information on the targeted system.Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available.SQLite has confirmed the vulnerability and released software updates.","totalCount":58260,"relatedResource":[]},{"identifier":"cisco-sa-20190109-ise-passwd","title":"Cisco Identity Services Engine Password Recovery Vulnerability","version":"1.1","firstPublished":"2019-01-09T16:00:00.000+0000","lastPublished":"2019-03-22T19:43:06.563+0000","workflowStatus":null,"id":1,"name":"Cisco Security Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-ise-passwd","status":"Updated","summary":"A vulnerability in the Admin Portal of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to view saved passwords in plain text.The vulnerability is due to the incorrect inclusion of saved passwords when loading configuration pages in the Admin Portal. An attacker with read or write access to the Admin Portal could exploit this vulnerability by browsing to a page that contains sensitive data. An exploit could allow the attacker to recover passwords for unauthorized use and expose those accounts to further attack.There are no workarounds that address this vulnerability.This advisory is available at the following link:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-ise-passwd","totalCount":58260,"relatedResource":[]},{"identifier":"59812","title":"Artifex Software Ghostscript superexec -dSAFER Security Bypass Vulnerability","version":"1","firstPublished":"2019-03-22T19:32:50.690+0000","lastPublished":"2019-03-22T19:32:50.690+0000","workflowStatus":null,"id":6,"name":"Vulnerability Alert","url":"https://tools.cisco.com/security/center/viewAlert.x?alertId=59812","status":"New","summary":"A vulnerability in Artifex Software Ghostscript could allow an unauthenticated, remote attacker to bypass security restrictions on a targeted system.The vulnerability exists because the superexec operator is available in the internal dictionary of the affected software. An attacker could exploit this vulnerability by persuading a user to open a crafted PostScript file that submits malicious input to the targeted system. A successful exploit could allow the attacker to bypass the -dSAFER protection in affected application, which could allow the attacker to access sensitive information or execute arbitrary code on the targeted system.Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available.Artifex Software has confirmed the vulnerability and released software updates.","totalCount":58260,"relatedResource":[]},{"identifier":"59813","title":"Artifex Software Ghostscript DefineResource dSAFER Security Bypass Vulnerability","version":"1","firstPublished":"2019-03-22T19:32:49.307+0000","lastPublished":"2019-03-22T19:32:49.307+0000","workflowStatus":null,"id":6,"name":"Vulnerability Alert","url":"https://tools.cisco.com/security/center/viewAlert.x?alertId=59813","status":"New","summary":"A vulnerability in Artifex Software Ghostscript could allow an unauthenticated, remote attacker to bypass security restrictions on a targeted system.The vulnerability exists because the forceput operator could be extracted from the DefineResource method of the affected software. An attacker could exploit this vulnerability by persuading a user to open a crafted PostScript file that submits malicious input to the targeted system. A successful exploit could allow the attacker to bypass the -dSAFER protection in the affected application, which could allow the attacker to access sensitive information or execute arbitrary code on the targeted system.Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available.Artifex Software has confirmed the vulnerability and released software updates.","totalCount":58260,"relatedResource":[]},{"identifier":"59814","title":"Moodle edit_blog.php Server-Side Request Forgery Vulnerability","version":"1","firstPublished":"2019-03-22T19:32:47.963+0000","lastPublished":"2019-03-22T19:32:47.963+0000","workflowStatus":null,"id":6,"name":"Vulnerability Alert","url":"https://tools.cisco.com/security/center/viewAlert.x?alertId=59814","status":"New","summary":"A vulnerability in the edit_blog.php script of Moodle could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on a targeted system.The vulnerability is due to an input validation flaw in the edit_blog.php script when GET requests are performed. An attacker could exploit this vulnerabilityby supplying crafted GET requests, including parameters, to the targeted system. A successful exploit could allow the attacker to conduct an SSRF attack and execute remote codeon the targeted system.Moodle has not confirmed this vulnerability and updates are not available.","totalCount":58260,"relatedResource":[]},{"identifier":"cisco-sa-20190320-ip-phone-csrf","title":"Cisco IP Phone 8800 Series Cross-Site Request Forgery Vulnerability","version":"1.1","firstPublished":"2019-03-20T16:00:00.000+0000","lastPublished":"2019-03-22T19:30:18.197+0000","workflowStatus":null,"id":1,"name":"Cisco Security Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-csrf","status":"Updated","summary":"A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack.The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is available at the following link:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-csrf","totalCount":58260,"relatedResource":[]},{"identifier":"cisco-sa-20190320-ipptv","title":"Cisco IP Phone 8800 Series Path Traversal Vulnerability","version":"1.1","firstPublished":"2019-03-20T16:00:00.000+0000","lastPublished":"2019-03-22T19:30:17.710+0000","workflowStatus":null,"id":1,"name":"Cisco Security Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipptv","status":"Updated","summary":"A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an authenticated, remote attacker to write arbitrary files to the filesystem.The vulnerability is due to insufficient input validation and file-level permissions. An attacker could exploit this vulnerability by uploading invalid files to an affected device. A successful exploit could allow the attacker to write files in arbitrary locations on the filesystem.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is available at the following link:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipptv","totalCount":58260,"relatedResource":[]},{"identifier":"cisco-sa-20190320-ipab","title":"Cisco IP Phone 8800 Series Authorization Bypass Vulnerability","version":"1.1","firstPublished":"2019-03-20T16:00:00.000+0000","lastPublished":"2019-03-22T19:30:17.207+0000","workflowStatus":null,"id":1,"name":"Cisco Security Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipab","status":"Updated","summary":"A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition.The vulnerability exists because the software fails to sanitize URLs before it handles requests. An attacker could exploit this vulnerability by submitting a crafted URL. A successful exploit could allow the attacker to gain unauthorized access to critical services and cause a DoS condition.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is available at the following link:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipab","totalCount":58260,"relatedResource":[]},{"identifier":"cisco-sa-20190320-ipfudos","title":"Cisco IP Phone 8800 Series File Upload Denial of Service Vulnerability","version":"1.1","firstPublished":"2019-03-20T16:00:00.000+0000","lastPublished":"2019-03-22T19:30:16.700+0000","workflowStatus":null,"id":1,"name":"Cisco Security Advisory","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipfudos","status":"Updated","summary":"A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition.The vulnerability exists because the affected software does not restrict the maximum size of certain files that can be written to disk. An attacker who has valid administrator credentials for an affected system could exploit this vulnerability by sending a crafted, remote connection request to an affected system. A successful exploit could allow the attacker to write a file that consumes most of the available disk space on the system, causing application functions to operate abnormally and leading to a DoS condition.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is available at the following link:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipfudos","totalCount":58260,"relatedResource":[]},{"identifier":"59811","title":"Tuxera NTFS-3G Heap-based Buffer Overflow Privilege Escalation Vulnerability","version":"1","firstPublished":"2019-03-22T19:02:56.773+0000","lastPublished":"2019-03-22T19:02:56.773+0000","workflowStatus":null,"id":6,"name":"Vulnerability Alert","url":"https://tools.cisco.com/security/center/viewAlert.x?alertId=59811","status":"New","summary":"A vulnerability in Tuxera NTFS-3G could allow a local attacker to gain elevated privileges on a targeted system.The vulnerability is due to insufficient size checks by the affected software because the getcwd() function uses an unsigned integer argument. An attacker could exploit this vulnerability by executing an application that submits malicious input to the targeted system. A successful exploit could trigger a heap-based buffer overflow condition that the attacker could use to gain elevated privileges. Tuxera has confirmed the vulnerability and released software updates.","totalCount":58260,"relatedResource":[]}]