Security vulnerabilities

Jira Server – Template injection in various resources – CVE-2019-11581

JIRA Security Advisory 2019-07-10

Summary CVE-2019-11581 – Template injection in various resources
Advisory Release Date

 10 AM PDT (Pacific Time, -7 hours)

Product Jira Server and Jira Data Center

Note: This includes Jira Software, Jira Core, and Jira Service Desk. Jira Cloud customers are not affected.

Versions listed are for Jira Core and Jira Software. Check the compatibility matrix to find the equivalent version for your Jira Service Desk version.

Affected Jira Server & Jira Data Center Versions

  • 4.4.x
  • 5.x.x
  • 6.x.x
  • 7.0.x
  • 7.1.x
  • 7.2.x
  • 7.3.x
  • 7.4.x
  • 7.5.x
  • 7.6.x before 7.6.14 (the fixed version for 7.6.x)
  • 7.7.x
  • 7.8.x
  • 7.9.x
  • 7.10.x
  • 7.11.x
  • 7.12.x
  • 7.13.x before 7.13.5 (the fixed version for 7.13.x)
  • 8.0.x before 8.0.3 (the fixed version for 8.0.x)
  • 8.1.x before 8.1.2 (the fixed version for 8.1.x)
  • 8.2.x before 8.2.3 (the fixed version for 8.2.x)

Fixed Jira Server & Jira Data Center Versions

  • 7.6.14
  • 7.13.5
  • 8.0.3
  • 8.1.2
  • 8.2.3
CVE ID(s) CVE-2019-11581

Summary of Vulnerability

This advisory discloses a critical severity security vulnerability which was introduced in version 4.4.0 of Jira Server & Jira Data Center. The following versions of Jira Server & Jira Data Center are affected by this vulnerability:

  • 4.4.x
  • 5.x.x
  • 6.x.x
  • 7.0.x
  • 7.1.x
  • 7.2.x
  • 7.3.x
  • 7.4.x
  • 7.5.x
  • 7.6.x before 7.6.14 (the fixed version for 7.6.x)
  • 7.7.x
  • 7.8.x
  • 7.9.x
  • 7.10.x
  • 7.11.x
  • 7.12.x
  • 7.13.x before 7.13.5 (the fixed version for 7.13.x)
  • 8.0.x before 8.0.3 (the fixed version for 8.0.x)
  • 8.1.x before 8.1.2 (the fixed version for 8.1.x), and
  • 8.2.x before 8.2.3 (the fixed version for 8.2.x).

Customers who have upgraded Jira Server & Jira Data Center to versions 7.6.14, 7.13.5, 8.0.3, 8.1.2, or 8.2.3 are not affected.

Customers using Jira Cloud are not affected.

Customers who have downloaded and installed Jira Server & Jira Data Center versions:

  • 4.4.x
  • 5.x.x
  • 6.x.x
  • 7.0.x
  • 7.1.x
  • 7.2.x
  • 7.3.x
  • 7.4.x
  • 7.5.x
  • 7.6.x before 7.6.14 (the fixed version for 7.6.x)
  • 7.7.x
  • 7.8.x
  • 7.9.x
  • 7.10.x
  • 7.11.x
  • 7.12.x
  • 7.13.x before 7.13.5 (the fixed version for 7.13.x)
  • 8.0.x before 8.0.3 (the fixed version for 8.0.x)
  • 8.1.x before 8.1.2 (the fixed version for 8.1.x), and
  • 8.2.x before 8.2.3 (the fixed version for 8.2.x)

Please upgrade your Jira Server & Jira Data Center installations immediately to fix this vulnerability.

If you have downloaded and installed Jira Service Desk from version 3.0.0 before 4.2.3, you may be affected.

The versions listed above are for Jira Software and Jira Core. Check the compatibility matrix to find the equivalent version for your Jira Service Desk version.

Template injection in various resources – CVE-2019-11581

Severity

Atlassian rates the severity level of this vulnerability as critical, according to the scale published in our Atlassian severity levels. The scale allows us to rank the severity as critical, high, moderate or low.

This is our assessment and you should evaluate its applicability to your own IT environment.

Description

There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. For this issue to be exploitable at least one of the following conditions must be met:

  • an SMTP server has been configured in Jira and the Contact Administrators Form is enabled; or
  • an SMTP server has been configured in Jira and an attacker has « JIRA Administrators » access.

In the first case, where the Contact Administrators Form is enabled, attackers are able to exploit this issue without authentication. In the second case, attackers with « JIRA Administrators » access can exploit this issue. In either case, successful exploitation of this issue allows an attacker to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center.

All versions of Jira Server and Data Center from 4.4.0 before 7.6.14 (the fixed version for 7.6.x), from 7.7.0 before 7.13.5 (the fixed version for 7.13.x), from 8.0.0 before 8.0.3 (the fixed version for 8.0.x), from 8.1.0 before 8.1.2 (the fixed version for 8.1.x), and from 8.2.0 before 8.2.3 are affected by this vulnerability. This issue can be tracked here:  JRASERVER-69532CVE-2019-11581 – Template injection in various resources Closed

Acknowledgements

We would like to acknowledge Daniil Dmitriev for finding this vulnerability.

Fix

We have released the following versions of Jira Server & Jira Data Center to address this issue:

What You Need to Do

Mitigation

If you are unable to upgrade Jira immediately, then as a temporary workaround, you can:

  1. Disable the Contact Administrators Form; and
  2. Block the /secure/admin/SendBulkMail!default.jspa endpoint from being accessed. This can be achieved by denying access in the reverse-proxy, load balancer, or Tomcat directly (see instructions).
    Note that blocking the SendBulkMail endpoint will prevent Jira Administrators from being able to send bulk emails to users.

After upgrading Jira, you can re-enable the Administrator Contact Form, and unblock the SendBulkMail endpoint.

Upgrading Jira

Atlassian recommends that you upgrade to the latest version. For a full description of the latest version of Jira Server & Jira Data Center, see the Release Notes. You can download the latest version of Jira Server & Jira Data Center from the Download Center.

Upgrade Jira Server & Jira Data Center to version of 8.2.3 or higher.

If you can’t upgrade to the latest version (8.2.3):

(1) If you have a current feature version (a feature version released on 10 December 2018 or later), upgrade to the next bugfix version of your current feature version.

If you have feature version… …then upgrade to this bugfix version:
8.0.x 8.0.3
8.1.x 8.1.2

(2) If you have a current Enterprise release version (an Enterprise release version released on 10th July 2017 or later), upgrade to the latest Enterprise release version (7.13.5).

Please note that the 7.6 Enterprise release will reach End of Life in November 2019. If you are unable to upgrade to the latest Enterprise release version (7.13.5), upgrade to 7.6.14.

If you have Enterprise release version… …then upgrade to this version:
7.6.x 7.13.5 (Recommended)

7.6.14

7.13.x 7.13.5

(3) If you have an older version (a feature version released before 10 December 2018, or an Enterprise release version released before 10th July 2017), either upgrade to the latest version, or to the latest Enterprise release version (7.13.5).

If you have older version… …then upgrade to any of these versions:
4.4.x

5.x.x

6.x.x

7.0.x

7.1.x

7.2.x

7.3.x

7.4.x

7.5.x

7.7.x

7.8.x

7.9.x

7.10.x

7.11.x

7.12.x

Current versions

8.0.3

8.1.2

8.2.3

Enterprise releases

7.6.14

7.13.5 (Recommended)

Support

If you did not receive an email for this advisory and you wish to receive such emails in the future go to https://my.atlassian.com/email and subscribe to Alerts emails.

If you have questions or concerns regarding this advisory, please raise a support request at https://support.atlassian.com/.

For guidance on determining whether your instance has been compromised, see Determining whether your Jira instance has been compromised by CVE-2019-11851.

References

Security Bug fix Policy As per our new policy critical security bug fixes will be back ported in accordance with https://www.atlassian.com/trust/security/bug-fix-policy. We will release new maintenance releases for the versions covered by the policy instead of binary patches.

Binary patches are no longer released. 

Severity Levels for security issues Atlassian security advisories include a severity level and a CVE identifier. This severity level is based on our self-calculated CVSS score for each specific vulnerability. CVSS is an industry standard vulnerability metric. You can also learn more about CVSS at FIRST.org.
End of Life Policy Our end of life policy varies for different products. Please refer to our EOL Policy for details.
Last modified on Jul 11, 2019

my-tracker_cpteJira Server – Template injection in various resources – CVE-2019-11581
read more

Cisco ASA and FTD Software Cryptographic TLS and SSL Driver Denial of Service Vulnerability

High
Advisory ID:
cisco-sa-20190710-asa-ftd-dos
First Published:
2019 July 10 16:00 GMT
Last Updated:
2019 July 11 21:11 GMT
Version 1.1:
Workarounds:
No workarounds available
Cisco Bug IDs:
CVSS Score:
CVE-2019-1873
CWE-400
my-tracker_cpteCisco ASA and FTD Software Cryptographic TLS and SSL Driver Denial of Service Vulnerability
read more

Knowledge Center – Browse All _ Security Advisories

Status Version ID Title Views Last Updated descending
Unread Published Published JSA10938 2019-07 Security Bulletin: Junos OS: EX4300 Series: Denial of Service upon receipt of large number of specific valid packets on management interface. (CVE-2019-0046) 26,348 5 days ago
Unread Published Published JSA10939 2019-07 Security Bulletin: Steel Belted Radius Carrier Edition: Multiple Vulnerabilities in NSPR, NSS and Bouncy Castle 20,164 5 days ago
Unread Published Published JSA10940 2019-07 Security Bulletin: Junos OS: Multiple Vulnerabilities in OpenSSH 26,797 5 days ago
Unread Published Published JSA10942 2019-07 Security Bulletin: EX4300 Series: When a firewall filter is applied to a loopback interface, other firewall filters for multicast traffic may fail (CVE-2019-0048) 24,044 5 days ago
Unread Published Published JSA10943 2019-07 Security Bulletin: Junos OS: RPD process crashes when BGP peer restarts (CVE-2019-0049) 31,562 5 days ago
Unread Published Published JSA10946 2019-07 Security Bulletin: SRX Series: srxpfe process crash while JSF/UTM module parses specific HTTP packets (CVE-2019-0052) 23,915 5 days ago
Unread Published Published JSA10947 2019-07 Security Bulletin: Junos OS: Insufficient validation of environment variables in telnet client may lead to stack-based buffer overflow (CVE-2019-0053) 25,192 5 days ago
Unread Published Published JSA10948 2019-07 Security Bulletin: Junos OS: J-Web Denial of Service due to multiple vulnerabilities in Embedthis Appweb Server 21,542 5 days ago
Unread Published Published JSA10949 2019-07 Security Bulletin: Junos OS: OpenSSL Security Advisory [26 Feb 2019] 25,864 5 days ago
Unread Published Published JSA10950 2019-07 Security Bulletin: Juniper Secure Analytics (JSA): Multiple vulnerabilities resolved in JSA 7.3.2 Patch 1 19,600 5 days ago
Unread Published Published JSA10951 2019-07 Security Bulletin: Junos Space: Multiple vulnerabilities resolved in 19.2R1 release 9,010 5 days ago
Unread Published Published JSA10922 2019-04 Security Bulletin: SRX Series: A remote attacker may cause a high CPU Denial of Service to the device when proxy ARP is configured. (CVE-2019-0033) 204,123 31 days ago
Unread Published Published JSA10704 2015-10 Security Bulletin: ScreenOS: Network based denial of service vulnerability in ScreenOS (CVE-2015-7750) 532,947 75 days ago
Unread Published Published JSA10927 2019-04 Security Bulletin: SRX Series: Crafted packets destined to fxp0 management interface on SRX340/SRX345 devices can lead to DoS (CVE-2019-0038) 247,068 82 days ago
Unread Published Published JSA10936 2019-04 Security Bulletin: Junos OS: SRX5000 series: Kernel crash (vmcore) upon receipt of a specific packet on fxp0 interface (CVE-2019-0044) 263,651 83 days ago
my-tracker_cpteKnowledge Center – Browse All _ Security Advisories
read more

Security update deployment information: July 9, 2019

Release Deployment Table


Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Browser Internet Explorer 10 Windows Server 2012 4507434 IE Cumulative Windows8-RT-KB4507434-x64.msu 4503259 Yes Yes
Browser Internet Explorer 10 Windows Server 2012 4507462 Monthly Rollup Windows8-RT-KB4507462-x64.msu 4503285 Yes Yes
Browser Internet Explorer 11 Windows 10 for 32-bit Systems 4507458 Security Update Windows10.0-KB4507458-x86.msu 4503291 Yes Yes
Browser Internet Explorer 11 Windows 10 for x64-based Systems 4507458 Security Update Windows10.0-KB4507458-x64.msu 4503291 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1607 for 32-bit Systems 4507460 Security Update Windows10.0-KB4507460-x86.msu 4503267 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1607 for x64-based Systems 4507460 Security Update Windows10.0-KB4507460-x64.msu 4503267 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1703 for 32-bit Systems 4507450 Security Update Windows10.0-KB4507450-x86.msu 4503279 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1703 for x64-based Systems 4507450 Security Update Windows10.0-KB4507450-x64.msu 4503279 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1709 for 32-bit Systems 4507455 Security Update Windows10.0-KB4507455-x86.msu 4503284 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1709 for ARM64-based Systems 4507455 Security Update Windows10.0-KB4507455-arm64.msu 4503284 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1709 for x64-based Systems 4507455 Security Update Windows10.0-KB4507455-x64.msu 4503284 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1803 for 32-bit Systems 4507435 Security Update Windows10.0-KB4507435-x86.msu 4503286 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1803 for ARM64-based Systems 4507435 Security Update Windows10.0-KB4507435-arm64.msu 4503286 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1803 for x64-based Systems 4507435 Security Update Windows10.0-KB4507435-x64.msu 4503286 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1809 for 32-bit Systems 4507469 Security Update Windows10.0-KB4507469-x86.msu 4503327 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1809 for ARM64-based Systems 4507469 Security Update Windows10.0-KB4507469-arm64.msu 4503327 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1809 for x64-based Systems 4507469 Security Update Windows10.0-KB4507469-x64.msu 4503327 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1903 for 32-bit Systems 4507453 Security Update Windows10.0-KB4507453-x86.msu 4503293 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1903 for ARM64-based Systems 4507453 Security Update Windows10.0-KB4507453-arm64.msu 4503293 Yes Yes
Browser Internet Explorer 11 Windows 10 Version 1903 for x64-based Systems 4507453 Security Update Windows10.0-KB4507453-x64.msu 4503293 Yes Yes
Browser Internet Explorer 11 Windows 7 for 32-bit Systems Service Pack 1 4507434 IE Cumulative IE11-Windows6.1-KB4507434-X86.msu 4503259 Yes Yes
Browser Internet Explorer 11 Windows 7 for 32-bit Systems Service Pack 1 4507449 Monthly Rollup Windows6.1-KB4507449-x86.msu 4503292 Yes Yes
Browser Internet Explorer 11 Windows 7 for x64-based Systems Service Pack 1 4507434 IE Cumulative IE11-Windows6.1-KB4507434-X64.msu 4503259 Yes Yes
Browser Internet Explorer 11 Windows 7 for x64-based Systems Service Pack 1 4507449 Monthly Rollup Windows6.1-KB4507449-x64.msu 4503292 Yes Yes
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Browser Internet Explorer 11 Windows 8.1 for 32-bit systems 4507434 IE Cumulative Windows8.1-KB4507434-x86.msu 4503259 Yes Yes
Browser Internet Explorer 11 Windows 8.1 for 32-bit systems 4507448 Monthly Rollup Windows8.1-KB4507448-x86.msu 4503276 Yes Yes
Browser Internet Explorer 11 Windows 8.1 for x64-based systems 4507434 IE Cumulative Windows8.1-KB4507434-x64.msu 4503259 Yes Yes
Browser Internet Explorer 11 Windows 8.1 for x64-based systems 4507448 Monthly Rollup Windows8.1-KB4507448-x64.msu 4503276 Yes Yes
Browser Internet Explorer 11 Windows RT 8.1 4507448 Monthly Rollup Windows8.1-KB4507448-arm.msu 4503276 Yes Yes
Browser Internet Explorer 11 Windows Server 2008 R2 for x64-based Systems Service Pack 1 4507434 IE Cumulative IE11-Windows6.1-KB4507434-X64.msu 4503259 Yes Yes
Browser Internet Explorer 11 Windows Server 2008 R2 for x64-based Systems Service Pack 1 4507449 Monthly Rollup Windows6.1-KB4507449-x64.msu 4503292 Yes Yes
Browser Internet Explorer 11 Windows Server 2012 4507434 IE Cumulative Windows8.1-KB4507434-x64.msu 4503259 Yes Yes
Browser Internet Explorer 11 Windows Server 2012 R2 4507434 IE Cumulative Windows8.1-KB4507434-x64.msu 4503259 Yes Yes
Browser Internet Explorer 11 Windows Server 2012 R2 4507448 Monthly Rollup Windows8.1-KB4507448-x64.msu 4503276 Yes Yes
Browser Internet Explorer 11 Windows Server 2016 4507460 Security Update Windows10.0-KB4507460-x64.msu 4503267 Yes Yes
Browser Internet Explorer 11 Windows Server 2019 4507469 Security Update Windows10.0-KB4507469-x64.msu 4503327 Yes Yes
Browser Internet Explorer 9 Windows Server 2008 for 32-bit Systems Service Pack 2 4507434 IE Cumulative IE9-Windows6.0-KB4507434-X86.msu 4503259 Yes Yes
Browser Internet Explorer 9 Windows Server 2008 for 32-bit Systems Service Pack 2 4507452 Monthly Rollup Windows6.0-KB4507452-x86.msu 4503273 Yes
Browser Internet Explorer 9 Windows Server 2008 for x64-based Systems Service Pack 2 4507434 IE Cumulative IE9-Windows6.0-KB4507434-X64.msu 4503259 Yes Yes
Browser Internet Explorer 9 Windows Server 2008 for x64-based Systems Service Pack 2 4507452 Monthly Rollup Windows6.0-KB4507452-x64.msu 4503273 Yes
Browser Microsoft Edge Windows 10 for 32-bit Systems 4507458 Security Update Windows10.0-KB4507458-x86.msu 4503291 Yes Yes
Browser Microsoft Edge Windows 10 for x64-based Systems 4507458 Security Update Windows10.0-KB4507458-x64.msu 4503291 Yes Yes
Browser Microsoft Edge Windows 10 Version 1607 for 32-bit Systems 4507460 Security Update Windows10.0-KB4507460-x86.msu 4503267 Yes Yes
Browser Microsoft Edge Windows 10 Version 1607 for x64-based Systems 4507460 Security Update Windows10.0-KB4507460-x64.msu 4503267 Yes Yes
Browser Microsoft Edge Windows 10 Version 1703 for 32-bit Systems 4507450 Security Update Windows10.0-KB4507450-x86.msu 4503279 Yes Yes
Browser Microsoft Edge Windows 10 Version 1703 for x64-based Systems 4507450 Security Update Windows10.0-KB4507450-x64.msu 4503279 Yes Yes
Browser Microsoft Edge Windows 10 Version 1709 for 32-bit Systems 4507455 Security Update Windows10.0-KB4507455-x86.msu 4503284 Yes Yes
Browser Microsoft Edge Windows 10 Version 1709 for ARM64-based Systems 4507455 Security Update Windows10.0-KB4507455-arm64.msu 4503284 Yes Yes
Browser Microsoft Edge Windows 10 Version 1709 for x64-based Systems 4507455 Security Update Windows10.0-KB4507455-x64.msu 4503284 Yes Yes
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Browser Microsoft Edge Windows 10 Version 1803 for 32-bit Systems 4507435 Security Update Windows10.0-KB4507435-x86.msu 4503286 Yes Yes
Browser Microsoft Edge Windows 10 Version 1803 for ARM64-based Systems 4507435 Security Update Windows10.0-KB4507435-arm64.msu 4503286 Yes Yes
Browser Microsoft Edge Windows 10 Version 1803 for x64-based Systems 4507435 Security Update Windows10.0-KB4507435-x64.msu 4503286 Yes Yes
Browser Microsoft Edge Windows 10 Version 1809 for 32-bit Systems 4507469 Security Update Windows10.0-KB4507469-x86.msu 4503327 Yes Yes
Browser Microsoft Edge Windows 10 Version 1809 for ARM64-based Systems 4507469 Security Update Windows10.0-KB4507469-arm64.msu 4503327 Yes Yes
Browser Microsoft Edge Windows 10 Version 1809 for x64-based Systems 4507469 Security Update Windows10.0-KB4507469-x64.msu 4503327 Yes Yes
Browser Microsoft Edge Windows 10 Version 1903 for 32-bit Systems 4507453 Security Update Windows10.0-KB4507453-x86.msu 4503293 Yes Yes
Browser Microsoft Edge Windows 10 Version 1903 for ARM64-based Systems 4507453 Security Update Windows10.0-KB4507453-arm64.msu 4503293 Yes Yes
Browser Microsoft Edge Windows 10 Version 1903 for x64-based Systems 4507453 Security Update Windows10.0-KB4507453-x64.msu 4503293 Yes Yes
Browser Microsoft Edge Windows Server 2016 4507460 Security Update Windows10.0-KB4507460-x64.msu 4503267 Yes Yes
Browser Microsoft Edge Windows Server 2019 4507469 Security Update Windows10.0-KB4507469-x64.msu 4503327 Yes Yes
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Developer Tools ASP.NET Core 2.1 Release Notes Security Update ASP.NET Core 2.1 CVE-2019-1075 Maybe
Developer Tools ASP.NET Core 2.2 Release Notes Security Update ASP.NET Core 2.2 CVE-2019-1075 Maybe
Developer Tools Azure DevOps Server 2019.0.1 Release Notes Security Update Azure DevOps 2019 Maybe
Developer Tools Azure IoT Edge Release Notes Security Update Azure IOT Edge Maybe
Developer Tools ChakraCore Release Notes Security Update Github Open Source Maybe
Developer Tools Microsoft .NET Framework 2.0 Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 4507414 Security Only Windows6.0-KB4506975-x86.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 2.0 Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 4507423 Monthly Rollup Windows6.0-KB4507003-x86.msu 4499409; 4503868 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 2.0 Service Pack 2 Windows Server 2008 for Itanium-Based Systems Service Pack 2 4507414 Security Only Windows6.0-KB4506975-ia64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 2.0 Service Pack 2 Windows Server 2008 for Itanium-Based Systems Service Pack 2 4507423 Monthly Rollup Windows6.0-KB4507003-ia64.msu 4499409; 4503868 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 2.0 Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 4507414 Security Only Windows6.0-KB4506975-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 2.0 Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 4507423 Monthly Rollup Windows6.0-KB4507003-x64.msu 4499409; 4503868 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.0 Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 4507414 Security Only Windows6.0-KB4506975-x86.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.0 Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 4507423 Monthly Rollup Windows6.0-KB4507003-x86.msu 4499409; 4503868 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.0 Service Pack 2 Windows Server 2008 for Itanium-Based Systems Service Pack 2 4507414 Security Only Windows6.0-KB4506975-ia64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.0 Service Pack 2 Windows Server 2008 for Itanium-Based Systems Service Pack 2 4507423 Monthly Rollup Windows6.0-KB4507003-ia64.msu 4499409; 4503868 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.0 Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 4507414 Security Only Windows6.0-KB4506975-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.0 Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 4507423 Monthly Rollup Windows6.0-KB4507003-x64.msu 4499409; 4503868 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 Windows 10 for 32-bit Systems 4507458 Security Update Windows10.0-KB4507458-x86.msu 4503291 Yes Yes
Developer Tools Microsoft .NET Framework 3.5 Windows 10 for x64-based Systems 4507458 Security Update Windows10.0-KB4507458-x64.msu 4503291 Yes Yes
Developer Tools Microsoft .NET Framework 3.5 Windows 10 Version 1607 for 32-bit Systems 4507460 Security Update Windows10.0-KB4507460-x86.msu 4503267 Yes Yes
Developer Tools Microsoft .NET Framework 3.5 Windows 10 Version 1607 for x64-based Systems 4507460 Security Update Windows10.0-KB4507460-x64.msu 4503267 Yes Yes
Developer Tools Microsoft .NET Framework 3.5 Windows 10 Version 1703 for 32-bit Systems 4507450 Security Update Windows10.0-KB4507450-x86.msu 4503279 Yes Yes
Developer Tools Microsoft .NET Framework 3.5 Windows 10 Version 1703 for x64-based Systems 4507450 Security Update Windows10.0-KB4507450-x64.msu 4503279 Yes Yes
Developer Tools Microsoft .NET Framework 3.5 Windows 10 Version 1709 for 32-bit Systems 4507455 Security Update Windows10.0-KB4507455-x86.msu 4503284 Yes Yes
Developer Tools Microsoft .NET Framework 3.5 Windows 10 Version 1709 for x64-based Systems 4507455 Security Update Windows10.0-KB4507455-x64.msu 4503284 Yes Yes
Developer Tools Microsoft .NET Framework 3.5 Windows 10 Version 1803 for 32-bit Systems 4507435 Security Update Windows10.0-KB4507435-x86.msu 4503286 Yes Yes
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Developer Tools Microsoft .NET Framework 3.5 Windows 10 Version 1803 for x64-based Systems 4507435 Security Update Windows10.0-KB4507435-x64.msu 4503286 Yes Yes
Developer Tools Microsoft .NET Framework 3.5 Windows 8.1 for 32-bit systems 4507413 Security Only Windows8.1-KB4506977-x86.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 Windows 8.1 for 32-bit systems 4507422 Monthly Rollup Windows8.1-KB4507005-x86.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 Windows 8.1 for x64-based systems 4507413 Security Only Windows8.1-KB4506977-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 Windows 8.1 for x64-based systems 4507422 Monthly Rollup Windows8.1-KB4507005-x64.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 Windows Server 2012 4507412 Security Only Windows8-RT-KB4506974-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 Windows Server 2012 4507421 Monthly Rollup Windows8-RT-KB4507002-x64.msu 4499407; 4503866 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 Windows Server 2012 (Server Core installation) 4507412 Security Only Windows8-RT-KB4506974-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 Windows Server 2012 (Server Core installation) 4507421 Monthly Rollup Windows8-RT-KB4507002-x64.msu 4499407; 4503866 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 Windows Server 2012 R2 4507413 Security Only Windows8.1-KB4506977-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 Windows Server 2012 R2 4507422 Monthly Rollup Windows8.1-KB4507005-x64.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 Windows Server 2012 R2 (Server Core installation) 4507413 Security Only Windows8.1-KB4506977-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 Windows Server 2012 R2 (Server Core installation) 4507422 Monthly Rollup Windows8.1-KB4507005-x64.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 Windows Server 2016 4507460 Security Update Windows10.0-KB4507460-x64.msu 4503267 Yes Yes
Developer Tools Microsoft .NET Framework 3.5 Windows Server 2016  (Server Core installation) 4507460 Security Update Windows10.0-KB4507460-x64.msu 4503267 Yes Yes
Developer Tools Microsoft .NET Framework 3.5 Windows Server, version 1803  (Server Core Installation) 4507435 Security Update Windows10.0-KB4507435-x64.msu 4503286 Yes Yes
Developer Tools Microsoft .NET Framework 3.5 AND 4.7.2 Windows 10 Version 1809 for 32-bit Systems 4507419 Security Update Windows10.0-KB4506998-x86.msu 4486553; 4499405; 4503864 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 AND 4.7.2 Windows 10 Version 1809 for x64-based Systems 4507419 Security Update Windows10.0-KB4506998-x64.msu 4486553; 4499405; 4503864 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 AND 4.7.2 Windows Server 2019 4507419 Security Update Windows10.0-KB4506998-x64.msu 4486553; 4499405; 4503864 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 AND 4.7.2 Windows Server 2019  (Server Core installation) 4507419 Security Update Windows10.0-KB4506998-x64.msu 4486553; 4499405; 4503864 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 AND 4.8 Windows 10 Version 1809 for 32-bit Systems 4507419 Security Update Windows10.0-KB4506990-x86.msu 4486553; 4499405; 4503864 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 AND 4.8 Windows 10 Version 1809 for x64-based Systems 4507419 Security Update Windows10.0-KB4506990-x64.msu 4486553; 4499405; 4503864 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 AND 4.8 Windows 10 Version 1903 for 32-bit Systems 4506991 Security Update Windows10.0-KB4506991-x86.msu 4495620; 4502584 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 AND 4.8 Windows 10 Version 1903 for x64-based Systems 4506991 Security Update Windows10.0-KB4506991-x64.msu 4495620; 4502584 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 AND 4.8 Windows Server 2019 4507419 Security Update Windows10.0-KB4506990-x64.msu 4486553; 4499405; 4503864 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 AND 4.8 Windows Server 2019  (Server Core installation) 4507419 Security Update Windows10.0-KB4506990-x64.msu 4486553; 4499405; 4503864 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5 AND 4.8 Windows Server, version 1903 (Server Core installation) 4506991 Security Update Windows10.0-KB4506991-x64.msu 4495620; 4502584 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Developer Tools Microsoft .NET Framework 3.5.1 Windows 7 for 32-bit Systems Service Pack 1 4507411 Security Only Windows6.1-KB4506976-x86.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5.1 Windows 7 for 32-bit Systems Service Pack 1 4507420 Monthly Rollup Windows6.1-KB4507004-x86.msu 4499406; 4503865 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5.1 Windows 7 for x64-based Systems Service Pack 1 4507411 Security Only Windows6.1-KB4506976-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5.1 Windows 7 for x64-based Systems Service Pack 1 4507420 Monthly Rollup Windows6.1-KB4507004-x64.msu 4499406; 4503865 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5.1 Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 4507411 Security Only Windows6.1-KB4506976-ia64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5.1 Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 4507420 Monthly Rollup Windows6.1-KB4507004-ia64.msu 4499406; 4503865 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5.1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 4507411 Security Only Windows6.1-KB4506976-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5.1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 4507420 Monthly Rollup Windows6.1-KB4507004-x64.msu 4499406; 4503865 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5.1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 4507411 Security Only Windows6.1-KB4506976-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 3.5.1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 4507420 Monthly Rollup Windows6.1-KB4507004-x64.msu 4499406; 4503865 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows 7 for 32-bit Systems Service Pack 1 4507411 Security Only NDP45-KB4506966-x86.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows 7 for 32-bit Systems Service Pack 1 4507420 Monthly Rollup NDP45-KB4507001-x86.exe 4503865 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows 7 for x64-based Systems Service Pack 1 4507411 Security Only NDP45-KB4506966-x64.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows 7 for x64-based Systems Service Pack 1 4507420 Monthly Rollup NDP45-KB4507001-x64.exe 4503865 Maybe
Developer Tools Microsoft .NET Framework 4.5.2 Windows 8.1 for 32-bit systems 4507413 Security Only Windows8.1-KB4506964-x86.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows 8.1 for 32-bit systems 4507422 Monthly Rollup Windows8.1-KB4506999-x86.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows 8.1 for x64-based systems 4507413 Security Only Windows8.1-KB4506964-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows 8.1 for x64-based systems 4507422 Monthly Rollup Windows8.1-KB4506999-x64.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows RT 8.1 4507422 Monthly Rollup Windows8.1-KB4506999-arm.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2008 for 32-bit Systems Service Pack 2 4507414 Security Only NDP45-KB4506966-x86.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2008 for 32-bit Systems Service Pack 2 4507423 Monthly Rollup NDP45-KB4507001-x86.exe 4489489; 4499409 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2008 for x64-based Systems Service Pack 2 4507414 Security Only NDP45-KB4506966-x64.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2008 for x64-based Systems Service Pack 2 4507423 Monthly Rollup NDP45-KB4507001-x64.exe 4489489; 4499409 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2008 R2 for x64-based Systems Service Pack 1 4507411 Security Only NDP45-KB4506966-x64.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2008 R2 for x64-based Systems Service Pack 1 4507420 Monthly Rollup NDP45-KB4507001-x64.exe 4503865 Maybe
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 4507411 Security Only NDP45-KB4506966-x64.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 4507420 Monthly Rollup NDP45-KB4507001-x64.exe 4503865 Maybe
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2012 4507412 Security Only Windows8-RT-KB4506965-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2012 4507421 Monthly Rollup Windows8-RT-KB4507000-x64.msu 4499407; 4503866 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2012 (Server Core installation) 4507412 Security Only Windows8-RT-KB4506965-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2012 (Server Core installation) 4507421 Monthly Rollup Windows8-RT-KB4507000-x64.msu 4499407; 4503866 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2012 R2 4507413 Security Only Windows8.1-KB4506964-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2012 R2 4507422 Monthly Rollup Windows8.1-KB4506999-x64.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2012 R2 (Server Core installation) 4507413 Security Only Windows8.1-KB4506964-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.5.2 Windows Server 2012 R2 (Server Core installation) 4507422 Monthly Rollup Windows8.1-KB4506999-x64.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6 Windows Server 2008 for 32-bit Systems Service Pack 2 4507414 Security Only NDP47-KB4506963-x86.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6 Windows Server 2008 for 32-bit Systems Service Pack 2 4507423 Monthly Rollup NDP47-KB4506997-x86.exe 4489489; 4499409 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6 Windows Server 2008 for x64-based Systems Service Pack 2 4507414 Security Only NDP47-KB4506963-x64.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6 Windows Server 2008 for x64-based Systems Service Pack 2 4507423 Monthly Rollup NDP47-KB4506997-x64.exe 4489489; 4499409 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2 Windows 10 for 32-bit Systems 4507458 Security Update Windows10.0-KB4507458-x86.msu 4503291 Yes Yes
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2 Windows 10 for x64-based Systems 4507458 Security Update Windows10.0-KB4507458-x64.msu 4503291 Yes Yes
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows 7 for 32-bit Systems Service Pack 1 4507411 Security Only NDP47-KB4506963-x86.exe Maybe
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows 7 for 32-bit Systems Service Pack 1 4507420 Monthly Rollup NDP47-KB4506997-x86.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows 7 for x64-based Systems Service Pack 1 4507411 Security Only NDP47-KB4506963-x64.exe Maybe
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows 7 for x64-based Systems Service Pack 1 4507420 Monthly Rollup NDP47-KB4506997-x64.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows 8.1 for 32-bit systems 4507413 Security Only Windows8.1-KB4506962-x86.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows 8.1 for 32-bit systems 4507422 Monthly Rollup Windows8.1-KB4506999-x86.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows 8.1 for x64-based systems 4507413 Security Only Windows8.1-KB4506962-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows 8.1 for x64-based systems 4507422 Monthly Rollup Windows8.1-KB4506996-x64.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows RT 8.1 4507422 Monthly Rollup Windows8.1-KB4506996-arm.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows Server 2008 R2 for x64-based Systems Service Pack 1 4507411 Security Only NDP47-KB4506963-x64.exe Maybe
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows Server 2008 R2 for x64-based Systems Service Pack 1 4507420 Monthly Rollup NDP47-KB4506997-x64.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 4507411 Security Only NDP47-KB4506963-x64.exe Maybe
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 4507420 Monthly Rollup NDP47-KB4506997-x64.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows Server 2012 4507412 Security Only Windows8-RT-KB4506961-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows Server 2012 4507421 Monthly Rollup Windows8-RT-KB4506995-x86.msu 4499407; 4503866 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows Server 2012 (Server Core installation) 4507412 Security Only Windows8-RT-KB4506961-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows Server 2012 (Server Core installation) 4507421 Monthly Rollup Windows8-RT-KB4506995-x86.msu 4499407; 4503866 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows Server 2012 R2 4507413 Security Only Windows8.1-KB4506962-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows Server 2012 R2 4507422 Monthly Rollup Windows8.1-KB4506996-x64.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows Server 2012 R2 (Server Core installation) 4507413 Security Only Windows8.1-KB4506962-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 Windows Server 2012 R2 (Server Core installation) 4507422 Monthly Rollup Windows8.1-KB4506996-x64.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows 10 Version 1607 for 32-bit Systems 4506986 Security Update Windows10.0-KB4506986-x86.msu 4495610; 4502560 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows 10 Version 1607 for x64-based Systems 4506986 Security Update Windows10.0-KB4506986-x64.msu 4495610; 4502560 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows 10 Version 1703 for 32-bit Systems 4506987 Security Update Windows10.0-KB4506987-x86.msu 4495611; 4502561 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows 10 Version 1703 for x64-based Systems 4506986 Security Update Windows10.0-KB4506986-x64.msu 4495610; 4502560 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows 10 Version 1709 for 32-bit Systems 4506988 Security Update Windows10.0-KB4506988-x86.msu 4495613; 4502562 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows 10 Version 1709 for x64-based Systems 4506986 Security Update Windows10.0-KB4506986-x64.msu 4495610; 4502560 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows 10 Version 1803 for 32-bit Systems 4506989 Security Update Windows10.0-KB4506989-x86.msu 4495616; 4502563 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows 10 Version 1803 for x64-based Systems 4506989 Security Update Windows10.0-KB4506989-x64.msu 4495616; 4502563 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows 7 for 32-bit Systems Service Pack 1 4507411 Security Only NDP48-KB4506956-x86.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows 7 for 32-bit Systems Service Pack 1 4507420 Monthly Rollup NDP48-KB4506994-x86.exe 4499406; 4503865 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows 7 for x64-based Systems Service Pack 1 4507411 Security Only NDP48-KB4506956-x64.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Developer Tools Microsoft .NET Framework 4.8 Windows 7 for x64-based Systems Service Pack 1 4507420 Monthly Rollup NDP48-KB4506994-x64.exe 4499406; 4503865 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows 8.1 for 32-bit systems 4507413 Security Only Windows8.1-KB4506955-x86.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows 8.1 for 32-bit systems 4507422 Monthly Rollup Windows8.1-KB4506993-x86.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows 8.1 for x64-based systems 4507413 Security Only Windows8.1-KB4506955-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows 8.1 for x64-based systems 4507422 Monthly Rollup Windows8.1-KB4506993-x64.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows RT 8.1 4507422 Monthly Rollup Windows8.1-KB4506993-arm.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows Server 2008 R2 for x64-based Systems Service Pack 1 4507411 Security Only NDP48-KB4506956-x64.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows Server 2008 R2 for x64-based Systems Service Pack 1 4507420 Monthly Rollup NDP48-KB4506994-x64.exe 4499406; 4503865 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 4507411 Security Only NDP48-KB4506956-x64.exe Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 4507420 Monthly Rollup NDP48-KB4506994-x64.exe 4499406; 4503865 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows Server 2012 4507412 Security Only Windows8-RT-KB4506954-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows Server 2012 4507421 Monthly Rollup Windows8-RT-KB4506992-x64.msu 4499407; 4503866 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows Server 2012 (Server Core installation) 4507412 Security Only Windows8-RT-KB4506954-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows Server 2012 (Server Core installation) 4507421 Monthly Rollup Windows8-RT-KB4506992-x64.msu 4499407; 4503866 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows Server 2012 R2 4507413 Security Only Windows8.1-KB4506955-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows Server 2012 R2 4507422 Monthly Rollup Windows8.1-KB4506993-x64.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows Server 2012 R2 (Server Core installation) 4507413 Security Only Windows8.1-KB4506955-x64.msu Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows Server 2012 R2 (Server Core installation) 4507422 Monthly Rollup Windows8.1-KB4506993-x64.msu 4499408; 4503867 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows Server 2016 4506986 Security Update Windows10.0-KB4506986-x64.msu 4495610; 4502560 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows Server 2016  (Server Core installation) 4506986 Security Update Windows10.0-KB4506986-x64.msu 4495610; 4502560 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft .NET Framework 4.8 Windows Server, version 1803  (Server Core Installation) 4506989 Security Update Windows10.0-KB4506989-x64.msu 4495616; 4502563 Maybe This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.
Developer Tools Microsoft Visual Studio 2010 Service Pack 1 4506161 Security Update 4506161 – Visual Studio 2010 Maybe
Developer Tools Microsoft Visual Studio 2012 Update 5 4506162 Security Update 4506162 – Visual Studio 2012 U5 Maybe
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Developer Tools Microsoft Visual Studio 2013 Update 5 4506163 Security Update 4506163 – Visual Studio 2013 U5 Maybe
Developer Tools Microsoft Visual Studio 2015 Update 3 4506164 Security Update 4506164 – Visual Studio 2015 U3 Maybe
Developer Tools Microsoft Visual Studio 2017 Release Notes Security Update Visual Studio 2017 Maybe
Developer Tools Microsoft Visual Studio 2017 version 15.9 Release Notes Security Update Visual Studio 2017 v15.9 Maybe
Developer Tools Microsoft Visual Studio 2019 version 16.0 Release Notes Security Update Visual Studio 2019  v16.0 Maybe
Developer Tools Microsoft Visual Studio 2019 version 16.1 Release Notes Security Update Visual Studio 2019  v16.1 Maybe
Developer Tools Microsoft.IdentityModel 7.0.0 Release Notes Security Update Microsoft.IdentityModel Maybe
Developer Tools Team Foundation Server 2010 SP1 Release Notes Security Update TFS Server 2010 SP1 Maybe
Developer Tools Team Foundation Server 2012 Update 4 Release Notes Security Update TFS Server 2012 – 4 Maybe
Developer Tools Team Foundation Server 2013 Update 5 Release Notes Security Update TFS Server 2013 – 5 Maybe
Developer Tools Team Foundation Server 2015 Update 4.2 Release Notes Security Update TFS Server 2015 – 4.2 Maybe
Developer Tools Team Foundation Server 2017 Update 3.1 Release Notes Security Update TFS Server 2017 – 3.1 Maybe
Developer Tools Team Foundation Server 2018 Update 1.2 Release Notes Security Update TFS Server 2018 – 1.2 Maybe
Developer Tools Team Foundation Server 2018 Update 3.2 Release Notes Security Update TFS Server 2018 – 3.2 Maybe
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Exchange Server Microsoft Exchange Server 2010 Service Pack 3 4509410 Security Update Exchange2010-RU29-KB4509410-x64 4503028 Maybe Yes
Exchange Server Microsoft Exchange Server 2013 Cumulative Update 23 4509409 Security Update Exchange2013-CU23-KB4509409-x64 Maybe Yes
Exchange Server Microsoft Exchange Server 2016 Cumulative Update 12 4509409 Security Update Exchange2016-CU12-KB4509409-x64 4503027 Maybe Yes
Exchange Server Microsoft Exchange Server 2016 Cumulative Update 13 4509409 Security Update Exchange2016-CU13-KB4509409-x64 Maybe Yes
Exchange Server Microsoft Exchange Server 2019 Cumulative Update 1 4509408 Security Update Exchange 2019-CU1-KB4509408-x64 4503027 Maybe Yes
Exchange Server Microsoft Exchange Server 2019 Cumulative Update 2 4509408 Security Update Exchange2019-CU2-KB4509408-x64 4503027 Maybe Yes
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Microsoft Office Microsoft Excel 2010 Service Pack 2 (32-bit editions) 4464572 Security Update excel2010-kb4464572-fullfile-x86-glb.exe 4462230 Maybe
Microsoft Office Microsoft Excel 2010 Service Pack 2 (64-bit editions) 4464572 Security Update excel2010-kb4464572-fullfile-x64-glb.exe 4462230 Maybe
Microsoft Office Microsoft Excel 2013 RT Service Pack 1 4464565 Security Update excel2013-kb4464565-fullfile-RT 4462209 Maybe
Microsoft Office Microsoft Excel 2013 Service Pack 1 (32-bit editions) 4464565 Security Update excel2013-kb4464565-fullfile-x86-glb.exe 4462209 Maybe Yes
Microsoft Office Microsoft Excel 2013 Service Pack 1 (64-bit editions) 4464565 Security Update excel2013-kb4464565-fullfile-x64-glb.exe 4462209 Maybe Yes
Microsoft Office Microsoft Excel 2016 (32-bit edition) 4475513 Security Update excel2016-kb4475513-fullfile-x86-glb.exe 4462236 Maybe Yes
Microsoft Office Microsoft Excel 2016 (64-bit edition) 4475513 Security Update excel2016-kb4475513-fullfile-x64-glb.exe 4462236 Maybe Yes
Microsoft Office Microsoft Lync 2013 Service Pack 1 (32-bit) 4475519 Security Update lync2013-kb4475519-fullfile-x86-glb.exe 4461487 Maybe
Microsoft Office Microsoft Lync 2013 Service Pack 1 (64-bit) 4475519 Security Update lync2013-kb4475519-fullfile-x64-glb.exe 4461487 Maybe
Microsoft Office Microsoft Lync Basic 2013 Service Pack 1 (32-bit) 4475519 Security Update lync2013-kb4475519-fullfile-x86-glb.exe 4461487 Maybe
Microsoft Office Microsoft Lync Basic 2013 Service Pack 1 (64-bit) 4475519 Security Update lync2013-kb4475519-fullfile-x64-glb.exe 4461487 Maybe
Microsoft Office Microsoft Office 2010 Service Pack 2 (32-bit editions) 4462224 Security Update graph2010-kb4462224-fullfile-x86-glb.exe 4462177 Maybe
Microsoft Office Microsoft Office 2010 Service Pack 2 (64-bit editions) 4462224 Security Update graph2010-kb4462224-fullfile-x64-glb.exe 4462177 Maybe
Microsoft Office Microsoft Office 2013 RT Service Pack 1 4018375 Security Update osfclient2013-kb4018375-fullfile-RT 3039782 Maybe
Microsoft Office Microsoft Office 2013 RT Service Pack 1 4464543 Security Update graph2013-kb4464543-fullfile-RT 4022237 Maybe
Microsoft Office Microsoft Office 2013 RT Service Pack 1 4464558 Security Update mso2013-kb4464558-fullfile-RT 4464504 Maybe
Microsoft Office Microsoft Office 2013 Service Pack 1 (32-bit editions) 4018375 Security Update osfclient2013-kb4018375-fullfile-x86-glb.exe 3039782 Maybe Yes
Microsoft Office Microsoft Office 2013 Service Pack 1 (32-bit editions) 4464543 Security Update graph2013-kb4464543-fullfile-x86-glb.exe 4022237 Maybe Yes
Microsoft Office Microsoft Office 2013 Service Pack 1 (32-bit editions) 4464558 Security Update mso2013-kb4464558-fullfile-x86-glb.exe 4464504 Maybe Yes
Microsoft Office Microsoft Office 2013 Service Pack 1 (64-bit editions) 4018375 Security Update osfclient2013-kb4018375-fullfile-x64-glb.exe 3039782 Maybe Yes
Microsoft Office Microsoft Office 2013 Service Pack 1 (64-bit editions) 4464543 Security Update graph2013-kb4464543-fullfile-x64-glb.exe 4022237 Maybe Yes
Microsoft Office Microsoft Office 2013 Service Pack 1 (64-bit editions) 4464558 Security Update mso2013-kb4464558-fullfile-x64-glb.exe 4464504 Maybe Yes
Microsoft Office Microsoft Office 2016 (32-bit edition) 4461539 Security Update graph2016-kb4461539-fullfile-x86-glb.exe 4022232 Maybe Yes
Microsoft Office Microsoft Office 2016 (32-bit edition) 4464534 Security Update osfclient2016-kb4464534-fullfile-x86-glb.exe Maybe Yes
Microsoft Office Microsoft Office 2016 (32-bit edition) 4475514 Security Update msodll99l2016-kb4475514-fullfile-x86-glb.exe 4011622 Maybe Yes
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Microsoft Office Microsoft Office 2016 (64-bit edition) 4461539 Security Update graph2016-kb4461539-fullfile-x64-glb.exe 4022232 Maybe Yes
Microsoft Office Microsoft Office 2016 (64-bit edition) 4464534 Security Update osfclient2016-kb4464534-fullfile-x64-glb.exe Maybe Yes
Microsoft Office Microsoft Office 2016 (64-bit edition) 4475514 Security Update msodll99l2016-kb4475514-fullfile-x64-glb.exe 4011622 Maybe Yes
Microsoft Office Microsoft Office 2019 for 32-bit editions Click to Run Security Update Update Channels No
Microsoft Office Microsoft Office 2019 for 64-bit editions Click to Run Security Update Update Channels No
Microsoft Office Microsoft Outlook 2010 Service Pack 2 (32-bit editions) 4475509 Security Update outlookloc2010-kb4475509-fullfile-x86-glb.exe 4461623 Maybe
Microsoft Office Microsoft Outlook 2010 Service Pack 2 (64-bit editions) 4475509 Security Update outlookloc2010-kb4475509-fullfile-x64-glb.exe 4461623 Maybe
Microsoft Office Microsoft Outlook 2013 Service Pack 1 (32-bit editions) 4464592 Security Update outlook2013-kb4464592-fullfile-x86-glb.exe 4461595 Maybe Yes
Microsoft Office Microsoft Outlook 2013 Service Pack 1 (64-bit editions) 4464592 Security Update outlook2013-kb4464592-fullfile-x64-glb.exe 4461595 Maybe Yes
Microsoft Office Microsoft Outlook 2016 (32-bit edition) 4475517 Security Update outlook2016-kb4475517-fullfile-x86-glb.exe 4461601 Maybe Yes
Microsoft Office Microsoft Outlook 2016 (64-bit edition) 4475517 Security Update outlook2016-kb4475517-fullfile-x64-glb.exe 4461601 Maybe Yes
Microsoft Office Microsoft Outlook for Android Release Notes Security Update Outlook for Android Maybe
Microsoft Office Microsoft SharePoint Enterprise Server 2013 Service Pack 1 4475522 Security Update coreserverloc2013-kb4475522-fullfile-x64-glb.exe 4464597 Maybe No
Microsoft Office Microsoft SharePoint Enterprise Server 2016 4475520 Security Update sts2016-kb4475520-fullfile-x64-glb.exe 4464594 Maybe No
Microsoft Office Microsoft SharePoint Foundation 2010 Service Pack 2 4475510 Security Update wssloc2010-kb4475510-fullfile-x64-glb.exe 4464573 Maybe
Microsoft Office Microsoft SharePoint Foundation 2013 Service Pack 1 4475527 Security Update sts2013-kb4475527-fullfile-x64-glb.exe 4464602 Maybe No
Microsoft Office Microsoft SharePoint Server 2019 4475529 Security Update sts2019-kb4475529-fullfile-x64-glb.exe 4475512 Maybe No
Microsoft Office Microsoft Teams Release Notes Security Update Microsoft Teams Yes
Microsoft Office Office 365 ProPlus for 32-bit Systems Click to Run Security Update Update Channels No
Microsoft Office Office 365 ProPlus for 64-bit Systems Click to Run Security Update Update Channels No
Microsoft Office Skype for Business 2016 (32-bit) 4475545 Security Update lync2016-kb4475545-fullfile-x86-glb.exe 4461473 Maybe
Microsoft Office Skype for Business 2016 (64-bit) 4475545 Security Update lync2016-kb4475545-fullfile-x64-glb.exe 4461473 Maybe
Microsoft Office Skype for Business 2016 Basic (32-bit) 4475545 Security Update lync2016-kb4475545-fullfile-x86-glb.exe 4461473 Maybe
Microsoft Office Skype for Business 2016 Basic (64-bit) 4475545 Security Update lync2016-kb4475545-fullfile-x64-glb.exe 4461473 Maybe
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
SQL Server Microsoft SQL Server 2014 Service Pack 2 for 32-bit Systems (CU+GDR) 4505419 Security Update SQLServer2014-KB4505419-x86.exe Maybe
SQL Server Microsoft SQL Server 2014 Service Pack 2 for 32-bit Systems (GDR) 4505217 Security Update SQLServer2014-KB4505217-x86.exe 4057120 Maybe
SQL Server Microsoft SQL Server 2014 Service Pack 2 for x64-based Systems (CU+GDR) 4505419 Security Update SQLServer2014-KB4505419-x64.exe Maybe
SQL Server Microsoft SQL Server 2014 Service Pack 2 for x64-based Systems (GDR) 4505217 Security Update SQLServer2014-KB4505217-x64.exe 4057120 Maybe
SQL Server Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (CU+GDR) 4505422 Security Update SQLServer2014-KB4505422-x86.exe Maybe
SQL Server Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (GDR) 4505218 Security Update SQLServer2014-KB4505218-x86.exe Maybe
SQL Server Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (CU+GDR) 4505422 Security Update SQLServer2014-KB4505422-x64.exe Maybe
SQL Server Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (GDR) 4505218 Security Update SQLServer2014-KB4505218-x64.exe Maybe
SQL Server Microsoft SQL Server 2016 for x64-based Systems Service Pack 1 (CU+GDR) 4505221 Security Update SQLServer2016-KB4505221 -x64.exe Maybe
SQL Server Microsoft SQL Server 2016 for x64-based Systems Service Pack 1 (GDR) 4505219 Security Update SQLServer2016-KB4505219-x64.exe 4293808 Maybe
SQL Server Microsoft SQL Server 2016 for x64-based Systems Service Pack 2 (CU+GDR) 4505222 Security Update SQLServer2016-KB4505222 -x64.exe Maybe
SQL Server Microsoft SQL Server 2016 for x64-based Systems Service Pack 2 (GDR) 4505220 Security Update SQLServer2016-KB4505220-x64.exe 4293802 Maybe
SQL Server Microsoft SQL Server 2017 for x64-based Systems (CU+GDR) 4505225 Security Update SQLServer2017-KB4505225-x64.exe Maybe
SQL Server Microsoft SQL Server 2017 for x64-based Systems (GDR) 4505224 Security Update SQLServer2017-KB4505224-x64.exe 4494351 Maybe
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Windows Mail and Calendar Release Notes Security Update Mail and Calendar App Maybe
Windows Windows 10 for 32-bit Systems 4507458 Security Update Windows10.0-KB4507458-x86.msu 4503291 Yes Yes
Windows Windows 10 for x64-based Systems 4507458 Security Update Windows10.0-KB4507458-x64.msu 4503291 Yes Yes
Windows Windows 10 Version 1607 for 32-bit Systems 4507460 Security Update Windows10.0-KB4507460-x86.msu 4503267 Yes Yes
Windows Windows 10 Version 1607 for x64-based Systems 4507460 Security Update Windows10.0-KB4507460-x64.msu 4503267 Yes Yes
Windows Windows 10 Version 1703 for 32-bit Systems 4507450 Security Update Windows10.0-KB4507450-x86.msu 4503279 Yes Yes
Windows Windows 10 Version 1703 for x64-based Systems 4507450 Security Update Windows10.0-KB4507450-x64.msu 4503279 Yes Yes
Windows Windows 10 Version 1709 for 32-bit Systems 4507455 Security Update Windows10.0-KB4507455-x86.msu 4503284 Yes Yes
Windows Windows 10 Version 1709 for ARM64-based Systems 4507455 Security Update Windows10.0-KB4507455-arm64.msu 4503284 Yes Yes
Windows Windows 10 Version 1709 for x64-based Systems 4507455 Security Update Windows10.0-KB4507455-x64.msu 4503284 Yes Yes
Windows Windows 10 Version 1803 for 32-bit Systems 4507435 Security Update Windows10.0-KB4507435-x86.msu 4503286 Yes Yes
Windows Windows 10 Version 1803 for ARM64-based Systems 4507435 Security Update Windows10.0-KB4507435-arm64.msu 4503286 Yes Yes
Windows Windows 10 Version 1803 for x64-based Systems 4507435 Security Update Windows10.0-KB4507435-x64.msu 4503286 Yes Yes
Windows Windows 10 Version 1809 for 32-bit Systems 4507469 Security Update Windows10.0-KB4507469-x86.msu 4503327 Yes Yes
Windows Windows 10 Version 1809 for ARM64-based Systems 4507469 Security Update Windows10.0-KB4507469-arm64.msu 4503327 Yes Yes
Windows Windows 10 Version 1809 for x64-based Systems 4507469 Security Update Windows10.0-KB4507469-x64.msu 4503327 Yes Yes
Windows Windows 10 Version 1903 for 32-bit Systems 4507453 Security Update Windows10.0-KB4507453-x86.msu 4503293 Yes Yes
Windows Windows 10 Version 1903 for ARM64-based Systems 4507453 Security Update Windows10.0-KB4507453-arm64.msu 4503293 Yes Yes
Windows Windows 10 Version 1903 for x64-based Systems 4507453 Security Update Windows10.0-KB4507453-x64.msu 4503293 Yes Yes
Windows Windows 7 for 32-bit Systems Service Pack 1 4507449 Monthly Rollup Windows6.1-KB4507449-x86.msu 4503292 Yes Yes
Windows Windows 7 for 32-bit Systems Service Pack 1 4507456 Security Only Windows6.1-KB4507456-x86.msu Yes
Windows Windows 7 for x64-based Systems Service Pack 1 4507449 Monthly Rollup Windows6.1-KB4507449-x64.msu 4503292 Yes Yes
Windows Windows 7 for x64-based Systems Service Pack 1 4507456 Security Only Windows6.1-KB4507456-x64.msu Yes
Windows Windows 8.1 for 32-bit systems 4507448 Monthly Rollup Windows8.1-KB4507448-x86.msu 4503276 Yes Yes
Windows Windows 8.1 for 32-bit systems 4507457 Security Only Windows8.1-KB4507457-x86.msu Yes Yes
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Windows Windows 8.1 for x64-based systems 4507448 Monthly Rollup Windows8.1-KB4507448-x64.msu 4503276 Yes Yes
Windows Windows 8.1 for x64-based systems 4507457 Security Only Windows8.1-KB4507457-x64.msu Yes Yes
Windows Windows RT 8.1 4507448 Monthly Rollup Windows8.1-KB4507448-arm.msu 4503276 Yes Yes
Windows Windows Server 2008 for 32-bit Systems Service Pack 2 4507452 Monthly Rollup Windows6.0-KB4507452-x86.msu 4503273 Yes
Windows Windows Server 2008 for 32-bit Systems Service Pack 2 4507461 Security Only Windows6.0-KB4507461-x86.msu Yes
Windows Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 4507452 Monthly Rollup Windows6.0-KB4507452-x86.msu 4503273 Yes
Windows Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 4507461 Security Only Windows6.0-KB4507461-x86.msu Yes
Windows Windows Server 2008 for Itanium-Based Systems Service Pack 2 4507452 Monthly Rollup Windows6.0-KB4507452-ia64.msu 4503273 Yes
Windows Windows Server 2008 for Itanium-Based Systems Service Pack 2 4507461 Security Only Windows6.0-KB4507461-ia64.msu Yes
Windows Windows Server 2008 for x64-based Systems Service Pack 2 4507452 Monthly Rollup Windows6.0-KB4507452-x64.msu 4503273 Yes
Windows Windows Server 2008 for x64-based Systems Service Pack 2 4507461 Security Only Windows6.0-KB4507461-x64.msu Yes
Windows Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 4507452 Monthly Rollup Windows6.0-KB4507452-x64.msu 4503273 Yes
Windows Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 4507461 Security Only Windows6.0-KB4507461-x64.msu Yes
Windows Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 4507449 Monthly Rollup Windows6.1-KB4507449-ia64.msu 4503292 Yes Yes
Windows Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 4507456 Security Only Windows6.1-KB4507456-ia64.msu Yes
Windows Windows Server 2008 R2 for x64-based Systems Service Pack 1 4507449 Monthly Rollup Windows6.1-KB4507449-x64.msu 4503292 Yes Yes
Windows Windows Server 2008 R2 for x64-based Systems Service Pack 1 4507456 Security Only Windows6.1-KB4507456-x64.msu Yes
Windows Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 4507449 Monthly Rollup Windows6.1-KB4507449-x64.msu 4503292 Yes Yes
Windows Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 4507456 Security Only Windows6.1-KB4507456-x64.msu Yes
Windows Windows Server 2012 4507462 Monthly Rollup Windows8-RT-KB4507462-x64.msu 4503285 Yes Yes
Windows Windows Server 2012 4507464 Security Only Windows8-RT-KB4507464-x64.msu Yes Yes
Windows Windows Server 2012 (Server Core installation) 4507462 Monthly Rollup Windows8-RT-KB4507462-x64.msu 4503285 Yes Yes
Windows Windows Server 2012 (Server Core installation) 4507464 Security Only Windows8-RT-KB4507464-x64.msu Yes Yes
Windows Windows Server 2012 R2 4507448 Monthly Rollup Windows8.1-KB4507448-x64.msu 4503276 Yes Yes
Windows Windows Server 2012 R2 4507457 Security Only Windows8.1-KB4507457-x64.msu Yes Yes
Product Family Product Installed On KBNumber Package Type Package Name Supersedence Reboot Uninstallable Known Issues
Windows Windows Server 2012 R2 (Server Core installation) 4507448 Monthly Rollup Windows8.1-KB4507448-x64.msu 4503276 Yes Yes
Windows Windows Server 2012 R2 (Server Core installation) 4507457 Security Only Windows8.1-KB4507457-x64.msu Yes Yes
Windows Windows Server 2016 4507460 Security Update Windows10.0-KB4507460-x64.msu 4503267 Yes Yes
Windows Windows Server 2016  (Server Core installation) 4507460 Security Update Windows10.0-KB4507460-x64.msu 4503267 Yes Yes
Windows Windows Server 2019 4507469 Security Update Windows10.0-KB4507469-x64.msu 4503327 Yes Yes
Windows Windows Server 2019  (Server Core installation) 4507469 Security Update Windows10.0-KB4507469-x64.msu 4503327 Yes Yes
Windows Windows Server, version 1803  (Server Core Installation) 4507435 Security Update Windows10.0-KB4507435-x64.msu 4503286 Yes Yes
Windows Windows Server, version 1903 (Server Core installation) 4507435 Security Update Windows10.0-KB4507435-x64.msu 4503286 Yes Yes
Windows Windows Server, version 1903 (Server Core installation) 4507453 Security Update Windows10.0-KB4507453-x64.msu 4503293 Yes Yes

my-tracker_cpteSecurity update deployment information: July 9, 2019
read more

Intel® Processor Diagnostic Tool Advisory

Intel ID: INTEL-SA-00268
Advisory Category: Software
Impact of vulnerability: Escalation of Privilege, Denial of Service, Information Disclosure
Severity rating: HIGH
Original release: 07/09/2019
Last revised: 07/09/2019

Summary:

A potential security vulnerability in the Intel® Processor Diagnostic Tool may allow escalation of privilege, denial of service, or information disclosure.  Intel is releasing software updates to mitigate this potential vulnerability.

Vulnerability Details:

CVEID: CVE-2019-11133

Description: Improper access control in the Intel(R) Processor Diagnostic Tool before version 4.1.2.24 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access.

CVSS Base Score: 8.2 High

CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Affected Products:

Intel® Processor Diagnostic Tool for 32-bit before version 4.1.2.24_32bit.

Intel® Processor Diagnostic Tool for 64-bit before version 4.1.2.24_64bit.

Recommendations:

Intel recommends that users of Intel® Processor Diagnostic Tool update to version 4.1.2.24 or later.

Updates are available for download at this location:

https://downloadcenter.intel.com/download/19792/Intel-Processor-Diagnostic-Tool

Acknowledgements:

Intel would like to thank Jesse Michael from Eclypsium for reporting this issue.

Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.

Revision History

Revision Date Description
1.0 07/09/2019 Initial Release
my-tracker_cpteIntel® Processor Diagnostic Tool Advisory
read more

Intel® SSD DC S4500/S4600 Series Advisory

Intel ID: INTEL-SA-00267
Advisory Category: Firmware
Impact of vulnerability: Escalation of Privilege
Severity rating: MEDIUM
Original release: 07/09/2019
Last revised: 07/09/2019

Summary:

A potential security vulnerability in Intel® Solid State Drives (SSD) for Data Centers (DC) S4500/S4600 Series firmware may allow escalation of privilege. Intel is releasing firmware updates to mitigate this potential vulnerability.

Vulnerability Details:

CVEID: CVE-2018-18095

Description: Improper authentication in firmware for Intel(R) SSD DC S4500 Series and Intel(R) SSD DC S4600 Series before SCV10150 may allow an unprivileged user to potentially enable escalation of privilege via physical access.

CVSS Base Score: 5.3 Medium

CVSS Vector: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

Affected Products:

Intel® SSD DC S4500 Series firmware before SCV10150.

Intel® SSD DC S4600 Series firmware before SCV10150.

Recommendations:

Intel recommends updating Intel® SSD DC S4500 Series and Intel® SSD DC S4600 Series firmware to SCV10150 or later.

Updates are available for download at this location:

https://downloadcenter.intel.com/download/28639/Intel-SSD-Data-Center-Tool-Intel-SSD-DCT-?product=83425

Acknowledgements:

This issue was found internally by Intel.

Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.

Revision History

Revision Date Description
1.0 07/09/2019 Initial Release
my-tracker_cpteIntel® SSD DC S4500/S4600 Series Advisory
read more

Security vulnerabilities fixed in Firefox ESR 60.8

Announced
July 9, 2019
Impact
critical
Products
Firefox ESR
Fixed in
  • Firefox ESR 60.8

#CVE-2019-9811: Sandbox escape via installation of malicious language pack

Reporter
Niklas Baumstark
Impact
high
Description

As part of his winning Pwn2Own entry, Niklas Baumstark demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation.

References

#CVE-2019-11711: Script injection within domain through inner window reuse

Reporter
Boris Zbarsky
Impact
high
Description

When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security.

References

#CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects

Reporter
Gregory Smiley of Security Compass
Impact
high
Description

POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks.

References

#CVE-2019-11713: Use-after-free with HTTP/2 cached stream

Reporter
Hanno Böck
Impact
high
Description

A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash.

References

#CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault

Reporter
Jonas Allmann
Impact
moderate
Description

Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used.

References

#CVE-2019-11715: HTML parsing error can contribute to content XSS

Reporter
Linus Särud
Impact
moderate
Description

Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances.

References

#CVE-2019-11717: Caret character improperly escaped in origins

Reporter
Tyson Smith
Impact
moderate
Description

A vulnerability exists where the caret (« ^ ») character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes.

References

#CVE-2019-11719: Out-of-bounds read when importing curve25519 private key

Reporter
Henry Corrigan-Gibbs
Impact
moderate
Description

When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure.

References

#CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin

Reporter
Luigi Gubello
Impact
moderate
Description

A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. Luigi Gubello demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app’s predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents.

References

#CVE-2019-11709: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8

Reporter
Mozilla developers and community
Impact
critical
Description

Mozilla developers and community members Andreea Pavel, Christian Holler, Honza Bambas, Jason Kratzer, and Jeff Gilbert reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.

References
my-tracker_cpteSecurity vulnerabilities fixed in Firefox ESR 60.8
read more

Security vulnerabilities fixed in Firefox 68

 

Announced
July 9, 2019
Impact
critical
Products
Firefox
Fixed in
  • Firefox 68

#CVE-2019-9811: Sandbox escape via installation of malicious language pack

Reporter
Niklas Baumstark
Impact
high
Description

As part of his winning Pwn2Own entry, Niklas Baumstark demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation.

References

#CVE-2019-11711: Script injection within domain through inner window reuse

Reporter
Boris Zbarsky
Impact
high
Description

When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security.

References

#CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects

Reporter
Gregory Smiley of Security Compass
Impact
high
Description

POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks.

References

#CVE-2019-11713: Use-after-free with HTTP/2 cached stream

Reporter
Hanno Böck
Impact
high
Description

A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash.

References

#CVE-2019-11714: NeckoChild can trigger crash when accessed off of main thread

Reporter
Hanno Böck
Impact
moderate
Description

Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances.

References

#CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault

Reporter
Jonas Allmann
Impact
moderate
Description

Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used.

References

#CVE-2019-11715: HTML parsing error can contribute to content XSS

Reporter
Linus Särud
Impact
moderate
Description

Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances.

References

#CVE-2019-11716: globalThis not enumerable until accessed

Reporter
Chris Hacking
Impact
moderate
Description

Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed.

References

#CVE-2019-11717: Caret character improperly escaped in origins

Reporter
Tyson Smith
Impact
moderate
Description

A vulnerability exists where the caret (« ^ ») character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes.

References

#CVE-2019-11718: Activity Stream writes unsanitized content to innerHTML

Reporter
Mark Banner
Impact
moderate
Description

Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised.

References

#CVE-2019-11719: Out-of-bounds read when importing curve25519 private key

Reporter
Henry Corrigan-Gibbs
Impact
moderate
Description

When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure.

References

#CVE-2019-11720: Character encoding XSS vulnerability

Reporter
Rakesh Mane
Impact
moderate
Description

Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering.

References

#CVE-2019-11721: Domain spoofing through unicode latin ‘kra’ character

Reporter
Anonymous
Impact
moderate
Description

The unicode latin ‘kra’ character can be used to spoof a standard ‘k’ character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion.

References

#CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin

Reporter
Luigi Gubello
Impact
moderate
Description

A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. Luigi Gubello demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app’s predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents.

References

#CVE-2019-11723: Cookie leakage during add-on fetching across private browsing boundaries

Reporter
Andreas Wagner
Impact
low
Description

A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different « containers » for people who use the Firefox Multi-Account Containers Web Extension.

References

#CVE-2019-11724: Retired site input.mozilla.org has remote troubleshooting permissions

Reporter
Frederik Braun
Impact
low
Description

Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks.

References

#CVE-2019-11725: Websocket resources bypass safebrowsing protections

Reporter
Andrey
Impact
low
Description

When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections.

References

#CVE-2019-11727: PKCS#1 v1.5 signatures can be used for TLS 1.3

Reporter
Hubert Kario
Impact
low
Description

A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages.

References

#CVE-2019-11728: Port scanning through Alt-Svc header

Reporter
Trishita Tiwari, Ari Trachtenberg
Impact
low
Description

The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded.

References

#CVE-2019-11710: Memory safety bugs fixed in Firefox 68

Reporter
Mozilla developers and community
Impact
critical
Description

Mozilla developers and community members André Bargull, Christian Holler, Natalia Csoregi, Raul Gurzau, Daniel Varga, Jon Coppeard, Marcia Knous, Gary Kwong, Randell Jesup, David Bolter, Jeff Gilbert, and Deian Stefan reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.

References

#CVE-2019-11709: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8

Reporter
Mozilla developers and community
Impact
critical
Description

Mozilla developers and community members Andreea Pavel, Christian Holler, Honza Bambas, Jason Kratzer, and Jeff Gilbert reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.

References

my-tracker_cpteSecurity vulnerabilities fixed in Firefox 68
read more

VMware Security Advisories

Advisory ID VMSA-2019-0010
Advisory Severity Important
CVSSv3 Range 5.3 – 7.5
Synopsis VMware product updates address Linux kernel vulnerabilities in TCP Selective Acknowledgement (SACK) (CVE-2019-11477, CVE-2019-11478)
Issue Date 2019-07-02
Updated On 2019-07-02 (Initial Advisory)
CVE(s) CVE-2019-11477, and CVE-2019-11478
1. Impacted Products
  • AppDefense
  • Container Service Extension
  • Enterprise PKS
  • Horizon
  • Horizon DaaS
  • Hybrid Cloud Extension
  • Identity Manager
  • Integrated OpenStack
  • NSX for vSphere
  • NSX-T Data Center
  • Pulse Console
  • SD-WAN Edge by VeloCloud
  • SD-WAN Gateway by VeloCloud
  • SD-WAN Orchestrator by VeloCloud
  • Skyline Collector
  • Unified Access Gateway
  • vCenter Server Appliance
  • vCloud Availability Appliance
  • vCloud Director For Service Providers
  • vCloud Usage Meter
  • vRealize Automation
  • vRealize Business for Cloud
  • vRealize Code Stream
  • vRealize Log Insight
  • vRealize Network Insight
  • vRealize Operations Manager
  • vRealize Orchestrator Appliance
  • vRealize Suite Lifecycle Manager
  • vSphere Data Protection
  • vSphere Integrated Containers
  • vSphere Replication
2. Introduction
Several vulnerabilities in the Linux kernel implementation of TCP Selective Acknowledgement (SACK) have been disclosed. These issues may allow a malicious entity to execute a Denial of Service attack against affected products.
3. Linux kernel vulnerabilities in TCP Selective Acknowledgement (SACK) CVE-2019-11477, CVE-2019-11478

Description:

There are two uniquely identifiable vulnerabilities associated with the Linux kernel implementation of SACK:

  • CVE-2019-11477 – SACK Panic – A sequence of SACKs may be crafted such that one can trigger an integer overflow, leading to a kernel panic. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.5.
  • CVE-2019-11478 – SACK  Excess Resource Usage – a crafted sequence of SACKs will fragment the TCP retransmission queue, causing resource exhaustion. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.3.

Known Attack Vectors:

A malicious actor must have network access to an affected system including the ability to send traffic with low MSS values to the target.  Successful exploitation of these issues may cause the target system to crash or significantly degrade performance.

Resolution:

To remediate CVE-2019-11477 and CVE-2019-11478 update/upgrade to the versions listed in the ‘Fixed Version’ column of the ‘Resolution Matrix’ found below.

Workarounds:

Some VMware Virtual Appliances can workaround CVE-2019-11477 and CVE-2019-11478 by either disabling SACK or by modifying the built in firewall (if available) in the base OS of the product to drop incoming connections with a low MSS value. In-product workarounds (if available) have been enumerated in the ‘Workarounds’ column of the ‘Resolution Matrix’ found below.

Additional Documentations:

None.

Acknowledgements:

None.

Response Matrix:

Product Version Running On CVE Identifier CVSSV3 Severity Fixed Version Workarounds Additional Documents
AppDefense x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
Container Service Extension x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
Enterprise PKS x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
Horizon x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
Horizon DaaS x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
Hybrid Cloud Extension x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
Identity Manager x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
Integrated OpenStack x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
NSX for vSphere x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
NSX-T Data Center x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
Pulse Console x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
SD-WAN Edge by VeloCloud x.x Any CVE-2019-11477, CVE-2019-11478 7.5 Important 3.3.0 None None
SD-WAN Gateway by VeloCloud x.x Any CVE-2019-11477, CVE-2019-11478 7.5 Important 3.3.0 None None
SD-WAN Orchestrator by VeloCloud x.x Any CVE-2019-11477, CVE-2019-11478 7.5 Important 3.3.0 None None
Skyline Collector x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
Unified Access Gateway x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important 3.6  KB70899 None
vCenter Server Appliance 6.7 Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
vCenter Server Appliance 6.5 Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important 6.5u3 None None
vCenter Server Appliance 6.0 Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
vCloud Availability Appliance x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
vCloud Director For Service Providers x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending KB70900 None
vCloud Usage Meter x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
vRealize Automation x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
vRealize Business for Cloud x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
vRealize Code Stream x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
vRealize Log Insight x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
vRealize Network Insight x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
vRealize Operations Manager x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
vRealize Orchestrator Appliance x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
vRealize Suite Lifecycle Manager x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
vSphere Data Protection x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
vSphere Integrated Containers x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None
vSphere Replication x.x Virtual Appliance CVE-2019-11477, CVE-2019-11478 7.5 Important Patch Pending None None

5. Change log
2019-07-02: VMSA-2019-0010

Initial security advisory detailing remediations and/or workarounds for SD-WAN, Unified Access Gateway, vCenter Server Appliance, and vCloud Director For Service Providers.

my-tracker_cpteVMware Security Advisories
read more

Bulletin (SB19-182) Vulnerability Summary for the Week of June 24, 2019

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score
cesanta — mongoose An issue was discovered in Mongoose before 6.15. The parse_mqtt() function in mg_mqtt.c has a critical heap-based buffer overflow. 2019-06-24 7.5
cisco — data_center_network_manager A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper session management on affected DCNM software. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to gain administrative access on the affected device. 2019-06-26 7.5
cisco — data_center_network_manager A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to upload arbitrary files on an affected device. The vulnerability is due to incorrect permission settings in affected DCNM software. An attacker could exploit this vulnerability by uploading specially crafted data to the affected device. A successful exploit could allow the attacker to write arbitrary files on the filesystem and execute code with root privileges on the affected device. 2019-06-26 10.0
citrix — appdna Citrix AppDNA before 7 1906.1.0.472 has Incorrect Access Control. 2019-06-24 7.5
hp — support_assistant HP Support Assistant 8.7.50 and earlier allows a user to gain system privilege and allows unauthorized modification of directories or files. Note: A different vulnerability than CVE-2019-6329. 2019-06-25 7.2
hp — support_assistant HP Support Assistant 8.7.50 and earlier allows a user to gain system privilege and allows unauthorized modification of directories or files. Note: A different vulnerability than CVE-2019-6328. 2019-06-25 7.2
libexpat — expat In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks). 2019-06-24 7.8
livezilla — livezilla LiveZilla Server before 8.0.1.1 is vulnerable to SQL Injection in server.php via the p_ext_rse parameter. 2019-06-24 7.5
livezilla — livezilla LiveZilla Server before 8.0.1.1 is vulnerable to Denial Of Service (memory consumption) in knowledgebase.php via a large integer value of the depth parameter. 2019-06-24 7.1
livezilla — livezilla LiveZilla Server before 8.0.1.1 is vulnerable to SQL Injection in functions.internal.build.inc.php via the parameter p_dt_s_d. 2019-06-25 7.5
pivotal_software — spring_security Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of « null ». 2019-06-26 7.5
postgresql — postgresql PostgreSQL versions 10.x before 10.9 and versions 11.x before 11.4 are vulnerable to a stack-based buffer overflow. Any authenticated user can overflow a stack-based buffer by changing the user’s own password to a purpose-crafted value. This often suffices to execute arbitrary code as the PostgreSQL operating system account. 2019-06-26 9.0
qemu — qemu The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command injection, which allows the remote attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. 2019-06-24 10.0
qemu — qemu The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. 2019-06-24 10.0
toaruos — toaruos apps/gsudo.c in gsudo in ToaruOS through 1.10.9 has a buffer overflow allowing local privilege escalation to the root user via the DISPLAY environment variable. 2019-06-23 7.2

Back to top

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score
analogic — poste.io The Roundcube component of Analogic Poste.io 2.1.6 uses .htaccess to protect the logs/ folder, which is effective with the Apache HTTP Server but is ineffective with nginx. Attackers can read logs via the webmail/logs/sendmail URI. 2019-06-24 4.0
apache — tomcat The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. 2019-06-21 5.0
atlassian — jira The issue searching component in Jira before version 8.1.0 allows remote attackers to deny access to Jira service via denial of service vulnerability in issue search when ordering by « Epic Name ». 2019-06-26 4.0
bcnquark — quarking_password_manager BCN Quark Quarking Password Manager 3.1.84 suffers from a clickjacking vulnerability caused by allowing * within web_accessible_resources. An attacker can take advantage of this vulnerability and cause significant harm. 2019-06-24 4.3
canonical — ubuntu_linux arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another’s virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected. 2019-06-25 6.9
cisco — data_center_network_manager A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to gain access to sensitive files on an affected device. The vulnerability is due to incorrect permissions settings on affected DCNM software. An attacker could exploit this vulnerability by connecting to the web-based management interface of an affected device and requesting specific URLs. A successful exploit could allow the attacker to download arbitrary files from the underlying filesystem of the affected device. 2019-06-26 5.0
cisco — data_center_network_manager A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device. The vulnerability is due to improper access controls for certain URLs on affected DCNM software. An attacker could exploit this vulnerability by connecting to the web-based management interface of an affected device and requesting specific URLs. A successful exploit could allow the attacker to download log files and diagnostic information from the affected device. 2019-06-26 5.0
dell — supportassist_for_business_pcs PC-Doctor Toolbox before 7.3 has an Uncontrolled Search Path Element. 2019-06-25 6.8
fasterxml — jackson-databind FasterXML jackson-databind 2.x before 2.9.9 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible. 2019-06-24 4.3
glyphandcog — xpdfreader In Xpdf 4.01.01, a buffer over-read could be triggered in FoFiType1C::convertToType1 in fofi/FoFiType1C.cc when the index number is larger than the charset array bounds. It can, for example, be triggered by sending a crafted PDF document to the pdftops tool. It allows an attacker to use a crafted pdf file to cause Denial of Service or an information leak, or possibly have unspecified other impact. 2019-06-24 6.8
glyphandcog — xpdfreader In Xpdf 4.01.01, a heap-based buffer over-read could be triggered in FoFiType1C::convertToType0 in fofi/FoFiType1C.cc when it is trying to access the second privateDicts array element, because the privateDicts array has only one element allocated. 2019-06-24 4.3
gnu — binutils An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing ‘\0’ character. 2019-06-26 4.3
google — chrome Insufficient data validation in V8 in Google Chrome prior to 56.0.2924.76 allowed a remote attacker to leak cross-origin data via a crafted HTML page. 2019-06-27 4.3
google — chrome Insufficient data validation in Extensions API in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. 2019-06-27 4.3
google — chrome Unintended floating-point error accumulation in SwiftShader in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to leak cross-origin data via a crafted HTML page. 2019-06-27 4.3
google — chrome Insufficient data validation in filesystem URIs in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. 2019-06-27 4.3
google — chrome Incorrect array position calculations in V8 in Google Chrome prior to 70.0.3538.102 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. 2019-06-27 6.8
google — chrome Incorrect object lifetime calculations in GPU code in Google Chrome prior to 70.0.3538.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2019-06-27 6.8
google — chrome A double-eviction in the Incognito mode cache that lead to a user-after-free in cache in Google Chrome prior to 66.0.3359.139 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. 2019-06-27 6.8
google — chrome Object lifecycle issue in WebAssembly in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2019-06-27 6.8
google — chrome Uninitialized data in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted video file. 2019-06-27 4.3
google — chrome Information leak in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to bypass no-referrer policy via a crafted HTML page. 2019-06-27 4.3
google — chrome Missing type check in V8 in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. 2019-06-27 4.3
google — chrome Insufficient policy enforcement in Extensions API in Google Chrome prior to 67.0.3396.62 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. 2019-06-27 5.8
google — chrome Array bounds check failure in V8 in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. 2019-06-27 4.3
google — chrome Insufficient data validation in WebGL in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2019-06-27 6.8
google — chrome Incorect derivation of a packet length in WebRTC in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. 2019-06-27 6.8
google — chrome Insufficient policy enforcement in Blink in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to bypass same origin policy via a crafted HTML page. 2019-06-27 6.8
google — chrome Information leak in media engine in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. 2019-06-27 4.3
google — chrome Insufficient file type enforcement in Extensions API in Google Chrome prior to 68.0.3440.75 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted Chrome Extension. 2019-06-27 4.6
google — chrome Information leak in media engine in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page. 2019-06-27 4.3
google — chrome Use after free in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2019-06-27 6.8
google — chrome Use after free in file chooser in Google Chrome prior to 74.0.3729.108 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. 2019-06-27 6.8
google — chrome Information leak in autofill in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. 2019-06-27 4.3
google — chrome Use after free in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2019-06-27 6.8
google — chrome Incorrect security UI in popup blocker in Google Chrome on iOS prior to 75.0.3770.80 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. 2019-06-27 4.3
ibm — api_connect IBM API Connect 5.0.0.0 through 5.0.8.6 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 151256. 2019-06-25 6.8
ibm — api_connect IBM API Connect 2018.1 through 2018.4.1.5 could allow an attacker to obtain sensitive information from a specially crafted HTTP request that could aid an attacker in further attacks against the system. IBM X-Force ID: 155150. 2019-06-25 5.0
ibm — api_connect IBM API Connect 2018.1 through 2018.4.1.5 could disclose sensitive information to an unauthorized user that could aid in further attacks against the system. IBM X-Force ID: 155193. 2019-06-25 5.0
ibm — api_connect IBM API Connect 5.0.0.0 through 5.0.8.6 could allow an unauthorized user to obtain sensitive information about the system users using specially crafted HTTP requests. IBM X-Force ID: 162162. 2019-06-25 5.0
ibm — pureapplication_system IBM PureApplication System 2.2.3.0 through 2.2.5.3 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 159240. 2019-06-26 6.5
ibm — pureapplication_system IBM PureApplication System 2.2.3.0 through 2.2.5.3 weakness in the implementation of locking feature in pattern editor. An attacker by intercepting the subsequent requests can bypass business logic to modify the pattern to unlocked state. IBM X-Force ID: 159416. 2019-06-26 4.0
ibm — pureapplication_system IBM PureApplication System 2.2.3.0 through 2.2.5.3 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 159417. 2019-06-26 5.0
ibm — pureapplication_system IBM PureApplication System 2.2.3.0 through 2.2.5.3 could allow an authenticated user with local access to bypass authentication and obtain administrative access. IBM X-Force ID: 159467. 2019-06-26 4.6
ibm — rational_collaborative_lifecycle_management IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 discloses sensitive information in error messages that may be used by a malicious user to orchestrate further attacks. IBM X-Force ID: 147838. 2019-06-27 4.0
ibm — rational_collaborative_lifecycle_management IBM Jazz Foundation products (IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1) could allow an authenticated user to obtain sensitive information from CLM Applications that could be used in further attacks against the system. IBM X-Force ID: 157384. 2019-06-27 4.0
ibm — rational_collaborative_lifecycle_management IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing « dot dot » sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 159883. 2019-06-27 5.0
ibm — security_access_manager IBM Security Access Manager 9.0.1 through 9.0.6 is affected by a security vulnerability that could allow authenticated users to impersonate other users. IBM X-Force ID: 158331. 2019-06-25 6.5
ibm — security_access_manager IBM Security Access Manager 9.0.1 through 9.0.6 does not validate, or incorrectly validates, a certificate which could allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. IBM X-Force ID: 158510. 2019-06-25 4.3
ibm — security_access_manager IBM Security Access Manager 9.0.1 through 9.0.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 158512. 2019-06-25 4.3
ibm — security_access_manager IBM Security Access Manager 9.0.1 through 9.0.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 158572. 2019-06-25 4.3
ibm — security_access_manager IBM Security Access Manager 9.0.1 through 9.0.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158573. 2019-06-25 4.3
ibm — security_access_manager IBM Security Access Manager 9.0.1 through 9.0.6 does not prove that a user’s identity is correct which can lead to the exposure of resources or functionality to unintended actors. IBM X-Force ID: 158574. 2019-06-25 5.5
ibm — sterling_b2b_integrator IBM Sterling B2B Integrator 6.0.0.0 and 6.0.0.1 reveals sensitive information from a stack trace that could be used in further attacks against the system. IBM X-Force ID: 162803. 2019-06-25 4.0
imagemagick — imagemagick A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image. 2019-06-26 4.3
imagemagick — imagemagick ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c. 2019-06-26 4.3
imagemagick — imagemagick ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c. 2019-06-26 4.3
imagemagick — imagemagick ImageMagick 7.0.8-34 has a « use of uninitialized value » vulnerability in the WriteJP2Image function in coders/jp2.c. 2019-06-26 6.8
imagemagick — imagemagick ImageMagick 7.0.8-34 has a « use of uninitialized value » vulnerability in the ReadPANGOImage function in coders/pango.c. 2019-06-26 6.8
imagemagick — imagemagick ImageMagick 7.0.8-34 has a « use of uninitialized value » vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c. 2019-06-26 6.8
lenovo — system_update A denial of service vulnerability was reported in Lenovo System Update before version 5.07.0084 that could allow log files to be written to non-standard locations. 2019-06-26 5.0
linux — linux_kernel A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_target() in net/nfc/netlink.c in the Linux kernel before 5.1.13 can be triggered by a malicious user-mode program that omits certain NFC attributes, leading to denial of service. 2019-06-26 4.3
livezilla — livezilla LiveZilla Server before 8.0.1.1 is vulnerable to CSV Injection in the Export Function. 2019-06-25 6.8
livezilla — livezilla LiveZilla Server before 8.0.1.1 is vulnerable to XSS in mobile/index.php via the Accept-Language HTTP header. 2019-06-25 4.3
livezilla — livezilla LiveZilla Server before 8.0.1.1 is vulnerable to XSS in the chat.php Create Ticket Action. 2019-06-25 4.3
livezilla — livezilla LiveZilla Server before 8.0.1.1 is vulnerable to XSS in the ticket.php Subject. 2019-06-25 4.3
moodle — moodle A flaw was found in Moodle before 3.7, 3.6.4, 3.5.6, 3.4.9 and 3.1.18. The form to upload cohorts contained a redirect field, which was not restricted to internal URLs. 2019-06-26 5.8
moodle — moodle A flaw was found in Moodle before 3.7, 3.6.4, 3.5.6, 3.4.9 and 3.1.18. The size of users’ private file uploads via email were not correctly checked, so their quota allowance could be exceeded. 2019-06-26 4.3
moodle — moodle A flaw was found in Moodle before versions 3.7, 3.6.4. A web service fetching messages was not restricted to the current user’s conversations. 2019-06-26 5.0
netgate — pfsense In pfSense 2.4.4-p2 and 2.4.4-p3, if it is possible to trick an authenticated administrator into clicking on a button on a phishing page, an attacker can leverage XSS to upload arbitrary executable code, via diag_command.php and rrd_fetch_json.php (timePeriod parameter), to a server. Then, the remote attacker can run any command with root privileges on that server. 2019-06-25 4.3
netiq — self_service_password_reset A potential XSS exists in Self Service Password Reset, in Micro Focus NetIQ Software all versions prior to version 4.4. The vulnerability could be exploited to enable an XSS attack. 2019-06-24 4.3
netiq — self_service_password_reset An information leakage exists in Micro Focus NetIQ Self Service Password Reset Software all versions prior to version 4.4. The vulnerability could be exploited to expose sensitive information. 2019-06-24 5.0
openjpeg — openjpeg Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). 2019-06-26 4.3
openjpeg — openjpeg Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). 2019-06-26 4.3
openjpeg — openjpeg An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow. 2019-06-26 6.8
openjpeg — openjpeg In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616. 2019-06-26 4.3
phoenixcontact — automationworx_software_suite An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-Of-Bounds Read, Information Disclosure, and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation. 2019-06-24 6.8
phoenixcontact — automationworx_software_suite An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Uninitialized Pointer and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation. 2019-06-24 6.8
phoenixcontact — automationworx_software_suite An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to a Use-After-Free and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation. 2019-06-24 6.8
shopware — shopware Shopware before 5.5.8 has XSS via the Query String to the backend/Login or backend/Login/load/ URI. 2019-06-23 4.3
tenable — nessus Nessus versions 8.4.0 and earlier were found to contain a reflected XSS vulnerability due to improper validation of user-supplied input. An unauthenticated, remote attacker could potentially exploit this vulnerability via a specially crafted request to execute arbitrary script code in a users browser session. 2019-06-25 4.3
ultimatemember — ultimate_member An issue was discovered in the Ultimate Member plugin 2.39 for WordPress. It allows unauthorized profile and cover picture modification. It is possible to modify the profile and cover picture of any user once one is connected. One can also modify the profiles and cover pictures of privileged users. To perform such a modification, one first needs to (for example) intercept an upload-picture request and modify the user_id parameter. 2019-06-24 4.0
zyxel — uag2100_firmware A reflective Cross-site scripting (XSS) vulnerability in the free_time_failed.cgi CGI program in selected Zyxel ZyWall, USG, and UAG devices allows remote attackers to inject arbitrary web script or HTML via the err_msg parameter. 2019-06-27 4.3
zyxel — uag2100_firmware Missing Access Control in the « Free Time » component of several Zyxel UAG, USG, and ZyWall devices allows a remote attacker to generate guest accounts by directly accessing the account generator. This can lead to unauthorised network access or Denial of Service. 2019-06-27 6.4

Back to top

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score
google — chrome Use of extended attributes in downloads in Google Chrome prior to 72.0.3626.81 allowed a local attacker to read download URLs via the filesystem. 2019-06-27 2.1
ibm — pureapplication_system IBM PureApplication System 2.2.3.0 through 2.2.5.3 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 159242. 2019-06-26 2.1
ibm — rational_collaborative_lifecycle_management IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 148605. 2019-06-27 3.5
ibm — rational_collaborative_lifecycle_management IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 148614. 2019-06-27 3.5
ibm — rational_collaborative_lifecycle_management IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150429. 2019-06-27 3.5
ibm — rational_collaborative_lifecycle_management IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150430. 2019-06-27 3.5
ibm — rational_collaborative_lifecycle_management IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150431. 2019-06-27 3.5
ibm — rational_collaborative_lifecycle_management IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152156. 2019-06-27 3.5
ibm — rational_collaborative_lifecycle_management IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152157. 2019-06-27 3.5
ibm — rational_collaborative_lifecycle_management IBM Jazz Foundation products (IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 157383. 2019-06-27 3.5
ibm — rational_collaborative_lifecycle_management IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 159647. 2019-06-27 3.5
ibm — rational_collaborative_lifecycle_management IBM Jazz Foundation products (IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 159648. 2019-06-27 3.5
ibm — security_access_manager IBM Security Access Manager 9.0.1 through 9.0.6 could reveal highly sensitive in specialized conditions to a local user which could be used in further attacks against the system. IBM X-Force ID: 158400. 2019-06-25 3.6
ibm — security_access_manager IBM Security Access Manager 9.0.1 through 9.0.6 does not invalidate session tokens in a timely manner. The lack of proper session expiration may allow attackers with local access to login into a closed browser session. IBM X-Force ID: 158515. 2019-06-25 3.6
ibm — security_access_manager IBM Security Access Manager 9.0.1 through 9.0.6 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 158517. 2019-06-25 3.5
polycom — better_together_over_ethernet_connector VVX products using UCS software version 5.9.2 and earlier with Better Together over Ethernet Connector (BToE) application version 3.9.1 and earlier provides insufficient authentication between the BToE application and the BToE component, resulting in leakage of sensitive information. 2019-06-24 3.3
quadbase — espressreport_es Stored XSS within Quadbase EspressReport ES (ERES) v7.0 update 7 allows remote attackers to execute malicious JavaScript and inject arbitrary source code into the target pages. The XSS payload is stored by creating a new user account, and setting the username to an XSS payload. The stored payload can then be triggered by accessing the « Set Security Levels » or « View User/Group Relationships » page. If the attacker does not currently have permission to create a new user, another vulnerability such as CSRF must be exploited first. 2019-06-24 3.5
redhat — cloudforms_management_engine A stored cross-site scripting (XSS) vulnerability was found in the PDF export component of CloudForms, versions 5.9 and 5.10, due to user input is not properly sanitized. An attacker with least privilege to edit compute is able to execute a XSS attack against other users, which could lead to malicious code execution and extraction of the anti-CSRF token of higher privileged users. 2019-06-27 3.5

Back to top

Severity Not Yet Assigned

Primary
Vendor — Product
Description Published CVSS Score
abb — cp635_hmi The ABB CP635 HMI uses two different transmission methods to upgrade its firmware and its software components: « Utilization of USB/SD Card to flash the device » and « Remote provisioning process via ABB Panel Builder 600 over FTP. » Neither of these transmission methods implements any form of encryption or authenticity checks against the new firmware HMI software binary files. 2019-06-24 not yet calculated
abb — hmi_components The ABB HMI components implement hidden administrative accounts that are used during the provisioning phase of the HMI interface. These credentials allow the provisioning tool « Panel Builder 600 » to flash a new interface and Tags (MODBUS coils) mapping to the HMI. These credentials are the idal123 password for the IdalMaster account, and the exor password for the exor account. These credentials are used over both HTTP(S) and FTP. There is no option to disable or change these undocumented credentials. An attacker can use these credentials to login to ABB HMI to read/write HMI configuration files and also to reset the device. This affects ABB CP635 HMI, CP600 HMIClient, Panel Builder 600, IDAL FTP server, IDAL HTTP server, and multiple other HMI components. 2019-06-27 not yet calculated
abb — idal_ftp_server The ABB IDAL FTP server is vulnerable to a buffer overflow when a long string is sent by an authenticated attacker. This overflow is handled, but terminates the process. An authenticated attacker can send a FTP command string of 472 bytes or more to overflow a buffer, causing an exception that terminates the server. 2019-06-24 not yet calculated
abb — idal_ftp_server The ABB IDAL FTP server mishandles format strings in a username during the authentication process. Attempting to authenticate with the username %s%p%x%d will crash the server. Sending %08x.AAAA.%08x.%08x will log memory content from the stack. 2019-06-24 not yet calculated
abb — idal_ftp_server In the ABB IDAL FTP server, an authenticated attacker can traverse to arbitrary directories on the hard disk with « CWD ../ » and then use the FTP server functionality to download and upload files. An unauthenticated attacker can take advantage of the hardcoded or default credential pair exor/exor to become an authenticated attacker. 2019-06-27 not yet calculated
abb — idal_http_server The ABB IDAL HTTP server mishandles format strings in a username or cookie during the authentication process. Attempting to authenticate with the username %25s%25p%25x%25n will crash the server. Sending %08x.AAAA.%08x.%08x will log memory content from the stack. 2019-06-27 not yet calculated
abb — idal_http_server The ABB IDAL HTTP server is vulnerable to a buffer overflow when a long Host header is sent in a web request. The Host header value overflows a buffer and overwrites a Structured Exception Handler (SEH) address. An unauthenticated attacker can submit a Host header value of 2047 bytes or more to overflow the buffer and overwrite the SEH address, which can then be leveraged to execute attacker-controlled code on the server. 2019-06-24 not yet calculated
abb — idal_http_server The ABB IDAL HTTP server CGI interface contains a URL that allows an unauthenticated attacker to bypass authentication and gain access to privileged functions. Specifically, /cgi/loginDefaultUser creates a session in an authenticated state and returns the session ID along with what may be the username and cleartext password of the user. An attacker can then supply an IDALToken value in a cookie, which will allow them to perform privileged operations such as restarting the service with /cgi/restart. A GET request to /cgi/loginDefaultUser may result in « 1 #S_OK IDALToken=532c8632b86694f0232a68a0897a145c admin admin » or a similar response. 2019-06-27 not yet calculated
actiontec — web6000q_devices An issue was discovered in the Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 devices. An attacker can statically set his/her IP to anything on the 169.254.1.0/24 subnet, and obtain root access by connecting to 169.254.1.2 port 23 with telnet/netcat. 2019-06-27 not yet calculated
actiontec — web6000q_devices The Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 allows login with root level access with the user « root » and an empty password by using the enabled onboard UART headers. 2019-06-27 not yet calculated
actiontec — web6000q_devices On Telus Actiontec WEB6000Q v1.1.02.22 devices, an attacker can login with root level access with the user « root » and password « admin » by using the enabled onboard UART headers. 2019-06-28 not yet calculated
advanced_micro_devices — platform_security_processor Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation. 2019-06-25 not yet calculated
advantech — webaccess/scada In WebAccess/SCADA, Versions 8.3.5 and prior, a path traversal vulnerability is caused by a lack of proper validation of a user-supplied path prior to use in file operations. An attacker can leverage this vulnerability to delete files while posing as an administrator. 2019-06-28 not yet calculated
advantech — webaccess/scada In WebAccess/SCADA Versions 8.3.5 and prior, an out-of-bounds read vulnerability is caused by a lack of proper validation of user-supplied data. Exploitation of this vulnerability may allow disclosure of information. 2019-06-28 not yet calculated
advantech — webaccess/scada In WebAccess/SCADA Versions 8.3.5 and prior, multiple heap-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution. Note: A different vulnerability than CVE-2019-10991. 2019-06-28 not yet calculated
advantech — webaccess/scada In WebAccess/SCADA Versions 8.3.5 and prior, multiple out-of-bounds write vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution. 2019-06-28 not yet calculated
advantech — webaccess/scada In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulnerabilities may allow a remote attacker to execute arbitrary code. 2019-06-28 not yet calculated
advantech — webaccess/scada In WebAccess/SCADA, Versions 8.3.5 and prior, multiple stack-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution. 2019-06-28 not yet calculated
asus — hivivo_application The ASUS HiVivo application before 5.6.27 for ASUS Watch has Missing SSL Certificate Validation. 2019-06-24 not yet calculated
bluestacks — app_player BlueStacks App Player 2, 3, and 4 before 4.90 allows DNS Rebinding for attacks on exposed IPC functions. 2019-06-23 not yet calculated
couchbase — couchbase_sync_gateway_and_couchbase_server The Couchbase Sync Gateway 2.1.2 in combination with a Couchbase Server is affected by a previously undisclosed N1QL-injection vulnerability in the REST API. An attacker with access to the public REST API can insert additional N1QL statements through the parameters ?startkey? and ?endkey? of the ?_all_docs? endpoint. 2019-06-26 not yet calculated
diffplug — spotless In DiffPlug Spotless before 1.20.0 (library and Maven plugin) and before 3.20.0 (Gradle plugin), the XML parser would resolve external entities over both HTTP and HTTPS and didn’t respect the resolveExternalEntities setting. For example, this allows disclosure of file contents to a MITM attacker if a victim performs a spotlessApply operation on an untrusted XML file. 2019-06-28 not yet calculated
digitaldruid — hoteldruid Hoteldruid before v2.3.1 allows remote authenticated users to cause a denial of service (invoice-creation outage) via the n_file parameter to visualizza_contratto.php with invalid arguments (any non-numeric value), as demonstrated by the anno=2019&id_transazione=1&numero_contratto=1&n_file=a query string to visualizza_contratto.php. 2019-06-24 not yet calculated
doomseeker — doomseeker A vulnerability was found in the Sonic Robo Blast 2 (SRB2) plugin (EP_Versions 9 to 11 inclusive) distributed with Doomseeker 1.1 and 1.2. Affected plugin versions did not discard IP packets with an unnaturally long response length from a Sonic Robo Blast 2 master server, allowing a remote attacker to cause a potential crash / denial of service in Doomseeker. The issue has been remediated in the Doomseeker 1.3 release with source code patches to the SRB2 plugin. 2019-06-26 not yet calculated
facebook_open_source — hhvm HHVM, when used with FastCGI, would bind by default to all available interfaces. This behavior could allow a malicious individual unintended direct access to the application, which could result in information disclosure. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, and all versions in the 4.0, 4.1, and 4.2 series. 2019-06-26 not yet calculated
fehelper — fehelper FeHelper through 2019-06-19 allows arbitrary code execution during a JSON format operation, as demonstrated by the {« a »:(function(){confirm(1)})()} input. 2019-06-26 not yet calculated
flightcrew — flightcrew An issue was discovered in FlightCrew v0.9.2 and earlier. A NULL pointer dereference occurs in GetRelativePathToNcx() or GetRelativePathsToXhtmlDocuments() when a NULL pointer is passed to xc::XMLUri::isValidURI(). This affects third-party software (not Sigil) that uses FlightCrew as a library. 2019-06-28 not yet calculated
gnome — glib The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.59.1 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450. 2019-06-28 not yet calculated
google — chrome Incorrect convexity calculations in Skia in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Integer overflow in download manager in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Insufficient file type enforcement in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to obtain local file data via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Type confusion in WebRTC in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. 2019-06-27 not yet calculated
google — chrome Insufficient policy enforcement in ServiceWorker in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Type confusion in JavaScript in Google Chrome prior to 67.0.3396.87 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Incorrect implementation in Content Security Policy in Google Chrome prior to 67.0.3396.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Insufficient data validation in HTML parser in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to bypass same origin policy via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Use after free in Bluetooth in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension. 2019-06-27 not yet calculated
google — chrome Incorrect handling of object lifetimes in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Object lifecycle issue in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass content security policy via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Object lifecycle issue in ServiceWorker in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Incorrect handling of CORS in ServiceWorker in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak cross-origin data via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Out of bounds array access in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Insufficient policy enforcement in site isolation in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass site isolation via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Object lifecycle issue in V8 in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Incorrect URL parsing in WebKit in Google Chrome on iOS prior to 67.0.3396.62 allowed a remote attacker to perform domain spoofing via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Insufficient validation of input in Blink in Google Chrome prior to 66.0.3359.170 allowed a remote attacker to perform privilege escalation via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Integer overflows in Skia in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Insufficient policy enforcement in extensions API in Google Chrome prior to 69.0.3497.81 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. 2019-06-27 not yet calculated
google — chrome Incorrect handling of frames in the VP8 parser in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. 2019-06-27 not yet calculated
google — chrome Parameter passing error in media in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Insufficient policy enforcement in site isolation in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to bypass site isolation via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Incorrect handling of deferred code in V8 in Google Chrome prior to 72.0.3626.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. 2019-06-27 not yet calculated
google — chrome Resource size information leakage in Blink in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Insufficient data validation in developer tools in Google Chrome on OS X prior to 74.0.3729.108 allowed a local attacker to execute arbitrary code via a crafted string copied to clipboard. 2019-06-27 not yet calculated
google — chrome Insufficient policy enforcement in XMLHttpRequest in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Use-after-free in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. 2019-06-27 not yet calculated
google — chrome Insufficient policy enforcement in extensions API in Google Chrome prior to 75.0.3770.80 allowed an attacker who convinced a user to install a malicious extension to bypass restrictions on file URIs via a crafted Chrome Extension. 2019-06-27 not yet calculated
google — chrome Incorrect dialog box scoping in browser in Google Chrome on Android prior to 75.0.3770.80 allowed a remote attacker to display misleading security UI via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Insufficient policy enforcement in service workers in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Insufficient data validation in Blink in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to perform domain spoofing via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Inappropriate implementation in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. 2019-06-27 not yet calculated
google — chrome Integer overflow in SQLite via WebSQL in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Object lifecycle issue in SwiftShader in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Integer overflow in ANGLE in Google Chrome on Windows prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Insufficient policy enforcement in CORS in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Heap buffer overflow in ANGLE in Google Chrome on Windows prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Process lifetime issue in Chrome in Google Chrome on Android prior to 74.0.3729.108 allowed a remote attacker to potentially persist an exploited process via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Insufficient policy enforcement in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to leak cross-origin data via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Excessive data validation in URL parser in Google Chrome prior to 75.0.3770.80 allowed a remote attacker who convinced a user to input a URL to bypass website URL validation via a crafted URL. 2019-06-27 not yet calculated
google — chrome Heap buffer overflow in ANGLE in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Inadequate security UI in iOS UI in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to perform domain spoofing via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Incorrect handling of CORS in ServiceWorker in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Object lifetime issue in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2019-06-27 not yet calculated
google — chrome Uninitialized data in media in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted video file. 2019-06-27 not yet calculated
grafana — grafana public/app/features/panel/panel_ctrl.ts in Grafana before 6.2.5 allows HTML Injection in panel drilldown links (via the Title or url field). 2019-06-29 not yet calculated
grouptime — teamwire_desktop_client The admin interface of the Grouptime Teamwire Desktop Client 1.5.1 prior to 1.9.0 on-premises messenger server allows stored XSS. All backend versions prior to prod-2018-11-13-15-00-42 are affected. 2019-06-28 not yet calculated
grouptime — teamwire_desktop_client Grouptime Teamwire Desktop Client 1.5.1 prior to 1.9.0 on Windows allows code injection via a template, leading to remote code execution. All backend versions prior to prod-2018-11-13-15-00-42 are affected. 2019-06-28 not yet calculated
hosting_controller — hc10_hc.server_service The HC.Server service in Hosting Controller HC10 10.14 allows an Invalid Pointer Write DoS. 2019-06-24 not yet calculated
ibm — bigfix_inventory IBM BigFix Inventory v9 (SUA v9 / ILMT v9) discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 161807. 2019-06-28 not yet calculated
ibm — websphere_application_server IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Admin Console could allow a remote attacker to obtain sensitive information when a specially crafted url causes a stack trace to be dumped. IBM X-Force ID: 160202. 2019-06-28 not yet calculated
icon_project — loopchain In Loopchain through 2.2.1.3, an attacker can escalate privileges from a low-privilege shell by changing the environment (aka injection in the DEFAULT_SCORE_HOST environment variable). 2019-06-28 not yet calculated
irssi — irssi Irssi before 1.0.8, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, when SASL is enabled, has a use after free when sending SASL login to the server. 2019-06-29 not yet calculated
istio — istio Istio before 1.2.2 mishandles certain access tokens, leading to « Epoch 0 terminated with an error » in Envoy. This is related to a jwt_authenticator.cc segmentation fault. 2019-06-28 not yet calculated
keyidentity — linotp KeyIdentity LinOTP before 2.10.5.3 has Incorrect Access Control (issue 1 of 2). 2019-06-27 not yet calculated
lemonldap-ng — lemonldap-ng LemonLDAP::NG before 1.9.20 has an XML External Entity (XXE) issue when submitting a notification to the notification server. By default, the notification server is not enabled and has a « deny all » rule. 2019-06-28 not yet calculated
lenovo — service_bridge A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow cross-site request forgery. 2019-06-26 not yet calculated
lenovo — service_bridge A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow remote code execution. 2019-06-26 not yet calculated
lenovo — service_bridge A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow unencrypted downloads over FTP. 2019-06-26 not yet calculated
lenovo — service_bridge A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow remote code execution. 2019-06-26 not yet calculated
lexmark — multiple_devices Various Lexmark devices have a Buffer Overflow (issue 2 of 2). 2019-06-28 not yet calculated
lexmark — multiple_devices Various Lexmark devices have a Buffer Overflow (issue 1 of 2). 2019-06-28 not yet calculated
libming — libming Ming (aka libming) 0.4.8 has a heap buffer overflow and underflow in the decompileCAST function in util/decompile.c in libutil.a. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted SWF file. 2019-06-26 not yet calculated
libming — libming In Ming (aka libming) 0.4.8, there is an integer overflow (caused by an out-of-range left shift) in the SWFInput_readSBits function in blocks/input.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted swf file. 2019-06-26 not yet calculated
libming — libming Ming (aka libming) 0.4.8 has an « fill overflow » vulnerability in the function SWFShape_setLeftFillStyle in blocks/shape.c. 2019-06-26 not yet calculated
logitech — r500_presentation_clicker The Logitech R500 presentation clicker allows attackers to determine the AES key, leading to keystroke injection. On Windows, any text may be injected by using ALT+NUMPAD input to bypass the restriction on the characters A through Z. 2019-06-29 not yet calculated
logitech — unifying_devices Logitech Unifying devices before 2016-02-26 allow keystroke injection, bypassing encryption, aka MouseJack. 2019-06-29 not yet calculated
logitech — unifying_devices Logitech Unifying devices allow live decryption if the pairing of a keyboard to a receiver is sniffed. 2019-06-29 not yet calculated
logitech — unifying_devices Certain Logitech Unifying devices allow attackers to dump AES keys and addresses, leading to the capability of live decryption of Radio Frequency transmissions, as demonstrated by an attack against a Logitech K360 keyboard. 2019-06-29 not yet calculated
logitech — unifying_devices Logitech Unifying devices allow keystroke injection, bypassing encryption. The attacker must press a « magic » key combination while sniffing cryptographic data from a Radio Frequency transmission. NOTE: this issue exists because of an incomplete fix for CVE-2016-10761. 2019-06-29 not yet calculated
loytec — lgate-902_devices LOYTEC LGATE-902 6.3.2 devices allow Arbitrary file deletion. 2019-06-28 not yet calculated
loytec — lgate-902_devices LOYTEC LGATE-902 6.3.2 devices allow Directory Traversal. 2019-06-28 not yet calculated
loytec — lgate-902_devices LOYTEC LGATE-902 6.3.2 devices allow XSS. 2019-06-28 not yet calculated
makerbot — replicator_5g_printer The MakerBot Replicator 5G printer runs an Apache HTTP Server with directory indexing enabled. Apache logs, system logs, design files (i.e., a history of print files), and more are exposed to unauthenticated attackers through this HTTP server. 2019-06-24 not yet calculated
mcafee — enterprise_security_manager Directory Traversal vulnerability in McAfee Enterprise Security Manager (ESM) prior to 11.2.0 and prior to 10.4.0 allows authenticated user to gain elevated privileges via specially crafted input. 2019-06-27 not yet calculated
mcafee — enterprise_security_manager Privilege escalation in McAfee Enterprise Security Manager (ESM) 11.x prior to 11.2.0 allows authenticated user to gain access to a core system component via incorrect access control. 2019-06-27 not yet calculated
mcafee — enterprise_security_manager Application protection bypass vulnerability in McAfee Enterprise Security Manager (ESM) prior to 11.2.0 and prior to 10.4.0 allows unauthenticated user to impersonate system users via specially crafted parameters. 2019-06-27 not yet calculated
mcafee — enterprise_security_manager Command Injection vulnerability in McAfee Enterprise Security Manager (ESM) prior to 11.2.0 and prior to 10.4.0 allows authenticated user to execute arbitrary code via specially crafted parameters. 2019-06-27 not yet calculated
mcafee — enterprise_security_manager Command Injection vulnerability in McAfee Enterprise Security Manager (ESM) prior to 11.2.0 and prior to 10.4.0 allows authenticated user to execute arbitrary code via specially crafted parameters. 2019-06-27 not yet calculated
medtronic — minimed_508_and_paradigm_series_insulin_pumps In Medtronic MinMed 508 and Medtronic Minimed Paradigm Insulin Pumps, Versions, MiniMed 508 pump ? All versions, MiniMed Paradigm 511 pump ? All versions, MiniMed Paradigm 512/712 pumps ? All versions, MiniMed Paradigm 712E pump?All versions, MiniMed Paradigm 515/715 pumps?All versions, MiniMed Paradigm 522/722 pumps ? All versions,MiniMed Paradigm 522K/722K pumps ? All versions, MiniMed Paradigm 523/723 pumps ? Software versions 2.4A or lower, MiniMed Paradigm 523K/723K pumps ? Software, versions 2.4A or lower, MiniMed Paradigm Veo 554/754 pumps ? Software versions 2.6A or lower, MiniMed Paradigm Veo 554CM and 754CM models only ? Software versions 2.7A or lower, the affected insulin pumps are designed to communicate using a wireless RF with other devices, such as blood glucose meters, glucose sensor transmitters, and CareLink USB devices. This wireless RF communication protocol does not properly implement authentication or authorization. An attacker with adjacent access to one of the affected insulin pump models can inject, replay, modify, and/or intercept data. This vulnerability could also allow attackers to change pump settings and control insulin delivery. 2019-06-28 not yet calculated
ministry_of_interior_of_the_slovak_republic — eid_client An incorrect implementation of a local web server in eID client (Windows version before 3.1.2, Linux version before 3.0.3) allows remote attackers to execute arbitrary code (.cgi, .pl, or .php) or delete arbitrary files via a crafted HTML page. This is a product from the Ministry of Interior of the Slovak Republic. 2019-06-28 not yet calculated
nginx — nginx njs through 0.3.3, used in NGINX, has a buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c. This issue occurs after the fix for CVE-2019-12207 is in place. 2019-06-29 not yet calculated
odoo — community_and_enterprise Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds. 2019-06-28 not yet calculated
odoo — community_and_enterprise Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters. 2019-06-28 not yet calculated
odoo — community_and_enterprise Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call. 2019-06-28 not yet calculated
odoo — community_and_enterprise The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST’s local file inclusion, which allows privileged authenticated users to read local files via a crafted module description. 2019-06-28 not yet calculated
odoo — community_and_enterprise Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request. 2019-06-28 not yet calculated
pandora_fms — pandora_fms Artica Pandora FMS 7.0 NG before 735 suffers from local privilege escalation due to improper permissions on C:\PandoraFMS and its sub-folders, allowing standard users to create new files. Moreover, the Apache service httpd.exe will try to execute cmd.exe from C:\PandoraFMS (the current directory) as NT AUTHORITY\SYSTEM upon web requests to the portal. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\SYSTEM. 2019-06-29 not yet calculated
panduit — intravue An insecure login process was discovered in Panduit IntraVUE before 3.2.0. 2019-06-29 not yet calculated
pulse_secure — pulse_connect_secure An input validation issue has been found with login_meeting.cgi in Pulse Secure Pulse Connect Secure 8.3RX before 8.3R2. 2019-06-28 not yet calculated
pulse_secure — pulse_connect_secure An XSS issue has been found in welcome.cgi in Pulse Secure Pulse Connect Secure (PCS) 8.1.x before 8.1R12, 8.2.x before 8.2R9, and 8.3.x before 8.3R3 due to one of the URL parameters not being sanitized properly. 2019-06-28 not yet calculated
pulse_secure — pulse_connect_secure An XSS issue was found with Psaldownload.cgi in Pulse Secure Pulse Connect Secure (PCS) 8.3R2 before 8.3R2 and Pulse Policy Secure (PPS) 5.4RX before 5.4R2. This is not applicable to PCS 8.1RX or PPS 5.2RX. 2019-06-28 not yet calculated
pulse_secure — pulse_connect_secure An XSS issue has been found with rd.cgi in Pulse Secure Pulse Connect Secure 8.3RX before 8.3R3 due to improper header sanitization. This is not applicable to 8.1RX. 2019-06-28 not yet calculated
pulse_secure — pulse_connect_secure A hidden RPC service issue was found with Pulse Secure Pulse Connect Secure 8.3RX before 8.3R2 and 8.1RX before 8.1R12. 2019-06-28 not yet calculated
pulse_secure — pulse_connect_secure_and_pulse_policy_secure A crafted message can cause the web server to crash with Pulse Secure Pulse Connect Secure (PCS) 8.3RX before 8.3R5 and Pulse Policy Secure 5.4RX before 5.4R5. This is not applicable to PCS 8.1RX. 2019-06-28 not yet calculated
pulse_secure — pulse_connect_secure_and_pulse_policy_secure Session data between cluster nodes during cluster synchronization is not properly encrypted in Pulse Secure Pulse Connect Secure (PCS) 8.3RX before 8.3R2 and Pulse Policy Secure (PPS) 5.4RX before 5.4R2. This is not applicable to PCS 8.1RX, PPS 5.2RX, or stand-alone devices. 2019-06-28 not yet calculated
pulse_secure — pulse_secure_desktop An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is applicable only to dual-stack (IPv4/IPv6) endpoints. 2019-06-28 not yet calculated
quadbase_systems — espressreport_es CSRF within the admin panel in Quadbase EspressReport ES (ERES) v7.0 update 7 allows remote attackers to escalate privileges, or create new admin accounts by crafting a malicious web page that issues specific requests, using a target admin’s session to process their requests. 2019-06-24 not yet calculated
rockoa — rockoa RockOA 1.8.7 allows remote attackers to obtain sensitive information because the webmain/webmainAction.php publictreestore method constructs a SQL WHERE clause unsafely by using the pidfields and idfields parameters, aka background SQL injection. 2019-06-28 not yet calculated
seeddms — seeddms A stored XSS vulnerability was found in SeedDMS 5.1.11 due to poorly escaping the search result in the autocomplete search form placed in the header of out/out.Viewfolder.php. 2019-06-28 not yet calculated
sks_keyserver_project — sks_keyserver Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack. 2019-06-29 not yet calculated
toaruos — toaruos linker/linker.c in ToaruOS through 1.10.9 has insecure LD_LIBRARY_PATH handling in setuid applications. 2019-06-29 not yet calculated
toaruos — toaruos kernel/sys/syscall.c in ToaruOS through 1.10.9 has incorrect access control in sys_sysfunc case 9 for TOARU_SYS_FUNC_SETHEAP, allowing arbitrary kernel pages to be mapped into user land, leading to root access. 2019-06-29 not yet calculated
toaruos — toaruos kernel/sys/syscall.c in ToaruOS through 1.10.9 allows a denial of service upon a critical error in certain sys_sbrk allocation patterns (involving PAGE_SIZE, and a value less than PAGE_SIZE). 2019-06-29 not yet calculated
toaruos — toaruos An integer wrap in kernel/sys/syscall.c in ToaruOS 1.10.10 allows users to map arbitrary kernel pages into userland process space via TOARU_SYS_FUNC_MMAP, leading to escalation of privileges. 2019-06-29 not yet calculated
uninett — mod_auth_mellon mod_auth_mellon through 0.14.2 has an Open Redirect via the login?ReturnTo= substring, as demonstrated by omitting the // after http: in the target URL. 2019-06-29 not yet calculated
virt-cdi-cloner — virt-cdi-cloner A flaw was found in the containerized-data-importer in virt-cdi-cloner, version 1.4, where the host-assisted cloning feature does not determine whether the requesting user has permission to access the Persistent Volume Claim (PVC) in the source namespace. This could allow users to clone any PVC in the cluster into their own namespace, effectively allowing access to other user’s data. 2019-06-28 not yet calculated
wordpress — wordpress In the miniOrange SAML SP Single Sign On plugin before 4.8.73 for WordPress, the SAML Login Endpoint is vulnerable to XSS via a specially crafted SAMLResponse XML post. 2019-06-24 not yet calculated
zoneminder — zoneminder Stored XSS in the Filters page (Name field) in ZoneMinder 1.32.3 allows a malicious user to embed and execute JavaScript code in the browser of any user who navigates to this page. 2019-06-29 not yet calculated

Back to top

my-tracker_cpteBulletin (SB19-182) Vulnerability Summary for the Week of June 24, 2019
read more