CVE-2017-0381CVE-2017-0381

Affected configuration(s):

cpe:/o:google:android:5.0
cpe:/o:google:android:5.0.1
cpe:/o:google:android:5.0.2
cpe:/o:google:android:5.1
cpe:/o:google:android:5.1.0
cpe:/o:google:android:5.1.1
cpe:/o:google:android:6.0
cpe:/o:google:android:6.0.1
cpe:/o:google:android:7.0
cpe:/o:google:android:7.1.0

Date published: 2017-01-12T15:59:01.953-05:00

Date last modified: 2017-10-23T21:29:01.500-04:00

CVSS Score: 9.3

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://www.securityfocus.com/bid/95248

Summary: An information disclosure vulnerability in silk/NLSF_stabilize.c in libopus in Mediaserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-31607432.

CVE-2014-4784CVE-2014-4784

Affected configuration(s):

cpe:/a:ibm:initiate_master_data_service:9.5
cpe:/a:ibm:initiate_master_data_service:9.7
cpe:/a:ibm:initiate_master_data_service:10.0
cpe:/a:ibm:initiate_master_data_service:10.1

Date published: 2014-09-10T06:55:08.020-04:00

Date last modified: 2017-08-28T21:35:07.063-04:00

CVSS Score: 4.3

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://www-01.ibm.com/support/docview.wss?uid=swg21682450

Summary: IBM Initiate Master Data Service 9.5 before 9.5.093013, 9.7 before 9.7.093013, 10.0 before 10.0.093013, and 10.1 before 10.1.093013 does not properly restrict use of FRAME elements, which allows remote attackers to conduct phishing attacks, and bypass intended access restrictions or obtain sensitive information, via a crafted web site, related to a “frame injection” issue.

CVE-2014-4785CVE-2014-4785

Affected configuration(s):

cpe:/a:ibm:initiate_master_data_service:9.5
cpe:/a:ibm:initiate_master_data_service:9.7
cpe:/a:ibm:initiate_master_data_service:10.0
cpe:/a:ibm:initiate_master_data_service:10.1

Date published: 2014-09-10T06:55:08.067-04:00

Date last modified: 2017-08-28T21:35:07.110-04:00

CVSS Score: 6.0

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://www-01.ibm.com/support/docview.wss?uid=swg21682450

Summary: Cross-site request forgery (CSRF) vulnerability in IBM Initiate Master Data Service 9.5 before 9.5.093013, 9.7 before 9.7.093013, 10.0 before 10.0.093013, and 10.1 before 10.1.093013 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences.

CVE-2014-4786CVE-2014-4786

Affected configuration(s):

cpe:/a:ibm:initiate_master_data_service:9.5
cpe:/a:ibm:initiate_master_data_service:9.7
cpe:/a:ibm:initiate_master_data_service:10.0
cpe:/a:ibm:initiate_master_data_service:10.1

Date published: 2014-09-10T06:55:08.097-04:00

Date last modified: 2017-08-28T21:35:07.157-04:00

CVSS Score: 4.9

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://www-01.ibm.com/support/docview.wss?uid=swg21682450

Summary: IBM Initiate Master Data Service 9.5 before 9.5.093013, 9.7 before 9.7.093013, 10.0 before 10.0.093013, and 10.1 before 10.1.093013 does not properly restrict use of FRAME elements, which allows remote authenticated users to conduct phishing attacks, and bypass intended access restrictions or obtain sensitive information, via a crafted web site, related to a “frame injection” issue.

CVE-2014-4789CVE-2014-4789

Affected configuration(s):

cpe:/a:ibm:initiate_master_data_service:9.5
cpe:/a:ibm:initiate_master_data_service:9.7
cpe:/a:ibm:initiate_master_data_service:10.0
cpe:/a:ibm:initiate_master_data_service:10.1

Date published: 2014-09-10T06:55:08.237-04:00

Date last modified: 2017-08-28T21:35:07.327-04:00

CVSS Score: 6.8

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://www-01.ibm.com/support/docview.wss?uid=swg21682450

Summary: Session fixation vulnerability in IBM Initiate Master Data Service 9.5 before 9.5.093013, 9.7 before 9.7.093013, 10.0 before 10.0.093013, and 10.1 before 10.1.093013 allows remote attackers to hijack web sessions via unspecified vectors.

CVE-2014-4790CVE-2014-4790

Affected configuration(s):

cpe:/a:ibm:emptoris_sourcing_portfolio:9.5.0.0
cpe:/a:ibm:emptoris_sourcing_portfolio:9.5.0.1
cpe:/a:ibm:emptoris_sourcing_portfolio:9.5.0.2
cpe:/a:ibm:emptoris_sourcing_portfolio:9.5.1.0
cpe:/a:ibm:emptoris_sourcing_portfolio:9.5.1.1
cpe:/a:ibm:emptoris_sourcing_portfolio:9.5.1.2
cpe:/a:ibm:emptoris_sourcing_portfolio:10.0.0.0
cpe:/a:ibm:emptoris_sourcing_portfolio:10.0.1.0
cpe:/a:ibm:emptoris_sourcing_portfolio:10.0.1.1
cpe:/a:ibm:emptoris_sourcing_portfolio:10.0.1.2
cpe:/a:ibm:emptoris_sourcing_portfolio:10.0.2.0
cpe:/a:ibm:emptoris_sourcing_portfolio:10.0.2.2
cpe:/a:ibm:emptoris_sourcing_portfolio:10.0.2.3
cpe:/a:ibm:emptoris_spend_analysis:9.5.0.0
cpe:/a:ibm:emptoris_spend_analysis:9.5.0.1
cpe:/a:ibm:emptoris_spend_analysis:9.5.0.2
cpe:/a:ibm:emptoris_spend_analysis:9.5.0.3
cpe:/a:ibm:emptoris_spend_analysis:10.0.1.0
cpe:/a:ibm:emptoris_spend_analysis:10.0.1.1
cpe:/a:ibm:emptoris_spend_analysis:10.0.1.2
cpe:/a:ibm:emptoris_spend_analysis:10.0.2.0
cpe:/a:ibm:emptoris_spend_analysis:10.0.2.2

Date published: 2014-08-26T06:55:04.607-04:00

Date last modified: 2017-08-28T21:35:07.390-04:00

CVSS Score: 4.9

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://www-01.ibm.com/support/docview.wss?uid=swg21680665

Summary: IBM Emptoris Sourcing Portfolio 9.5.x before 9.5.1.3, 10.0.0.x before 10.0.0.1, 10.0.1.x before 10.0.1.3, and 10.0.2.x before 10.0.2.4 and Emptoris Spend Analysis 9.5.x before 9.5.0.4, 10.0.1.x before 10.0.1.3, and 10.0.2.x before 10.0.2.4 do not properly restrict use of FRAME elements, which allows remote authenticated users to conduct phishing attacks, and bypass intended access restrictions or obtain sensitive information, via a crafted web site, related to a “frame injection” issue.

CVE-2014-4787CVE-2014-4787

Affected configuration(s):

cpe:/a:ibm:initiate_master_data_service:9.5
cpe:/a:ibm:initiate_master_data_service:9.7
cpe:/a:ibm:initiate_master_data_service:10.0
cpe:/a:ibm:initiate_master_data_service:10.1

Date published: 2014-09-10T06:55:08.143-04:00

Date last modified: 2017-08-28T21:35:07.217-04:00

CVSS Score: 3.5

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://www-01.ibm.com/support/docview.wss?uid=swg21682450

Summary: Cross-site scripting (XSS) vulnerability in IBM Initiate Master Data Service 9.5 before 9.5.093013, 9.7 before 9.7.093013, 10.0 before 10.0.093013, and 10.1 before 10.1.093013 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.

CVE-2014-9754CVE-2014-9754

Affected configuration(s):

cpe:/o:viprinet:multichannel_vpn_router_300_firmware:2013070830
cpe:/o:viprinet:multichannel_vpn_router_300_firmware:2013080900

Date published: 2017-01-20T10:59:00.193-05:00

Date last modified: 2017-01-26T14:33:36.727-05:00

CVSS Score: 4.3

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.html

Summary: The hardware VPN client in Viprinet MultichannelVPN Router 300 version 2013070830/2013080900 does not validate the remote VPN endpoint identity (through the checking of the endpoint’s SSL key) before initiating the exchange, which allows an attacker to perform a Man in the Middle attack.

CVE-2014-0016CVE-2014-0016

Affected configuration(s):

cpe:/a:stunnel:stunnel:0.1
cpe:/a:stunnel:stunnel:1.0
cpe:/a:stunnel:stunnel:1.1
cpe:/a:stunnel:stunnel:1.2
cpe:/a:stunnel:stunnel:1.3
cpe:/a:stunnel:stunnel:1.4
cpe:/a:stunnel:stunnel:1.5
cpe:/a:stunnel:stunnel:1.6
cpe:/a:stunnel:stunnel:2.0
cpe:/a:stunnel:stunnel:2.1
cpe:/a:stunnel:stunnel:3.0
cpe:/a:stunnel:stunnel:3.0:b1
cpe:/a:stunnel:stunnel:3.0:b2
cpe:/a:stunnel:stunnel:3.0:b3
cpe:/a:stunnel:stunnel:3.0:b4
cpe:/a:stunnel:stunnel:3.0:b5
cpe:/a:stunnel:stunnel:3.0:b6
cpe:/a:stunnel:stunnel:3.0:b7
cpe:/a:stunnel:stunnel:3.1
cpe:/a:stunnel:stunnel:3.2
cpe:/a:stunnel:stunnel:3.3
cpe:/a:stunnel:stunnel:3.4a
cpe:/a:stunnel:stunnel:3.5
cpe:/a:stunnel:stunnel:3.6
cpe:/a:stunnel:stunnel:3.7
cpe:/a:stunnel:stunnel:3.8
cpe:/a:stunnel:stunnel:3.8:p1
cpe:/a:stunnel:stunnel:3.8:p2
cpe:/a:stunnel:stunnel:3.8:p3
cpe:/a:stunnel:stunnel:3.8:p4
cpe:/a:stunnel:stunnel:3.8p1
cpe:/a:stunnel:stunnel:3.8p2
cpe:/a:stunnel:stunnel:3.8p3
cpe:/a:stunnel:stunnel:3.8p4
cpe:/a:stunnel:stunnel:3.9
cpe:/a:stunnel:stunnel:3.10
cpe:/a:stunnel:stunnel:3.11
cpe:/a:stunnel:stunnel:3.12
cpe:/a:stunnel:stunnel:3.13
cpe:/a:stunnel:stunnel:3.14
cpe:/a:stunnel:stunnel:3.15
cpe:/a:stunnel:stunnel:3.16
cpe:/a:stunnel:stunnel:3.17
cpe:/a:stunnel:stunnel:3.18
cpe:/a:stunnel:stunnel:3.19
cpe:/a:stunnel:stunnel:3.20
cpe:/a:stunnel:stunnel:3.21
cpe:/a:stunnel:stunnel:3.21a
cpe:/a:stunnel:stunnel:3.21b
cpe:/a:stunnel:stunnel:3.21c
cpe:/a:stunnel:stunnel:3.22
cpe:/a:stunnel:stunnel:3.23
cpe:/a:stunnel:stunnel:3.24
cpe:/a:stunnel:stunnel:3.25
cpe:/a:stunnel:stunnel:3.26
cpe:/a:stunnel:stunnel:4.00
cpe:/a:stunnel:stunnel:4.01
cpe:/a:stunnel:stunnel:4.02
cpe:/a:stunnel:stunnel:4.03
cpe:/a:stunnel:stunnel:4.04
cpe:/a:stunnel:stunnel:4.05
cpe:/a:stunnel:stunnel:4.06
cpe:/a:stunnel:stunnel:4.07
cpe:/a:stunnel:stunnel:4.08
cpe:/a:stunnel:stunnel:4.09
cpe:/a:stunnel:stunnel:4.10
cpe:/a:stunnel:stunnel:4.11
cpe:/a:stunnel:stunnel:4.12
cpe:/a:stunnel:stunnel:4.13
cpe:/a:stunnel:stunnel:4.14
cpe:/a:stunnel:stunnel:4.15
cpe:/a:stunnel:stunnel:4.16
cpe:/a:stunnel:stunnel:4.17
cpe:/a:stunnel:stunnel:4.18
cpe:/a:stunnel:stunnel:4.19
cpe:/a:stunnel:stunnel:4.20
cpe:/a:stunnel:stunnel:4.21
cpe:/a:stunnel:stunnel:4.22
cpe:/a:stunnel:stunnel:4.23
cpe:/a:stunnel:stunnel:4.24
cpe:/a:stunnel:stunnel:4.25
cpe:/a:stunnel:stunnel:4.26
cpe:/a:stunnel:stunnel:4.27
cpe:/a:stunnel:stunnel:4.28
cpe:/a:stunnel:stunnel:4.29
cpe:/a:stunnel:stunnel:4.30
cpe:/a:stunnel:stunnel:4.31
cpe:/a:stunnel:stunnel:4.32
cpe:/a:stunnel:stunnel:4.33
cpe:/a:stunnel:stunnel:4.34
cpe:/a:stunnel:stunnel:4.35
cpe:/a:stunnel:stunnel:4.36
cpe:/a:stunnel:stunnel:4.37
cpe:/a:stunnel:stunnel:4.38
cpe:/a:stunnel:stunnel:4.39
cpe:/a:stunnel:stunnel:4.40
cpe:/a:stunnel:stunnel:4.41
cpe:/a:stunnel:stunnel:4.42
cpe:/a:stunnel:stunnel:4.43
cpe:/a:stunnel:stunnel:4.44
cpe:/a:stunnel:stunnel:4.45
cpe:/a:stunnel:stunnel:4.46
cpe:/a:stunnel:stunnel:4.47
cpe:/a:stunnel:stunnel:4.48
cpe:/a:stunnel:stunnel:4.49
cpe:/a:stunnel:stunnel:4.50
cpe:/a:stunnel:stunnel:4.51
cpe:/a:stunnel:stunnel:4.52
cpe:/a:stunnel:stunnel:4.53
cpe:/a:stunnel:stunnel:4.54
cpe:/a:stunnel:stunnel:4.55
cpe:/a:stunnel:stunnel:4.56

Date published: 2014-03-24T12:31:08.447-04:00

Date last modified: 2017-01-26T15:00:06.940-05:00

CVSS Score: 4.3

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://www.openwall.com/lists/oss-security/2014/03/05/1

Summary: stunnel before 5.00, when using fork threading, does not properly update the state of the OpenSSL pseudo-random number generator (PRNG), which causes subsequent children with the same process ID to use the same entropy pool and allows remote attackers to obtain private keys for EC (ECDSA) or DSA certificates.

CVE-2014-2045CVE-2014-2045

Affected configuration(s):

cpe:/o:viprinet:multichannel_vpn_router_300_firmware:2013070830
cpe:/o:viprinet:multichannel_vpn_router_300_firmware:2013080900

Date published: 2017-01-20T10:59:00.147-05:00

Date last modified: 2017-01-26T14:32:44.190-05:00

CVSS Score: 4.3

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://packetstormsecurity.com/files/135613/Viprinet-Multichannel-VPN-Router-300-Cross-Site-Scripting.html

Summary: Multiple cross-site scripting (XSS) vulnerabilities in the old and new interfaces in Viprinet Multichannel VPN Router 300 allow remote attackers to inject arbitrary web script or HTML via the username when (1) logging in or (2) creating an account in the old interface, (3) username when creating an account in the new interface, (4) hostname in the old interface, (5) inspect parameter in the config module, (6) commands parameter in the atcommands tool, or (7) host parameter in the ping tool.