Vulnerabilities
Vulnerable Software
Security Vulnerabilities - CVEs Published In February 2018
The sample web application in web2py before 2.14.2 might allow remote attackers to execute arbitrary code via vectors involving use of a hardcoded encryption key when calling the session.connect function.
CVSS Score
9.8
EPSS Score
0.015
Published
2018-02-06
web2py before 2.14.2 allows remote attackers to obtain the session_cookie_key value via a direct request to examples/simple_examples/status. NOTE: this issue can be leveraged by remote attackers to execute arbitrary code using CVE-2016-3957.
CVSS Score
5.5
EPSS Score
0.004
Published
2018-02-06
The secure_load function in gluon/utils.py in web2py before 2.14.2 uses pickle.loads to deserialize session information stored in cookies, which might allow remote attackers to execute arbitrary code by leveraging knowledge of encryption_key.
CVSS Score
9.8
EPSS Score
0.127
Published
2018-02-06
The uwsgi_expand_path function in core/utils.c in Unbit uWSGI through 2.0.15 has a stack-based buffer overflow via a large directory length.
CVSS Score
9.8
EPSS Score
0.005
Published
2018-02-06
The htpasswd implementation of mini_httpd before v1.28 and of thttpd before v2.28 is affected by a buffer overflow that can be exploited remotely to perform code execution.
CVSS Score
9.8
EPSS Score
0.008
Published
2018-02-06
In WordPress through 4.9.2, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.
CVSS Score
7.5
EPSS Score
0.877
Published
2018-02-06
The Docker daemon managed by boot2docker 1.2 and earlier improperly enables unauthenticated TCP connections by default, which makes it easier for remote attackers to gain privileges or execute arbitrary code from children containers.
CVSS Score
8.8
EPSS Score
0.024
Published
2018-02-06
boot2docker 1.2 and earlier allows attackers to conduct cross-site request forgery (CSRF) attacks by leveraging Docker daemons enabling TCP connections without TLS authentication.
CVSS Score
8.8
EPSS Score
0.001
Published
2018-02-06
Docker before 1.3 does not properly validate image IDs, which allows remote attackers to redirect to another image through the loading of untrusted images via 'docker load'.
CVSS Score
8.1
EPSS Score
0.004
Published
2018-02-06
Cross-site scripting (XSS) vulnerability in Nagios Business Process Intelligence (BPI) before 2.3.4 allows remote attackers to inject arbitrary web script or HTML via vectors involving index.php.
CVSS Score
6.1
EPSS Score
0.028
Published
2018-02-06


Contact Us

Shodan ® - All rights reserved