8 Big Processor Vulnerabilities in 2018

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database CVE-2018-10631
PUBLISHED: 2018-07-13

Medtronic N’Vision Clinician Programmer 8840 N’Vision Clinician Programmer, all versions, and 8870 N’Vision removable Application Card, all versions. The 8840 Clinician Programmer executes the application program from the 8870 Application Card. An attacker with physical access to an 8870 Application…

CVE-2018-8847
PUBLISHED: 2018-07-13

Eaton 9000X DriveA versions 2.0.29 and prior has a stack-based buffer overflow vulnerability, which may allow remote code execution.

CVE-2018-10002
PUBLISHED: 2018-07-13

JFrog Artifactory version since 5.11 contains a Cross ite Request Forgery (CSRF) vulnerability in UI rest endpoints that can result in Classic CSRF attack allowing an attacker to perform actions as logged in user. This attack appear to be exploitable via The victim must run maliciously crafted flash…

CVE-2018-10002
PUBLISHED: 2018-07-13

MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This vulnerability appe…

CVE-2018-10002
PUBLISHED: 2018-07-13

MODX Revolution version <=2.6.4 contains a Directory Traversal vulnerability in /core/model/modx/modmanagerrequest.class.php that can result in remove files. This attack appear to be exploitable via web request via security/login processor. This vulnerability appears to have been fixed in pull 13…

Read More HERE

Leave a Reply