CVE-2018-2008

CWE-200Information Exposure26 documents12 sources
Severity
4.3MEDIUM
EPSS
0.2%
top 62.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 7
Latest updateMar 3

Description

IBM TRIRIGA Application Platform 3.5.3 and 3.6.0 could disclose sensitive information to an authenticated user that could aid in further attacks against the system. IBM X-Force ID: 155146.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages2 packages

NVDibm/tririga_application_platform3.5.3.03.5.3.6+1
CVEListV5ibm/tririga_application_platform3.5.3, 3.6.0+1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-jg76-j4qf-w3x2: IBM TRIRIGA Application Platform 32022-05-24
CVEList
CVE-2018-2008: IBM TRIRIGA Application Platform 32019-05-07

💥Exploits & PoCs

10
Exploit-DB
Microsoft Windows - NtUserSetWindowFNID Win32k User Callback Privilege Escalation (Metasploit)2019-07-17
Exploit-DB
Microsoft Windows MSHTML Engine - 'Edit' Remote Code Execution2019-03-13
Exploit-DB
CyberArk 9.7 - Memory Disclosure2018-12-03
Exploit-DB
Advantech WebAccess SCADA 8.3.2 - Remote Code Execution2018-11-05
Exploit-DB
Microsoft Windows - SetImeInfoEx Win32k NULL Pointer Dereference (Metasploit)2018-10-22

📋Vendor Advisories

2
Red Hat
gnome-keyring: login credentials retrieval via a Secret Service API call2018-07-06
Microsoft
Windows Kernel Elevation of Privilege Vulnerability2018-03-13

🕵️Threat Intelligence

4
Bleepingcomputer
CISA tags Windows, Cisco vulnerabilities as actively exploited2025-03-03
Krebs
Patch Tuesday, October 2018 Edition2018-10-11
Qualys
A “Patch for the Meltdown Patch” released out of band Thursday night | Qualys2018-03-30
Qualys
A “Patch for the Meltdown Patch” released out of band Thursday night2018-03-30