Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-8076

EPSS 0.33% · P56
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-8076

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
ZenMate 1.5.4 for macOS suffers from a type confusion vulnerability within the com.zenmate.chron-xpc LaunchDaemon component. The LaunchDaemon implements an XPC service that uses an insecure XPC API for accessing data from an inbound XPC message. This could potentially result in an XPC object of the wrong type being passed as the first argument to the xpc_connection_create_from_endpoint function if controlled by an attacker. In recent versions of macOS and OS X, Apple has implemented an internal check to prevent such XPC API abuse from occurring, thus making this vulnerability only result in a denial of service if exploited by an attacker.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ZenMate for macOS com.zenmate.chron-xpc LaunchDaemon 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ZenMate for macOS是一款免费的基于macOS平台的VPN软件。com.zenmate.chron-xpc LaunchDaemon是其中的一个启动守护程序组件。 基于macOS平台的ZenMate 1.5.4版本中的com.zenmate.chron-xpc LaunchDaemon组件存在类型混淆漏洞。攻击者可利用该漏洞造成拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2018-8076

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-8076

登录查看更多情报信息。

Same Patch Batch · n/a · 2018-03-15 · 38 CVEs total

CVE-2017-18237Exempi 安全漏洞
CVE-2017-18063Android Qualcomm WLAN 权限许可和访问控制漏洞
CVE-2017-18064Android Qualcomm WLAN 权限许可和访问控制漏洞
CVE-2017-18067Android Qualcomm Wireless network驱动程序缓冲区错误漏洞
CVE-2017-18068Android Qualcomm WLAN 权限许可和访问控制漏洞
CVE-2017-18069Android Qualcomm WLAN 信息泄露漏洞
CVE-2017-18233Exempi 安全漏洞
CVE-2017-18234Exempi 安全漏洞
CVE-2017-18235Exempi 安全漏洞
CVE-2017-18236Exempi 安全漏洞
CVE-2017-18056Android Qualcomm WLAN 权限许可和访问控制漏洞
CVE-2017-18238Exempi 安全漏洞
CVE-2018-8729WordPress Activity Log插件跨站脚本漏洞
CVE-2018-8728Kontena 跨站脚本漏洞
CVE-2018-8720ServiceNow ITSM 跨站脚本漏洞
CVE-2017-18232Linux kernel 安全漏洞
CVE-2018-8721ZOHO ManageEngine EventLog Analyzer 跨站脚本漏洞
CVE-2018-8722ZOHO ManageEngine Desktop Central 跨站脚本漏洞
CVE-2018-7886CloudMe 缓冲区错误漏洞
CVE-2016-0223IBM Forms Server 跨站脚本漏洞

Showing top 20 of 38 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2018-8076

No comments yet


Leave a comment