Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2017-01-13 CVE-2016-7428 Resource Exhaustion vulnerability in NTP 4.2.8
ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via the poll interval in a broadcast packet.
low complexity
ntp CWE-400
4.3
2017-01-13 CVE-2016-7427 Resource Exhaustion vulnerability in NTP 4.2.8
The broadcast mode replay prevention functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via a crafted broadcast mode packet.
low complexity
ntp CWE-400
4.3
2017-01-13 CVE-2016-7426 Resource Exhaustion vulnerability in multiple products
NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
network
low complexity
ntp canonical redhat hpe CWE-400
7.5
2017-01-13 CVE-2016-6887 Information Exposure vulnerability in Matrixssl
The pstm_exptmod function in MatrixSSL 3.8.6 and earlier does not properly perform modular exponentiation, which might allow remote attackers to predict the secret key via a CRT attack.
network
high complexity
matrixssl CWE-200
5.9
2017-01-13 CVE-2016-6886 Key Management Errors vulnerability in Matrixssl 3.8.2/3.8.3
The pstm_reverse function in MatrixSSL before 3.8.4 allows remote attackers to cause a denial of service (invalid memory read and crash) via a (1) zero value or (2) the key's modulus for the secret key during RSA key exchange.
network
low complexity
matrixssl CWE-320
7.5
2017-01-13 CVE-2016-6885 Use After Free vulnerability in Matrixssl 3.8.2/3.8.3
The pstm_exptmod function in MatrixSSL before 3.8.4 allows remote attackers to cause a denial of service (invalid free and crash) via a base zero value for the modular exponentiation.
network
low complexity
matrixssl CWE-416
7.5
2017-01-13 CVE-2016-2090 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Off-by-one vulnerability in the fgetwln function in libbsd before 0.8.2 allows attackers to have unspecified impact via unknown vectors, which trigger a heap-based buffer overflow.
network
low complexity
fedoraproject freedesktop debian canonical CWE-119
critical
9.8
2017-01-13 CVE-2015-3188 Permissions, Privileges, and Access Controls vulnerability in Apache Storm 0.10.0
The UI daemon in Apache Storm 0.10.0 before 0.10.0-beta1 allows remote attackers to execute arbitrary code via unspecified vectors.
network
low complexity
apache CWE-264
critical
9.8
2017-01-13 CVE-2017-5364 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Foxit PDF Toolkit 1.3
Memory Corruption Vulnerability in Foxit PDF Toolkit v1.3 allows an attacker to cause Denial of Service and Remote Code Execution when the victim opens the specially crafted PDF file.
local
low complexity
foxitsoftware CWE-119
7.8
2017-01-13 CVE-2017-3890 Cross-site Scripting vulnerability in Blackberry Appliance-X and Workspaces Vapp
A reflected cross-site scripting vulnerability in the BlackBerry WatchDox Server components Appliance-X, version 1.8.1 and earlier, and vAPP, versions 4.6.0 to 5.4.1, allows remote attackers to execute script commands in the context of the affected browser by persuading a user to click an attacker-supplied malicious link.
network
low complexity
blackberry CWE-79
6.1