Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2017-04-04 CVE-2016-10318 Permissions, Privileges, and Access Controls vulnerability in Linux Kernel
A missing authorization check in the fscrypt_process_policy function in fs/crypto/policy.c in the ext4 and f2fs filesystem encryption support in the Linux kernel before 4.7.4 allows a user to assign an encryption policy to a directory owned by a different user, potentially creating a denial of service.
network
low complexity
linux CWE-264
6.5
2017-04-04 CVE-2017-7414 OS Command Injection vulnerability in Horde Groupware
In Horde_Crypt before 2.7.6, as used in Horde Groupware Webmail Edition 5.x through 5.2.17, OS Command Injection can occur if the user has PGP features enabled in the user's preferences, and has enabled the "Should PGP signed messages be automatically verified when viewed?" preference.
network
high complexity
horde CWE-78
7.5
2017-04-04 CVE-2017-7413 OS Command Injection vulnerability in Horde Groupware
In Horde_Crypt before 2.7.6, as used in Horde Groupware Webmail Edition through 5.2.17, OS Command Injection can occur if the attacker is an authenticated Horde Webmail user, has PGP features enabled in their preferences, and attempts to encrypt an email addressed to a maliciously crafted email address.
network
low complexity
horde CWE-78
8.8
2017-04-04 CVE-2017-7398 Cross-Site Request Forgery (CSRF) vulnerability in D-Link Dir-615 Firmware 20.09
D-Link DIR-615 HW: T1 FW:20.09 is vulnerable to Cross-Site Request Forgery (CSRF) vulnerability.
network
low complexity
d-link CWE-352
8.8
2017-04-04 CVE-2017-7228 Improper Validation of Array Index vulnerability in XEN
An issue (known as XSA-212) was discovered in Xen, with fixes available for 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x.
local
low complexity
xen CWE-129
8.2
2017-04-04 CVE-2017-5683 Unspecified vulnerability in Intel Hardware Accelerated Execution Manager 6.0.4
Privilege escalation in IntelHAXM.sys driver in the Intel Hardware Accelerated Execution Manager before version 6.0.6 allows a local user to gain system level access.
local
low complexity
intel
7.8
2017-04-04 CVE-2017-3204 Unspecified vulnerability in Golang Crypto
The Go SSH library (x/crypto/ssh) by default does not verify host keys, facilitating man-in-the-middle attacks.
network
high complexity
golang
8.1
2017-04-04 CVE-2016-10229 Improperly Implemented Security Check for Standard vulnerability in multiple products
udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.
network
low complexity
linux google CWE-358
critical
9.8
2017-04-04 CVE-2014-9922 Permissions, Privileges, and Access Controls vulnerability in multiple products
The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
local
low complexity
linux google CWE-264
7.8
2017-04-04 CVE-2017-7412 Unspecified vulnerability in Nixos 17.03
NixOS 17.03 before 17.03.887 has a world-writable Docker socket, which allows local users to gain privileges by executing docker commands.
local
low complexity
nixos
7.8