Vulnerabilities > 7PK - Security Features

DATE CVE VULNERABILITY TITLE RISK
2016-01-27 CVE-2016-1896 7PK - Security Features vulnerability in Lexmark Printer Firmware
Race condition in the initialization process on Lexmark printers with firmware ATL before ATL.02.049, CB before CB.02.049, PP before PP.02.049, and YK before YK.02.049 allows remote attackers to bypass authentication by leveraging incorrect detection of the security-jumper status.
network
low complexity
lexmark CWE-254
critical
9.8
2016-01-26 CVE-2016-1567 7PK - Security Features vulnerability in Tuxfamily Chrony
chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
network
high complexity
tuxfamily CWE-254
8.1
2016-01-26 CVE-2016-1489 7PK - Security Features vulnerability in Lenovo Shareit 2.5.1.1/3.0.18Ww
Lenovo SHAREit before 3.2.0 for Windows and SHAREit before 3.5.48_ww for Android transfer files in cleartext, which allows remote attackers to (1) obtain sensitive information by sniffing the network or (2) conduct man-in-the-middle (MITM) attacks via unspecified vectors.
high complexity
lenovo CWE-254
8.0
2016-01-25 CVE-2016-1616 7PK - Security Features vulnerability in Google Chrome
The CustomButton::AcceleratorPressed function in ui/views/controls/button/custom_button.cc in Google Chrome before 48.0.2564.82 allows remote attackers to spoof URLs via vectors involving an unfocused custom button.
network
low complexity
google CWE-254
4.3
2016-01-25 CVE-2016-1615 7PK - Security Features vulnerability in Google Chrome
The Omnibox implementation in Google Chrome before 48.0.2564.82 allows remote attackers to spoof a document's origin via unspecified vectors.
network
low complexity
google CWE-254
6.5
2016-01-20 CVE-2016-1296 7PK - Security Features vulnerability in Cisco web Security Appliance 8.5.3055/9.1.0000/9.5.0235
The proxy engine on Cisco Web Security Appliance (WSA) devices with software 8.5.3-055, 9.1.0-000, and 9.5.0-235 allows remote attackers to bypass intended proxy restrictions via a malformed HTTP method, aka Bug ID CSCux00848.
network
low complexity
cisco CWE-254
7.5
2016-01-20 CVE-2015-8777 7PK - Security Features vulnerability in GNU Glibc
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
local
low complexity
gnu CWE-254
5.5
2016-01-17 CVE-2015-4960 7PK - Security Features vulnerability in IBM Infosphere Master Data Management
IBM InfoSphere Master Data Management - Collaborative Edition 9.1, 10.1, 11.0 before 11.0.0.0 IF11, 11.3 before 11.3.0.0 IF7, and 11.4 before 11.4.0.4 IF1 allows remote authenticated users to conduct clickjacking attacks via a crafted web site.
network
low complexity
ibm CWE-254
4.1
2016-01-13 CVE-2016-0019 7PK - Security Features vulnerability in Microsoft Windows 10 1511
The Remote Desktop Protocol (RDP) service implementation in Microsoft Windows 10 Gold and 1511 allows remote attackers to bypass intended access restrictions and establish sessions for blank-password accounts via a modified RDP client, aka "Windows Remote Desktop Protocol Security Bypass Vulnerability."
network
high complexity
microsoft CWE-254
8.1
2016-01-12 CVE-2015-8400 7PK - Security Features vulnerability in multiple products
The HTTPS fallback implementation in Shell In A Box (aka shellinabox) before 2.19 makes it easier for remote attackers to conduct DNS rebinding attacks via the "/plain" URL.
network
low complexity
fedoraproject shellinabox-project CWE-254
7.4