Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2018-09-07 CVE-2018-15483 Improper Input Validation vulnerability in Kone Group Controller Firmware
An issue was discovered on KONE Group Controller (KGC) devices before 4.6.5.
network
low complexity
kone CWE-20
7.5
2018-09-07 CVE-2018-12897 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Solarwinds Dameware Mini Remote Control
SolarWinds DameWare Mini Remote Control before 12.1 has a Buffer Overflow.
local
low complexity
solarwinds CWE-119
7.8
2018-09-07 CVE-2017-17691 Insufficiently Protected Credentials vulnerability in Contronics Homeputer CL Studio FUR Homematic
Homeputer CL Studio fur HomeMatic 4.0 Rel 160808 and earlier uses cleartext to exchange the username and password between server and client instances, which allows remote attackers to obtain sensitive information via a man in the middle attack.
network
high complexity
contronics CWE-522
8.1
2018-09-07 CVE-2018-16667 Out-of-bounds Read vulnerability in Contiki-Ng Contiki-Ng.
An issue was discovered in Contiki-NG through 4.1.
local
high complexity
contiki-ng CWE-125
7.0
2018-09-07 CVE-2018-16666 Out-of-bounds Write vulnerability in Contiki-Ng Contiki-Ng.
An issue was discovered in Contiki-NG through 4.1.
local
low complexity
contiki-ng CWE-787
7.8
2018-09-07 CVE-2018-16664 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Contiki-Ng Contiki-Ng.
An issue was discovered in Contiki-NG through 4.1.
local
high complexity
contiki-ng CWE-119
7.0
2018-09-07 CVE-2018-16663 Out-of-bounds Write vulnerability in Contiki-Ng Contiki-Ng.
An issue was discovered in Contiki-NG through 4.1.
local
low complexity
contiki-ng CWE-787
7.8
2018-09-07 CVE-2016-9044 Command Injection vulnerability in Informationbuilders Webfocus 8.1
An exploitable command execution vulnerability exists in Information Builders WebFOCUS Business Intelligence Portal 8.1 .
network
low complexity
informationbuilders CWE-77
8.8
2018-09-07 CVE-2017-2795 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Marklogic 8.06
An exploitable heap corruption vulnerability exists in the Txo functionality of Antenna House DMC HTMLFilter as used by MarkLogic 8.0-6.
local
low complexity
marklogic CWE-119
8.6
2018-09-07 CVE-2018-4010 OS Command Injection vulnerability in Protonvpn 1.5.1
An exploitable code execution vulnerability exists in the connect functionality of ProtonVPN VPN client 1.5.1.
local
low complexity
protonvpn CWE-78
7.8