Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2018-03-23 CVE-2018-8960 Out-of-bounds Read vulnerability in multiple products
The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-26 Q16 does not properly restrict memory allocation, leading to a heap-based buffer over-read.
network
low complexity
imagemagick canonical CWE-125
8.8
2018-03-23 CVE-2018-1000137 Cross-Site Request Forgery (CSRF) vulnerability in I-Librarian I Librarian
I, Librarian version 4.8 and earlier contains a Cross site Request Forgery (CSRF) vulnerability in users.php that can result in the password of the admin being forced to be changed without the administrator's knowledge.
network
low complexity
i-librarian CWE-352
8.8
2018-03-23 CVE-2018-1000136 Improper Input Validation vulnerability in Electronjs Electron
Electron version 1.7 up to 1.7.12; 1.8 up to 1.8.3 and 2.0.0 up to 2.0.0-beta.3 contains an improper handling of values vulnerability in Webviews that can result in remote code execution.
network
high complexity
electronjs CWE-20
8.1
2018-03-23 CVE-2018-7502 Improper Input Validation vulnerability in Beckhoff Twincat and Twincat C++
Kernel drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values.
local
low complexity
beckhoff CWE-20
7.8
2018-03-23 CVE-2017-15325 Integer Overflow or Wraparound vulnerability in Huawei products
The Bdat driver of Prague smart phones with software versions earlier than Prague-AL00AC00B211, versions earlier than Prague-AL00BC00B211, versions earlier than Prague-AL00CC00B211, versions earlier than Prague-TL00AC01B211, versions earlier than Prague-TL10AC01B211 has integer overflow vulnerability due to the lack of parameter validation.
local
low complexity
huawei CWE-190
7.8
2018-03-23 CVE-2018-1211 Path Traversal vulnerability in Dell EMC Idrac7 and EMC Idrac8
Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain a path traversal vulnerability in its Web server's URI parser which could be used to obtain specific sensitive data without authentication.
network
low complexity
dell CWE-22
7.5
2018-03-22 CVE-2018-7524 Cross-Site Request Forgery (CSRF) vulnerability in Geutebrueck G-Cam/Efd-2250 Firmware and Topfd-2125 Firmware
A cross-site request forgery vulnerability has been identified in Geutebruck G-Cam/EFD-2250 Version 1.12.0.4 and Topline TopFD-2125 Version 3.15.1 IP cameras, which may allow an unauthorized user to be added to the system.
network
low complexity
geutebrueck CWE-352
8.8
2018-03-22 CVE-2018-7516 Server-Side Request Forgery (SSRF) vulnerability in Geutebrueck G-Cam/Efd-2250 Firmware and Topfd-2125 Firmware
A server-side request forgery vulnerability has been identified in Geutebruck G-Cam/EFD-2250 Version 1.12.0.4 and Topline TopFD-2125 Version 3.15.1 IP cameras, which could lead to proxied network scans.
network
low complexity
geutebrueck CWE-918
7.3
2018-03-22 CVE-2018-5509 Improper Input Validation vulnerability in F5 products
On F5 BIG-IP versions 13.0.0 or 12.1.0 - 12.1.3.1, when a specifically configured virtual server receives traffic of an undisclosed nature, TMM will crash and take the configured failover action, potentially causing a denial of service.
network
low complexity
f5 CWE-20
7.5
2018-03-22 CVE-2018-5504 Unspecified vulnerability in F5 products
In some circumstances, the Traffic Management Microkernel (TMM) does not properly handle certain malformed Websockets requests/responses, which allows remote attackers to cause a denial-of-service (DoS) or possible remote code execution on the F5 BIG-IP system running versions 13.0.0 - 13.1.0.3 or 12.1.0 - 12.1.3.1.
network
high complexity
f5
8.1