Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2018-02-18 CVE-2018-7216 Cross-Site Request Forgery (CSRF) vulnerability in Tejari Bravo Solution
Cross-site request forgery (CSRF) vulnerability in esop/toolkit/profile/regData.do in Bravo Tejari Procurement Portal allows remote authenticated users to hijack the authentication of application users for requests that modify their personal data by leveraging lack of anti-CSRF tokens.
network
low complexity
tejari CWE-352
8.0
2018-02-18 CVE-2018-7211 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Idashboards
An issue was discovered in iDashboards 9.6b.
network
high complexity
idashboards CWE-327
8.1
2018-02-18 CVE-2018-7210 Information Exposure vulnerability in Idashboards
An issue was discovered in iDashboards 9.6b.
network
low complexity
idashboards CWE-200
7.5
2018-02-18 CVE-2018-7209 Information Exposure vulnerability in Idashboards
An issue was discovered in iDashboards 9.6b.
network
low complexity
idashboards CWE-200
7.5
2018-02-18 CVE-2018-7208 Improper Input Validation vulnerability in multiple products
In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.
local
low complexity
gnu redhat CWE-20
7.8
2018-02-18 CVE-2018-7206 Unspecified vulnerability in Jupyter Oauthenticator
An issue was discovered in Project Jupyter JupyterHub OAuthenticator 0.6.x before 0.6.2 and 0.7.x before 0.7.3.
network
low complexity
jupyter
8.8
2018-02-16 CVE-2018-6218 Untrusted Search Path vulnerability in Trendmicro products
A DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) could allow an attacker to run arbitrary code on a vulnerable system.
local
high complexity
trendmicro CWE-426
7.0
2018-02-16 CVE-2018-3609 Information Exposure Through Log Files vulnerability in Trendmicro Interscan Messaging Security Virtual Appliance 9.0/9.1
A vulnerability in the Trend Micro InterScan Messaging Security Virtual Appliance 9.0 and 9.1 management portal could allow an unauthenticated user to access sensitive information in a particular log file that could be used to bypass authentication on vulnerable installations.
network
high complexity
trendmicro CWE-532
8.1
2018-02-16 CVE-2018-7187 OS Command Injection vulnerability in multiple products
The "go get" implementation in Go 1.9.4, when the -insecure command-line option is used, does not validate the import path (get/vcs.go only checks for "://" anywhere in the string), which allows remote attackers to execute arbitrary OS commands via a crafted web site.
network
low complexity
golang debian CWE-78
8.8
2018-02-16 CVE-2018-0516 Untrusted Search Path vulnerability in Flets Address Selection Tool 4.0/6.0
Untrusted search path vulnerability in FLET'S v4 / v6 address selection tool allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
flets CWE-426
7.8