Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2018-05-02 CVE-2018-10115 Use of Uninitialized Resource vulnerability in 7-Zip
Incorrect initialization logic of RAR decoder objects in 7-Zip 18.03 and before can lead to usage of uninitialized memory, allowing remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive.
local
low complexity
7-zip CWE-908
7.8
2018-05-02 CVE-2018-8115 Improper Input Validation vulnerability in Microsoft Windows Host Compute Service Shim
A remote code execution vulnerability exists when the Windows Host Compute Service Shim (hcsshim) library fails to properly validate input while importing a container image, aka "Windows Host Compute Service Shim Remote Code Execution Vulnerability." This affects Windows Host Compute.
local
low complexity
microsoft CWE-20
8.6
2018-05-02 CVE-2018-1104 Code Injection vulnerability in Redhat Ansible Tower
Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.
network
low complexity
redhat CWE-94
8.8
2018-05-02 CVE-2018-10677 Out-of-bounds Write vulnerability in Miniupnp Project Ngiflib 0.4
The DecodeGifImg function in ngiflib.c in MiniUPnP ngiflib 0.4 lacks certain checks against width and height, which allows remote attackers to cause a denial of service (WritePixels heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted GIF file.
network
low complexity
miniupnp-project CWE-787
8.8
2018-05-02 CVE-2018-1101 Weak Password Requirements vulnerability in Redhat Ansible Tower
Ansible Tower before version 3.2.4 has a flaw in the management of system and organization administrators that allows for privilege escalation.
network
low complexity
redhat CWE-521
7.2
2018-05-02 CVE-2018-10675 Use After Free vulnerability in multiple products
The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.
local
low complexity
linux redhat canonical CWE-416
7.8
2018-05-02 CVE-2018-10657 Improper Input Validation vulnerability in Matrix Synapse
Matrix Synapse before 0.28.1 is prone to a denial of service flaw where malicious events injected with depth = 2^63 - 1 render rooms unusable, related to federation/federation_base.py and handlers/message.py, as exploited in the wild in April 2018.
network
low complexity
matrix CWE-20
7.5
2018-05-02 CVE-2013-6272 Improper Access Control vulnerability in Google Android
The NotificationBroadcastReceiver class in the com.android.phone process in Google Android 4.1.1 through 4.4.2 allows attackers to bypass intended access restrictions and consequently make phone calls to arbitrary numbers, send mmi or ussd codes, or hangup ongoing calls via a crafted application.
local
low complexity
google CWE-284
7.8
2018-05-02 CVE-2017-4952 Incorrect Permission Assignment for Critical Resource vulnerability in VMWare Xenon
VMware Xenon 1.x, prior to 1.5.4-CR7_1, 1.5.7_7, 1.5.4-CR6_2, 1.3.7-CR1_2, 1.1.0-CR0-3, 1.1.0-CR3_1,1.4.2-CR4_1, and 1.5.4_8, contains an authentication bypass vulnerability due to insufficient access controls for utility endpoints.
network
low complexity
vmware CWE-732
7.5
2018-05-02 CVE-2018-5517 Improper Input Validation vulnerability in F5 products
On F5 BIG-IP 13.1.0-13.1.0.5, malformed TCP packets sent to a self IP address or a FastL4 virtual server may cause an interruption of service.
network
low complexity
f5 CWE-20
7.5