Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2018-05-02 CVE-2018-5514 Improper Input Validation vulnerability in F5 products
On F5 BIG-IP 13.1.0-13.1.0.5, maliciously crafted HTTP/2 request frames can lead to denial of service.
network
low complexity
f5 CWE-20
7.5
2018-05-02 CVE-2018-5512 Unspecified vulnerability in F5 products
On F5 BIG-IP 13.1.0-13.1.0.5, when Large Receive Offload (LRO) and SYN cookies are enabled (default settings), undisclosed traffic patterns may cause TMM to restart.
network
low complexity
f5
7.5
2018-05-02 CVE-2017-1255 Inadequate Encryption Strength vulnerability in IBM Security Guardium
IBM Security Guardium 10.0, 10.0.1, and 10.1 through 10.1.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-326
7.5
2018-05-02 CVE-2018-10647 Incorrect Permission Assignment for Critical Resource vulnerability in Safervpn 4.2.5
SaferVPN 4.2.5 for Windows suffers from a SYSTEM privilege escalation vulnerability in its "SaferVPN.Service" service.
local
low complexity
safervpn CWE-732
7.8
2018-05-02 CVE-2018-10646 Incorrect Permission Assignment for Critical Resource vulnerability in Cyberghostvpn Cyberghost 6.5.0.3180
CyberGhost 6.5.0.3180 for Windows suffers from a SYSTEM privilege escalation vulnerability through the "CG6Service" service.
local
low complexity
cyberghostvpn CWE-732
7.8
2018-05-02 CVE-2018-10645 Incorrect Permission Assignment for Critical Resource vulnerability in Goldenfrog Vyprvpn 2.12.1.8015
Golden Frog VyprVPN 2.12.1.8015 for Windows suffers from a SYSTEM privilege escalation vulnerability through the "VyprVPN" service.
local
low complexity
goldenfrog CWE-732
7.8
2018-05-02 CVE-2018-10642 Code Injection vulnerability in Combodo Itop
Command injection vulnerability in Combodo iTop 2.4.1 allows remote authenticated administrators to execute arbitrary commands by changing the platform configuration, because web/env-production/itop-config/config.php contains a function called TestConfig() that calls the vulnerable function eval().
network
low complexity
combodo CWE-94
7.2
2018-05-01 CVE-2018-10260 Improper Input Validation vulnerability in Hrsale Project Hrsale 1.0.2
A Local File Inclusion vulnerability was found in HRSALE The Ultimate HRM v1.0.2, exploitable by a low privileged user.
network
low complexity
hrsale-project CWE-20
8.8
2018-05-01 CVE-2018-10258 Improper Neutralization of Formula Elements in a CSV File vulnerability in Codeslab Shopy Point of Sale 1.0
A CSV Injection vulnerability was discovered in Shopy Point of Sale v1.0 that allows a user with low level privileges to inject a command that will be included in the exported CSV file, leading to possible code execution.
network
low complexity
codeslab CWE-1236
8.8
2018-05-01 CVE-2018-10257 Improper Neutralization of Formula Elements in a CSV File vulnerability in Hrsale Project Hrsale 1.0.2
A CSV Injection vulnerability was discovered in HRSALE The Ultimate HRM v1.0.2 that allows a user with low level privileges to inject a command that will be included in the exported CSV file, leading to possible code execution.
local
low complexity
hrsale-project CWE-1236
8.8