Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2018-02-19 CVE-2017-16756 Cross-Site Request Forgery (CSRF) vulnerability in Userscape Helpspot
An issue was discovered in Userscape HelpSpot before 4.7.2.
network
low complexity
userscape CWE-352
8.8
2018-02-19 CVE-2018-5381 Infinite Loop vulnerability in multiple products
The Quagga BGP daemon (bgpd) prior to version 1.2.3 has a bug in its parsing of "Capabilities" in BGP OPEN messages, in the bgp_packet.c:bgp_capability_msg_parse function.
network
low complexity
quagga canonical debian siemens CWE-835
7.5
2018-02-18 CVE-2018-7217 Unrestricted Upload of File with Dangerous Type vulnerability in Tejari Bravo Solution
In Bravo Tejari Procurement Portal, uploaded files are not properly validated by the application either on the client or the server side.
network
low complexity
tejari CWE-434
8.8
2018-02-18 CVE-2018-7216 Cross-Site Request Forgery (CSRF) vulnerability in Tejari Bravo Solution
Cross-site request forgery (CSRF) vulnerability in esop/toolkit/profile/regData.do in Bravo Tejari Procurement Portal allows remote authenticated users to hijack the authentication of application users for requests that modify their personal data by leveraging lack of anti-CSRF tokens.
network
low complexity
tejari CWE-352
8.0
2018-02-18 CVE-2018-7211 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Idashboards
An issue was discovered in iDashboards 9.6b.
network
high complexity
idashboards CWE-327
8.1
2018-02-18 CVE-2018-7210 Information Exposure vulnerability in Idashboards
An issue was discovered in iDashboards 9.6b.
network
low complexity
idashboards CWE-200
7.5
2018-02-18 CVE-2018-7209 Information Exposure vulnerability in Idashboards
An issue was discovered in iDashboards 9.6b.
network
low complexity
idashboards CWE-200
7.5
2018-02-18 CVE-2018-7208 Improper Input Validation vulnerability in multiple products
In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.
local
low complexity
gnu redhat CWE-20
7.8
2018-02-18 CVE-2018-7206 Unspecified vulnerability in Jupyter Oauthenticator
An issue was discovered in Project Jupyter JupyterHub OAuthenticator 0.6.x before 0.6.2 and 0.7.x before 0.7.3.
network
low complexity
jupyter
8.8
2018-02-16 CVE-2018-6218 Untrusted Search Path vulnerability in Trendmicro products
A DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) could allow an attacker to run arbitrary code on a vulnerable system.
local
high complexity
trendmicro CWE-426
7.0