Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2017-09-06 CVE-2015-2210 Command Injection vulnerability in Epicor CRS Retail Store 3.2.03.01.008
The help window in Epicor CRS Retail Store before 3.2.03.01.008 allows local users to execute arbitrary code by injecting Javascript into the window source to create a button that spawns a command shell.
local
low complexity
epicor CWE-77
7.8
2017-09-06 CVE-2015-0853 Improper Input Validation vulnerability in Pysvn Project Svn-Workbench 1.6.2
svn-workbench 1.6.2 and earlier on a system with xeyes installed allows local users to execute arbitrary commands by using the "Command Shell" menu item while in the directory trunk/$(xeyes).
network
low complexity
pysvn-project CWE-20
8.8
2017-09-06 CVE-2014-6438 Resource Management Errors vulnerability in Ruby-Lang Ruby
The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.
network
low complexity
ruby-lang CWE-399
7.5
2017-09-06 CVE-2017-14164 Out-of-bounds Write vulnerability in Uclouvain Openjpeg
A size-validation issue was discovered in opj_j2k_write_sot in lib/openjp2/j2k.c in OpenJPEG 2.2.0.
network
low complexity
uclouvain CWE-787
8.8
2017-09-05 CVE-2017-1491 Unspecified vulnerability in IBM Qradar Network Security 5.4
IBM QRadar Network Security 5.4 supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the strongest algorithm that is available to both parties.
network
low complexity
ibm
7.5
2017-09-05 CVE-2017-1458 XXE vulnerability in IBM Qradar Network Security 5.4
IBM QRadar Network Security 5.4 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data.
network
low complexity
ibm CWE-611
8.1
2017-09-05 CVE-2017-1097 Cross-Site Request Forgery (CSRF) vulnerability in IBM Emptoris Strategic Supply Management
IBM Emptoris Strategic Supply Management Platform 10.0.0.x through 10.1.1.x is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
network
low complexity
ibm CWE-352
8.8
2017-09-05 CVE-2017-2870 Integer Overflow or Wraparound vulnerability in multiple products
An exploitable integer overflow vulnerability exists in the tiff_image_parse functionality of Gdk-Pixbuf 2.36.6 when compiled with Clang.
local
low complexity
gnome debian CWE-190
7.8
2017-09-05 CVE-2017-2862 Out-of-bounds Write vulnerability in multiple products
An exploitable heap overflow vulnerability exists in the gdk_pixbuf__jpeg_image_load_increment functionality of Gdk-Pixbuf 2.36.6.
local
low complexity
gnome debian CWE-787
7.8
2017-09-05 CVE-2017-2822 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Lexmark Perceptive Document Filters 11.3.0.2400
An exploitable code execution vulnerability exists in the image rendering functionality of Lexmark Perceptive Document Filters 11.3.0.2400.
network
low complexity
lexmark CWE-119
8.8