Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2017-08-18 CVE-2017-10824 Untrusted Search Path vulnerability in Teikoku Databank Type a 5.2
Untrusted search path vulnerability in TDB CA TypeA use software Version 5.2 and earlier, distributed until 10 August 2017 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
teikoku-databank CWE-426
7.8
2017-08-18 CVE-2017-10823 Untrusted Search Path vulnerability in Enecho.Meti Shin Kinkyuji Houkoku Data Nyuryoku Program
Untrusted search path vulnerability in Installer for Shin Kinkyuji Houkoku Data Nyuryoku Program (program released on 2011 March 10) Distributed on the website till 2017 May 17 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
enecho-meti CWE-426
7.8
2017-08-18 CVE-2017-10822 Untrusted Search Path vulnerability in Enecho.Meti Shin Sekiyu Yunyu Chousa Houkoku Data Nyuryoku Program
Untrusted search path vulnerability in Installer for Shin Sekiyu Yunyu Chousa Houkoku Data Nyuryoku Program (program released on 2013 September 30) distributed on the website until 2017 May 17 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
enecho-meti CWE-426
7.8
2017-08-18 CVE-2017-10821 Untrusted Search Path vulnerability in Enecho.Meti Shin Kikan Toukei Houkoku Data Nyuryokuyou Program
Untrusted search path vulnerability in Installer for Shin Kikan Toukei Houkoku Data Nyuryokuyou Program (program released on 2013 September 30) Distributed on the website until 2017 May 17 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
local
low complexity
enecho-meti CWE-426
7.8
2017-08-18 CVE-2017-12937 Out-of-bounds Read vulnerability in multiple products
The ReadSUNImage function in coders/sun.c in GraphicsMagick 1.3.26 has a colormap heap-based buffer over-read.
network
low complexity
graphicsmagick debian CWE-125
8.8
2017-08-18 CVE-2017-12936 Use After Free vulnerability in multiple products
The ReadWMFImage function in coders/wmf.c in GraphicsMagick 1.3.26 has a use-after-free issue for data associated with exception reporting.
network
low complexity
graphicsmagick debian CWE-416
8.8
2017-08-18 CVE-2017-12935 Out-of-bounds Read vulnerability in multiple products
The ReadMNGImage function in coders/png.c in GraphicsMagick 1.3.26 mishandles large MNG images, leading to an invalid memory read in the SetImageColorCallBack function in magick/image.c.
network
low complexity
graphicsmagick debian CWE-125
8.8
2017-08-18 CVE-2017-12934 Use After Free vulnerability in PHP
ext/standard/var_unserializer.re in PHP 7.0.x before 7.0.21 and 7.1.x before 7.1.7 is prone to a heap use after free while unserializing untrusted data, related to the zval_get_type function in Zend/zend_types.h.
network
low complexity
php CWE-416
7.5
2017-08-17 CVE-2017-6771 Information Exposure vulnerability in Cisco Ultra Services Framework 21.0.V0.65839
A vulnerability in the AutoVNF automation tool of the Cisco Ultra Services Framework could allow an unauthenticated, remote attacker to acquire sensitive information.
network
low complexity
cisco CWE-200
7.5
2017-08-17 CVE-2017-6768 Untrusted Search Path vulnerability in Cisco Application Policy Infrastructure Controller
A vulnerability in the build procedure for certain executable system files installed at boot time on Cisco Application Policy Infrastructure Controller (APIC) devices could allow an authenticated, local attacker to gain root-level privileges.
local
low complexity
cisco CWE-426
7.8