Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2017-11-01 CVE-2017-15566 Untrusted Search Path vulnerability in Schedmd Slurm
Insecure SPANK environment variable handling exists in SchedMD Slurm before 16.05.11, 17.x before 17.02.9, and 17.11.x before 17.11.0rc2, allowing privilege escalation to root during Prolog or Epilog execution.
local
low complexity
schedmd CWE-426
7.8
2017-11-01 CVE-2017-16352 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
GraphicsMagick 1.3.26 is vulnerable to a heap-based buffer overflow vulnerability found in the "Display visual image directory" feature of the DescribeImage() function of the magick/describe.c file.
network
low complexity
graphicsmagick debian CWE-119
8.8
2017-11-01 CVE-2017-1000244 Cross-Site Request Forgery (CSRF) vulnerability in Jenkins Favorite
Jenkins Favorite Plugin version 2.2.0 and older is vulnerable to CSRF resulting in data modification
network
low complexity
jenkins CWE-352
8.8
2017-11-01 CVE-2017-16248 Information Exposure vulnerability in Catalyst-Plugin-Static-Simple Project Catalyst-Plugin-Static-Simple
The Catalyst-Plugin-Static-Simple module before 0.34 for Perl allows remote attackers to read arbitrary files if there is a '.' character anywhere in the pathname, which differs from the intended policy of allowing access only when the filename itself has a '.' character.
7.5
2017-11-01 CVE-2017-16244 Cross-Site Request Forgery (CSRF) vulnerability in Octobercms October 1.0.426
Cross-Site Request Forgery exists in OctoberCMS 1.0.426 (aka Build 426) due to improper validation of CSRF tokens for postback handling, allowing an attacker to successfully take over the victim's account.
network
low complexity
octobercms CWE-352
8.8
2017-11-01 CVE-2017-14376 Use of Hard-coded Credentials vulnerability in EMC Appsync
EMC AppSync Server prior to 3.5.0.1 contains database accounts with hardcoded passwords that could potentially be exploited by malicious users to compromise the affected system.
local
low complexity
emc CWE-798
7.8
2017-10-31 CVE-2017-10954 Integer Overflow or Wraparound vulnerability in Bitdefender Internet Security 2018
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security Internet Security 2018 prior to build 7.72918.
network
low complexity
bitdefender CWE-190
8.8
2017-10-31 CVE-2017-10953 Improper Input Validation vulnerability in Foxitsoftware Foxit Reader 8.3.0.14878
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.0.14878.
network
low complexity
foxitsoftware CWE-20
8.8
2017-10-31 CVE-2017-10948 Use After Free vulnerability in Foxitsoftware Foxit Reader 8.2.1.6871
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.1.6871.
network
low complexity
foxitsoftware CWE-416
8.8
2017-10-31 CVE-2017-10947 Use After Free vulnerability in Foxitsoftware Foxit Reader 8.2.1.6871
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.1.6871.
network
low complexity
foxitsoftware CWE-416
8.8