Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2017-07-11 CVE-2017-8502 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Excel 2010/2013/2016
Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Memory Corruption Vulnerability".
local
low complexity
microsoft CWE-119
7.8
2017-07-11 CVE-2017-8501 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products
Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Memory Corruption Vulnerability".
local
low complexity
microsoft CWE-119
7.8
2017-07-11 CVE-2017-8495 Improper Authentication vulnerability in Microsoft products
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to bypass Extended Protection for Authentication when Kerberos fails to prevent tampering with the SNAME field during ticket exchange, aka "Kerberos SNAME Security Feature Bypass Vulnerability" or Orpheus' Lyre.
network
high complexity
microsoft CWE-287
7.5
2017-07-11 CVE-2017-8467 Improper Preservation of Permissions vulnerability in Microsoft products
Graphics in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an elevation of privilege vulnerability due to the way it handles objects in memory, aka "Win32k Elevation of Privilege Vulnerability".
local
high complexity
microsoft CWE-281
7.0
2017-07-11 CVE-2017-8463 Unspecified vulnerability in Microsoft products
Windows Shell in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a remote code execution vulnerability due to the way it improperly handles executable files and shares during rename operations, aka "Windows Explorer Remote Code Execution Vulnerability".
local
low complexity
microsoft
7.8
2017-07-11 CVE-2017-0243 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products
Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability".
local
low complexity
microsoft CWE-119
7.8
2017-07-11 CVE-2017-11170 Missing Release of Resource after Effective Lifetime vulnerability in Imagemagick 7.0.56
The ReadTGAImage function in coders\tga.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via invalid colors data in the header of a TGA or VST file.
network
low complexity
imagemagick CWE-772
8.8
2017-07-11 CVE-2017-7730 Improper Input Validation vulnerability in Ismartalarm Cubeone Firmware
iSmartAlarm cube devices allow Denial of Service.
network
low complexity
ismartalarm CWE-20
7.5
2017-07-11 CVE-2017-7729 Missing Encryption of Sensitive Data vulnerability in Ismartalarm Cubeone Firmware
On iSmartAlarm cube devices, there is Incorrect Access Control because a "new key" is transmitted in cleartext.
network
low complexity
ismartalarm CWE-311
7.5
2017-07-11 CVE-2017-7726 Improper Certificate Validation vulnerability in Ismartalarm Cubeone Firmware
iSmartAlarm cube devices have an SSL Certificate Validation Vulnerability.
network
low complexity
ismartalarm CWE-295
7.5