Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-07-11 | CVE-2017-8502 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Excel 2010/2013/2016 Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". | 7.8 |
2017-07-11 | CVE-2017-8501 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". | 7.8 |
2017-07-11 | CVE-2017-8495 | Improper Authentication vulnerability in Microsoft products Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to bypass Extended Protection for Authentication when Kerberos fails to prevent tampering with the SNAME field during ticket exchange, aka "Kerberos SNAME Security Feature Bypass Vulnerability" or Orpheus' Lyre. | 7.5 |
2017-07-11 | CVE-2017-8467 | Improper Preservation of Permissions vulnerability in Microsoft products Graphics in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an elevation of privilege vulnerability due to the way it handles objects in memory, aka "Win32k Elevation of Privilege Vulnerability". | 7.0 |
2017-07-11 | CVE-2017-8463 | Unspecified vulnerability in Microsoft products Windows Shell in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a remote code execution vulnerability due to the way it improperly handles executable files and shares during rename operations, aka "Windows Explorer Remote Code Execution Vulnerability". | 7.8 |
2017-07-11 | CVE-2017-0243 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". | 7.8 |
2017-07-11 | CVE-2017-11170 | Missing Release of Resource after Effective Lifetime vulnerability in Imagemagick 7.0.56 The ReadTGAImage function in coders\tga.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via invalid colors data in the header of a TGA or VST file. | 8.8 |
2017-07-11 | CVE-2017-7730 | Improper Input Validation vulnerability in Ismartalarm Cubeone Firmware iSmartAlarm cube devices allow Denial of Service. | 7.5 |
2017-07-11 | CVE-2017-7729 | Missing Encryption of Sensitive Data vulnerability in Ismartalarm Cubeone Firmware On iSmartAlarm cube devices, there is Incorrect Access Control because a "new key" is transmitted in cleartext. | 7.5 |
2017-07-11 | CVE-2017-7726 | Improper Certificate Validation vulnerability in Ismartalarm Cubeone Firmware iSmartAlarm cube devices have an SSL Certificate Validation Vulnerability. | 7.5 |