Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2017-10-03 CVE-2017-13704 Improper Input Validation vulnerability in multiple products
In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value.
7.5
2017-10-03 CVE-2017-1311 SQL Injection vulnerability in IBM Insights Foundation for Energy 2.0
IBM Insights Foundation for Energy 2.0 is vulnerable to SQL injection.
network
low complexity
ibm CWE-89
8.8
2017-10-03 CVE-2017-11498 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Gemalto Sentinel LDK RTE
Buffer overflow in hasplms in Gemalto ACC (Admin Control Center), all versions ranging from HASP SRM 2.10 to Sentinel LDK 7.50, allows remote attackers to shut down the remote process (a denial of service) via a language pack (ZIP file) with invalid HTML files.
network
low complexity
gemalto CWE-119
7.5
2017-10-03 CVE-2017-11322 OS Command Injection vulnerability in Ucopia Wireless Appliance
The chroothole_client executable in UCOPIA Wireless Appliance before 5.1.8 allows remote attackers to gain root privileges via a dollar sign ($) metacharacter in the argument to chroothole_client.
local
low complexity
ucopia CWE-78
8.2
2017-10-03 CVE-2017-11321 OS Command Injection vulnerability in Ucopia Wireless Appliance 5.1.7
The restricted shell interface in UCOPIA Wireless Appliance before 5.1.8 allows remote authenticated users to gain 'admin' privileges via shell metacharacters in the less command.
network
low complexity
ucopia CWE-78
7.2
2017-10-03 CVE-2016-6806 Cross-Site Request Forgery (CSRF) vulnerability in Apache Wicket
Apache Wicket 6.x before 6.25.0, 7.x before 7.5.0, and 8.0.0-M1 provide a CSRF prevention measure that fails to discover some cross origin requests.
network
low complexity
apache CWE-352
8.8
2017-10-03 CVE-2015-7843 7PK - Security Features vulnerability in Huawei products
The management interface on Huawei FusionServer rack servers RH2288 V3 with software before V100R003C00SPC603, RH2288H V3 with software before V100R003C00SPC503, XH628 V3 with software before V100R003C00SPC602, RH1288 V3 with software before V100R003C00SPC602, RH2288A V2 with software before V100R002C00SPC701, RH1288A V2 with software before V100R002C00SPC502, RH8100 V3 with software before V100R003C00SPC110, CH222 V3 with software before V100R001C00SPC161, CH220 V3 with software before V100R001C00SPC161, and CH121 V3 with software before V100R001C00SPC161 does not limit the number of query attempts, which allows remote authenticated users to obtain credentials of higher-level users via a brute force attack.
network
low complexity
huawei CWE-254
8.8
2017-10-03 CVE-2015-7359 Permissions, Privileges, and Access Controls vulnerability in multiple products
The (1) IsVolumeAccessibleByCurrentUser and (2) MountDevice methods in Ntdriver.c in TrueCrypt 7.0, VeraCrypt before 1.15, and CipherShed, when running on Windows, do not check the impersonation level of impersonation tokens, which allows local users to impersonate a user at SecurityIdentify level and gain access to other users' mounted encrypted volumes.
local
low complexity
ciphershed idrix truecrypt CWE-264
7.8
2017-10-03 CVE-2015-7358 Permissions, Privileges, and Access Controls vulnerability in multiple products
The IsDriveLetterAvailable method in Driver/Ntdriver.c in TrueCrypt 7.0, VeraCrypt before 1.15, and CipherShed, when running on Windows, does not properly validate drive letter symbolic links, which allows local users to mount an encrypted volume over an existing drive letter and gain privileges via an entry in the /GLOBAL?? directory.
local
low complexity
ciphershed idrix truecrypt CWE-264
7.8
2017-10-03 CVE-2015-6971 Command Injection vulnerability in Lenovo System Update 5.06.0027/5.06.0034
Lenovo System Update (formerly ThinkVantage System Update) before 5.07.0013 allows local users to submit commands to the System Update service (SUService.exe) and gain privileges by launching signed Lenovo executables.
local
low complexity
lenovo CWE-77
7.8