Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2017-04-14 CVE-2016-7032 Improper Access Control vulnerability in Todd Miller Sudo
sudo_noexec.so in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.
local
high complexity
todd-miller CWE-284
7.0
2017-04-14 CVE-2016-6489 Information Exposure Through Discrepancy vulnerability in multiple products
The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack.
network
low complexity
redhat canonical nettle-project CWE-203
7.5
2017-04-14 CVE-2016-6299 Permissions, Privileges, and Access Controls vulnerability in multiple products
The scm plug-in in mock might allow attackers to bypass the intended chroot protection mechanism and gain root privileges via a crafted spec file.
local
low complexity
fedoraproject mock-project CWE-264
7.8
2017-04-14 CVE-2016-4889 Permissions, Privileges, and Access Controls vulnerability in Zohocorp Servicedesk Plus
ZOHO ManageEngine ServiceDesk Plus before 9.0 allows remote authenticated guest users to have unspecified impact by leveraging failure to restrict access to unknown functions.
network
low complexity
zohocorp CWE-264
8.8
2017-04-14 CVE-2016-3104 Resource Exhaustion vulnerability in Mongodb 2.4.0/2.6.0
mongod in MongoDB 2.6, when using 2.4-style users, and 2.4 allow remote attackers to cause a denial of service (memory consumption and process termination) by leveraging in-memory database representation when authenticating against a non-existent database.
network
low complexity
mongodb CWE-400
7.5
2017-04-14 CVE-2016-1713 Unrestricted Upload of File with Dangerous Type vulnerability in Vtiger CRM 6.4.0
Unrestricted file upload vulnerability in the Settings_Vtiger_CompanyDetailsSave_Action class in modules/Settings/Vtiger/actions/CompanyDetailsSave.php in Vtiger CRM 6.4.0 allows remote authenticated users to execute arbitrary code by uploading a crafted image file with an executable extension, then accessing it via a direct request to the file in test/logo/.
local
low complexity
vtiger CWE-434
7.3
2017-04-14 CVE-2016-0727 Permissions, Privileges, and Access Controls vulnerability in Canonical Ubuntu Linux 12.04/14.04/16.04
The crontab script in the ntp package before 1:4.2.6.p3+dfsg-1ubuntu3.11 on Ubuntu 12.04 LTS, before 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 on Ubuntu 14.04 LTS, on Ubuntu Wily, and before 1:4.2.8p4+dfsg-3ubuntu5.3 on Ubuntu 16.04 LTS allows local users with access to the ntp account to write to arbitrary files and consequently gain privileges via vectors involving statistics directory cleanup.
local
low complexity
canonical CWE-264
7.8
2017-04-14 CVE-2017-1205 Unspecified vulnerability in IBM Spectrum LSF
IBM Platform LSF 10.1 contains an unspecified vulnerability that could allow a local user to escalate their privileges and obtain root access.
local
low complexity
ibm
8.8
2017-04-14 CVE-2015-6568 Improper Input Validation vulnerability in Wolfcms Wolf CMS
Wolf CMS before 0.8.3.1 allows unrestricted file rename and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not prevent a change of a file extension to ".php" after originally using the parameter "filename" for uploading a JPEG image.
network
low complexity
wolfcms CWE-20
8.8
2017-04-14 CVE-2015-6567 Improper Input Validation vulnerability in Wolfcms Wolf CMS
Wolf CMS before 0.8.3.1 allows unrestricted file upload and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not validate the parameter "filename" properly.
network
low complexity
wolfcms CWE-20
8.8