Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2017-03-01 CVE-2016-10092 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Libtiff 4.0.7
Heap-based buffer overflow in the readContigStripsIntoBuffer function in tif_unix.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5 and 4.0.6 allows remote attackers to have unspecified impact via a crafted image.
local
low complexity
libtiff CWE-119
7.8
2017-02-28 CVE-2017-5682 Unspecified vulnerability in Intel products
Intel PSET Application Install wrapper of Intel Parallel Studio XE, Intel System Studio, Intel VTune Amplifier, Intel Inspector, Intel Advisor, Intel MPI Library, Intel Trace Analyzer and Collector, Intel Integrated Performance Primitives, Cryptography for Intel Integrated Performance Primitives, Intel Math Kernel Library, Intel Data Analytics Acceleration Library, and Intel Threading Building Blocks before 2017 Update 2 allows an attacker to launch a process with escalated privileges.
local
low complexity
intel
7.3
2017-02-28 CVE-2017-5982 Path Traversal vulnerability in Kodi 17.1
Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.
network
low complexity
kodi CWE-22
7.5
2017-02-28 CVE-2017-5884 Range Error vulnerability in multiple products
gtk-vnc before 0.7.0 does not properly check boundaries of subrectangle-containing tiles, which allows remote servers to execute arbitrary code via the src x, y coordinates in a crafted (1) rre, (2) hextile, or (3) copyrect tile.
local
low complexity
fedoraproject gnome CWE-118
7.8
2017-02-28 CVE-2016-10207 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
The Xvnc server in TigerVNC allows remote attackers to cause a denial of service (invalid memory access and crash) by terminating a TLS handshake early.
network
low complexity
opensuse tigervnc CWE-119
7.5
2017-02-28 CVE-2016-8715 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Iceni Argus 6.6.05
An exploitable heap corruption vulnerability exists in the loadTrailer functionality of Iceni Argus version 6.6.05.
local
low complexity
iceni CWE-119
7.8
2017-02-28 CVE-2016-8389 Integer Overflow or Wraparound vulnerability in Iceni Argus 6.6.04
An exploitable integer-overflow vulnerability exists within Iceni Argus.
local
low complexity
iceni CWE-190
7.8
2017-02-28 CVE-2016-8388 Out-of-bounds Read vulnerability in Iceni Argus 6.6.04
An exploitable arbitrary heap-overwrite vulnerability exists within Iceni Argus.
local
low complexity
iceni CWE-125
7.8
2017-02-27 CVE-2016-8387 Out-of-bounds Write vulnerability in Iceni Argus 6.6.04
An exploitable heap-based buffer overflow exists in Iceni Argus.
local
low complexity
iceni CWE-787
7.8
2017-02-27 CVE-2016-8386 Out-of-bounds Write vulnerability in Iceni Argus 6.6.04
An exploitable heap-based buffer overflow exists in Iceni Argus.
local
low complexity
iceni CWE-787
7.8