Weekly Vulnerabilities Reports > October 9 to 15, 2017
Overview
280 new vulnerabilities reported during this period, including 23 critical vulnerabilities and 152 high severity vulnerabilities. This weekly summary report vulnerabilities in 174 products from 87 vendors including Microsoft, Irfanview, Google, Juniper, and Kanboard. Vulnerabilities are notably categorized as "Improper Restriction of Operations within the Bounds of a Memory Buffer", "Cross-site Scripting", "Information Exposure", "Improper Input Validation", and "Authorization Bypass Through User-Controlled Key".
- 185 reported vulnerabilities are remotely exploitables.
- 36 reported vulnerabilities have public exploit available.
- 78 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 177 reported vulnerabilities are exploitable by an anonymous user.
- Microsoft has the most reported vulnerabilities, with 62 reported vulnerabilities.
- Apache has the most reported critical vulnerabilities, with 3 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
23 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2017-10-10 | CVE-2017-13706 | Lansweeper | XXE vulnerability in Lansweeper XML external entity (XXE) vulnerability in the import package functionality of the deployment module in Lansweeper before 6.0.100.67 allows remote authenticated users to obtain sensitive information, cause a denial of service, conduct server-side request forgery (SSRF) attacks, conduct internal port scans, or have unspecified other impact via an XML request, aka bug #572705. | 9.9 |
2017-10-15 | CVE-2017-15304 | Airtame | Session Fixation vulnerability in Airtame Hdmi Dongle Firmware 2.3.3 /bin/login.php in the Web Panel on the Airtame HDMI dongle with firmware before 3.0 allows an attacker to set his own session id via a "Cookie: PHPSESSID=" header. | 9.8 |
2017-10-14 | CVE-2017-12629 | Apache Redhat Debian Canonical | XXE vulnerability in multiple products Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. | 9.8 |
2017-10-13 | CVE-2017-10622 | Juniper | Improper Authentication vulnerability in Juniper Junos Space 16.1/17.1 An authentication bypass vulnerability in Juniper Networks Junos Space Network Management Platform may allow a remote unauthenticated network based attacker to login as any privileged user. | 9.8 |
2017-10-13 | CVE-2017-10615 | Juniper | Improper Input Validation vulnerability in Juniper Junos 14.1/14.1X53/14.2 A vulnerability in the pluggable authentication module (PAM) of Juniper Networks Junos OS may allow an unauthenticated network based attacker to potentially execute arbitrary code or crash daemons such as telnetd or sshd that make use of PAM. | 9.8 |
2017-10-13 | CVE-2016-1265 | Juniper | Information Exposure vulnerability in Juniper Junos Space A remote unauthenticated network based attacker with access to Junos Space may execute arbitrary code on Junos Space or gain access to devices managed by Junos Space using cross site request forgery (CSRF), default authentication credentials, information leak and command injection attack vectors. | 9.8 |
2017-10-13 | CVE-2017-11771 | Microsoft | Improper Input Validation vulnerability in Microsoft products The Microsoft Windows Search component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability when it fails to properly handle DNS responses, aka "Windows Search Remote Code Execution Vulnerability". | 9.8 |
2017-10-13 | CVE-2016-5791 | Jantek | Improper Authentication vulnerability in Jantek Jtc-200 Firmware An Improper Authentication issue was discovered in JanTek JTC-200, all versions. | 9.8 |
2017-10-12 | CVE-2016-8736 | Apache | Deserialization of Untrusted Data vulnerability in Apache Openmeetings Apache OpenMeetings before 3.1.2 is vulnerable to Remote Code Execution via RMI deserialization attack. | 9.8 |
2017-10-11 | CVE-2017-5791 | HP | Improper Authentication vulnerability in HP Intelligent Management Center Plat 7.2 The doFilter method in UrlAccessController in HPE Intelligent Management Center (iMC) PLAT 7.2 E0403P06 allows remote bypass of authentication via unspecified strings in a URI. | 9.8 |
2017-10-11 | CVE-2017-5789 | HP | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in HP Loadrunner and Performance Center HPE LoadRunner before 12.53 Patch 4 and HPE Performance Center before 12.53 Patch 4 allow remote attackers to execute arbitrary code via unspecified vectors. | 9.8 |
2017-10-11 | CVE-2017-14003 | Lavalink | Improper Authentication vulnerability in Lavalink Ether-Serial Link Firmware 6.01.00/29.03.2007 An Authentication Bypass by Spoofing issue was discovered in LAVA Ether-Serial Link (ESL) running firmware versions 6.01.00/29.03.2007 and prior versions. | 9.8 |
2017-10-11 | CVE-2017-0903 | Rubygems Debian Canonical Redhat | Deserialization of Untrusted Data vulnerability in multiple products RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. | 9.8 |
2017-10-11 | CVE-2017-15220 | Flexense | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Flexense VX Search 10.1.12 Flexense VX Search Enterprise 10.1.12 is vulnerable to a buffer overflow via an empty POST request to a long URI beginning with a /../ substring. | 9.8 |
2017-10-11 | CVE-2013-6924 | Seagate | Command Injection vulnerability in Seagate Blackarmor NAS 220 Firmware Sg20002000.1331 Seagate BlackArmor NAS devices with firmware sg2000-2000.1331 allow remote attackers to execute arbitrary commands via shell metacharacters in the ip parameter to backupmgt/getAlias.php. | 9.8 |
2017-10-10 | CVE-2017-15226 | Zyxel | OS Command Injection vulnerability in Zyxel Nbg6716 Firmware 1.00(Aakg.9)C0 Zyxel NBG6716 V1.00(AAKG.9)C0 devices allow command injection in the ozkerz component because beginIndex and endIndex are used directly in a popen call. | 9.8 |
2017-10-10 | CVE-2017-8994 | HP | Improper Input Validation vulnerability in HP Operations Orchestration A input validation vulnerability in HPE Operations Orchestration product all versions prior to 10.80, allows for the execution of code remotely. | 9.8 |
2017-10-10 | CVE-2008-7315 | Cpan | Command Injection vulnerability in Cpan Ui::Dialog UI-Dialog 1.09 and earlier allows remote attackers to execute arbitrary commands. | 9.8 |
2017-10-10 | CVE-2017-12861 | Epson | Weak Password Requirements vulnerability in Epson Easymp 2.86 The Epson "EasyMP" software is designed to remotely stream a users computer to supporting projectors.These devices are authenticated using a unique 4-digit code, displayed on-screen - ensuring only those who can view it are streaming.All Epson projectors supporting the "EasyMP" software are vulnerable to a brute-force vulnerability, allowing any attacker on the network to remotely control and stream to the vulnerable device | 9.8 |
2017-10-10 | CVE-2017-12860 | Epson | Use of Hard-coded Credentials vulnerability in Epson Easymp 2.86 The Epson "EasyMP" software is designed to remotely stream a users computer to supporting projectors.These devices are authenticated using a unique 4-digit code, displayed on-screen - ensuring only those who can view it are streaming.In addition to the password, each projector has a hardcoded "backdoor" code (2270), which authenticates to all devices. | 9.8 |
2017-10-10 | CVE-2017-14980 | Flexense | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Flexense Syncbreeze 10.0.28 Buffer overflow in Sync Breeze Enterprise 10.0.28 allows remote attackers to have unspecified impact via a long username parameter to /login. | 9.8 |
2017-10-10 | CVE-2014-9474 | Mpfr | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Mpfr GNU Mpfr 3.1.2 Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2-p11 allows context-dependent attackers to have unspecified impact via vectors related to incorrect documentation for mpn_set_str. | 9.8 |
2017-10-10 | CVE-2014-0030 | Apache | XXE vulnerability in Apache Roller The XML-RPC protocol support in Apache Roller before 5.0.3 allows attackers to conduct XML External Entity (XXE) attacks via unspecified vectors. | 9.8 |
152 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2017-10-13 | CVE-2017-6224 | Ruckuswireless | OS Command Injection vulnerability in Ruckuswireless Unleashed Firmware and Zonedirector Firmware Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. | 8.8 |
2017-10-13 | CVE-2017-6223 | Ruckus | OS Command Injection vulnerability in Ruckus Zonedirector Firmware Ruckus Wireless Zone Director Controller firmware releases ZD9.9.x, ZD9.10.x, ZD9.13.0.x less than 9.13.0.0.232 contain OS Command Injection vulnerabilities in the ping functionality that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system. | 8.8 |
2017-10-13 | CVE-2016-1261 | Juniper | Cross-Site Request Forgery (CSRF) vulnerability in Juniper Junos J-Web does not validate certain input that may lead to cross-site request forgery (CSRF) issues or cause a denial of J-Web service (DoS). | 8.8 |
2017-10-13 | CVE-2017-15276 | Opentext | Path Traversal vulnerability in Opentext Documentum Content Server 7.3 OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows an authenticated user to gain superuser privileges: Content Server allows uploading content using batches (TAR archives). | 8.8 |
2017-10-13 | CVE-2017-15013 | Opentext | Improper Privilege Management vulnerability in Opentext Documentum Content Server 7.3 OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows an authenticated user to gain superuser privileges: Content Server stores information about uploaded files in dmr_content objects, which are queryable and "editable" (before release 7.2P02, any authenticated user was able to edit dmr_content objects; now any authenticated user may delete a dmr_content object and then create a new one with the old identifier) by authenticated users; this allows any authenticated user to replace the content of security-sensitive dmr_content objects (for example, dmr_content related to dm_method objects) and gain superuser privileges. | 8.8 |
2017-10-13 | CVE-2017-15012 | Opentext | Improper Input Validation vulnerability in Opentext Documentum Content Server 7.3 OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 does not properly validate the input of the PUT_FILE RPC-command, which allows any authenticated user to hijack an arbitrary file from the Content Server filesystem; because some files on the Content Server filesystem are security-sensitive, this leads to privilege escalation. | 8.8 |
2017-10-13 | CVE-2017-11786 | Microsoft | Authentication Bypass by Capture-replay vulnerability in Microsoft Lync and Skype for Business Skype for Business in Microsoft Lync 2013 SP1 and Skype for Business 2016 allows an attacker to steal an authentication hash that can be reused elsewhere, due to how Skype for Business handles authentication requests, aka "Skype for Business Elevation of Privilege Vulnerability." | 8.8 |
2017-10-13 | CVE-2017-11763 | Microsoft | Improper Input Validation vulnerability in Microsoft products The Microsoft Graphics Component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability in the way it handles specially crafted embedded fonts, aka "Microsoft Graphics Remote Code Execution Vulnerability". | 8.8 |
2017-10-13 | CVE-2017-11762 | Microsoft | Improper Input Validation vulnerability in Microsoft products The Microsoft Graphics Component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability in the way it handles specially crafted embedded fonts, aka "Microsoft Graphics Remote Code Execution Vulnerability". | 8.8 |
2017-10-12 | CVE-2017-9514 | Atlassian | Incorrect Permission Assignment for Critical Resource vulnerability in Atlassian Bamboo Bamboo before 6.0.5, 6.1.x before 6.1.4, and 6.2.x before 6.2.1 had a REST endpoint that parsed a YAML file and did not sufficiently restrict which classes could be loaded. | 8.8 |
2017-10-12 | CVE-2017-15285 | Qualiteam | Improper Input Validation vulnerability in Qualiteam X-Cart X-Cart 5.2.23, 5.3.1.9, 5.3.2.13, and 5.3.3 is vulnerable to Remote Code Execution. | 8.8 |
2017-10-12 | CVE-2017-15281 | Imagemagick Canonical | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products ReadPSDImage in coders/psd.c in ImageMagick 7.0.7-6 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to "Conditional jump or move depends on uninitialised value(s)." | 8.8 |
2017-10-11 | CVE-2017-2888 | Libsdl Canonical Debian | Integer Overflow or Wraparound vulnerability in multiple products An exploitable integer overflow vulnerability exists when creating a new RGB Surface in SDL 2.0.5. | 8.8 |
2017-10-11 | CVE-2017-2887 | Libsdl Debian | Out-of-bounds Write vulnerability in multiple products An exploitable buffer overflow vulnerability exists in the XCF property handling functionality of SDL_image 2.0.1. | 8.8 |
2017-10-11 | CVE-2017-15238 | Graphicsmagick Debian | Use After Free vulnerability in multiple products ReadOneJNGImage in coders/png.c in GraphicsMagick 1.3.26 has a use-after-free issue when the height or width is zero, related to ReadJNGImage. | 8.8 |
2017-10-11 | CVE-2017-5700 | Intel | Insufficiently Protected Credentials vulnerability in Intel products Insufficient protection of password storage in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows local attackers to bypass Administrator and User passwords via access to password storage. | 8.4 |
2017-10-13 | CVE-2017-10623 | Juniper | Improper Authentication vulnerability in Juniper Junos Space Lack of authentication and authorization of cluster messages in Juniper Networks Junos Space may allow a man-in-the-middle type of attacker to intercept, inject or disrupt Junos Space cluster operations between two nodes. | 8.1 |
2017-10-13 | CVE-2017-11779 | Microsoft | Unspecified vulnerability in Microsoft products The Microsoft Windows Domain Name System (DNS) DNSAPI.dll on Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability when it fails to properly handle DNS responses, aka "Windows DNSAPI Remote Code Execution Vulnerability". | 8.1 |
2017-10-13 | CVE-2017-10612 | Juniper | Cross-site Scripting vulnerability in Juniper Junos Space A persistent site scripting vulnerability in Juniper Networks Junos Space allows users who can change certain configuration to implant malicious Javascript or HTML which may be used to steal information or perform actions as other Junos Space users or administrators. | 8.0 |
2017-10-13 | CVE-2016-5789 | Jantek | Cross-Site Request Forgery (CSRF) vulnerability in Jantek Jtc-200 Firmware A Cross-site Request Forgery issue was discovered in JanTek JTC-200, all versions. | 8.0 |
2017-10-13 | CVE-2016-4922 | Juniper | Command Injection vulnerability in Juniper Junos Certain combinations of Junos OS CLI commands and arguments have been found to be exploitable in a way that can allow unauthorized access to the operating system. | 7.8 |
2017-10-13 | CVE-2017-8718 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products The Microsoft JET Database Engine in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to take control of an affected system, due to how it handles objects in memory, aka "Microsoft JET Database Engine Remote Code Execution Vulnerability". | 7.8 |
2017-10-13 | CVE-2017-8717 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products The Microsoft JET Database Engine in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to take control of an affected system, due to how it handles objects in memory, aka "Microsoft JET Database Engine Remote Code Execution Vulnerability". | 7.8 |
2017-10-13 | CVE-2017-11826 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products Microsoft Office 2010, SharePoint Enterprise Server 2010, SharePoint Server 2010, Web Applications, Office Web Apps Server 2010 and 2013, Word Viewer, Word 2007, 2010, 2013 and 2016, Word Automation Services, and Office Online Server allow remote code execution when the software fails to properly handle objects in memory. | 7.8 |
2017-10-13 | CVE-2017-11825 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Office and Office for mac Microsoft Office 2016 Click-to-Run (C2R) and Microsoft Office 2016 for Mac allow an attacker to use a specially crafted file to perform actions in the security context of the current user, due to how Microsoft Office handles files in memory, aka "Microsoft Office Remote Code Execution Vulnerability". | 7.8 |
2017-10-13 | CVE-2017-11782 | Microsoft | Improper Input Validation vulnerability in Microsoft Windows 10 and Windows Server 2016 The Microsoft Server Block Message (SMB) on Microsoft Windows 10 1607 and Windows Server 2016, allows an elevation of privilege vulnerability when an attacker sends specially crafted requests to the server, aka "Windows SMB Elevation of Privilege Vulnerability". | 7.8 |
2017-10-13 | CVE-2017-11774 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Outlook 2010/2013/2016 Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Security Feature Bypass Vulnerability." | 7.8 |
2017-10-13 | CVE-2017-11769 | Microsoft | Unspecified vulnerability in Microsoft Windows 10 and Windows Server 2016 The Microsoft Windows TRIE component on Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability in the way it handles loading dll files, aka "TRIE Remote Code Execution Vulnerability". | 7.8 |
2017-10-12 | CVE-2017-10865 | Hitachi Solutions | Untrusted Search Path vulnerability in Hitachi-Solutions Confidential File Decryption Untrusted search path vulnerability in HIBUN Confidential File Decryption program prior to 10.50.0.5 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | 7.8 |
2017-10-12 | CVE-2017-10864 | Hitachi Solutions | Untrusted Search Path vulnerability in Hitachi-Solutions Confidential File Viewer Untrusted search path vulnerability in Installer of HIBUN Confidential File Viewer prior to 11.20.0001 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | 7.8 |
2017-10-12 | CVE-2017-10863 | Hitachi Solutions | Untrusted Search Path vulnerability in Hitachi-Solutions Confidential File Decryption Untrusted search path vulnerability in HIBUN Confidential File Decryption program prior to 10.50.0.5 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | 7.8 |
2017-10-11 | CVE-2017-15264 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview 4.44 IrfanView version 4.44 (32bit) allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .tif file, related to "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at image00000000_00400000+0x00000000000236e4." | 7.8 |
2017-10-11 | CVE-2017-15263 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlListWalk+0x00000000000166c4." | 7.8 |
2017-10-11 | CVE-2017-15262 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at PDF!xmlParserInputRead+0x0000000000048d0c." | 7.8 |
2017-10-11 | CVE-2017-15261 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Possible Stack Corruption starting at PDF!xmlGetGlobalState+0x0000000000057b35." | 7.8 |
2017-10-11 | CVE-2017-15260 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address may be used as a return value starting at PDF!xmlParserInputRead+0x0000000000129a59." | 7.8 |
2017-10-11 | CVE-2017-15259 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlParserInputRead+0x000000000011624a." | 7.8 |
2017-10-11 | CVE-2017-15258 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Read Access Violation starting at PDF!xmlParserInputRead+0x0000000000161a9c." | 7.8 |
2017-10-11 | CVE-2017-15257 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at PDF!xmlParserInputRead+0x000000000009174a." | 7.8 |
2017-10-11 | CVE-2017-15256 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlListWalk+0x0000000000019fc8." | 7.8 |
2017-10-11 | CVE-2017-15255 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview PDF 4.43 IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Read Access Violation starting at PDF!xmlParserInputRead+0x00000000001601b0." | 7.8 |
2017-10-11 | CVE-2017-15254 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Read Access Violation starting at PDF!xmlGetGlobalState+0x000000000007dfa5." | 7.8 |
2017-10-11 | CVE-2017-15253 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to a "User Mode Write AV starting at PDF!xmlGetGlobalState+0x000000000007dff2." | 7.8 |
2017-10-11 | CVE-2017-15252 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to a "Read Access Violation on Block Data Move starting at PDF!xmlListWalk+0x00000000000158cb." | 7.8 |
2017-10-11 | CVE-2017-15251 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at PDF!xmlParserInputRead+0x00000000000e7326." | 7.8 |
2017-10-11 | CVE-2017-15250 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Read Access Violation starting at PDF!xmlParserInputRead+0x0000000000132e19." | 7.8 |
2017-10-11 | CVE-2017-15249 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at PDF!xmlGetGlobalState+0x00000000000668d6." | 7.8 |
2017-10-11 | CVE-2017-15248 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at PDF!xmlGetGlobalState+0x0000000000063ca6." | 7.8 |
2017-10-11 | CVE-2017-15247 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlParserInputRead+0x00000000001168a1." | 7.8 |
2017-10-11 | CVE-2017-15246 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to a "Read Access Violation on Block Data Move starting at PDF!xmlListWalk+0x000000000001515b." | 7.8 |
2017-10-11 | CVE-2017-15245 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlGetGlobalState+0x0000000000057b76." | 7.8 |
2017-10-11 | CVE-2017-15244 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to an "Error Code (0xe06d7363) starting at wow64!Wow64NotifyDebugger+0x000000000000001d." | 7.8 |
2017-10-11 | CVE-2017-15243 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Possible Stack Corruption starting at PDF!xmlGetGlobalState+0x00000000000568a4." | 7.8 |
2017-10-11 | CVE-2017-15242 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to a "User Mode Write AV starting at PDF!xmlGetGlobalState+0x0000000000031abe." | 7.8 |
2017-10-11 | CVE-2017-15241 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlParserInputRead+0x00000000000929f5." | 7.8 |
2017-10-11 | CVE-2017-15240 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Read Access Violation starting at PDF!xmlParserInputRead+0x0000000000132cef." | 7.8 |
2017-10-11 | CVE-2017-15239 | Irfanview | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Irfanview and PDF IrfanView 4.44 - 32bit with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address may be used as a return value starting at PDF!xmlParserInputRead+0x0000000000040db4." | 7.8 |
2017-10-11 | CVE-2017-12188 | Linux | Unspecified vulnerability in Linux Kernel arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun." | 7.8 |
2017-10-10 | CVE-2017-9714 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, an out of bound memory access may happen in limCheckRxRSNIeMatch in case incorrect RSNIE is received from the client in assoc request. | 7.8 | |
2017-10-10 | CVE-2017-9706 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, an array out-of-bounds access can potentially occur in a display driver. | 7.8 | |
2017-10-10 | CVE-2017-9687 | Double Free vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, two concurrent threads/processes can write the value of "0" to the debugfs file that controls ipa ipc log which will lead to the double-free in ipc_log_context_destroy(). | 7.8 | |
2017-10-10 | CVE-2017-9686 | Double Free vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, there is a possible double free/use after free in the SPS driver when debugfs logging is used. | 7.8 | |
2017-10-10 | CVE-2017-9683 | Integer Overflow or Wraparound vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while flashing a meta image, an integer overflow can occur, if user-defined image offset and size values are too large. | 7.8 | |
2017-10-10 | CVE-2017-11067 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, the Athdiag procfs entry does not have a proper address sanity check which may potentially lead to the use of an out-of-range pointer offset. | 7.8 | |
2017-10-10 | CVE-2017-11059 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, setting the HMAC key by different threads during SHA operations may potentially lead to a buffer overflow. | 7.8 | |
2017-10-10 | CVE-2017-11057 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in compatibility mode, flash_data from 64-bit userspace may cause disclosure of kernel memory or a fault due to using a userspace-provided address. | 7.8 | |
2017-10-10 | CVE-2017-11056 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while doing sha and cipher operations, a userspace buffer is directly accessed in kernel space potentially leading to a page fault. | 7.8 | |
2017-10-10 | CVE-2017-11053 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, when qos map set IE of length less than 16 is received in association response or in qos map configure action frame, a buffer overflow can potentially occur in ConvertQosMapsetFrame(). | 7.8 | |
2017-10-10 | CVE-2017-11050 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, when the pktlogconf tool gives a pktlog buffer of size less than the minimal possible source data size in the host driver, a buffer overflow can potentially occur. | 7.8 | |
2017-10-10 | CVE-2017-11048 | Use After Free vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in a display driver function, a Use After Free condition can occur. | 7.8 | |
2017-10-10 | CVE-2017-11046 | Out-of-bounds Write vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, when an audio driver ioctl handler is called, a kernel out-of-bounds write can potentially occur. | 7.8 | |
2017-10-10 | CVE-2015-5675 | Freebsd | Permissions, Privileges, and Access Controls vulnerability in Freebsd 10.1/9.3 The sys_amd64 IRET Handler in the kernel in FreeBSD 9.3 and 10.1 allows local users to gain privileges or cause a denial of service (kernel panic). | 7.8 |
2017-10-10 | CVE-2017-13723 | X ORG Debian | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products In X.Org Server (aka xserver and xorg-server) before 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp. | 7.8 |
2017-10-15 | CVE-2017-15363 | Luracast | Path Traversal vulnerability in Luracast Restler Directory traversal vulnerability in public/examples/resources/getsource.php in Luracast Restler through 3.0.0, as used in the restler extension before 1.7.1 for TYPO3, allows remote attackers to read arbitrary files via the file parameter. | 7.5 |
2017-10-13 | CVE-2017-10624 | Juniper | Insufficient Verification of Data Authenticity vulnerability in Juniper Junos Space Insufficient verification of node certificates in Juniper Networks Junos Space may allow a man-in-the-middle type of attacker to make unauthorized modifications to Space database or add nodes. | 7.5 |
2017-10-13 | CVE-2017-10619 | Juniper | Unspecified vulnerability in Juniper Junos 12.3X48/15.1X49 When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain multicast packets might cause the flowd process to crash, halting or interrupting traffic from flowing through the device and triggering RG1+ (data-plane) fail-over to the secondary node. | 7.5 |
2017-10-13 | CVE-2017-10614 | Juniper | Resource Exhaustion vulnerability in Juniper Junos A vulnerability in telnetd service on Junos OS allows a remote attacker to cause a limited memory and/or CPU consumption denial of service attack. | 7.5 |
2017-10-13 | CVE-2017-10608 | Juniper | Resource Exhaustion vulnerability in Juniper Junos Any Juniper Networks SRX series device with one or more ALGs enabled may experience a flowd crash when traffic is processed by the Sun/MS-RPC ALGs. | 7.5 |
2017-10-13 | CVE-2017-10607 | Juniper | Unspecified vulnerability in Juniper Junos 16.1 Juniper Networks Junos OS 16.1R1, and services releases based off of 16.1R1, are vulnerable to the receipt of a crafted BGP Protocol Data Unit (PDU) sent directly to the router, which can cause the RPD routing process to crash and restart. | 7.5 |
2017-10-13 | CVE-2016-4925 | Juniper | Data Processing Errors vulnerability in Juniper Junose Receipt of a specifically malformed IPv6 packet processed by the router may trigger a line card reset: processor exception 0x68616c74 (halt) in task: scheduler. | 7.5 |
2017-10-13 | CVE-2016-4921 | Juniper | Resource Management Errors vulnerability in Juniper Junos By flooding a Juniper Networks router running Junos OS with specially crafted IPv6 traffic, all available resources can be consumed, leading to the inability to store next hop information for legitimate traffic. | 7.5 |
2017-10-13 | CVE-2017-8727 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user, due to how Microsoft Windows Text Services Framework handles objects in memory, aka "Windows Shell Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11822 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Internet Explorer 11 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how Internet Explorer handles objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11821 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11819 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Windows 7 Microsoft Windows 7 SP1 allows an attacker to execute arbitrary code in the context of the current user, due to how Microsoft browsers handle objects in memory, aka "Windows Shell Remote Code Execution Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11813 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Internet Explorer 11 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, and Windows Server 2012 R2 allows an attacker to execute arbitrary code in the context of the current user, due to how Internet Explorer handles objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11812 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11811 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11810 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Internet Explorer 10/11/9 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11809 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11808 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11807 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11806 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11805 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11804 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11802 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11801 | Microsoft | Information Exposure vulnerability in Microsoft Chakracore ChakraCore allows an attacker to execute arbitrary code in the context of the current user, due to how the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11800 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Edge Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11799 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11798 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Edge Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11797 | Microsoft | Information Exposure vulnerability in Microsoft Chakracore ChakraCore allows an attacker to execute arbitrary code in the context of the current user, due to how the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11796 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge ChakraCore and Microsoft Edge in Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11793 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Internet Explorer 10/11/9 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11792 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allow an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11781 | Microsoft | Improper Input Validation vulnerability in Microsoft products The Microsoft Server Block Message (SMB) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows a denial of service vulnerability when an attacker sends specially crafted requests to the server, aka "Windows SMB Denial of Service Vulnerability". | 7.5 |
2017-10-13 | CVE-2017-11776 | Microsoft | Information Exposure vulnerability in Microsoft Outlook 2016 Microsoft Outlook 2016 allows an attacker to obtain the email content of a user, due to how Outlook 2016 discloses user email content, aka "Microsoft Outlook Information Disclosure Vulnerability." | 7.5 |
2017-10-13 | CVE-2017-11772 | Microsoft | Information Exposure vulnerability in Microsoft products The Microsoft Windows Search component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure when it fails to properly handle objects in memory, aka "Microsoft Search Information Disclosure Vulnerability". | 7.5 |
2017-10-12 | CVE-2017-15290 | Mirasys | Cleartext Transmission of Sensitive Information vulnerability in Mirasys Video Management System Mirasys Video Management System (VMS) 6.x before 6.4.6, 7.x before 7.5.15, and 8.x before 8.1.1 has a login process in which cleartext data is sent from a server to a client, and not all of this data is required for the client functionality. | 7.5 |
2017-10-12 | CVE-2017-15268 | Qemu | Missing Release of Resource after Effective Lifetime vulnerability in Qemu Qemu through 2.10.0 allows remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c. | 7.5 |
2017-10-12 | CVE-2017-15286 | Sqlite | NULL Pointer Dereference vulnerability in Sqlite 3.20.1 SQLite 3.20.1 has a NULL pointer dereference in tableColumnList in shell.c because it fails to consider certain cases where `sqlite3_step(pStmt)==SQLITE_ROW` is false and a data structure is never initialized. | 7.5 |
2017-10-11 | CVE-2017-15267 | GNU | NULL Pointer Dereference vulnerability in GNU Libextractor 1.4 In GNU Libextractor 1.4, there is a NULL Pointer Dereference in flac_metadata in flac_extractor.c. | 7.5 |
2017-10-11 | CVE-2017-15236 | Tiandy | Information Exposure vulnerability in Tiandy IP Camera Firmware 5.56.17.120 Tiandy IP cameras 5.56.17.120 do not properly restrict a certain proprietary protocol, which allows remote attackers to read settings via a crafted request to TCP port 3001, as demonstrated by config* files and extendword.txt. | 7.5 |
2017-10-11 | CVE-2017-15235 | Horde | Forced Browsing vulnerability in Horde Groupware 5.2.21 The File Manager (gollem) module 3.0.11 in Horde Groupware 5.2.21 allows remote attackers to bypass Horde authentication for file downloads via a crafted fn parameter that corresponds to the exact filename. | 7.5 |
2017-10-11 | CVE-2017-5722 | Intel | Improper Privilege Management vulnerability in Intel products Incorrect policy enforcement in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows attackers with local or physical access to bypass enforcement of integrity protections via manipulation of firmware storage. | 7.5 |
2017-10-11 | CVE-2017-5721 | Intel | Improper Input Validation vulnerability in Intel products Insufficient input validation in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows local attackers to execute arbitrary code via manipulation of memory. | 7.5 |
2017-10-10 | CVE-2017-15193 | Wireshark | Resource Exhaustion vulnerability in Wireshark In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the MBIM dissector could crash or exhaust system memory. | 7.5 |
2017-10-10 | CVE-2017-15192 | Wireshark | Unspecified vulnerability in Wireshark In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the BT ATT dissector could crash. | 7.5 |
2017-10-10 | CVE-2017-15191 | Wireshark Debian | Use of Externally-Controlled Format String vulnerability in multiple products In Wireshark 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, and 2.0.0 to 2.0.15, the DMP dissector could crash. | 7.5 |
2017-10-10 | CVE-2017-15190 | Wireshark | Unspecified vulnerability in Wireshark 2.4.0/2.4.1 In Wireshark 2.4.0 to 2.4.1, the RTSP dissector could crash. | 7.5 |
2017-10-10 | CVE-2017-15189 | Wireshark | Missing Release of Resource after Effective Lifetime vulnerability in Wireshark 2.4.0/2.4.1 In Wireshark 2.4.0 to 2.4.1, the DOCSIS dissector could go into an infinite loop. | 7.5 |
2017-10-10 | CVE-2017-9717 | Out-of-bounds Read vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while parsing Netlink attributes, a buffer overread can occur. | 7.5 | |
2017-10-10 | CVE-2017-9715 | Out-of-bounds Read vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing a vendor command, a buffer over-read can occur. | 7.5 | |
2017-10-10 | CVE-2017-11064 | Out-of-bounds Read vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a buffer overread is observed during processing of ACA_NL80211_VENDOR_SUBCMD_EXTSCAN_PNO_SET_PASSPOINT_LIST and QCA_NL80211_VENDOR_SUBCMD_EXTSCAN_PNO_SET_LIST cfg80211 vendor commands in __wlan_hdd_cfg80211_set_passpoint_list and hdd_extscan_passpoint_fill_network_list function respectively. | 7.5 | |
2017-10-10 | CVE-2017-11062 | Out-of-bounds Read vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, currently attributes are not validated in __wlan_hdd_cfg80211_do_acs which can potentially lead to a buffer overread. | 7.5 | |
2017-10-10 | CVE-2017-11061 | Out-of-bounds Read vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing cfg80211 vendor sub command QCA_NL80211_VENDOR_SUBCMD_ROAM, a buffer over-read can occur. | 7.5 | |
2017-10-10 | CVE-2017-11060 | Out-of-bounds Read vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a buffer overread is observed during processing of ACA_NL80211_VENDOR_SUBCMD_EXTSCAN_PNO_SET_PASSPOINT_LIST and QCA_NL80211_VENDOR_SUBCMD_EXTSCAN_PNO_SET_LIST cfg80211 vendor commands in __wlan_hdd_cfg80211_set_passpoint_list and hdd_extscan_passpoint_fill_network_list function respectively. | 7.5 | |
2017-10-10 | CVE-2017-11055 | Out-of-bounds Read vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing a specially crafted QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION cfg80211 vendor command, a buffer over-read can occur. | 7.5 | |
2017-10-10 | CVE-2017-11054 | Out-of-bounds Read vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing a specially crafted cfg80211 vendor command, a buffer over-read can occur. | 7.5 | |
2017-10-10 | CVE-2017-11052 | Out-of-bounds Read vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing a specially crafted QCA_NL80211_VENDOR_SUBCMD_NDP cfg80211 vendor command a buffer over-read can occur. | 7.5 | |
2017-10-10 | CVE-2017-11051 | Information Exposure vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, information disclosure is possible in function __wlan_hdd_cfg80211_testmode since buffer hb_params is not initialized to zero. | 7.5 | |
2017-10-10 | CVE-2015-7503 | Zend | Key Management Errors vulnerability in Zend Framework Zend Framework before 2.4.9, zend-framework/zend-crypt 2.4.x before 2.4.9, and 2.5.x before 2.5.2 allows remote attackers to recover the RSA private key. | 7.5 |
2017-10-10 | CVE-2015-7384 | Nodejs | Resource Exhaustion vulnerability in Nodejs Node.Js 4.0.0/4.1.0/4.1.1 Node.js 4.0.0, 4.1.0, and 4.1.1 allows remote attackers to cause a denial of service. | 7.5 |
2017-10-10 | CVE-2015-2856 | Accellion | Path Traversal vulnerability in Accellion File Transfer Appliance Directory traversal vulnerability in the template function in function.inc in Accellion File Transfer Appliance devices before FTA_9_11_210 allows remote attackers to read arbitrary files via a .. | 7.5 |
2017-10-10 | CVE-2017-14943 | Trapezegroup | Information Exposure vulnerability in Trapezegroup Transitmaster Trapeze TransitMaster is vulnerable to information disclosure (emails / hashed passwords) via a modified userID field in JSON data to ManageSubscriber.aspx/GetSubscriber. | 7.5 |
2017-10-10 | CVE-2017-5637 | Apache Debian | Missing Authentication for Critical Function vulnerability in multiple products Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. | 7.5 |
2017-10-10 | CVE-2017-14603 | Digium | Information Exposure vulnerability in Digium Asterisk In Asterisk 11.x before 11.25.3, 13.x before 13.17.2, and 14.x before 14.6.2 and Certified Asterisk 11.x before 11.6-cert18 and 13.x before 13.13-cert6, insufficient RTCP packet validation could allow reading stale buffer contents and when combined with the "nat" and "symmetric_rtp" options allow redirecting where Asterisk sends the next RTCP report. | 7.5 |
2017-10-09 | CVE-2017-14972 | Infocus | Improper Authentication vulnerability in Infocus Mondopad 2.2.08 InFocus Mondopad 2.2.08 is vulnerable to authentication bypass when accessing uploaded files by entering Control-Alt-Delete, and then using Task Manager to reach a file. | 7.5 |
2017-10-13 | CVE-2017-10620 | Juniper | Improper Certificate Validation vulnerability in Juniper Junos 12.1X46/12.3X48/15.1X49 Juniper Networks Junos OS on SRX series devices do not verify the HTTPS server certificate before downloading anti-virus updates. | 7.4 |
2017-10-11 | CVE-2017-8025 | EMC | Improper Input Validation vulnerability in EMC Archer GRC Platform 6.2.0.4 RSA Archer GRC Platform prior to 6.2.0.5 is affected by an arbitrary file upload vulnerability. | 7.4 |
2017-10-10 | CVE-2015-5639 | Dwango | Improper Certificate Validation vulnerability in Dwango Niconico 6.37 niconico App for iOS before 6.38 does not verify SSL certificates which could allow remote attackers to execute man-in-the-middle attacks. | 7.4 |
2017-10-10 | CVE-2015-2988 | Rakutencard | Improper Certificate Validation vulnerability in Rakutencard Rakuten Card Rakuten card App for iOS 5.2.0 through 5.2.4 does not verify SSL certificates which might allow remote attackers to execute man-in-the-middle attacks. | 7.4 |
2017-10-11 | CVE-2017-13722 | X ORG | Out-of-bounds Read vulnerability in X.Org Libxfont 2.0.0/2.0.1 In the pcfGetProperties function in bitmap/pcfread.c in libXfont through 1.5.2 and 2.x before 2.0.2, a missing boundary check (for PCF files) could be used by local attackers authenticated to an Xserver for a buffer over-read, for information disclosure or a crash of the X server. | 7.1 |
2017-10-11 | CVE-2017-13720 | X ORG | Out-of-bounds Read vulnerability in X.Org Libxfont 2.0.0/2.0.1 In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). | 7.1 |
2017-10-11 | CVE-2017-5701 | Intel | Unspecified vulnerability in Intel products Insecure platform configuration in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows an attacker with physical presence to run arbitrary code via unauthorized firmware modification during BIOS Recovery. | 7.1 |
2017-10-10 | CVE-2015-7842 | Huawei | Permission Issues vulnerability in Huawei products Huawei FusionServer rack servers RH2288 V3 with software before V100R003C00SPC603, RH2288H V3 with software before V100R003C00SPC503, XH628 V3 with software before V100R003C00SPC602, RH1288 V3 with software before V100R003C00SPC602, RH2288A V2 with software before V100R002C00SPC701, RH1288A V2 with software before V100R002C00SPC502, RH8100 V3 with software before V100R003C00SPC110, CH222 V3 with software before V100R001C00SPC161, CH220 V3 with software before V100R001C00SPC161, and CH121 V3 with software before V100R001C00SPC161 allow remote authenticated operators to change server information by leveraging failure to verify user permissions. | 7.1 |
2017-10-13 | CVE-2017-8694 | Microsoft | Unspecified vulnerability in Microsoft products The Microsoft Windows Kernel Mode Driver on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". | 7.0 |
2017-10-13 | CVE-2017-8689 | Microsoft | Unspecified vulnerability in Microsoft products The Microsoft Windows Kernel Mode Driver on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". | 7.0 |
2017-10-13 | CVE-2017-11824 | Microsoft | Unspecified vulnerability in Microsoft products The Microsoft Graphics Component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability in the way it handles objects in memory, aka "Windows Graphics Component Elevation of Privilege Vulnerability". | 7.0 |
2017-10-13 | CVE-2017-11783 | Microsoft | Unspecified vulnerability in Microsoft products Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability in the way it handles calls to Advanced Local Procedure Call (ALPC), aka "Windows Elevation of Privilege Vulnerability". | 7.0 |
2017-10-13 | CVE-2017-11780 | Microsoft | Unspecified vulnerability in Microsoft products The Server Message Block 1.0 (SMBv1) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows a remote code execution vulnerability when it fails to properly handle certain requests, aka "Windows SMB Remote Code Execution Vulnerability". | 7.0 |
2017-10-10 | CVE-2017-9697 | Race Condition vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a race condition can allow access to already freed memory while reading command registration table entries in diag_dbgfs_read_table. | 7.0 | |
2017-10-10 | CVE-2015-8239 | Sudo Project | Race Condition vulnerability in Sudo Project Sudo The SHA-2 digest support in the sudoers plugin in sudo after 1.8.7 allows local users with write permissions to parts of the called command to replace them before it is executed. | 7.0 |
105 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2017-10-13 | CVE-2017-11823 | Microsoft | Race Condition vulnerability in Microsoft Windows 10 and Windows Server 2016 The Microsoft Device Guard on Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a security feature bypass by the way it handles Windows PowerShell sessions, aka "Microsoft Windows Security Feature Bypass". | 6.7 |
2017-10-13 | CVE-2016-6815 | Apache | Credentials Management vulnerability in Apache Ranger In Apache Ranger before 0.6.2, users with "keyadmin" role should not be allowed to change password for users with "admin" role. | 6.5 |
2017-10-12 | CVE-2017-15277 | Imagemagick Graphicsmagick | Information Exposure vulnerability in multiple products ReadGIFImage in coders/gif.c in ImageMagick 7.0.6-1 and GraphicsMagick 1.3.26 leaves the palette uninitialized when processing a GIF file that has neither a global nor local palette. | 6.5 |
2017-10-11 | CVE-2017-15232 | Libjpeg Turbo | NULL Pointer Dereference vulnerability in Libjpeg-Turbo 1.5.2 libjpeg-turbo 1.5.2 has a NULL Pointer Dereference in jdpostct.c and jquant1.c via a crafted JPEG file. | 6.5 |
2017-10-10 | CVE-2017-1538 | IBM | Information Exposure vulnerability in IBM Financial Transaction Manager 3.0.2.0/3.0.2.1 IBM Financial Transaction Manager for ACH Services for Multi-Platform 3.0.2 could allow an authenticated user to obtain sensitive information from an undocumented URL. | 6.5 |
2017-10-10 | CVE-2017-15218 | Imagemagick Canonical | Missing Release of Resource after Effective Lifetime vulnerability in multiple products ImageMagick 7.0.7-2 has a memory leak in ReadOneJNGImage in coders/png.c. | 6.5 |
2017-10-10 | CVE-2017-15217 | Imagemagick Canonical | Missing Release of Resource after Effective Lifetime vulnerability in multiple products ImageMagick 7.0.7-2 has a memory leak in ReadSGIImage in coders/sgi.c. | 6.5 |
2017-10-10 | CVE-2016-10514 | Piwigo | Improper Access Control vulnerability in Piwigo url_check_format in include/functions.inc.php in Piwigo before 2.8.3 allows remote attackers to bypass intended access restrictions via a URL that contains a " character, or a URL beginning with a substring other than the http:// or https:// substring. | 6.5 |
2017-10-10 | CVE-2017-12623 | Apache | XXE vulnerability in Apache Nifi An authorized user could upload a template which contained malicious code and accessed sensitive files via an XML External Entity (XXE) attack. | 6.5 |
2017-10-10 | CVE-2014-9092 | Libjpeg Turbo Fedoraproject Canonical | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products libjpeg-turbo before 1.3.1 allows remote attackers to cause a denial of service (crash) via a crafted JPEG file, related to the Exif marker. | 6.5 |
2017-10-10 | CVE-2017-14614 | Gridgain | Path Traversal vulnerability in Gridgain Directory traversal vulnerability in the Visor GUI Console in GridGain before 1.7.16, 1.8.x before 1.8.12, 1.9.x before 1.9.7, and 8.x before 8.1.5 allows remote authenticated users to read arbitrary files on remote cluster nodes via a crafted path. | 6.5 |
2017-10-10 | CVE-2015-6918 | Saltstack | Information Exposure vulnerability in Saltstack Salt 2015 salt before 2015.5.5 leaks git usernames and passwords to the log. | 6.3 |
2017-10-15 | CVE-2017-15305 | Nexusphp Project | Cross-site Scripting vulnerability in Nexusphp Project Nexusphp 1.5 XSS exists in NexusPHP 1.5 via the keyword parameter to messages.php. | 6.1 |
2017-10-13 | CVE-2016-4923 | Juniper | Cross-site Scripting vulnerability in Juniper Junos Insufficient cross site scripting protection in J-Web component in Juniper Networks Junos OS may potentially allow a remote unauthenticated user to inject web script or HTML and steal sensitive data and credentials from a J-Web session and to perform administrative actions on the Junos device. | 6.1 |
2017-10-12 | CVE-2017-15287 | Bouqueteditor Project | Cross-site Scripting vulnerability in Bouqueteditor Project Bouqueteditor 2.0.0 There is XSS in the BouquetEditor WebPlugin for Dream Multimedia Dreambox devices, as demonstrated by the "Name des Bouquets" field, or the file parameter to the /file URI. | 6.1 |
2017-10-11 | CVE-2017-8017 | EMC | Cross-site Scripting vulnerability in EMC Smarts Network Configuration Manager EMC Network Configuration Manager (NCM) 9.3.x, 9.4.0.x, 9.4.1.x, and 9.4.2.x is affected by a reflected cross-site scripting Vulnerability that could potentially be exploited by malicious users to compromise the affected system. | 6.1 |
2017-10-11 | CVE-2017-14372 | RSA | Cross-site Scripting vulnerability in RSA Archer GRC Platform RSA Archer GRC Platform prior to 6.2.0.5 is affected by reflected cross-site scripting vulnerabilities via certain RSA Archer Help pages. | 6.1 |
2017-10-11 | CVE-2017-14371 | RSA | Cross-site Scripting vulnerability in RSA Archer GRC Platform RSA Archer GRC Platform prior to 6.2.0.5 is affected by reflected cross-site scripting via the request URL. | 6.1 |
2017-10-11 | CVE-2017-14588 | Atlassian | Cross-site Scripting vulnerability in Atlassian Fisheye Various resources in Atlassian Fisheye and Crucible before version 4.4.2 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the dialog parameter. | 6.1 |
2017-10-11 | CVE-2017-15215 | Shaarli Project | Cross-site Scripting vulnerability in Shaarli Project Shaarli 0.9.1 Reflected XSS vulnerability in Shaarli v0.9.1 allows an unauthenticated attacker to inject JavaScript via the searchtags parameter to index.php. | 6.1 |
2017-10-11 | CVE-2017-15194 | Cacti | Cross-site Scripting vulnerability in Cacti 1.1.25 include/global_session.php in Cacti 1.1.25 has XSS related to (1) the URI or (2) the refresh page. | 6.1 |
2017-10-10 | CVE-2017-1503 | IBM | Cross-site Scripting vulnerability in IBM Websphere Application Server IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to HTTP response splitting attacks. | 6.1 |
2017-10-10 | CVE-2016-10513 | Piwigo | Cross-site Scripting vulnerability in Piwigo Cross Site Scripting (XSS) exists in Piwigo before 2.8.3 via a crafted search expression to include/functions_search.inc.php. | 6.1 |
2017-10-10 | CVE-2017-15216 | Misp Project | Cross-site Scripting vulnerability in Misp-Project Misp MISP before 2.4.81 has a potential reflected XSS in a quickDelete action that is used to delete a sighting, related to app/View/Sightings/ajax/quickDeleteConfirmationForm.ctp and app/webroot/js/misp.js. | 6.1 |
2017-10-13 | CVE-2017-10618 | Juniper | Unspecified vulnerability in Juniper Junos When the 'bgp-error-tolerance' feature â€" designed to help mitigate remote session resets from malformed path attributes â€" is enabled, a BGP UPDATE containing a specifically crafted set of transitive attributes can cause the RPD routing process to crash and restart. | 5.9 |
2017-10-13 | CVE-2017-10611 | Juniper | Unspecified vulnerability in Juniper Junos If extended statistics are enabled via 'set chassis extended-statistics', when executing any operation that fetches interface statistics, including but not limited to SNMP GET requests, the pfem process or the FPC may crash and restart. | 5.9 |
2017-10-13 | CVE-2017-10610 | Juniper | Improper Input Validation vulnerability in Juniper Junos 12.1X46/12.3X48/15.1X49 On SRX Series devices, a crafted ICMP packet embedded within a NAT64 IPv6 to IPv4 tunnel may cause the flowd process to crash. | 5.9 |
2017-10-12 | CVE-2015-6358 | Cisco | Improper Certificate Validation vulnerability in Cisco products Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913. | 5.9 |
2017-10-10 | CVE-2017-11063 | NULL Pointer Dereference vulnerability in Google Android 8.0 In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, as a result of a race condition between two userspace processes that interact with the driver concurrently, a null pointer dereference can potentially occur. | 5.9 | |
2017-10-10 | CVE-2015-7778 | Gurunavi | Improper Certificate Validation vulnerability in Gurunavi Gournavi 5.4.4 Gurunavi App for iOS before 6.0.0 does not verify SSL certificates which could allow remote attackers to perform man-in-the-middle attacks. | 5.9 |
2017-10-10 | CVE-2017-15038 | Qemu | Race Condition vulnerability in Qemu Race condition in the v9fs_xattrwalk function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes. | 5.6 |
2017-10-15 | CVE-2017-15364 | Ccsv Project | Double Free vulnerability in Ccsv Project Ccsv 1.1.0 The foreach function in ext/ccsv.c in Ccsv 1.1.0 allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact via a crafted file. | 5.5 |
2017-10-14 | CVE-2017-15299 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel The KEYS subsystem in the Linux kernel through 4.13.7 mishandles use of add_key for a key that already exists but is uninstantiated, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted system call. | 5.5 |
2017-10-14 | CVE-2017-15298 | GIT SCM Canonical | Resource Exhaustion vulnerability in multiple products Git through 2.14.2 mishandles layers of tree objects, which allows remote attackers to cause a denial of service (memory consumption) via a crafted repository, aka a Git bomb. | 5.5 |
2017-10-13 | CVE-2017-10613 | Juniper | Resource Exhaustion vulnerability in Juniper Junos A vulnerability in a specific loopback filter action command, processed in a specific logical order of operation, in a running configuration of Juniper Networks Junos OS, allows an attacker with CLI access and the ability to initiate remote sessions to the loopback interface with the defined action, to hang the kernel. | 5.5 |
2017-10-13 | CVE-2016-4924 | Juniper | Permission Issues vulnerability in Juniper Junos 14.1/15.1 An incorrect permissions vulnerability in Juniper Networks Junos OS on vMX may allow local unprivileged users on a host system read access to vMX or vPFE images and obtain sensitive information contained in them such as private cryptographic keys. | 5.5 |
2017-10-13 | CVE-2017-8703 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Windows 10 1703 The Microsoft Windows Subsystem for Linux on Microsoft Windows 10 1703 allows a denial of service vulnerability when it improperly handles objects in memory, aka "Windows Subsystem for Linux Denial of Service Vulnerability". | 5.5 |
2017-10-13 | CVE-2017-8693 | Microsoft | Information Exposure vulnerability in Microsoft Windows 10 and Windows Server 2016 The Microsoft Graphics Component on Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability in the way it handles objects in memory, aka "Microsoft Graphics Information Disclosure Vulnerability". | 5.5 |
2017-10-13 | CVE-2017-11829 | Microsoft | Files or Directories Accessible to External Parties vulnerability in Microsoft Windows 10 and Windows Server 2016 Microsoft Windows 10 allows an elevation of privilege vulnerability when the Windows Update Delivery Optimization does not properly enforce file share permissions. | 5.5 |
2017-10-13 | CVE-2017-11816 | Microsoft | Information Exposure vulnerability in Microsoft products The Microsoft Windows Graphics Device Interface (GDI) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability in the way it handles objects in memory, aka "Windows GDI Information Disclosure Vulnerability". | 5.5 |
2017-10-13 | CVE-2017-11814 | Microsoft | Information Exposure vulnerability in Microsoft products The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". | 5.5 |
2017-10-13 | CVE-2017-11785 | Microsoft | Information Exposure vulnerability in Microsoft products The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". | 5.5 |
2017-10-13 | CVE-2017-11784 | Microsoft | Information Exposure vulnerability in Microsoft products The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". | 5.5 |
2017-10-13 | CVE-2017-11765 | Microsoft | Information Exposure vulnerability in Microsoft products The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". | 5.5 |
2017-10-12 | CVE-2017-15280 | Umbraco | XXE vulnerability in Umbraco CMS XML external entity (XXE) vulnerability in Umbraco CMS before 7.7.3 allows attackers to obtain sensitive information by reading files on the server or sending TCP requests to intranet hosts (aka SSRF), related to Umbraco.Web/umbraco.presentation/umbraco/dialogs/importDocumenttype.aspx.cs. | 5.5 |
2017-10-12 | CVE-2017-15274 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192. | 5.5 |
2017-10-12 | CVE-2017-12192 | Linux | NULL Pointer Dereference vulnerability in Linux Kernel The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operation. | 5.5 |
2017-10-11 | CVE-2017-15266 | GNU | Divide By Zero vulnerability in GNU Libextractor 1.4 In GNU Libextractor 1.4, there is a Divide-By-Zero in EXTRACTOR_wav_extract_method in wav_extractor.c via a zero sample rate. | 5.5 |
2017-10-10 | CVE-2017-15225 | GNU | Missing Release of Resource after Effective Lifetime vulnerability in GNU Binutils 2.29 _bfd_dwarf2_cleanup_debug_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (memory leak) via a crafted ELF file. | 5.5 |
2017-10-09 | CVE-2017-14971 | Infocuscorp | Information Exposure vulnerability in Infocuscorp Infocus Mondopad 2.2.08 Infocus Mondopad 2.2.08 is vulnerable to a Hashed Credential Disclosure vulnerability. | 5.5 |
2017-10-15 | CVE-2017-15360 | Paessler | Cross-site Scripting vulnerability in Paessler Prtg Network Monitor 17.3.33.2830 PRTG Network Monitor version 17.3.33.2830 is vulnerable to stored Cross-Site Scripting on all group names created, related to incorrect error handling for an HTML encoded script. | 5.4 |
2017-10-13 | CVE-2017-11820 | Microsoft | Cross-site Scripting vulnerability in Microsoft Sharepoint Enterprise Server 2013/2016 Microsoft SharePoint Enterprise Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an attacker to exploit a cross-site scripting (XSS) vulnerability by sending a specially crafted request to an affected SharePoint server, due to how SharePoint Server sanitizes web requests, aka "Microsoft Office SharePoint XSS Vulnerability". | 5.4 |
2017-10-13 | CVE-2017-11777 | Microsoft | Cross-site Scripting vulnerability in Microsoft Sharepoint Enterprise Server 2013/2016 Microsoft SharePoint Enterprise Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an attacker to exploit a cross-site scripting (XSS) vulnerability by sending a specially crafted request to an affected SharePoint server, due to how SharePoint Server sanitizes web requests, aka "Microsoft Office SharePoint XSS Vulnerability". | 5.4 |
2017-10-13 | CVE-2017-11775 | Microsoft | Cross-site Scripting vulnerability in Microsoft Sharepoint Enterprise Server 2013/2016 Microsoft SharePoint Enterprise Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an attacker to exploit a cross-site scripting (XSS) vulnerability by sending a specially crafted request to an affected SharePoint server, due to how SharePoint Server sanitizes web requests, aka "Microsoft Office SharePoint XSS Vulnerability". | 5.4 |
2017-10-12 | CVE-2017-15284 | Octobercms | Cross-site Scripting vulnerability in Octobercms October 1.0.425 Cross-Site Scripting exists in OctoberCMS 1.0.425 (aka Build 425), allowing a least privileged user to upload an SVG file containing malicious code as the Avatar for the profile. | 5.4 |
2017-10-12 | CVE-2017-15279 | Umbraco | Cross-site Scripting vulnerability in Umbraco CMS Cross-site scripting (XSS) vulnerability in Umbraco CMS before 7.7.3 allows remote attackers to inject arbitrary web script or HTML via the "page name" (aka nodename) parameter during the creation of a new page, related to Umbraco.Web.UI/umbraco/dialogs/Publish.aspx.cs and Umbraco.Web/umbraco.presentation/umbraco/dialogs/notifications.aspx.cs. | 5.4 |
2017-10-12 | CVE-2017-15278 | Teampass | Cross-site Scripting vulnerability in Teampass Cross-Site Scripting (XSS) was discovered in TeamPass before 2.1.27.9. | 5.4 |
2017-10-11 | CVE-2017-8016 | EMC | Cross-site Scripting vulnerability in EMC Archer GRC Platform 6.2.0.4 RSA Archer GRC Platform prior to 6.2.0.5 is affected by stored cross-site scripting via the Questionnaire ID field. | 5.4 |
2017-10-11 | CVE-2017-14370 | RSA | Cross-site Scripting vulnerability in RSA Archer GRC Platform RSA Archer GRC Platform prior to 6.2.0.5 is affected by stored cross-site scripting via the Source Asset ID field. | 5.4 |
2017-10-11 | CVE-2017-14587 | Atlassian | Cross-site Scripting vulnerability in Atlassian Fisheye The administration user deletion resource in Atlassian Fisheye and Crucible before version 4.4.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the uname parameter. | 5.4 |
2017-10-11 | CVE-2017-7352 | Purestorage | Cross-site Scripting vulnerability in Purestorage Purity 4.7.5 Stored Cross-site scripting (XSS) vulnerability in Pure Storage Purity 4.7.5 allows remote authenticated users to inject arbitrary web script or HTML via the "host" parameter on the 'System > Configuration > SNMP > Add SNMP Trap Manager' screen. | 5.4 |
2017-10-11 | CVE-2017-15214 | Flyspray | Cross-site Scripting vulnerability in Flyspray 1.0 Stored XSS vulnerability in Flyspray 1.0-rc4 before 1.0-rc6 allows an authenticated user to inject JavaScript to gain administrator privileges and also to execute JavaScript against other users (including unauthenticated users), via the name, title, or id parameter to plugins/dokuwiki/lib/plugins/changelinks/syntax.php. | 5.4 |
2017-10-11 | CVE-2017-15213 | Flyspray | Cross-site Scripting vulnerability in Flyspray 1.0 Stored XSS vulnerability in Flyspray before 1.0-rc6 allows an authenticated user to inject JavaScript to gain administrator privileges, via the real_name or email_address field to themes/CleanFS/templates/common.editallusers.tpl. | 5.4 |
2017-10-10 | CVE-2017-15219 | Dotcms | Cross-site Scripting vulnerability in Dotcms 4.1.1 The dotCMS 4.1.1 application is vulnerable to Stored Cross-Site Scripting (XSS) affecting a vanity-urls Title field, a containers Description field, and a templates Description field. | 5.4 |
2017-10-10 | CVE-2015-6521 | Atutor | Cross-site Scripting vulnerability in Atutor 2.2 Multiple cross-site scripting (XSS) vulnerabilities in ATutor LMS version 2.2. | 5.4 |
2017-10-09 | CVE-2017-14973 | Identicard | Cross-site Scripting vulnerability in Identicard Two-Reader Controller Configuration Manager 1.18.8(396) IDenticard Two-Reader Controller Configuration Manager 1.18.8 (396) is vulnerable to Stored Cross-Site Scripting (XSS) via the notes field in /~user_handler?file=logged_in.shtm (aka the edit user page). | 5.4 |
2017-10-15 | CVE-2017-15300 | Ewbf | Unspecified vulnerability in Ewbf Cuda Zcash Miner 0.3.4B The miner statistics HTTP API in EWBF Cuda Zcash Miner Version 0.3.4b hangs on incoming TCP connections until some sort of request is made (such as "GET / HTTP/1.1"), which allows for a Denial of Service attack preventing a user from viewing their mining statistics by an attacker opening a session with telnet or netcat and connecting to the miner on the HTTP API port. | 5.3 |
2017-10-13 | CVE-2017-10621 | Juniper | Resource Exhaustion vulnerability in Juniper Junos A denial of service vulnerability in telnetd service on Juniper Networks Junos OS allows remote unauthenticated attackers to cause a denial of service. | 5.3 |
2017-10-13 | CVE-2017-8715 | Microsoft | Unspecified vulnerability in Microsoft Windows 10 and Windows Server 2016 The Microsoft Device Guard on Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a security feature bypass by the way it handles Windows PowerShell sessions, aka "Windows Security Feature Bypass". | 5.3 |
2017-10-13 | CVE-2017-11815 | Microsoft | Information Exposure vulnerability in Microsoft products The Microsoft Server Block Message (SMB) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability in the way that it handles certain requests, aka "Windows SMB Information Disclosure Vulnerability". | 5.3 |
2017-10-12 | CVE-2017-12849 | Silverstripe | Information Exposure vulnerability in Silverstripe Response discrepancy in the login and password reset forms in SilverStripe CMS before 3.5.5 and 3.6.x before 3.6.1 allows remote attackers to enumerate users via timing attacks. | 5.3 |
2017-10-12 | CVE-2017-10862 | Really | Insufficient Verification of Data Authenticity vulnerability in Really Jwt-Scala 1.2.2 jwt-scala 1.2.2 and earlier fails to verify token signatures correctly which may lead to an attacker being able to pass specially crafted JWT data as a correctly signed token. | 5.3 |
2017-10-09 | CVE-2017-15185 | Libmp3Splt Project | Improper Input Validation vulnerability in Libmp3Splt Project Libmp3Splt 0.9.2 plugins/ogg.c in Libmp3splt 0.9.2 calls the libvorbis vorbis_block_clear function with uninitialized data upon detection of invalid input, which allows remote attackers to cause a denial of service (application crash) via a crafted file. | 5.0 |
2017-10-11 | CVE-2017-15188 | Eyesofnetwork | Cross-site Scripting vulnerability in Eyesofnetwork 5.10 A persistent (stored) XSS vulnerability in the EyesOfNetwork web interface (aka eonweb) 5.1-0 allows remote authenticated administrators to inject arbitrary web script or HTML via the hosts array parameter to module/admin_device/index.php. | 4.8 |
2017-10-13 | CVE-2017-11817 | Microsoft | Information Exposure vulnerability in Microsoft products The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability when it improperly validates objects in memory, aka "Windows Information Disclosure Vulnerability". | 4.7 |
2017-10-12 | CVE-2016-9263 | Wordpress | Improper Input Validation vulnerability in Wordpress WordPress through 4.8.2, when domain-based flashmediaelement.swf sandboxing is not used, allows remote attackers to conduct cross-domain Flash injection (XSF) attacks by leveraging code contained within the wp-includes/js/mediaelement/flashmediaelement.swf file. | 4.7 |
2017-10-10 | CVE-2017-13721 | X ORG Debian | Improper Privilege Management vulnerability in multiple products In X.Org Server (aka xserver and xorg-server) before 1.19.4, an attacker authenticated to an X server with the X shared memory extension enabled can cause aborts of the X server or replace shared memory segments of other X clients in the same session. | 4.7 |
2017-10-13 | CVE-2017-11818 | Microsoft | 7PK - Security Features vulnerability in Microsoft products The Microsoft Windows Storage component on Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a security feature bypass vulnerability when it fails to validate an integrity-level check, aka "Windows Storage Security Feature Bypass Vulnerability". | 4.5 |
2017-10-13 | CVE-2017-10606 | Juniper | Unspecified vulnerability in Juniper Trusted Platform Module Firmware 4.40 Version 4.40 of the TPM (Trusted Platform Module) firmware on Juniper Networks SRX300 Series has a weakness in generating cryptographic keys that may allow an attacker to decrypt sensitive information in SRX300 Series products. | 4.4 |
2017-10-13 | CVE-2017-15014 | Opentext | Improper Privilege Management vulnerability in Opentext Documentum Content Server 7.3 OpenText Documentum Content Server (formerly EMC Documentum Content Server) through 7.3 contains the following design gap, which allows authenticated users to download arbitrary content files regardless of the attacker's repository permissions: When an authenticated user uploads content to the repository, he performs the following steps: (1) calls the START_PUSH RPC-command; (2) uploads the file to the content server; (3) calls the END_PUSH_V2 RPC-command (here, Content Server returns a DATA_TICKET integer, intended to identify the location of the uploaded file on the Content Server filesystem); (4) creates a dmr_content object in the repository, which has a value of data_ticket equal to the value of DATA_TICKET returned at the end of END_PUSH_V2 call. | 4.3 |
2017-10-13 | CVE-2017-8726 | Microsoft | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Edge Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how affected Microsoft scripting engines handle objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". | 4.3 |
2017-10-13 | CVE-2017-11794 | Microsoft | Information Exposure vulnerability in Microsoft Edge Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to obtain information to further compromise the user's system, due to how Microsoft Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". | 4.3 |
2017-10-13 | CVE-2017-11790 | Microsoft | Information Exposure vulnerability in Microsoft Internet Explorer 10/11/9 Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to obtain information to further compromise the user's system, due to how Internet Explorer handles objects in memory, aka "Internet Explorer Information Disclosure Vulnerability". | 4.3 |
2017-10-12 | CVE-2017-10857 | Cybozu | Improper Privilege Management vulnerability in Cybozu Office Cybozu Office 10.0.0 to 10.6.1 allows authenticated attackers to bypass access restriction to perform arbitrary actions via "Cabinet" function. | 4.3 |
2017-10-11 | CVE-2017-14369 | RSA | Unspecified vulnerability in RSA Archer GRC Platform RSA Archer GRC Platform prior to 6.2.0.5 is affected by a privilege escalation vulnerability. | 4.3 |
2017-10-11 | CVE-2017-15212 | Kanboard | Information Exposure vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can at least see the names of tags of a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15211 | Kanboard | Authorization Bypass Through User-Controlled Key vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can add an external link to a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15210 | Kanboard | Information Exposure vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can see thumbnails of pictures from a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15209 | Kanboard | Authorization Bypass Through User-Controlled Key vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can remove attachments from a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15208 | Kanboard | Authorization Bypass Through User-Controlled Key vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can remove automatic actions from a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15207 | Kanboard | Authorization Bypass Through User-Controlled Key vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can edit tasks of a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15206 | Kanboard | Authorization Bypass Through User-Controlled Key vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can add an internal link to a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15205 | Kanboard | Information Exposure vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can download attachments from a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15204 | Kanboard | Authorization Bypass Through User-Controlled Key vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can add automatic actions to a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15203 | Kanboard | Authorization Bypass Through User-Controlled Key vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can remove categories from a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15202 | Kanboard | Authorization Bypass Through User-Controlled Key vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can edit columns of a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15201 | Kanboard | Authorization Bypass Through User-Controlled Key vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can edit tags of a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15200 | Kanboard | Authorization Bypass Through User-Controlled Key vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can add a new task to a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15199 | Kanboard | Authorization Bypass Through User-Controlled Key vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can edit metadata of a private project of another user, as demonstrated by Name, Email, Identifier, and Description. | 4.3 |
2017-10-11 | CVE-2017-15198 | Kanboard | Information Exposure vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can edit a category of a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15197 | Kanboard | Authorization Bypass Through User-Controlled Key vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can add a new category to a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15196 | Kanboard | Authorization Bypass Through User-Controlled Key vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can remove columns from a private project of another user. | 4.3 |
2017-10-11 | CVE-2017-15195 | Kanboard | Authorization Bypass Through User-Controlled Key vulnerability in Kanboard In Kanboard before 1.0.47, by altering form data, an authenticated user can edit swimlanes of a private project of another user. | 4.3 |
2017-10-10 | CVE-2017-13679 | Symantec | Unspecified vulnerability in Symantec Encryption Desktop 10.3.2/10.4.1 A denial of service (DoS) attack in Symantec Encryption Desktop before SED 10.4.1 MP2HF1 allows remote attackers to make a particular machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a specific host within a network. | 4.2 |
2017-10-10 | CVE-2017-13675 | Symantec | Unspecified vulnerability in Symantec Endpoint Encryption A denial of service (DoS) attack in Symantec Endpoint Encryption before SEE 11.1.3HF2 allows remote attackers to make a particular machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a specific host within a network. | 4.2 |
0 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|