VYPR

CVEs

28,694 total · page 474 of 574

  • CVE-2017-2398HigApr 2, 2017
    risk 0.51cvss 7.8epss 0.00

    An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.

  • CVE-2017-2396HigApr 2, 2017
    risk 0.57cvss 8.8epss 0.01

    An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

  • CVE-2017-2395HigApr 2, 2017
    risk 0.57cvss 8.8epss 0.01

    An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

  • CVE-2017-2394HigApr 2, 2017
    risk 0.57cvss 8.8epss 0.01

    An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

  • CVE-2017-2392HigApr 2, 2017
    risk 0.51cvss 7.8epss 0.00

    An issue was discovered in certain Apple products. Safari before 10.1 is affected. The issue involves the "WebKit" component. It allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted app.

  • CVE-2017-2389HigApr 2, 2017
    risk 0.53cvss 8.1epss 0.01

    An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. The issue involves the "Safari" component. It allows remote attackers to spoof an HTTP authentication sheet or cause a denial of service via a crafted web site.

  • CVE-2017-2382HigApr 2, 2017
    risk 0.49cvss 7.5epss 0.01

    An issue was discovered in certain Apple products. macOS Server before 5.3 is affected. The issue involves the "Wiki Server" component. It allows remote attackers to enumerate user accounts via unspecified vectors.

  • CVE-2017-2381HigApr 2, 2017
    risk 0.57cvss 8.8epss 0.01

    An issue was discovered in certain Apple products. macOS before 10.12.4 is affected. The issue involves the "sudo" component. It allows remote authenticated users to gain privileges by leveraging membership in the admin group on a network directory server.

  • CVE-2017-2380HigApr 2, 2017
    risk 0.49cvss 7.5epss 0.00

    An issue was discovered in certain Apple products. iOS before 10.3 is affected. The issue involves the Simple Certificate Enrollment Protocol (SCEP) implementation in the "Profiles" component. It allows remote attackers to bypass cryptographic protection mechanisms by leveraging DES support.

  • CVE-2017-2379HigApr 2, 2017
    risk 0.51cvss 7.8epss 0.01

    An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves the "Carbon" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted .dfont file.

  • CVE-2017-2378HigApr 2, 2017
    risk 0.57cvss 8.8epss 0.01

    An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. The issue involves bookmark creation in the "WebKit" component. It allows remote attackers to execute arbitrary code or spoof a bookmark by leveraging mishandling of links during drag-and-drop actions.

  • CVE-2017-2377HigApr 2, 2017
    risk 0.49cvss 7.5epss 0.01

    An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. The issue involves the "WebKit Web Inspector" component. It allows attackers to cause a denial of service (memory corruption and application crash) by leveraging a window-close action during a debugger-pause state.

  • CVE-2017-2376HigApr 2, 2017
    risk 0.49cvss 7.5epss 0.00

    An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. The issue involves the "Safari" component. It allows remote attackers to spoof the address bar by leveraging text input during the loading of a page.

  • CVE-2017-7396HigApr 1, 2017
    risk 0.49cvss 7.5epss 0.00

    In TigerVNC 1.7.1 (CConnection.cxx CConnection::CConnection), an unauthenticated client can cause a small memory leak in the server.

  • CVE-2017-7394HigApr 1, 2017
    risk 0.49cvss 7.5epss 0.01

    In TigerVNC 1.7.1 (SSecurityPlain.cxx SSecurityPlain::processMsg), unauthenticated users can crash the server by sending long usernames.

  • CVE-2017-7393HigApr 1, 2017
    risk 0.57cvss 8.8epss 0.00

    In TigerVNC 1.7.1 (VNCSConnectionST.cxx VNCSConnectionST::fence), an authenticated client can cause a double free, leading to denial of service or potentially code execution.

  • CVE-2017-7392HigApr 1, 2017
    risk 0.49cvss 7.5epss 0.01

    In TigerVNC 1.7.1 (SSecurityVeNCrypt.cxx SSecurityVeNCrypt::SSecurityVeNCrypt), an unauthenticated client can cause a small memory leak in the server.

  • CVE-2016-8032HigMar 31, 2017
    risk 0.47cvss 7.3epss 0.00

    Software Integrity Attacks vulnerability in Intel Security Anti-Virus Engine (AVE) 5200 through 5800 allows local attackers to bypass local security protection via a crafted input file.

  • CVE-2017-7374HigMar 31, 2017
    risk 0.51cvss 7.8epss 0.00

    Use-after-free vulnerability in fs/crypto/ in the Linux kernel before 4.10.7 allows local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely.

  • CVE-2016-6561HigMar 31, 2017
    risk 0.49cvss 7.5epss 0.01

    illumos smbsrv NULL pointer dereference allows system crash.

  • CVE-2016-6560HigMar 31, 2017
    risk 0.56cvss 8.6epss 0.00

    illumos osnet-incorporation bcopy() and bzero() implementations make signed instead of unsigned comparisons allowing a system crash.

  • CVE-2017-2775HigMar 31, 2017
    risk 0.49cvss 7.5epss 0.01

    An exploitable memory corruption vulnerability exists in the LvVariantUnflatten functionality in 64-bit versions of LabVIEW before 2015 SP1 f7 Patch and 2016 before f2 Patch. A specially crafted VI file can cause a user controlled value to be used as a loop terminator resulting in internal heap corruption. An attacker controlled VI file can be used to trigger this vulnerability, exploitation could lead to remote code execution.

  • CVE-2016-9707HigMar 31, 2017
    risk 0.53cvss 8.1epss 0.00

    IBM Jazz Foundation is vulnerable to a denial of service, caused by an XML External Entity Injection (XXE) error when processing XML data. A remote attacker could exploit this vulnerability to expose highly sensitive information or consume all available memory resources. IBM Reference #: 2000784.

  • CVE-2016-8917HigMar 31, 2017
    risk 0.57cvss 8.8epss 0.00

    IBM Sterling Order Management 9.2 - 9.5 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM Reference #: 2000943.

  • CVE-2017-3009HigMar 31, 2017
    risk 0.49cvss 7.5epss 0.02

    Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable buffer overflow vulnerability in the JPEG2000 parser. Successful exploitation could lead to information disclosure.

  • CVE-2015-4624HigMar 31, 2017
    risk 0.56cvss 7.5epss 0.48

    Hak5 WiFi Pineapple 2.0 through 2.3 uses predictable CSRF tokens.

  • CVE-2014-9114HigMar 31, 2017
    risk 0.51cvss 7.8epss 0.00

    Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code.

  • CVE-2017-2647HigMar 31, 2017
    risk 0.51cvss 7.8epss 0.00

    The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c.

  • CVE-2017-7253HigMar 30, 2017
    risk 0.57cvss 8.8epss 0.01

    Dahua IP Camera devices 3.200.0001.6 can be exploited via these steps: 1. Use the default low-privilege credentials to list all users via a request to a certain URI. 2. Login to the IP camera with admin credentials so as to obtain full control of the target IP camera. During exploitation, the first JSON object encountered has a "Component error: login challenge!" message. The second JSON object encountered has a result indicating a successful admin login.

  • CVE-2017-6412HigMar 30, 2017
    risk 0.56cvss 8.1epss 0.01

    In Sophos Web Appliance (SWA) before 4.3.1.2, Session Fixation could occur, aka NSWA-1310.

  • CVE-2017-6183HigMar 30, 2017
    risk 0.47cvss 7.2epss 0.03

    In Sophos Web Appliance (SWA) before 4.3.1.2, a section of the machine's configuration utilities for adding (and detecting) Active Directory servers was vulnerable to remote command injection, aka NSWA-1314.

  • CVE-2017-5185HigMar 30, 2017
    risk 0.49cvss 7.5epss 0.01

    A vulnerability was discovered in NetIQ Sentinel Server 8.0 before 8.0.1 that may allow remote denial of service.

  • CVE-2014-9825HigMar 30, 2017
    risk 0.51cvss 7.8epss 0.00

    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file, a different vulnerability than CVE-2014-9824.

  • CVE-2014-9824HigMar 30, 2017
    risk 0.51cvss 7.8epss 0.00

    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file, a different vulnerability than CVE-2014-9825.

  • CVE-2014-9823HigMar 30, 2017
    risk 0.51cvss 7.8epss 0.00

    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted palm file, a different vulnerability than CVE-2014-9819.

  • CVE-2014-9822HigMar 30, 2017
    risk 0.51cvss 7.8epss 0.00

    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted quantum file.

  • CVE-2014-9821HigMar 30, 2017
    risk 0.51cvss 7.8epss 0.00

    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted xpm file.

  • CVE-2014-9820HigMar 30, 2017
    risk 0.51cvss 7.8epss 0.00

    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted pnm file.

  • CVE-2014-9819HigMar 30, 2017
    risk 0.51cvss 7.8epss 0.00

    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted palm file, a different vulnerability than CVE-2014-9823.

  • CVE-2014-9817HigMar 30, 2017
    risk 0.51cvss 7.8epss 0.00

    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted pdb file.

  • CVE-2014-9804HigMar 30, 2017
    risk 0.49cvss 7.5epss 0.02

    vision.c in ImageMagick allows remote attackers to cause a denial of service (infinite loop) via vectors related to "too many object."

  • CVE-2017-7323HigMar 30, 2017
    risk 0.53cvss 8.1epss 0.01

    The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier use http://rest.modx.com by default, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code by leveraging the lack of the HTTPS protection mechanism.

  • CVE-2017-7322HigMar 30, 2017
    risk 0.53cvss 8.1epss 0.01

    The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier do not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code via a crafted certificate.

  • CVE-2017-7290HigMar 30, 2017
    risk 0.47cvss 7.2epss 0.01

    SQL injection vulnerability in XOOPS 2.5.7.2 and other versions before 2.5.8.1 allows remote authenticated administrators to execute arbitrary SQL commands via the url parameter to findusers.php. An example attack uses "into outfile" to create a backdoor program.

  • CVE-2017-7310HigMar 29, 2017
    risk 0.61cvss 7.8epss 0.87

    A buffer overflow vulnerability in Import Command in SyncBreeze before 10.6, DiskSorter before 10.6, DiskBoss before 8.9, DiskPulse before 10.6, DiskSavvy before 10.6, DupScout before 10.6, and VX Search before 10.6 allows attackers to execute arbitrary code via a crafted XML file containing a long name attribute of a classify element.

  • CVE-2017-4980HigMar 29, 2017
    risk 0.49cvss 7.5epss 0.03

    EMC Isilon OneFS is affected by a path traversal vulnerability that may potentially be exploited by attackers to compromise the affected system. Affected versions are 7.1.0 - 7.1.1.10, 7.2.0 - 7.2.1.3, and 8.0.0 - 8.0.0.1.

  • CVE-2017-4977HigMar 29, 2017
    risk 0.46cvss 7.0epss 0.00

    EMC RSA Archer Security Operations Management with RSA Unified Collector Framework versions prior to 1.3.1.52 contain a sensitive information disclosure vulnerability that could potentially be exploited by malicious users to compromise an affected system.

  • CVE-2017-7308HigMar 29, 2017
    risk 0.61cvss 7.8epss 0.87

    The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.

  • CVE-2017-7258HigMar 29, 2017
    risk 0.49cvss 7.5epss 0.01

    HTTP Exploit in eMLi Portal in AuroMeera Technometrix Pvt. Ltd. eMLi allows an Attacker to View Restricted Information or (even more seriously) execute powerful commands on the web server which can lead to a full compromise of the system via Directory Path Traversal, as demonstrated by reading core-emli/Storage. The affected versions are eMLi School Management 1.0, eMLi College Campus Management 1.0, and eMLi University Management 1.0.

  • CVE-2016-2379HigMar 29, 2017
    risk 0.57cvss 8.8epss 0.00

    The Mxit protocol uses weak encryption when encrypting user passwords, which might allow attackers to (1) decrypt hashed passwords by leveraging knowledge of client registration codes or (2) gain login access by eavesdropping on login messages and re-using the hashed passwords.