VYPR

CVEs

28,667 total · page 480 of 574

  • CVE-2016-10251HigMar 15, 2017
    risk 0.51cvss 7.8epss 0.00

    Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value.

  • CVE-2016-10250HigMar 15, 2017
    risk 0.49cvss 7.5epss 0.01

    The jp2_colr_destroy function in jp2_cod.c in JasPer before 1.900.13 allows remote attackers to cause a denial of service (NULL pointer dereference) by leveraging incorrect cleanup of JP2 box data on error. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8887.

  • CVE-2016-10249HigMar 15, 2017
    risk 0.51cvss 7.8epss 0.01

    Integer overflow in the jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.12 allows remote attackers to have unspecified impact via a crafted image file, which triggers a heap-based buffer overflow.

  • CVE-2016-10248HigMar 15, 2017
    risk 0.49cvss 7.5epss 0.01

    The jpc_tsfb_synthesize function in jpc_tsfb.c in JasPer before 1.900.9 allows remote attackers to cause a denial of service (NULL pointer dereference) via vectors involving an empty sequence.

  • CVE-2017-6903HigMar 14, 2017
    risk 0.51cvss 7.8epss 0.00

    In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A malicious auto-downloaded file can contain configuration defaults that override the user's. Executable bytecode in a malicious auto-downloaded file can set configuration variables to values that will result in unwanted native code DLLs being loaded, resulting in sandbox escape.

  • CVE-2016-8026HigMar 14, 2017
    risk 0.51cvss 7.8epss 0.00

    Arbitrary command execution vulnerability in Intel Security McAfee Security Scan Plus (SSP) 3.11.469 and earlier allows authenticated users to gain elevated privileges via unspecified vectors.

  • CVE-2016-8024HigMar 14, 2017
    risk 0.56cvss 8.1epss 0.09

    Improper neutralization of CRLF sequences in HTTP headers vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to obtain sensitive information via the server HTTP response spoofing.

  • CVE-2016-8023HigMar 14, 2017
    risk 0.57cvss 8.1epss 0.11

    Authentication bypass by assumed-immutable data vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to bypass server authentication via a crafted authentication cookie.

  • CVE-2016-8022HigMar 14, 2017
    risk 0.52cvss 7.5epss 0.09

    Authentication bypass by spoofing vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to execute arbitrary code or cause a denial of service via a crafted authentication cookie.

  • CVE-2016-8020HigMar 14, 2017
    risk 0.55cvss 8.0epss 0.03

    Improper control of generation of code vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote authenticated users to execute arbitrary code via a crafted HTTP request parameter.

  • CVE-2016-8012HigMar 14, 2017
    risk 0.51cvss 7.8epss 0.00

    Access control vulnerability in Intel Security Data Loss Prevention Endpoint (DLPe) 9.4.200 and 9.3.600 allows authenticated users with Read-Write-Execute permissions to inject hook DLLs into other processes via pages in the target process memory get.

  • CVE-2016-8010HigMar 14, 2017
    risk 0.51cvss 7.8epss 0.00

    Application protections bypass vulnerability in Intel Security McAfee Application Control (MAC) 7.0 and earlier and Endpoint Security (ENS) 10.2 and earlier allows local users to bypass local security protection via a command-line utility.

  • CVE-2016-8009HigMar 14, 2017
    risk 0.51cvss 7.8epss 0.00

    Privilege escalation vulnerability in Intel Security McAfee Application Control (MAC) 7.0 and 6.x versions allows attackers to cause DoS, unexpected behavior, or potentially unauthorized code execution via an unauthorized use of IOCTL call.

  • CVE-2016-8008HigMar 14, 2017
    risk 0.57cvss 8.8epss 0.00

    Privilege escalation vulnerability in Windows 7 and Windows 10 in McAfee Security Scan Plus (SSP) 3.11.376 allows attackers to load a replacement of the version.dll file via McAfee McUICnt.exe onto a Windows system.

  • CVE-2016-10252HigMar 14, 2017
    risk 0.49cvss 7.5epss 0.01

    Memory leak in the IsOptionMember function in MagickCore/option.c in ImageMagick before 6.9.2-2, as used in ODR-PadEnc and other products, allows attackers to trigger memory consumption.

  • CVE-2015-8993HigMar 14, 2017
    risk 0.46cvss 7.0epss 0.00

    Malicious file execution vulnerability in Intel Security CloudAV (Beta) before 0.5.0.151.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation.

  • CVE-2015-8992HigMar 14, 2017
    risk 0.46cvss 7.0epss 0.00

    Malicious file execution vulnerability in Intel Security WebAdvisor before 4.0.2, 4.0.1 and 3.7.2 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation.

  • CVE-2015-8991HigMar 14, 2017
    risk 0.46cvss 7.0epss 0.00

    Malicious file execution vulnerability in Intel Security McAfee Security Scan+ (MSS+) before 3.11.266.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation.

  • CVE-2015-8990HigMar 14, 2017
    risk 0.49cvss 7.5epss 0.00

    Detection bypass vulnerability in Intel Security Advanced Threat Defense (ATD) 3.4.6 and earlier allows malware samples to bypass ATD detection via renaming the malware.

  • CVE-2015-8989HigMar 14, 2017
    risk 0.57cvss 8.8epss 0.00

    Unsalted password vulnerability in the Enterprise Manager (web portal) component in Intel Security McAfee Vulnerability Manager (MVM) 7.5.8 and earlier allows attackers to more easily decrypt user passwords via brute force attacks against the database.

  • CVE-2015-8988HigMar 14, 2017
    risk 0.57cvss 8.8epss 0.01

    Unquoted executable path vulnerability in Client Management and Gateway components in McAfee (now Intel Security) ePO Deep Command (eDC) 2.2 and 2.1 allows authenticated users to execute a command of their choice via dropping a malicious file for the path.

  • CVE-2013-7462HigMar 14, 2017
    risk 0.49cvss 7.5epss 0.02

    A directory traversal vulnerability in the web application in McAfee (now Intel Security) SaaS Control Console (SCC) Platform 6.14 before patch 1070, and 6.15 before patch 1076 allows unauthenticated users to view contents of arbitrary system files that did not have file system level read access restrictions via a null-byte injection exploit.

  • CVE-2017-6896HigMar 14, 2017
    risk 0.60cvss 8.8epss 0.03

    Privilege escalation vulnerability on the DIGISOL DG-HR1400 1.00.02 wireless router enables an attacker to escalate from user privilege to admin privilege just by modifying the Base64-encoded session cookie value.

  • CVE-2017-3003HigMar 14, 2017
    risk 0.57cvss 8.8epss 0.01

    Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability related to an interaction between the privacy user interface and the ActionScript 2 Camera object. Successful exploitation could lead to arbitrary code execution.

  • CVE-2017-3002HigMar 14, 2017
    risk 0.57cvss 8.8epss 0.02

    Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability in the ActionScript2 TextField object related to the variable property. Successful exploitation could lead to arbitrary code execution.

  • CVE-2017-3001HigMar 14, 2017
    risk 0.57cvss 8.8epss 0.02

    Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability related to garbage collection in the ActionScript 2 VM. Successful exploitation could lead to arbitrary code execution.

  • CVE-2017-2999HigMar 14, 2017
    risk 0.57cvss 8.8epss 0.03

    Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable memory corruption vulnerability in the Primetime TVSDK functionality related to hosting playback surface. Successful exploitation could lead to arbitrary code execution.

  • CVE-2017-2998HigMar 14, 2017
    risk 0.57cvss 8.8epss 0.03

    Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable memory corruption vulnerability in the Primetime TVSDK API functionality related to timeline interactions. Successful exploitation could lead to arbitrary code execution.

  • CVE-2017-2997HigMar 14, 2017
    risk 0.58cvss 8.8epss 0.06

    Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable buffer overflow / underflow vulnerability in the Primetime TVSDK that supports customizing ad information. Successful exploitation could lead to arbitrary code execution.

  • CVE-2017-2983HigMar 14, 2017
    risk 0.51cvss 7.8epss 0.02

    Adobe Shockwave versions 12.2.7.197 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to escalation of privilege.

  • CVE-2016-10189HigMar 14, 2017
    risk 0.49cvss 7.5epss 0.03

    BitlBee before 3.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a file transfer request for a contact that is not in the contact list.

  • CVE-2017-6874HigMar 14, 2017
    risk 0.46cvss 7.0epss 0.00

    Race condition in kernel/ucount.c in the Linux kernel through 4.10.2 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls that leverage certain decrement behavior that causes incorrect interaction between put_ucounts and get_ucounts.

  • CVE-2017-6398HigMar 14, 2017
    risk 0.65cvss 8.8epss 0.65

    An issue was discovered in Trend Micro InterScan Messaging Security (Virtual Appliance) 9.1-1600. An authenticated user can execute a terminal command in the context of the web server user (which is root). Besides, the default installation of IMSVA comes with default administrator credentials. The saveCert.imss endpoint takes several user inputs and performs blacklisting. After that, it uses them as arguments to a predefined operating-system command without proper sanitization. However, because of an improper blacklisting rule, it's possible to inject arbitrary commands into it.

  • CVE-2017-6367HigMar 14, 2017
    risk 0.55cvss 7.5epss 0.40

    In Cerberus FTP Server 8.0.10.1, a crafted HTTP request causes the Windows service to crash. The attack methodology involves a long Host header and an invalid Content-Length header.

  • CVE-2016-9368HigMar 14, 2017
    risk 0.49cvss 7.5epss 0.00

    An issue was discovered in Eaton xComfort Ethernet Communication Interface (ECI) Versions 1.07 and prior. By accessing a specific uniform resource locator (URL) on the webserver, a malicious user may be able to access files without authenticating.

  • CVE-2016-8747HigMar 14, 2017
    risk 0.42cvss 7.5epss 0.03

    An information disclosure issue was discovered in Apache Tomcat 8.5.7 to 8.5.9 and 9.0.0.M11 to 9.0.0.M15 in reverse-proxy configurations. Http11InputBuffer.java allows remote attackers to read data that was intended to be associated with a different request.

  • CVE-2014-8688HigMar 14, 2017
    risk 0.49cvss 7.5epss 0.00

    An issue was discovered in Telegram Messenger 2.6 for iOS and 1.8.2 for Android. Secret chat messages are available in cleartext in process memory and a .db file.

  • CVE-2017-6180HigMar 13, 2017
    risk 0.57cvss 8.8epss 0.00

    Keekoon KK002 devices 1.8.12 HD have a Cross Site Request Forgery Vulnerability affecting goform/formChnUserPwd and goform/formUserMng (and the entire set of other pages).

  • CVE-2017-6081HigMar 13, 2017
    risk 0.57cvss 8.8epss 0.00

    A CSRF issue was discovered in Zammad before 1.0.4, 1.1.x before 1.1.3, and 1.2.x before 1.2.1. To exploit the vulnerability, an attacker can send cross-domain requests directly to the REST API for users with a valid session cookie.

  • CVE-2017-5675HigMar 13, 2017
    risk 0.57cvss 8.8epss 0.01

    A command-injection vulnerability exists in a web application on a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models. The mail-sending form in the mail.htm page allows an attacker to inject a command into the receiver1 field in the form; it will be executed with root privileges.

  • CVE-2017-6823HigMar 12, 2017
    risk 0.61cvss 8.8epss 0.07

    Fiyo CMS 2.0.6.1 allows remote authenticated users to gain privileges via a modified level parameter to dapur/ in an app=user&act=edit action.

  • CVE-2017-6444HigMar 12, 2017
    risk 0.53cvss 7.5epss 0.18

    The MikroTik Router hAP Lite 6.25 has no protection mechanism for unsolicited TCP ACK packets in the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many ACK packets. After the attacker stops the exploit, the CPU usage is 100% and the router requires a reboot for normal operation.

  • CVE-2017-6466HigMar 11, 2017
    risk 0.53cvss 8.1epss 0.01

    F-Secure Software Updater 2.20, as distributed in several F-Secure products, downloads installation packages over plain http and does not perform file integrity validation after download. Man-in-the-middle attackers can replace the file with their own executable which will be executed under the SYSTEM account. Note that when Software Updater is configured to install updates automatically, it checks if the downloaded file is digitally signed by default, but does not check the author of the signature. When running in manual mode (default), no signature check is performed.

  • CVE-2010-4314HigMar 11, 2017
    risk 0.57cvss 8.8epss 0.03

    Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the "name" parameter.

  • CVE-2017-6802HigMar 10, 2017
    risk 0.49cvss 7.5epss 0.01

    An issue was discovered in ytnef before 1.9.2. There is a potential heap-based buffer over-read on incoming Compressed RTF Streams, related to DecompressRTF() in libytnef.

  • CVE-2017-6801HigMar 10, 2017
    risk 0.49cvss 7.5epss 0.01

    An issue was discovered in ytnef before 1.9.2. There is a potential out-of-bounds access with fields of Size 0 in TNEFParse() in libytnef.

  • CVE-2017-6800HigMar 10, 2017
    risk 0.49cvss 7.5epss 0.01

    An issue was discovered in ytnef before 1.9.2. An invalid memory access (heap-based buffer over-read) can occur during handling of LONG data types, related to MAPIPrint() in libytnef.

  • CVE-2017-6798HigMar 10, 2017
    risk 0.51cvss 7.8epss 0.02

    Trend Micro Endpoint Sensor 1.6 before b1290 has a DLL hijacking vulnerability that allows remote attackers to execute arbitrary code, aka Trend Micro Vulnerability Identifier 2015-0208.

  • CVE-2017-6427HigMar 10, 2017
    risk 0.55cvss 7.5epss 0.40

    A Buffer Overflow was discovered in EvoStream Media Server 1.7.1. A crafted HTTP request with a malicious header will cause a crash. An example attack methodology may include a long message-body in a GET request.

  • CVE-2017-2786HigMar 10, 2017
    risk 0.49cvss 7.5epss 0.02

    A denial of service vulnerability exists in the psnotifyd application of the Pharos PopUp printer client version 9.0. A specially crafted packet can be sent to the victim's computer and can lead to an out of bounds read causing a crash and a denial of service.