CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities (CVSS score between 5 and 5.99)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
6351 CVE-2017-5924 416 DoS 2017-04-03 2017-05-01
5.0
None Remote Low Not required None None Partial
libyara/grammar.y in YARA 3.5.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted rule that is mishandled in the yr_compiler_destroy function.
6352 CVE-2017-5923 125 DoS 2017-04-03 2017-05-01
5.0
None Remote Low Not required None None Partial
libyara/grammar.y in YARA 3.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted rule that is mishandled in the yara_yyparse function.
6353 CVE-2017-5892 200 +Info 2017-05-10 2017-05-15
5.0
None Remote Low Not required Partial None None
ASUS RT-AC* and RT-N* devices with firmware before 3.0.0.4.380.7378 allow JSONP Information Disclosure such as a network map.
6354 CVE-2017-5887 295 Bypass 2017-04-06 2017-04-25
5.0
None Remote Low Not required None Partial None
WebSocket.swift in Starscream before 2.0.4 allows an SSL Pinning bypass because pinning occurs in the stream function (this is too late; pinning should occur in the initStreamsWithData function).
6355 CVE-2017-5872 20 DoS 2017-03-09 2017-03-16
5.0
None Remote Low Not required None None Partial
The TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 57.1 before 57.152, 58.1 before 58.142, or 59.1 before 59.172, when running a TLS 1.2 service, allows remote attackers to cause a denial of service (network connectivity disruption) via a client hello with a signature_algorithms extension above those defined in RFC 5246, which triggers a full memory dump.
6356 CVE-2017-5871 601 +Info 2019-05-22 2019-05-23
5.8
None Remote Medium Not required Partial Partial None
Odoo Version <= 8.0-20160726 and Version 9 is affected by: CWE-601: Open redirection. The impact is: obtain sensitive information (remote).
6357 CVE-2017-5848 125 DoS 2017-02-09 2018-01-04
5.0
None Remote Low Not required None None Partial
The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux.c in gst-plugins-bad in GStreamer allows remote attackers to cause a denial of service (invalid memory read and crash) via vectors involving PSM parsing.
6358 CVE-2017-5847 125 DoS 2017-02-09 2017-11-03
5.0
None Remote Low Not required None None Partial
The gst_asf_demux_process_ext_content_desc function in gst/asfdemux/gstasfdemux.c in gst-plugins-ugly in GStreamer allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving extended content descriptors.
6359 CVE-2017-5845 125 DoS 2017-02-09 2018-01-04
5.0
None Remote Low Not required None None Partial
The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via a ncdt sub-tag that "goes behind" the surrounding tag.
6360 CVE-2017-5843 416 DoS 2017-02-09 2018-01-04
5.0
None Remote Low Not required None None Partial
Multiple use-after-free vulnerabilities in the (1) gst_mini_object_unref, (2) gst_tag_list_unref, and (3) gst_mxf_demux_update_essence_tracks functions in GStreamer before 1.10.3 allow remote attackers to cause a denial of service (crash) via vectors involving stream tags, as demonstrated by 02785736.mxf.
6361 CVE-2017-5841 125 DoS 2017-02-09 2018-01-04
5.0
None Remote Low Not required None None Partial
The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving ncdt tags.
6362 CVE-2017-5840 125 DoS 2017-02-09 2018-01-04
5.0
None Remote Low Not required None None Partial
The qtdemux_parse_samples function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving the current stts index.
6363 CVE-2017-5839 674 DoS Overflow 2017-02-09 2019-10-02
5.0
None Remote Low Not required None None Partial
The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 does not properly limit recursion, which allows remote attackers to cause a denial of service (stack overflow and crash) via vectors involving nested WAVEFORMATEX.
6364 CVE-2017-5838 125 DoS 2017-02-09 2018-01-04
5.0
None Remote Low Not required None None Partial
The gst_date_time_new_from_iso8601_string function in gst/gstdatetime.c in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a malformed datetime string.
6365 CVE-2017-5836 415 DoS 2017-03-03 2017-03-06
5.0
None Remote Low Not required None None Partial
The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free.
6366 CVE-2017-5835 770 DoS 2017-03-03 2019-10-02
5.0
None Remote Low Not required None None Partial
libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.
6367 CVE-2017-5831 384 2017-03-03 2017-03-06
5.5
None Remote Low Single system Partial Partial None
Session fixation vulnerability in the forgot password mechanism in Revive Adserver before 4.0.1, when setting a new password, allows remote attackers to hijack web sessions via the session ID.
6368 CVE-2017-5828 611 Exec Code 2018-02-15 2018-03-07
5.5
None Remote Low Single system Partial Partial None
An arbitrary command execution vulnerability in HPE Aruba ClearPass Policy Manager version 6.6.x was found.
6369 CVE-2017-5812 89 Sql 2018-02-15 2018-03-07
5.0
None Remote Low Not required Partial None None
A remote sql information disclosure vulnerability in HPE Network Automation version 9.1x, 9.2x, 10.0x, 10.1x and 10.2x were found.
6370 CVE-2017-5801 200 +Info 2018-02-15 2018-03-15
5.0
None Remote Low Not required Partial None None
A Remote Unauthorized Access to Data vulnerability in HPE Business Process Monitor version v09.2x, v09.30 was found.
6371 CVE-2017-5784 20 2018-02-15 2018-03-05
5.8
None Remote Medium Not required Partial Partial None
A missing HSTS Header vulnerability in HPE Matrix Operating Environment version v7.6 was found.
6372 CVE-2017-5783 20 2018-02-15 2018-03-05
5.0
None Remote Low Not required Partial None None
A remote clickjacking vulnerability in HPE Matrix Operating Environment version v7.6 was found.
6373 CVE-2017-5782 20 2018-02-15 2018-03-05
5.8
None Remote Medium Not required Partial Partial None
A missing HSTS Header vulnerability in HPE Matrix Operating Environment version v7.6 was found.
6374 CVE-2017-5729 2017-11-21 2019-10-02
5.8
None Remote Medium Not required None Partial Partial
Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle.
6375 CVE-2017-5681 2017-03-07 2019-10-02
5.0
None Remote Low Not required Partial None None
The RSA-CRT implementation in the Intel QuickAssist Technology (QAT) Engine for OpenSSL versions prior to 0.5.19 may allow remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack.
6376 CVE-2017-5674 200 +Info 2017-03-13 2017-03-15
5.0
None Remote Low Not required Partial None None
A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP ("GET system.ini HTTP/1.1\n\n" - note the lack of "/" in the path field of the request) request that will disclose the configuration file with the login password.
6377 CVE-2017-5664 755 2017-06-06 2019-10-02
5.0
None Remote Low Not required None Partial None
The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. This means that the request is presented to the error page with the original HTTP method. If the error page is a static file, expected behaviour is to serve content of the file as if processing a GET request, regardless of the actual HTTP method. The Default Servlet in Apache Tomcat 9.0.0.M1 to 9.0.0.M20, 8.5.0 to 8.5.14, 8.0.0.RC1 to 8.0.43 and 7.0.0 to 7.0.77 did not do this. Depending on the original request this could lead to unexpected and undesirable results for static error pages including, if the DefaultServlet is configured to permit writes, the replacement or removal of the custom error page. Notes for other user provided error pages: (1) Unless explicitly coded otherwise, JSPs ignore the HTTP method. JSPs used as error pages must must ensure that they handle any error dispatch as a GET request, regardless of the actual method. (2) By default, the response generated by a Servlet does depend on the HTTP method. Custom Servlets used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method.
6378 CVE-2017-5660 20 2018-02-27 2018-03-21
5.0
None Remote Low Not required None Partial None
There is a vulnerability in Apache Traffic Server (ATS) 6.2.0 and prior and 7.0.0 and prior with the Host header and line folding. This can have issues when interacting with upstream proxies and the wrong host being used.
6379 CVE-2017-5659 20 2017-04-17 2017-07-10
5.0
None Remote Low Not required None None Partial
Apache Traffic Server before 6.2.1 generates a coredump when there is a mismatch between content length and chunked encoding.
6380 CVE-2017-5658 200 +Info 2018-10-04 2019-01-08
5.0
None Remote Low Not required Partial None None
The statistics generator in Apache Pony Mail 0.7 to 0.9 was found to be returning timestamp data without proper authorization checks. This could lead to derived information disclosure on private lists about the timing of specific email subjects or text bodies, though without disclosing the content itself. As this was primarily used as a caching feature for faster loading times, the caching was disabled by default to prevent this. Users using 0.9 should upgrade to 0.10 to address this issue.
6381 CVE-2017-5656 384 2017-04-18 2018-05-23
5.0
None Remote Low Not required Partial None None
Apache CXF's STSClient before 3.1.11 and 3.0.13 uses a flawed way of caching tokens that are associated with delegation tokens, which means that an attacker could craft a token which would return an identifer corresponding to a cached token for another user.
6382 CVE-2017-5654 91 2017-05-12 2017-05-23
5.0
None Remote Low Not required Partial None None
In Ambari 2.4.x (before 2.4.3) and Ambari 2.5.0, an authorized user of the Ambari Hive View may be able to gain unauthorized read access to files on the host where the Ambari server executes.
6383 CVE-2017-5653 295 2017-04-18 2019-10-02
5.0
None Remote Low Not required None Partial None
JAX-RS XML Security streaming clients in Apache CXF before 3.1.11 and 3.0.13 do not validate that the service response was signed or encrypted, which allows remote attackers to spoof servers.
6384 CVE-2017-5652 319 2017-07-10 2019-10-02
5.0
None Remote Low Not required Partial None None
During a routine security analysis, it was found that one of the ports in Apache Impala (incubating) 2.7.0 to 2.8.0 sent data in plaintext even when the cluster was configured to use TLS. The port in question was used by the StatestoreSubscriber class which did not use the appropriate secure Thrift transport when TLS was turned on. It was therefore possible for an adversary, with access to the network, to eavesdrop on the packets going to and coming from that port and view the data in plaintext.
6385 CVE-2017-5650 404 2017-04-17 2019-10-02
5.0
None Remote Low Not required None None Partial
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handling of an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application to write more data. These waiting streams each consumed a thread. A malicious client could therefore construct a series of HTTP/2 requests that would consume all available processing threads.
6386 CVE-2017-5647 200 +Info 2017-04-17 2019-04-15
5.0
None Remote Low Not required Partial None None
A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C.
6387 CVE-2017-5643 918 2017-03-16 2019-05-24
5.8
None Remote Medium Not required Partial Partial None
Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE.
6388 CVE-2017-5637 306 2017-10-09 2019-10-02
5.0
None Remote Low Not required None None Partial
Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.
6389 CVE-2017-5635 287 2017-10-19 2019-10-02
5.0
None Remote Low Not required Partial None None
In Apache NiFi before 0.7.2 and 1.x before 1.1.2 in a cluster environment, if an anonymous user request is replicated to another node, the originating node identity is used rather than the "anonymous" user.
6390 CVE-2017-5630 74 2017-02-01 2019-10-02
5.0
None Remote Low Not required None Partial None
PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite.
6391 CVE-2017-5617 918 2017-03-16 2019-03-29
5.8
None Remote Medium Not required Partial Partial None
The SVG Salamander (aka svgSalamander) library, when used in a web application, allows remote attackers to conduct server-side request forgery (SSRF) attacks via an xlink:href attribute in an SVG file.
6392 CVE-2017-5615 601 2017-03-03 2017-03-07
5.8
None Remote Medium Not required Partial Partial None
cgiemail and cgiecho allow remote attackers to inject HTTP headers via a newline character in the redirect location.
6393 CVE-2017-5614 601 2017-03-03 2017-03-07
5.8
None Remote Medium Not required Partial Partial None
Open redirect vulnerability in cgiemail and cgiecho allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving the (1) success or (2) failure parameter.
6394 CVE-2017-5610 200 Bypass +Info 2017-01-29 2017-11-03
5.0
None Remote Low Not required Partial None None
wp-admin/includes/class-wp-press-this.php in Press This in WordPress before 4.7.2 does not properly restrict visibility of a taxonomy-assignment user interface, which allows remote attackers to bypass intended access restrictions by reading terms.
6395 CVE-2017-5601 125 2017-01-27 2018-11-30
5.0
None Remote Low Not required None None Partial
An error in the lha_read_file_header_1() function (archive_read_support_format_lha.c) in libarchive 3.2.2 allows remote attackers to trigger an out-of-bounds read memory access and subsequently cause a crash via a specially crafted archive.
6396 CVE-2017-5598 89 Sql 2017-01-27 2017-01-31
5.0
None Remote Low Not required Partial None None
An issue was discovered in eClinicalWorks [email protected] 8.0 build 8. This is a blind SQL injection within the EmployeePortalServlet, which can be exploited by un-authenticated users via an HTTP POST request and which can be used to dump database data out to a malicious server, using an out-of-band technique, such as select_loadfile(). The vulnerability affects the EmployeePortalServlet page and the following parameter: employer.
6397 CVE-2017-5597 190 Overflow 2017-01-25 2017-11-03
5.0
None Remote Low Not required None None Partial
In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow.
6398 CVE-2017-5596 190 Overflow 2017-01-25 2019-10-02
5.0
None Remote Low Not required None None Partial
In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow.
6399 CVE-2017-5572 269 2017-01-30 2019-10-02
5.5
None Remote Low Single system None Partial Partial
An issue was discovered in Linux Foundation xapi in Citrix XenServer through 7.0. An authenticated read-only administrator can corrupt the host database.
6400 CVE-2017-5571 601 2017-03-03 2018-05-29
5.8
None Remote Medium Not required Partial Partial None
Open redirect vulnerability in the lmadmin component in Flexera FlexNet Publisher (aka Flex License Manager) 11.14.1 and earlier, as used in Citrix License Server for Windows and the Citrix License Server VPX, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
Total number of vulnerabilities : 23746   Page : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 (This Page)129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.