Total
1509 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-14330 | 1 Extremenetworks | 1 Extremexos | 2019-10-02 | 7.2 HIGH | 6.7 MEDIUM |
Extreme EXOS 16.x, 21.x, and 22.x allows administrators to obtain a root shell via vectors involving a privileged process. | |||||
CVE-2017-14329 | 1 Extremenetworks | 1 Extremexos | 2019-10-02 | 7.2 HIGH | 6.7 MEDIUM |
Extreme EXOS 16.x, 21.x, and 22.x allows administrators to obtain a root shell via vectors involving an exsh debug shell. | |||||
CVE-2017-14312 | 1 Nagios | 1 Nagios Core | 2019-10-02 | 7.2 HIGH | 7.8 HIGH |
Nagios Core through 4.3.4 initially executes /usr/sbin/nagios as root but supports configuration options in which this file is owned by a non-root account (and similarly can have nagios.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account. | |||||
CVE-2017-14187 | 1 Fortinet | 1 Fortios | 2019-10-02 | 7.2 HIGH | 6.2 MEDIUM |
A local privilege escalation and local code execution vulnerability in Fortinet FortiOS 5.6.0 to 5.6.2, 5.4.0 to 5.4.8, and 5.2 and below versions allows attacker to execute unauthorized binary program contained on an USB drive plugged into a FortiGate via linking the aforementioned binary program to a command that is allowed to be run by the fnsysctl CLI command. | |||||
CVE-2017-14124 | 1 Unicon-software | 1 Rp | 2019-10-02 | 3.3 LOW | 6.3 MEDIUM |
In eLux RP 5.x before 5.5.1000 LTSR and 5.6.x before 5.6.2 CR when classic desktop mode is used, it is possible to start applications other than defined, even if the user does not have permissions to change application definitions. | |||||
CVE-2017-13721 | 2 Debian, X.org | 2 Debian Linux, Xorg-server | 2019-10-02 | 1.9 LOW | 4.7 MEDIUM |
In X.Org Server (aka xserver and xorg-server) before 1.19.4, an attacker authenticated to an X server with the X shared memory extension enabled can cause aborts of the X server or replace shared memory segments of other X clients in the same session. | |||||
CVE-2018-12596 | 1 Episerver | 1 Ektron Cms | 2019-10-02 | 7.5 HIGH | 9.8 CRITICAL |
Episerver Ektron CMS before 9.0 SP3 Site CU 31, 9.1 before SP3 Site CU 45, or 9.2 before SP2 Site CU 22 allows remote attackers to call aspx pages via the "activateuser.aspx" page, even if a page is located under the /WorkArea/ path, which is forbidden (normally available exclusively for local admins). | |||||
CVE-2017-1326 | 1 Ibm | 1 Sterling B2b Integrator | 2019-10-02 | 4.0 MEDIUM | 4.3 MEDIUM |
IBM Sterling File Gateway does not properly restrict user requests based on permission level. This allows for users to update data related to other users, by manipulating the parameters passed in the POST request. IBM X-Force ID: 126060. | |||||
CVE-2018-12884 | 1 Octopus | 1 Octopus Deploy | 2019-10-02 | 4.0 MEDIUM | 6.5 MEDIUM |
In Octopus Deploy 3.0 onwards (before 2018.6.7), an authenticated user with incorrect permissions may be able to create Accounts under the Infrastructure menu. | |||||
CVE-2017-12635 | 1 Apache | 1 Couchdb | 2019-10-02 | 10.0 HIGH | 9.8 CRITICAL |
Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges. | |||||
CVE-2017-12422 | 1 Netapp | 1 Storagegrid Webscale | 2019-10-02 | 4.0 MEDIUM | 6.5 MEDIUM |
NetApp StorageGRID Webscale 10.2.x before 10.2.2.3, 10.3.x before 10.3.0.4, and 10.4.x before 10.4.0.2 allow remote authenticated users to delete arbitrary objects via unspecified vectors. | |||||
CVE-2017-5207 | 1 Firejail Project | 1 Firejail | 2019-10-02 | 7.2 HIGH | 7.8 HIGH |
Firejail before 0.9.44.4, when running a bandwidth command, allows local users to gain root privileges via the --shell argument. | |||||
CVE-2017-11681 | 1 Project Hashtopussy | 1 Hashtopussy | 2019-10-02 | 6.5 MEDIUM | 8.8 HIGH |
Incorrect Access Control vulnerability in Hashtopussy 0.4.0 allows remote authenticated users to execute actions that should only be available for administrative roles, as demonstrated by an action=createVoucher request to agents.php. | |||||
CVE-2017-1150 | 1 Ibm | 1 Db2 | 2019-10-02 | 3.5 LOW | 3.1 LOW |
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.1, 10.5, and 11.1 could allow an authenticated attacker with specialized access to tables that they should not be permitted to view. IBM Reference #: 1999515. | |||||
CVE-2017-11467 | 1 Orientdb | 1 Orientdb | 2019-10-02 | 10.0 HIGH | 9.8 CRITICAL |
OrientDB through 2.2.22 does not enforce privilege requirements during "where" or "fetchplan" or "order by" use, which allows remote attackers to execute arbitrary OS commands via a crafted request. | |||||
CVE-2017-11438 | 1 Gitlab | 1 Gitlab | 2019-10-02 | 6.5 MEDIUM | 6.3 MEDIUM |
GitLab Community Edition (CE) and Enterprise Edition (EE) before 9.0.11, 9.1.8, 9.2.8 allow an authenticated user with the ability to create a group to add themselves to any project that is inside a subgroup. | |||||
CVE-2017-11319 | 1 Resolver | 1 Perspective | 2019-10-02 | 6.5 MEDIUM | 8.8 HIGH |
Perspective ICM Investigation & Case 5.1.1.16 allows remote authenticated users to modify access level permissions and consequently gain privileges by leveraging insufficient validation methods and missing cross server side checking mechanisms. | |||||
CVE-2017-11361 | 1 Intenogroup | 2 Inteno Router, Inteno Router Firmware | 2019-10-02 | 9.0 HIGH | 8.8 HIGH |
Inteno routers have a JUCI ACL misconfiguration that allows the "user" account to read files, write to files, and add root SSH keys via JSON commands to ubus. (Exploitation is sometimes easy because the "user" password might be "user" or might match the Wi-Fi key.) | |||||
CVE-2017-10857 | 1 Cybozu | 1 Office | 2019-10-02 | 4.0 MEDIUM | 4.3 MEDIUM |
Cybozu Office 10.0.0 to 10.6.1 allows authenticated attackers to bypass access restriction to perform arbitrary actions via "Cabinet" function. | |||||
CVE-2017-10689 | 3 Canonical, Puppet, Redhat | 4 Ubuntu Linux, Puppet, Puppet Enterprise and 1 more | 2019-10-02 | 2.1 LOW | 5.5 MEDIUM |
In previous versions of Puppet Agent it was possible to install a module with world writable permissions. Puppet Agent 5.3.4 and 1.10.10 included a fix to this vulnerability. |