Total
5210 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2016-5995 | 3 Hp, Ibm, Linux | 5 Hp-ux, Aix, Db2 and 2 more | 2017-07-30 | 6.9 MEDIUM | 7.3 HIGH |
Untrusted search path vulnerability in IBM DB2 9.7 through FP11, 10.1 through FP5, 10.5 before FP8, and 11.1 GA on Linux, AIX, and HP-UX allows local users to gain privileges via a Trojan horse library that is accessed by a setuid or setgid program. | |||||
CVE-2016-6413 | 1 Cisco | 1 Application Policy Infrastructure Controller | 2017-07-30 | 6.8 MEDIUM | 7.8 HIGH |
The installation procedure on Cisco Application Policy Infrastructure Controller (APIC) devices 1.3(2f) mishandles binary files, which allows local users to obtain root access via unspecified vectors, aka Bug ID CSCva50496. | |||||
CVE-2016-0905 | 1 Emc | 1 Avamar Server | 2017-07-30 | 7.2 HIGH | 6.7 MEDIUM |
Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) in EMC Avamar Server before 7.3.0-233 allow local users to obtain root privileges by leveraging admin access and entering a sudo command. | |||||
CVE-2016-4713 | 1 Apple | 1 Mac Os X | 2017-07-30 | 4.3 MEDIUM | 5.3 MEDIUM |
CoreDisplay in Apple OS X before 10.12 allows attackers to view arbitrary users' screens by leveraging screen-sharing access. | |||||
CVE-2007-6209 | 2 Linux, Zsh | 2 Linux Kernel, Zsh | 2017-07-29 | 4.6 MEDIUM | N/A |
Util/difflog.pl in zsh 4.3.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files. | |||||
CVE-2007-6182 | 1 Growth | 1 Ispmanager | 2017-07-29 | 7.2 HIGH | N/A |
The responder program in ISPsystem ISPmanager (aka ISPmgr) 4.2.15.1 allows local users to gain privileges via shell metacharacters in command line arguments. | |||||
CVE-2007-6222 | 1 Crm Ctt | 1 Interleave | 2017-07-29 | 6.5 MEDIUM | N/A |
The CheckCustomerAccess function in functions.php in CRM-CTT Interleave before 4.2.0 (formerly CRM-CTT) does not properly verify user privileges, which allows remote authenticated users with the LIMITTOCUSTOMERS privilege to bypass intended access restrictions and edit non-active user settings. NOTE: some of these details are obtained from third party information. | |||||
CVE-2016-4686 | 1 Apple | 1 Iphone Os | 2017-07-29 | 3.6 LOW | 4.4 MEDIUM |
An issue was discovered in certain Apple products. iOS before 10.1 is affected. The issue involves the "Contacts" component, which does not prevent an app's Address Book access after access revocation. | |||||
CVE-2016-5499 | 1 Oracle | 1 Database Server | 2017-07-29 | 2.1 LOW | 3.3 LOW |
Unspecified vulnerability in the RDBMS Security component in Oracle Database Server 11.2.0.4 and 12.1.0.2 allows local users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2016-5498. | |||||
CVE-2016-8289 | 1 Oracle | 1 Mysql | 2017-07-29 | 3.3 LOW | 4.7 MEDIUM |
Unspecified vulnerability in Oracle MySQL 5.7.13 and earlier allows local users to affect integrity and availability via vectors related to Server: InnoDB. | |||||
CVE-2016-5572 | 1 Oracle | 1 Database | 2017-07-29 | 4.4 MEDIUM | 6.4 MEDIUM |
Unspecified vulnerability in the Kernel PDB component in Oracle Database Server 12.1.0.2 allows local users to affect confidentiality, integrity, and availability via unknown vectors. | |||||
CVE-2007-6174 | 1 Phpdevshell | 1 Phpdevshell | 2017-07-29 | 8.5 HIGH | N/A |
PHPDevShell before 0.7.0 allows remote authenticated users to gain privileges via a crafted request to update a user profile. NOTE: some of these details are obtained from third party information. | |||||
CVE-2016-6438 | 1 Cisco | 1 Ios Xe | 2017-07-29 | 4.3 MEDIUM | 5.9 MEDIUM |
A vulnerability in Cisco IOS XE Software running on Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, remote attacker to cause a configuration integrity change to the vty line configuration on an affected device. This vulnerability affects the following releases of Cisco IOS XE Software running on Cisco cBR-8 Converged Broadband Routers: All 3.16S releases, All 3.17S releases, Release 3.18.0S, Release 3.18.1S, Release 3.18.0SP. More Information: CSCuz62815. Known Affected Releases: 15.5(3)S2.9, 15.6(2)SP. Known Fixed Releases: 15.6(1.7)SP1, 16.4(0.183), 16.5(0.1). | |||||
CVE-2007-5171 | 1 Quicksilver Forums | 1 Quicksilver Forums | 2017-07-29 | 5.0 MEDIUM | N/A |
Unspecified vulnerability in Quicksilver Forums before 1.4.1 allows remote attackers to delete arbitrary PMs via unspecified vectors. | |||||
CVE-2007-5170 | 1 Sun | 2 Embedded Lights Out Manager, Sun Fire | 2017-07-29 | 5.0 MEDIUM | N/A |
Unspecified vulnerability in the embedded service processor (SP) before 3.09 in Sun Fire X2100 M2 and X2200 M2 Embedded Lights Out Manager (ELOM) allows remote attackers to send arbitrary network traffic and use ELOM as a spam proxy. | |||||
CVE-2007-4685 | 1 Apple | 2 Mac Os X, Mac Os X Server | 2017-07-29 | 7.2 HIGH | N/A |
The kernel in Apple Mac OS X 10.4 through 10.4.10 allows local users to gain privileges by executing setuid or setgid programs in which the stdio, stderr, or stdout file descriptors are "in an unexpected state." | |||||
CVE-2007-5819 | 1 Ibm | 1 Tivoli Continuous Data Protection For Files | 2017-07-29 | 2.1 LOW | N/A |
IBM Tivoli Continuous Data Protection for Files (CDP) 3.1.0 uses weak permissions (unrestricted write) for the Central Admin Global download directory, which allows local users to place arbitrary files into a location used for updating CDP clients. | |||||
CVE-2007-5401 | 1 Layton Technology | 1 Helpbox | 2017-07-29 | 6.5 MEDIUM | N/A |
Unrestricted file upload vulnerability in uploadrequest.asp in Layton HelpBox 3.7.1 allows remote authenticated users to upload and execute arbitrary ASP files, related to not properly checking file extensions. | |||||
CVE-2007-5101 | 1 Furquim | 1 Chironfs | 2017-07-29 | 7.2 HIGH | N/A |
ChironFS before 1.0 RC7 sets user/group ownership to the mounter account instead of the creator account when files are created, which allows local users to gain privileges. | |||||
CVE-2007-5987 | 1 Bti-tracker | 1 Bti-tracker | 2017-07-29 | 6.8 MEDIUM | N/A |
details.php in BtiTracker before 1.4.5, when torrent viewing is disabled for guests, allows remote attackers to bypass protection mechanisms via a direct request, as demonstrated by (1) reading the details of an arbitrary torrent and (2) modifying a torrent owned by a guest. |