Total
1246 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2017-11156 | 1 Synology | 1 Download Station | 2024-11-21 | N/A |
Synology Download Station 3.8.x before 3.8.5-3475 and 3.x before 3.5-2984 uses weak permissions (0777) for ui/dlm/btsearch directory, which allows remote authenticated users to execute arbitrary code by uploading an executable via unspecified vectors. | ||||
CVE-2017-1000089 | 2 Jenkins, Redhat | 2 Pipeline\, Openshift | 2024-11-21 | N/A |
Builds in Jenkins are associated with an authentication that controls the permissions that the build has to interact with other elements in Jenkins. The Pipeline: Build Step Plugin did not check the build authentication it was running as and allowed triggering any other project in Jenkins. | ||||
CVE-2017-1000084 | 1 Jenkins | 1 Parameterized Trigger | 2024-11-21 | N/A |
Parameterized Trigger Plugin fails to check Item/Build permission: The Parameterized Trigger Plugin did not check the build authentication it was running as and allowed triggering any other project in Jenkins. | ||||
CVE-2017-0847 | 1 Google | 1 Android | 2024-11-21 | N/A |
An elevation of privilege vulnerability in the Android media framework (mediaanalytics). Product: Android. Versions: 8.0. Android ID: A-65540999. | ||||
CVE-2017-0369 | 2 Debian, Mediawiki | 2 Debian Linux, Mediawiki | 2024-11-21 | N/A |
Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw, allowing a sysops to undelete pages, although the page is protected against it. | ||||
CVE-2016-6914 | 2 Microsoft, Ui | 2 Windows, Unifi Video | 2024-11-21 | 7.8 High |
Ubiquiti UniFi Video before 3.8.0 for Windows uses weak permissions for the installation directory, which allows local users to gain SYSTEM privileges via a Trojan horse taskkill.exe file. | ||||
CVE-2016-5425 | 3 Apache, Oracle, Redhat | 10 Tomcat, Instantis Enterprisetrack, Linux and 7 more | 2024-11-21 | 7.8 High |
The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group. | ||||
CVE-2016-3943 | 1 Watchguard | 1 Panda Endpoint Administration Agent | 2024-11-21 | 7.8 High |
Panda Endpoint Administration Agent before 7.50.00, as used in Panda Security for Business products for Windows, uses a weak ACL for the Panda Security/WaAgent directory and sub-directories, which allows local users to gain SYSTEM privileges by modifying an executable module. | ||||
CVE-2015-9477 | 1 Vernissage Project | 1 Vernissage | 2024-11-21 | 8.8 High |
The Vernissage theme 1.2.8 for WordPress has insufficient restrictions on option updates. | ||||
CVE-2015-9476 | 1 Teardrop Project | 1 Teardrop | 2024-11-21 | 8.8 High |
The Teardrop theme 1.8.1 for WordPress has insufficient restrictions on option updates. | ||||
CVE-2015-9475 | 1 Pont Project | 1 Pont | 2024-11-21 | 8.8 High |
The Pont theme 1.5 for WordPress has insufficient restrictions on option updates. | ||||
CVE-2015-9474 | 1 Simpolio Project | 1 Simpolio | 2024-11-21 | 8.8 High |
The Simpolio theme 1.3.2 for WordPress has insufficient restrictions on option updates. | ||||
CVE-2015-7985 | 1 Valvesoftware | 1 Steam Client | 2024-11-21 | N/A |
Valve Steam 2.10.91.91 uses weak permissions (Users: read and write) for the Install folder, which allows local users to gain privileges via a Trojan horse steam.exe file. | ||||
CVE-2015-7378 | 1 Watchguard | 1 Panda Url Filtering | 2024-11-21 | 7.8 High |
Panda Security URL Filtering before 4.3.1.9 uses a weak ACL for the "Panda Security URL Filtering" directory and installed files, which allows local users to gain SYSTEM privileges by modifying Panda_URL_Filteringb.exe. | ||||
CVE-2014-7303 | 1 Hp | 1 Sgi Tempo | 2024-11-21 | 7.8 High |
SGI Tempo, as used on SGI ICE-X systems, uses weak permissions for certain files, which allows local users to obtain password hashes and possibly other unspecified sensitive information by reading etc/dbdump.db. | ||||
CVE-2014-7302 | 1 Hp | 1 Sgi Tempo | 2024-11-21 | 7.8 High |
SGI Tempo, as used on SGI ICE-X systems, uses weak permissions for certain files, which allows local users to change the permissions of arbitrary files by executing /opt/sgi/sgimc/bin/vx. | ||||
CVE-2014-7301 | 1 Hp | 1 Sgi Tempo | 2024-11-21 | 6.6 Medium |
SGI Tempo, as used on SGI ICE-X systems, uses weak permissions for certain files, which allows local users to obtain password hashes and possibly other unspecified sensitive information by reading /etc/odapw. | ||||
CVE-2014-2723 | 1 Fortinet | 8 Fortibalancer 1000, Fortibalancer 1000 Firmware, Fortibalancer 2000 and 5 more | 2024-11-21 | 8.8 High |
In FortiBalancer 400, 1000, 2000 and 3000, a platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect. | ||||
CVE-2014-2722 | 1 Fortinet | 8 Fortibalancer 1000, Fortibalancer 1000 Firmware, Fortibalancer 2000 and 5 more | 2024-11-21 | 8.8 High |
In FortiBalancer 400, 1000, 2000 and 3000, a platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect. | ||||
CVE-2014-2721 | 1 Fortinet | 8 Fortibalancer 1000, Fortibalancer 1000 Firmware, Fortibalancer 2000 and 5 more | 2024-11-21 | 8.8 High |
In FortiBalancer 400, 1000, 2000 and 3000, a platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect. |