|
251531
|
2.3 |
LOW
Local
|
huawei
|
honor_8_firmware
|
Huawei Honor 8 smartphone with software versions earlier than FRD-L04C567B389 and earlier than FRD-L14C567B389 have a permission control vulnerability due to improper authorization configuration on s…
|
NVD-CWE-noinfo
|
CVE-2017-15307
|
2024-11-21 12:14 |
2017-12-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
251532
|
5.7 |
MEDIUM
Adjacent
|
symantec
|
messaging_gateway
|
Prior to 10.6.4, Symantec Messaging Gateway may be susceptible to a path traversal attack (also known as directory traversal). These types of attacks aim to access files and directories that are stor…
|
CWE-22
Path Traversal
|
CVE-2017-15532
|
2024-11-21 12:14 |
2017-12-21 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
251533
|
8.8 |
HIGH
Network
|
zoom
|
zoom
|
The ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 does not properly sanitize user input when constructing a shell command, which allows remote attackers to execute arbitrary…
|
CWE-78
OS Command
|
CVE-2017-15049
|
2024-11-21 12:14 |
2017-12-20 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
251534
|
8.8 |
HIGH
Network
|
zoom
|
zoom
|
Stack-based buffer overflow in the ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handle…
|
CWE-119
Incorrect Access of Indexable Resource ('Range Error')
|
CVE-2017-15048
|
2024-11-21 12:14 |
2017-12-20 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
251535
|
9.1 |
CRITICAL
Network
|
kemptechnologies
|
web_application_firewall
|
The Application Firewall Pack (AFP, aka Web Application Firewall) component on Kemp Load Balancer devices with software before 7.2.40.1 allows a Security Feature Bypass via an HTTP POST request.
|
NVD-CWE-noinfo
|
CVE-2017-15524
|
2024-11-21 12:14 |
2017-12-19 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
251536
|
7.8 |
HIGH
Local
|
heketi_project redhat
|
heketi enterprise_linux
|
An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi…
|
-
|
CVE-2017-15104
|
2024-11-21 12:14 |
2017-12-19 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
251537
|
8.8 |
HIGH
Network
|
heketi_project redhat
|
heketi enterprise_linux
|
A security-check flaw was found in the way the Heketi 5 server API handled user requests. An authenticated Heketi user could send specially crafted requests to the Heketi server, resulting in remote …
|
-
|
CVE-2017-15103
|
2024-11-21 12:14 |
2017-12-19 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
251538
|
3.3 |
LOW
Local
|
symantec
|
norton_family
|
Prior to 4.4.1.10, the Norton Family Android App can be susceptible to an Information Disclosure issue. Information disclosure is a very common issue that attackers will attempt to exploit as a first…
|
CWE-200
Information Exposure
|
CVE-2017-15530
|
2024-11-21 12:14 |
2017-12-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
251539
|
6.2 |
MEDIUM
Local
|
symantec
|
norton_family
|
Prior to 4.4.1.10, the Norton Family Android App can be susceptible to a Denial of Service (DoS) exploit. A DoS attack is a type of attack whereby the perpetrator attempts to make a particular device…
|
CWE-400
Uncontrolled Resource Consumption
|
CVE-2017-15529
|
2024-11-21 12:14 |
2017-12-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
251540
|
5.5 |
MEDIUM
Local
|
redhat
|
enterprise_linux_desktop enterprise_linux_workstation enterprise_linux enterprise_linux_server enterprise_linux_server_tus enterprise_linux_server_eus enterprise_linux_server_aus
|
A non-privileged user is able to mount a fuse filesystem on RHEL 6 or 7 and crash a system if an application punches a hole in a file that does not end aligned to a page boundary.
|
-
|
CVE-2017-15121
|
2024-11-21 12:14 |
2017-12-7 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|