|
249321
|
2.1 |
LOW
Physics
|
hp
|
tommy_hilfiger_th24\/7
|
A potential security vulnerability caused by incomplete obfuscation of application configuration information was discovered in Tommy Hilfiger TH24/7 Android app versions 2.0.0.11, 2.0.1.14, 2.1.0.16,…
|
CWE-254
7PK - Security Features
|
CVE-2017-2752
|
2024-11-21 12:24 |
2019-03-28 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
249322
|
7.5 |
HIGH
Network
|
hp
|
isaac_mizrahi_smartwatch
|
A potential security vulnerability caused by the use of insecure (http) transactions during login has been identified with early versions of the Isaac Mizrahi Smartwatch mobile app. HP has no access …
|
CWE-254
7PK - Security Features
|
CVE-2017-2748
|
2024-11-21 12:24 |
2019-03-28 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
249323
|
7.5 |
HIGH
Network
|
apache
|
solr
|
Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the se…
|
CWE-918
Server-Side Request Forgery (SSRF)
|
CVE-2017-3164
|
2024-11-21 12:24 |
2019-03-9 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
249324
|
7.8 |
HIGH
Local
|
isc
|
bind
|
The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9,…
|
CWE-428
Unquoted Search Path or Element
|
CVE-2017-3141
|
2024-11-21 12:24 |
2019-01-17 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
249325
|
5.9 |
MEDIUM
Network
|
isc netapp
|
bind data_ontap_edge oncommand_balance element_software
|
If named is configured to use Response Policy Zones (RPZ) an error processing some rule types can lead to a condition where BIND will endlessly loop while handling a query. Affects BIND 9.9.10, 9.10.…
|
CWE-400
Uncontrolled Resource Consumption
|
CVE-2017-3140
|
2024-11-21 12:24 |
2019-01-17 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
249326
|
7.5 |
HIGH
Network
|
isc redhat debian netapp juniper
|
bind enterprise_linux_desktop enterprise_linux_server_aus enterprise_linux_workstation enterprise_linux_server_tus enterprise_linux_server enterprise_linux_server_eus debian_linu…
|
BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affec…
|
CWE-416
Use After Free
|
CVE-2017-3145
|
2024-11-21 12:24 |
2019-01-17 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
249327
|
7.5 |
HIGH
Network
|
isc redhat canonical debian
|
dhcp enterprise_linux_desktop enterprise_linux_workstation enterprise_linux_server enterprise_linux_server_aus enterprise_linux_server_eus enterprise_linux_server_tus ubuntu_linu…
|
A vulnerability stemming from failure to properly clean up closed OMAPI connections can lead to exhaustion of the pool of socket descriptors available to the DHCP server. Affects ISC DHCP 4.1.0 to 4.…
|
CWE-400
Uncontrolled Resource Consumption
|
CVE-2017-3144
|
2024-11-21 12:24 |
2019-01-17 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
249328
|
5.9 |
MEDIUM
Network
|
isc redhat debian
|
bind enterprise_linux_desktop enterprise_linux_workstation enterprise_linux_server enterprise_linux_server_tus enterprise_linux_server_aus enterprise_linux_server_eus debian_linux
|
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BI…
|
NVD-CWE-noinfo
|
CVE-2017-3143
|
2024-11-21 12:24 |
2019-01-17 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
249329
|
3.7 |
LOW
Network
|
isc redhat debian
|
bind enterprise_linux_desktop enterprise_linux_workstation enterprise_linux_server enterprise_linux_server_tus enterprise_linux_server_aus enterprise_linux_server_eus debian_linux
|
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a…
|
CWE-20
Improper Input Validation
|
CVE-2017-3142
|
2024-11-21 12:24 |
2019-01-17 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
249330
|
5.3 |
MEDIUM
Network
|
isc netapp debian
|
bind data_ontap_edge oncommand_balance element_software debian_linux
|
named contains a feature which allows operators to issue commands to a running server by communicating with the server process over a control channel, using a utility program such as rndc. A regressi…
|
CWE-617
Reachable Assertion
|
CVE-2017-3138
|
2024-11-21 12:24 |
2019-01-17 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|