|
255591
|
7.5 |
HIGH
Network
|
rarlab debian
|
unrar debian_linux
|
unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a directory traversal vulnerability for RAR v2 archives: pathnames of the form ../[filename] are unpacked into the upper directory.
|
CWE-22
Path Traversal
|
CVE-2017-14120
|
2024-11-21 12:12 |
2017-09-4 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
255592
|
8.8 |
HIGH
Network
|
eyesofnetwork
|
eyesofnetwork
|
In the EyesOfNetwork web interface (aka eonweb) 5.1-0, module\tool_all\tools\snmpwalk.php does not properly restrict popen calls, which allows remote attackers to execute arbitrary commands via shell…
|
CWE-78
OS Command
|
CVE-2017-14119
|
2024-11-21 12:12 |
2017-09-4 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
255593
|
8.8 |
HIGH
Network
|
eyesofnetwork
|
eyesofnetwork
|
In the EyesOfNetwork web interface (aka eonweb) 5.1-0, module\tool_all\tools\interface.php does not properly restrict exec calls, which allows remote attackers to execute arbitrary commands via shell…
|
CWE-78
OS Command
|
CVE-2017-14118
|
2024-11-21 12:12 |
2017-09-4 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
255594
|
5.9 |
MEDIUM
Network
|
att
|
u-verse_firmware
|
The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures an unauthenticated proxy service on WAN TCP port 49152, which allows rem…
|
CWE-287
Improper Authentication
|
CVE-2017-14117
|
2024-11-21 12:12 |
2017-09-4 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
255595
|
8.1 |
HIGH
Network
|
att
|
u-verse_firmware
|
The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG599 device, when IP Passthrough mode is not used, configures WAN access to a caserver https service with the tech account and an empty password, …
|
CWE-798
Use of Hard-coded Credentials
|
CVE-2017-14116
|
2024-11-21 12:12 |
2017-09-4 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
255596
|
8.1 |
HIGH
Network
|
att
|
u-verse_firmware
|
The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures ssh-permanent-enable WAN SSH logins to the remotessh account with the 5S…
|
CWE-798
Use of Hard-coded Credentials
|
CVE-2017-14115
|
2024-11-21 12:12 |
2017-09-4 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
255597
|
6.5 |
MEDIUM
Network
|
rtpproxy
|
rtpproxy
|
RTPproxy through 2.2.alpha.20160822 has a NAT feature that results in not properly determining the IP address and port number of the legitimate recipient of RTP traffic, which allows remote attackers…
|
CWE-200
Information Exposure
|
CVE-2017-14114
|
2024-11-21 12:12 |
2017-09-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
255598
|
9.8 |
CRITICAL
Network
|
digium
|
asterisk certified_asterisk
|
In Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized command execution is possible. Th…
|
CWE-78
OS Command
|
CVE-2017-14100
|
2024-11-21 12:12 |
2017-09-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
255599
|
7.5 |
HIGH
Network
|
digium
|
asterisk certified_asterisk
|
In res/res_rtp_asterisk.c in Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized data di…
|
CWE-200
Information Exposure
|
CVE-2017-14099
|
2024-11-21 12:12 |
2017-09-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
255600
|
7.5 |
HIGH
Network
|
digium
|
asterisk
|
In the pjsip channel driver (res_pjsip) in Asterisk 13.x before 13.17.1 and 14.x before 14.6.1, a carefully crafted tel URI in a From, To, or Contact header could cause Asterisk to crash.
|
CWE-20
Improper Input Validation
|
CVE-2017-14098
|
2024-11-21 12:12 |
2017-09-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|