|
256151
|
8.8 |
HIGH
Network
|
huawei
|
ireader
|
Huawei iReader app before 8.0.2.301 has an input validation vulnerability due to insufficient validation on the URL used for loading network data. An attacker can control app access and load maliciou…
|
CWE-20
Improper Input Validation
|
CVE-2017-15308
|
2024-11-21 12:14 |
2017-12-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
256152
|
2.3 |
LOW
Local
|
huawei
|
honor_8_firmware
|
Huawei Honor 8 smartphone with software versions earlier than FRD-L04C567B389 and earlier than FRD-L14C567B389 have a permission control vulnerability due to improper authorization configuration on s…
|
NVD-CWE-noinfo
|
CVE-2017-15307
|
2024-11-21 12:14 |
2017-12-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
256153
|
5.7 |
MEDIUM
Adjacent
|
symantec
|
messaging_gateway
|
Prior to 10.6.4, Symantec Messaging Gateway may be susceptible to a path traversal attack (also known as directory traversal). These types of attacks aim to access files and directories that are stor…
|
CWE-22
Path Traversal
|
CVE-2017-15532
|
2024-11-21 12:14 |
2017-12-21 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
256154
|
8.8 |
HIGH
Network
|
zoom
|
zoom
|
The ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 does not properly sanitize user input when constructing a shell command, which allows remote attackers to execute arbitrary…
|
CWE-78
OS Command
|
CVE-2017-15049
|
2024-11-21 12:14 |
2017-12-20 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
256155
|
8.8 |
HIGH
Network
|
zoom
|
zoom
|
Stack-based buffer overflow in the ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handle…
|
CWE-119
Incorrect Access of Indexable Resource ('Range Error')
|
CVE-2017-15048
|
2024-11-21 12:14 |
2017-12-20 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
256156
|
9.1 |
CRITICAL
Network
|
kemptechnologies
|
web_application_firewall
|
The Application Firewall Pack (AFP, aka Web Application Firewall) component on Kemp Load Balancer devices with software before 7.2.40.1 allows a Security Feature Bypass via an HTTP POST request.
|
NVD-CWE-noinfo
|
CVE-2017-15524
|
2024-11-21 12:14 |
2017-12-19 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
256157
|
7.8 |
HIGH
Local
|
heketi_project redhat
|
heketi enterprise_linux
|
An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi…
|
-
|
CVE-2017-15104
|
2024-11-21 12:14 |
2017-12-19 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
256158
|
8.8 |
HIGH
Network
|
heketi_project redhat
|
heketi enterprise_linux
|
A security-check flaw was found in the way the Heketi 5 server API handled user requests. An authenticated Heketi user could send specially crafted requests to the Heketi server, resulting in remote …
|
-
|
CVE-2017-15103
|
2024-11-21 12:14 |
2017-12-19 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
256159
|
3.3 |
LOW
Local
|
symantec
|
norton_family
|
Prior to 4.4.1.10, the Norton Family Android App can be susceptible to an Information Disclosure issue. Information disclosure is a very common issue that attackers will attempt to exploit as a first…
|
CWE-200
Information Exposure
|
CVE-2017-15530
|
2024-11-21 12:14 |
2017-12-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
256160
|
6.2 |
MEDIUM
Local
|
symantec
|
norton_family
|
Prior to 4.4.1.10, the Norton Family Android App can be susceptible to a Denial of Service (DoS) exploit. A DoS attack is a type of attack whereby the perpetrator attempts to make a particular device…
|
CWE-400
Uncontrolled Resource Consumption
|
CVE-2017-15529
|
2024-11-21 12:14 |
2017-12-14 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|