Latest CVE Feed
-
6.1
MEDIUMCVE-2017-14190
A Cross-site Scripting vulnerability in Fortinet FortiOS 5.6.0 to 5.6.2, 5.4.0 to 5.4.7, 5.2 and earlier, allows attacker to inject arbitrary web script or HTML via maliciously crafted "Host" header in user HTTP requests.... Read more
Affected Products : fortios- EPSS Score: %0.33
- Published: Jan. 29, 2018
- Modified: Nov. 21, 2024
-
7.2
HIGHCVE-2017-14187
A local privilege escalation and local code execution vulnerability in Fortinet FortiOS 5.6.0 to 5.6.2, 5.4.0 to 5.4.8, and 5.2 and below versions allows attacker to execute unauthorized binary program contained on an USB drive plugged into a FortiGate vi... Read more
Affected Products : fortios- EPSS Score: %0.06
- Published: May. 24, 2018
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2017-14185
An Information Disclosure vulnerability in Fortinet FortiOS 5.6.0 to 5.6.2, 5.4.0 to 5.4.8 and 5.2 all versions allows SSL VPN web portal users to access internal FortiOS configuration information (eg:addresses) via specifically crafted URLs inside the SS... Read more
Affected Products : fortios- EPSS Score: %0.33
- Published: May. 25, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2017-14180
Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root... Read more
- EPSS Score: %0.05
- Published: Feb. 02, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2017-14179
Apport before 2.13 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privilege... Read more
- EPSS Score: %0.03
- Published: Feb. 02, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2017-14178
In snapd 2.27 through 2.29.2 the 'snap logs' command could be made to call journalctl without match arguments and therefore allow unprivileged, unauthenticated users to bypass systemd-journald's access restrictions.... Read more
Affected Products : snapd- EPSS Score: %1.17
- Published: Feb. 02, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2017-14177
Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. ... Read more
- EPSS Score: %0.05
- Published: Feb. 02, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2017-14097
An improper access control vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to decrypt contents of a database with information that could be used to access a vulnerable system.... Read more
Affected Products : smart_protection_server- EPSS Score: %16.25
- Published: Jan. 19, 2018
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2017-14096
A stored cross site scripting (XSS) vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to execute a malicious payload on vulnerable systems.... Read more
Affected Products : smart_protection_server- EPSS Score: %2.54
- Published: Jan. 19, 2018
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2017-14095
A vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to perform remote command execution via a local file inclusion on a vulnerable system.... Read more
Affected Products : smart_protection_server- EPSS Score: %2.92
- Published: Jan. 19, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2017-14094
A vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to perform remote command execution via a cron job injection on a vulnerable system.... Read more
Affected Products : smart_protection_server- EPSS Score: %56.27
- Published: Jan. 19, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2017-14082
An uninitialized pointer information disclosure vulnerability in Trend Micro Mobile Security (Enterprise) versions 9.7 and below could allow an unauthenticated remote attacker to disclosure sensitive information on a vulnerable system.... Read more
Affected Products : mobile_security- EPSS Score: %2.74
- Published: Jan. 19, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2017-14030
An issue was discovered in Moxa MXview v2.8 and prior. The unquoted service path escalation vulnerability could allow an authorized user with file access to escalate privileges by inserting arbitrary code into the unquoted service path.... Read more
Affected Products : mxview- EPSS Score: %0.10
- Published: Jan. 12, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2017-14026
In Ice Qube Thermal Management Center versions prior to version 4.13, the web application does not properly authenticate users which may allow an attacker to gain access to sensitive information.... Read more
- EPSS Score: %0.40
- Published: Sep. 06, 2018
- Modified: Nov. 21, 2024
-
4.6
MEDIUMCVE-2017-14014
Boston Scientific ZOOM LATITUDE PRM Model 3120 uses a hard-coded cryptographic key to encrypt PHI prior to having it transferred to removable media. CVSS v3 base score: 4.6; CVSS vector string: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N.... Read more
- EPSS Score: %0.12
- Published: May. 01, 2018
- Modified: Nov. 21, 2024
-
4.6
MEDIUMCVE-2017-14012
Boston Scientific ZOOM LATITUDE PRM Model 3120 does not encrypt PHI at rest. CVSS v3 base score: 4.6; CVSS vector string: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N.... Read more
- EPSS Score: %0.06
- Published: May. 01, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2017-14010
In SpiderControl MicroBrowser Windows XP, Vista 7, 8 and 10, Versions 1.6.30.144 and prior, an uncontrolled search path element vulnerability has been identified which could be exploited by placing a specially crafted DLL file in the search path. If the ... Read more
- EPSS Score: %0.37
- Published: Apr. 26, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2017-14008
GE Centricity PACS RA1000, diagnostic image analysis, all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access... Read more
Affected Products : centricity_pacs_ra1000- EPSS Score: %6.94
- Published: Mar. 20, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2017-14006
GE Xeleris versions 1.0,1.1,2.1,3.0,3.1, medical imaging systems, all current versions are affected, these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication an... Read more
- EPSS Score: %0.91
- Published: Mar. 20, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2017-14004
GE GEMNet License server (EchoServer) all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected... Read more
Affected Products : gemnet_license_server- EPSS Score: %0.91
- Published: Mar. 20, 2018
- Modified: Nov. 21, 2024