Latest CVE Feed
-
7.5
HIGHCVE-2016-9570
cb.exe in Carbon Black 5.1.1.60603 allows attackers to cause a denial of service (out-of-bounds read, invalid pointer dereference, and application crash) by leveraging access to the NetMon named pipe.... Read more
Affected Products : carbon_black- EPSS Score: %0.39
- Published: Feb. 12, 2018
- Modified: Nov. 21, 2024
-
4.9
MEDIUMCVE-2016-9569
The cbstream.sys driver in Carbon Black 5.1.1.60603 allows local users with admin privileges to cause a denial of service (out-of-bounds read and system crash) via a large counter value in an 0x62430028 IOCTL call.... Read more
Affected Products : carbon_black- EPSS Score: %0.13
- Published: Feb. 12, 2018
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2016-9568
A security design issue can allow an unprivileged user to interact with the Carbon Black Sensor and perform unauthorized actions.... Read more
Affected Products : carbon_black- EPSS Score: %0.72
- Published: Feb. 19, 2018
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2016-9500
Accellion FTP server prior to version FTA_9_12_220 uses the Accusoft Prizm Content flash component, which contains multiple parameters (customTabCategoryName, customButton1Image) that are vulnerable to cross-site scripting.... Read more
Affected Products : ftp_server- EPSS Score: %0.74
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2016-9499
Accellion FTP server prior to version FTA_9_12_220 only returns the username in the server response if the username is invalid. An attacker may use this information to determine valid user accounts and enumerate them.... Read more
Affected Products : ftp_server- EPSS Score: %0.51
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2016-9498
ManageEngine Applications Manager 12 and 13 before build 13200, allows unserialization of unsafe Java objects. The vulnerability can be exploited by remote user without authentication and it allows to execute remote code compromising the application as we... Read more
Affected Products : manageengine_applications_manager- EPSS Score: %71.20
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2016-9497
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, is vulnerable to an authentication bypass using an alternate path or channel. By default, port 1953 is accessible via telnet and does not require authentication. An unau... Read more
Affected Products : hn7740s_firmware dw7000_firmware hn7000s_firmware hn7000sm_firmware hn7740s dw7000 hn7000s hn7000sm- EPSS Score: %3.88
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2016-9496
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, lacks authentication. An unauthenticated user may send an HTTP GET request to http://[ip]/com/gatewayreset or http://[ip]/cgi/reboot.bin to cause the modem to reboot.... Read more
Affected Products : hn7740s_firmware dw7000_firmware hn7000s_firmware hn7000sm_firmware hn7740s dw7000 hn7000s hn7000sm- EPSS Score: %2.44
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2016-9495
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, uses hard coded credentials. Access to the device's default telnet port (23) can be obtained through using one of a few default credentials shared among all devices.... Read more
Affected Products : hn7740s_firmware dw7000_firmware hn7000s_firmware hn7000sm_firmware hn7740s dw7000 hn7000s hn7000sm- EPSS Score: %0.22
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2016-9494
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, are potentially vulnerable to improper input validation. The device's advanced status web page that is linked to from the basic status web page does not appear to proper... Read more
Affected Products : hn7740s_firmware dw7000_firmware hn7000s_firmware hn7000sm_firmware hn7740s dw7000 hn7000s hn7000sm- EPSS Score: %0.24
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2016-9493
The code generated by PHP FormMail Generator prior to 17 December 2016 is vulnerable to stored cross-site scripting. In the generated form.lib.php file, upload file types are checked against a hard-coded list of dangerous extensions. This list does not in... Read more
Affected Products : php_formmail_generator- EPSS Score: %0.21
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2016-9492
The code generated by PHP FormMail Generator prior to 17 December 2016 is vulnerable to unrestricted upload of dangerous file types. In the generated form.lib.php file, upload file types are checked against a hard-coded list of dangerous extensions. This ... Read more
Affected Products : php_formmail_generator- EPSS Score: %0.83
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
6.8
MEDIUMCVE-2016-9491
ManageEngine Applications Manager 12 and 13 before build 13690 allows an authenticated user, who is able to access /register.do page (most likely limited to administrator), to browse the filesystem and read the system files, including Applications Manager... Read more
Affected Products : manageengine_applications_manager- EPSS Score: %0.81
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2016-9490
ManageEngine Applications Manager versions 12 and 13 before build 13200 suffer from a Reflected Cross-Site Scripting vulnerability. Applications Manager is prone to a Cross-Site Scripting vulnerability in parameter LIMIT, in URL path /DiagAlertAction.do?R... Read more
- EPSS Score: %0.85
- Published: Jun. 05, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2016-9489
In ManageEngine Applications Manager 12 and 13 before build 13200, an authenticated user is able to alter all of their own properties, including own group, i.e. changing their group to one with higher privileges like "ADMIN". A user is also able to change... Read more
Affected Products : manageengine_applications_manager- EPSS Score: %0.36
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2016-9488
ManageEngine Applications Manager versions 12 and 13 before build 13200 suffer from remote SQL injection vulnerabilities. An unauthenticated attacker is able to access the URL /servlet/MenuHandlerServlet, which is vulnerable to SQL injection. The attacker... Read more
- EPSS Score: %5.65
- Published: Jun. 05, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2016-9487
EpubCheck 4.0.1 does not properly restrict resolving external entities when parsing XML in EPUB files during validation. An attacker who supplies a specially crafted EPUB file may be able to exploit this behavior to read arbitrary files, or have the victi... Read more
Affected Products : epubcheck- EPSS Score: %0.13
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2016-9486
On Windows endpoints, the SecureConnector agent must run under the local SYSTEM account or another administrator account in order to enable full functionality of the agent. The typical configuration is for the agent to run as a Windows service under the l... Read more
Affected Products : secureconnector- EPSS Score: %0.28
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2016-9485
On Windows endpoints, the SecureConnector agent must run under the local SYSTEM account or another administrator account in order to enable full functionality of the agent. The typical configuration is for the agent to run as a Windows service under the l... Read more
Affected Products : secureconnector- EPSS Score: %0.16
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2016-9484
The generated PHP form code does not properly validate user input folder directories, allowing a remote unauthenticated attacker to perform a path traversal and access arbitrary files on the server. The PHP FormMail Generator website does not use version ... Read more
Affected Products : php_formmail_generator- EPSS Score: %5.45
- Published: Jul. 13, 2018
- Modified: Nov. 21, 2024