Latest CVE Feed
-
9.8
CRITICALCVE-2017-8283
dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source pack... Read more
Affected Products : dpkg- Published: Apr. 26, 2017
- Modified: Apr. 20, 2025
-
7.8
HIGHCVE-2017-7293
The Dolby DAX2 and DAX3 API services are vulnerable to a privilege escalation vulnerability that allows a normal user to get arbitrary system privileges, because these services have .NET code for DCOM. This affects Dolby Audio X2 (DAX2) 1.0, 1.0.1, 1.1, 1... Read more
- Published: Apr. 26, 2017
- Modified: Apr. 20, 2025
-
9.8
CRITICALCVE-2017-8225
On Wireless IP Camera (P2P) WIFICAM devices, access to .ini files (containing credentials) is not correctly checked. An attacker can bypass authentication by providing an empty loginuse parameter and an empty loginpas parameter in the URI.... Read more
- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-8224
Wireless IP Camera (P2P) WIFICAM devices have a backdoor root account that can be accessed with TELNET.... Read more
- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
7.5
HIGHCVE-2017-8223
On Wireless IP Camera (P2P) WIFICAM devices, an attacker can use the RTSP server on port 10554/tcp to watch the streaming without authentication via tcp/av0_1 or tcp/av0_0.... Read more
- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
7.5
HIGHCVE-2017-8222
Wireless IP Camera (P2P) WIFICAM devices have an "Apple Production IOS Push Services" private RSA key and certificate stored in /system/www/pem/ck.pem inside the firmware, which allows attackers to obtain sensitive information.... Read more
- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
7.5
HIGHCVE-2017-8221
Wireless IP Camera (P2P) WIFICAM devices rely on a cleartext UDP tunnel protocol (aka the Cloud feature) for communication between an Android application and a camera device, which allows remote attackers to obtain sensitive information by sniffing the ne... Read more
- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
9.9
CRITICALCVE-2017-8220
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow remote code execution with a single HTTP request by placing shell commands in a "host=" line within HTTP POST data.... Read more
- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
6.5
MEDIUMCVE-2017-8219
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow DoSing the HTTP server via a crafted Cookie header to the /cgi/ansi URI.... Read more
- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-8218
vsftpd on TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n has a backdoor admin account with the 1234 password, a backdoor guest account with the guest password, and a backdoor test account with the test password.... Read more
- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
5.3
MEDIUMCVE-2017-8217
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n have too permissive iptables rules, e.g., SNMP is not blocked on any interface.... Read more
- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
5.3
MEDIUMCVE-2017-8115
Directory traversal in setup/processors/url_search.php (aka the search page of an unused processor) in MODX Revolution 2.5.7 might allow remote attackers to obtain system directory information.... Read more
Affected Products : modx_revolution- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
7.1
HIGHCVE-2017-3434
Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: Audience workbench). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily "exploitable" vulnerability allows unauthenticated attac... Read more
Affected Products : one-to-one_fulfillment- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
7.1
HIGHCVE-2017-3356
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily "exploitable" vulnerability allows unauth... Read more
Affected Products : marketing- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
7.1
HIGHCVE-2017-3355
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily "exploitable" vulnerability allows unauth... Read more
Affected Products : marketing- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
7.1
HIGHCVE-2017-3347
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily "exploitable" vulnerability allows unauth... Read more
Affected Products : marketing- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
7.1
HIGHCVE-2017-3345
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily "exploitable" vulnerability allows unauth... Read more
Affected Products : marketing- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
7.1
HIGHCVE-2017-3342
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily "exploitable" vulnerability allows unauth... Read more
Affected Products : marketing- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
5.3
MEDIUMCVE-2017-8057
In Joomla! 3.4.0 through 3.6.5 (fixed in 3.7.0), multiple files caused full path disclosures on systems with enabled error reporting.... Read more
Affected Products : joomla\!- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025
-
6.5
MEDIUMCVE-2017-7989
In Joomla! 3.2.0 through 3.6.5 (fixed in 3.7.0), inadequate MIME type checks allowed low-privilege users to upload swf files even if they were explicitly forbidden.... Read more
Affected Products : joomla\!- Published: Apr. 25, 2017
- Modified: Apr. 20, 2025