Lucene search

K

Talos Security Vulnerabilities

cve
cve

CVE-2018-3846

In the ffgphd and ffgtkn functions in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code...

8.8CVSS

8.8AI Score

0.009EPSS

2018-04-16 04:29 PM
33
cve
cve

CVE-2018-3849

In the ffghtb function in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code...

8.8CVSS

8.8AI Score

0.004EPSS

2018-04-16 04:29 PM
36
cve
cve

CVE-2018-3848

In the ffghbn function in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code...

8.8CVSS

8.8AI Score

0.004EPSS

2018-04-16 04:29 PM
38
cve
cve

CVE-2016-9042

An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin...

5.9CVSS

6.6AI Score

0.02EPSS

2018-06-04 08:29 PM
72
11
cve
cve

CVE-2018-3907

An exploitable vulnerability exists in the REST parser of video-core's HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The video-core process incorrectly handles pipelined HTTP requests, which allows successive requests to overwrite the previously parsed HTTP...

10CVSS

9.2AI Score

0.001EPSS

2018-08-24 12:29 AM
31
cve
cve

CVE-2018-3903

On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17, the video-core process incorrectly extracts fields from a user-controlled JSON payload, leading to a buffer overflow on the stack. An attacker can send an HTTP request to trigger this vulnerability. The memcpy call...

9.9CVSS

9.6AI Score

0.001EPSS

2018-08-23 03:29 PM
28
cve
cve

CVE-2018-3926

An exploitable integer underflow vulnerability exists in the ZigBee firmware update routine of the hubCore binary of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The hubCore process incorrectly handles malformed files existing in its data directory, leading to an infinite...

5.5CVSS

5.4AI Score

0.0004EPSS

2018-08-28 05:29 PM
30
cve
cve

CVE-2018-3841

A denial-of-service vulnerability exists in the Pixar Renderman IT Display Service 21.6 (0x69). The vulnerability is present in the parsing of a network packet without proper validation of the packet. The data read-in is not validated, and its use can lead to a null pointer dereference. The IT...

7.5CVSS

7.4AI Score

0.002EPSS

2018-06-26 09:29 PM
25
cve
cve

CVE-2018-4010

An exploitable code execution vulnerability exists in the connect functionality of ProtonVPN VPN client 1.5.1. A specially crafted configuration file can cause a privilege escalation, resulting in the ability to execute arbitrary commands with the system's...

7.8CVSS

8AI Score

0.001EPSS

2018-09-07 03:29 PM
32
cve
cve

CVE-2018-3842

An exploitable use of an uninitialized pointer vulnerability exists in the JavaScript engine in Foxit PDF Reader version 9.0.1.1049. A specially crafted PDF document can lead to a dereference of an uninitialized pointer which, if under attacker control, can result in arbitrary code execution. An...

8.8CVSS

8.6AI Score

0.007EPSS

2018-04-19 07:29 PM
36
cve
cve

CVE-2018-3835

An exploitable out of bounds write vulnerability exists in version 2.2 of the Per Face Texture mapping application known as PTEX. The vulnerability is present in the reading of a file without proper parameter checking. The value read in, is not verified to be valid and its use can lead to a buffer....

8.8CVSS

8.9AI Score

0.003EPSS

2018-01-29 08:29 PM
30
cve
cve

CVE-2018-3909

An exploitable vulnerability exists in the REST parser of video-core's HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The video-core process incorrectly handles pipelined HTTP requests, which allows successive requests to overwrite the previously parsed HTTP...

8.6CVSS

8.8AI Score

0.001EPSS

2018-08-24 12:29 AM
29
cve
cve

CVE-2018-3973

An exploitable out of bounds write exists in the CAL parsing functionality of Canvas Draw version 5.0.0. A specially crafted CAL image processed via the application can lead to an out of bounds write overwriting arbitrary data. An attacker can deliver a PCX image to trigger this vulnerability and.....

7.8CVSS

7.9AI Score

0.001EPSS

2019-02-06 09:29 PM
32
cve
cve

CVE-2018-3886

A memory corruption vulnerability exists in the PCX-parsing functionality of Computerinsel Photoline 20.53. A specially crafted PCX image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a PCX image to trigger this vulnerability.....

7.8CVSS

8AI Score

0.001EPSS

2018-04-11 08:29 PM
29
cve
cve

CVE-2018-3843

An exploitable type confusion vulnerability exists in the way Foxit PDF Reader version 9.0.1.1049 parses files with associated file annotations. A specially crafted PDF document can lead to an object of invalid type to be dereferenced, which can potentially lead to sensitive memory disclosure, and....

8.8CVSS

8.7AI Score

0.065EPSS

2018-04-19 07:29 PM
43
cve
cve

CVE-2018-3980

An exploitable out-of-bounds write exists in the TIFF-parsing functionality of Canvas Draw version 5.0.0. A specially crafted TIFF image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a TIFF image to trigger this vulnerability.....

7.8CVSS

7.9AI Score

0.001EPSS

2019-02-06 09:29 PM
31
cve
cve

CVE-2018-3976

An exploitable out-of-bounds write exists in the CALS Raster file format-parsing functionality of Canvas Draw version 5.0.0.28. A specially crafted CAL image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a CAL image to trigger....

7.8CVSS

7.9AI Score

0.001EPSS

2019-02-06 09:29 PM
29
cve
cve

CVE-2018-3889

A specially crafted PCX image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a PCX image to trigger this vulnerability and gain code...

7.8CVSS

7.8AI Score

0.001EPSS

2018-04-12 07:29 PM
25
cve
cve

CVE-2018-3861

A specially crafted TIFF image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a TIFF image to trigger this vulnerability and gain code...

7.8CVSS

7.8AI Score

0.001EPSS

2018-04-12 07:29 PM
27
cve
cve

CVE-2018-3885

An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The order_by parameter can be used to perform an SQL injection attack. An attacker can use a browser to trigger...

8.8CVSS

8.8AI Score

0.001EPSS

2018-09-12 02:29 PM
32
cve
cve

CVE-2018-3884

An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The sort_by and start parameter can be used to perform an SQL injection attack. An attacker can use a browser to...

8.8CVSS

8.8AI Score

0.001EPSS

2018-09-12 02:29 PM
28
cve
cve

CVE-2018-3951

An exploitable remote code execution vulnerability exists in the HTTP header-parsing function of the TP-Link TL-R600VPN HTTP Server. A specially crafted HTTP request can cause a buffer overflow, resulting in remote code execution on the device. An attacker can send an authenticated HTTP request to....

7.2CVSS

7.7AI Score

0.002EPSS

2018-12-01 06:29 AM
33
cve
cve

CVE-2018-3950

An exploitable remote code execution vulnerability exists in the ping and tracert functionality of the TP-Link TL-R600VPN HWv3 FRNv1.3.0 and HWv2 FRNv1.2.3 http server. A specially crafted IP address can cause a stack overflow, resulting in remote code execution. An attacker can send a single...

8.8CVSS

8.8AI Score

0.006EPSS

2018-12-01 04:29 AM
32
cve
cve

CVE-2018-3868

A specially crafted TIFF image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a TIFF image to trigger this vulnerability and gain code...

7.8CVSS

7.8AI Score

0.001EPSS

2018-04-12 07:29 PM
28
cve
cve

CVE-2018-3949

An exploitable information disclosure vulnerability exists in the HTTP server functionality of the TP-Link TL-R600VPN. A specially crafted URL can cause a directory traversal, resulting in the disclosure of sensitive system files. An attacker can send either an unauthenticated or an authenticated.....

7.5CVSS

7.2AI Score

0.033EPSS

2018-12-01 03:29 AM
50
In Wild
cve
cve

CVE-2018-3840

A denial-of-service vulnerability exists in the Pixar Renderman IT Display Service 21.6 (0x67). The vulnerability is present in the parsing of a network packet without proper validation of the packet. The data read by the application is not validated, and its use can lead to a null pointer...

7.5CVSS

7.4AI Score

0.002EPSS

2018-06-26 09:29 PM
29
cve
cve

CVE-2018-3970

An exploitable memory disclosure vulnerability exists in the 0x222000 IOCTL handler functionality of Sophos HitmanPro.Alert 3.7.6.744. A specially crafted IRP request can cause the driver to return uninitialized memory, resulting in kernel memory disclosure. An attacker can send an IRP request to.....

5.5CVSS

5.4AI Score

0.0005EPSS

2018-10-25 06:29 PM
30
cve
cve

CVE-2018-3883

An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The employee and sort_order parameter can be used to perform an SQL injection attack. An attacker can use a browser.....

8.8CVSS

8.8AI Score

0.001EPSS

2018-09-12 02:29 PM
26
cve
cve

CVE-2018-3952

An exploitable code execution vulnerability exists in the connect functionality of NordVPN 6.14.28.0. A specially crafted configuration file can cause a privilege escalation, resulting in the execution of arbitrary commands with system...

8.8CVSS

8.9AI Score

0.0005EPSS

2018-09-07 03:29 PM
33
cve
cve

CVE-2018-3971

An exploitable arbitrary write vulnerability exists in the 0x2222CC IOCTL handler functionality of Sophos HitmanPro.Alert 3.7.6.744. A specially crafted IRP request can cause the driver to write data under controlled by an attacker address, resulting in memory corruption. An attacker can send IRP.....

7.8CVSS

7.5AI Score

0.0005EPSS

2018-10-25 06:29 PM
38
cve
cve

CVE-2018-3888

A memory corruption vulnerability exists in the PCX-parsing functionality of Computerinsel Photoline 20.53. A specially crafted PCX image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a PCX image to trigger this vulnerability.....

7.8CVSS

8AI Score

0.001EPSS

2018-04-11 08:29 PM
33
cve
cve

CVE-2018-3981

An exploitable out-of-bounds write exists in the TIFF-parsing functionality of Canvas Draw version 5.0.0. An attacker can deliver a TIFF image to trigger this vulnerability and gain code...

7.8CVSS

7.9AI Score

0.002EPSS

2019-01-30 12:00 AM
31
cve
cve

CVE-2018-3887

A memory corruption vulnerability exists in the PCX-parsing functionality of Computerinsel Photoline 20.53. A specially crafted PCX image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a PCX image to trigger this vulnerability.....

7.8CVSS

8AI Score

0.001EPSS

2018-04-11 08:29 PM
30
cve
cve

CVE-2018-3850

An exploitable use-after-free vulnerability exists in the JavaScript engine Foxit Software Foxit PDF Reader version 9.0.1.1049. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user.....

8.8CVSS

8.6AI Score

0.084EPSS

2018-04-23 03:29 PM
37
cve
cve

CVE-2017-14457

An exploitable information leak/denial of service vulnerability exists in the libevm (Ethereum Virtual Machine) create2 opcode handler of CPP-Ethereum. A specially crafted smart contract code can cause an out-of-bounds read leading to memory disclosure or denial of service. An attacker can...

8.2CVSS

7.9AI Score

0.001EPSS

2018-01-19 11:29 PM
32
cve
cve

CVE-2017-14458

An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 8.3.2.25013. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the....

8.8CVSS

8.6AI Score

0.004EPSS

2018-04-23 03:29 PM
40
cve
cve

CVE-2017-12093

An exploitable insufficient resource pool vulnerability exists in the session communication functionality of Allen Bradley Micrologix 1400 Series B Firmware 21.2 and before. A specially crafted stream of packets can cause a flood of the session resource pool resulting in legitimate connections to.....

5.3CVSS

5.5AI Score

0.001EPSS

2018-04-05 09:29 PM
58
cve
cve

CVE-2017-12097

An exploitable cross site scripting (XSS) vulnerability exists in the filter functionality of the delayed_job_web rails gem version 1.4. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish.....

6.1CVSS

5.8AI Score

0.001EPSS

2018-01-19 08:29 PM
45
cve
cve

CVE-2017-12119

An exploitable unhandled exception vulnerability exists in multiple APIs of CPP-Ethereum JSON-RPC. Specially crafted JSON requests can cause an unhandled exception resulting in denial of service. An attacker can send malicious JSON to trigger this...

7.5CVSS

7.4AI Score

0.002EPSS

2018-01-19 11:29 PM
42
cve
cve

CVE-2017-12117

An exploitable improper authorization vulnerability exists in miner_start API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization bypass. An attacker can send JSON to trigger...

8.1CVSS

7.9AI Score

0.013EPSS

2018-01-19 10:29 PM
43
cve
cve

CVE-2017-12118

An exploitable improper authorization vulnerability exists in miner_stop API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). An attacker can send JSON to trigger this...

8.1CVSS

7.9AI Score

0.013EPSS

2018-01-19 11:29 PM
37
cve
cve

CVE-2017-12116

An exploitable improper authorization vulnerability exists in miner_setGasPrice API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization bypass. An attacker can send JSON to...

8.1CVSS

7.9AI Score

0.01EPSS

2018-01-19 11:29 PM
38
2
cve
cve

CVE-2017-12114

An exploitable improper authorization vulnerability exists in admin_peers API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization bypass. An attacker can send JSON to trigger...

6.8CVSS

6.5AI Score

0.006EPSS

2018-01-19 10:29 PM
33
cve
cve

CVE-2017-12113

An exploitable improper authorization vulnerability exists in admin_nodeInfo API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization bypass. An attacker can send JSON to trigger.....

8.1CVSS

7.9AI Score

0.013EPSS

2018-01-19 11:29 PM
45
cve
cve

CVE-2017-12112

An exploitable improper authorization vulnerability exists in admin_addPeer API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization bypass. An attacker can send JSON to trigger...

8.1CVSS

7.9AI Score

0.013EPSS

2018-01-19 10:29 PM
43
cve
cve

CVE-2017-14466

An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information,...

9.8CVSS

9.1AI Score

0.001EPSS

2018-04-05 09:29 PM
44
cve
cve

CVE-2017-12115

An exploitable improper authorization vulnerability exists in miner_setEtherbase API of cpp-ethereum's JSON-RPC (commit 4e1015743b95821849d001618a7ce82c7c073768). A JSON request can cause an access to the restricted functionality resulting in authorization...

8.1CVSS

7.9AI Score

0.013EPSS

2018-01-19 10:29 PM
41
cve
cve

CVE-2017-14463

An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information,...

9.8CVSS

9.2AI Score

0.001EPSS

2018-04-05 09:29 PM
42
cve
cve

CVE-2017-14468

An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information,...

9.8CVSS

9.2AI Score

0.001EPSS

2018-04-05 09:29 PM
42
cve
cve

CVE-2017-12121

An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the rsakey_name= parm in the...

8.8CVSS

9AI Score

0.001EPSS

2018-05-14 08:29 PM
35
Total number of security vulnerabilities127