CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
96371 | CVE-2016-9551 | Candidate | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. | Assigned (20161122) | None (candidate not yet proposed) | View | |
96372 | CVE-2016-9552 | Candidate | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. | Assigned (20161122) | None (candidate not yet proposed) | View | |
96373 | CVE-2016-9553 | Candidate | The Sophos Web Appliance (version 4.2.1.3) is vulnerable to two Remote Command Injection vulnerabilities affecting its web administrative interface. These vulnerabilities occur in the MgrReport.php (/controllers/MgrReport.php) component responsible for blocking and unblocking IP addresses from accessing the device. The device doesn"t properly escape the information passed in the variables "unblockip" and "blockip" before calling the shell_exec() function which allows for system commands to be injected into the device. The code erroneously suggests that the information handled is protected by utilizing the variable name "escapedips" - however this was not the case. The Sophos ID is NSWA-1258. | Assigned (20161122) | None (candidate not yet proposed) | View | |
96374 | CVE-2016-9554 | Candidate | The Sophos Web Appliance Remote / Secure Web Gateway server (version 4.2.1.3) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. These vulnerabilities occur in MgrDiagnosticTools.php (/controllers/MgrDiagnosticTools.php), in the component responsible for performing diagnostic tests with the UNIX wget utility. The application doesn"t properly escape the information passed in the "url" variable before calling the executeCommand class function ($this->dtObj->executeCommand). This function calls exec() with unsanitized user input allowing for remote command injection. The page that contains the vulnerabilities, /controllers/MgrDiagnosticTools.php, is accessed by a built-in command answered by the administrative interface. The command that calls to that vulnerable page (passed in the "section" parameter) is: "configuration". Exploitation of this vulnerability yields shell access to the remote machine under the "spiderman" user account. | Assigned (20161122) | None (candidate not yet proposed) | View | |
96375 | CVE-2016-9555 | Candidate | The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data. | Assigned (20161122) | None (candidate not yet proposed) | View |
Page 19275 of 20943, showing 5 records out of 104715 total, starting on record 96371, ending on 96375