CVE List

Id CVE No. Status Description Phase Votes Comments Actions
96371  CVE-2016-9551  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20161122)  None (candidate not yet proposed)    View
96372  CVE-2016-9552  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20161122)  None (candidate not yet proposed)    View
96373  CVE-2016-9553  Candidate  The Sophos Web Appliance (version 4.2.1.3) is vulnerable to two Remote Command Injection vulnerabilities affecting its web administrative interface. These vulnerabilities occur in the MgrReport.php (/controllers/MgrReport.php) component responsible for blocking and unblocking IP addresses from accessing the device. The device doesn"t properly escape the information passed in the variables "unblockip" and "blockip" before calling the shell_exec() function which allows for system commands to be injected into the device. The code erroneously suggests that the information handled is protected by utilizing the variable name "escapedips" - however this was not the case. The Sophos ID is NSWA-1258.  Assigned (20161122)  None (candidate not yet proposed)    View
96374  CVE-2016-9554  Candidate  The Sophos Web Appliance Remote / Secure Web Gateway server (version 4.2.1.3) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. These vulnerabilities occur in MgrDiagnosticTools.php (/controllers/MgrDiagnosticTools.php), in the component responsible for performing diagnostic tests with the UNIX wget utility. The application doesn"t properly escape the information passed in the "url" variable before calling the executeCommand class function ($this->dtObj->executeCommand). This function calls exec() with unsanitized user input allowing for remote command injection. The page that contains the vulnerabilities, /controllers/MgrDiagnosticTools.php, is accessed by a built-in command answered by the administrative interface. The command that calls to that vulnerable page (passed in the "section" parameter) is: "configuration". Exploitation of this vulnerability yields shell access to the remote machine under the "spiderman" user account.  Assigned (20161122)  None (candidate not yet proposed)    View
96375  CVE-2016-9555  Candidate  The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.  Assigned (20161122)  None (candidate not yet proposed)    View

Page 19275 of 20943, showing 5 records out of 104715 total, starting on record 96371, ending on 96375

Actions