CVE List

Id CVE No. Status Description Phase Votes Comments Actions
103233  CVE-2017-6413  Candidate  The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.  Assigned (20170301)  None (candidate not yet proposed)    View
103234  CVE-2017-6414  Candidate  Memory leak in the vcard_apdu_new function in card_7816.c in libcacard before 2.5.3 allows local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object.  Assigned (20170301)  None (candidate not yet proposed)    View
103235  CVE-2017-6415  Candidate  The dex_parse_debug_item function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DEX file.  Assigned (20170301)  None (candidate not yet proposed)    View
103236  CVE-2017-6416  Candidate  An issue was discovered in SysGauge 1.5.18. A buffer overflow vulnerability in SMTP connection verification leads to arbitrary code execution. The attack vector is a crafted SMTP daemon that sends a long 220 (aka "Service ready") string.  Assigned (20170301)  None (candidate not yet proposed)    View
103237  CVE-2017-6417  Candidate  Code injection vulnerability in Avira Total Security Suite 15.0 (and earlier), Optimization Suite 15.0 (and earlier), Internet Security Suite 15.0 (and earlier), and Free Security Suite 15.0 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Avira process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Image File Execution Options in the registry; (2) the self-protection mechanism is intended to block all local processes (regardless of privileges) from modifying Image File Execution Options for these products; and (3) this mechanism can be bypassed by an attacker who temporarily renames Image File Execution Options during the attack.  Assigned (20170301)  None (candidate not yet proposed)    View

Page 906 of 20943, showing 5 records out of 104715 total, starting on record 4526, ending on 4530

Actions