NVD List
Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
---|---|---|---|---|---|---|---|---|---|
87341 | CVE-2017-9807 | An issue was discovered in the OpenWebif plugin through 1.2.4 for E2 open devices. The saveConfig function of plugin/controllers/models/config.py performs an eval() call on the contents of the key HTTP GET parameter. This allows an unauthenticated remote attacker to execute arbitrary Python code or OS commands via api/saveconfig. | 2 | 10 | High | 2017-07-18 | 2017-07-03 | View | |
87096 | CVE-2017-9505 | Atlassian Confluence starting with 4.3.0 before 6.2.1 did not check if a user had permission to view a page when creating a workbox notification about new comments. An attacker who can login to Confluence could receive workbox notifications, which contain the content of comments, for comments added to a page after they started watching it even if they do not have permission to view the page itself. | 2 | 4 | Medium | 2017-07-18 | 2017-07-03 | View | |
87097 | CVE-2017-9552 | A design flaw in authentication in Synology Photo Station 6.0-2528 through 6.7.1-3419 allows local users to obtain credentials via cmdline. Synology Photo Station employs the synophoto_dsm_user program to authenticate username and password by synophoto_dsm_user --auth USERNAME PASSWORD, and local users are able to obtain credentials by sniffing /proc/*/cmdline. | 2 | 2.1 | Low | 2017-07-18 | 2017-07-03 | View | |
88122 | CVE-2017-8116 | The management interface for the Teltonika RUT9XX routers (aka LuCI) with firmware 00.03.265 and earlier allows remote attackers to execute arbitrary commands with root privileges via shell metacharacters in the username parameter in a login request. | 2017-07-18 | 2017-07-03 | View | ||||
87371 | CVE-2017-2843 | In the web management interface in Foscam C1 Indoor HD Camera running application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary data in the msmtprc configuration file resulting in command execution. An attacker can simply send an HTTP request to the device to trigger this vulnerability. | 2 | 7.5 | High | 2017-07-18 | 2017-07-03 | View |
Page 1321 of 17672, showing 5 records out of 88360 total, starting on record 6601, ending on 6605