NVD List
Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
---|---|---|---|---|---|---|---|---|---|
85519 | CVE-2017-8307 | In Avast Antivirus before v17, using the LPC interface API exposed by the AvastSVC.exe Windows service, it is possible to launch predefined binaries, or replace or delete arbitrary files. This vulnerability is exploitable by any unprivileged user when Avast Self-Defense is disabled. It is also exploitable in conjunction with CVE-2017-8308 when Avast Self-Defense is enabled. The vulnerability allows for Denial of Service attacks and hiding traces of a possible attack. | 2 | 7.5 | High | 2017-05-27 | 2017-05-09 | View | |
85520 | CVE-2017-8308 | In Avast Antivirus before v17, an unprivileged user (and thus malware or a virus) can mark an arbitrary process as Trusted from the perspective of the Avast product. This bypasses the Self-Defense feature of the product, opening a door to subsequent attack on many of its components. | 2 | 5 | Medium | 2017-05-27 | 2017-05-09 | View | |
85055 | CVE-2017-8217 | TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n have too permissive iptables rules, e.g., SNMP is not blocked on any interface. | 2 | 5 | Medium | 2017-05-27 | 2017-05-09 | View | |
85056 | CVE-2017-8218 | vsftpd on TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n has a backdoor admin account with the 1234 password, a backdoor guest account with the guest password, and a backdoor test account with the test password. | 2 | 10 | High | 2017-05-27 | 2017-05-09 | View | |
85057 | CVE-2017-8219 | TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow DoSing the HTTP server via a crafted Cookie header to the /cgi/ansi URI. | 2 | 4 | Medium | 2017-05-27 | 2017-05-09 | View |
Page 1689 of 17672, showing 5 records out of 88360 total, starting on record 8441, ending on 8445