Total
10280 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-6630 | 1 Micropoint | 1 Proactive Defense | 2024-11-21 | 6.1 MEDIUM | 7.8 HIGH |
In Micropoint proactive defense software 2.0.20266.0146, the driver file (mp110005.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x8000014c. | |||||
CVE-2018-6629 | 1 Micropoint | 1 Proactive Defense | 2024-11-21 | 6.1 MEDIUM | 7.8 HIGH |
In Micropoint proactive defense software 2.0.20266.0146, the driver file (mp110005.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x80000118. | |||||
CVE-2018-6628 | 1 Micropoint | 1 Proactive Defense | 2024-11-21 | 6.1 MEDIUM | 7.8 HIGH |
In Micropoint proactive defense software 2.0.20266.0146, the driver file (mp110005.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x8000010c. | |||||
CVE-2018-6627 | 1 Watchdogdevelopment | 1 Anti-malware | 2024-11-21 | 6.1 MEDIUM | 7.8 HIGH |
In WatchDog Anti-Malware 2.74.186.150, the driver file (ZAMGUARD32.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x80002054. | |||||
CVE-2018-6626 | 1 Micropoint | 1 Proactive Defense | 2024-11-21 | 6.1 MEDIUM | 7.8 HIGH |
In Micropoint proactive defense software 2.0.20266.0146, the driver file (mp110005.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x80000035. | |||||
CVE-2018-6625 | 1 Watchdogdevelopment | 1 Anti-malware | 2024-11-21 | 6.1 MEDIUM | 7.8 HIGH |
In WatchDog Anti-Malware 2.74.186.150, the driver file (ZAMGUARD32.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x80002010. | |||||
CVE-2018-6525 | 1 Inca | 1 Nprotect Avs | 2024-11-21 | 6.1 MEDIUM | 7.8 HIGH |
In nProtect AVS V4.0 before 4.0.0.39, the driver file (TKFsAv.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x220458. | |||||
CVE-2018-6524 | 1 Inca | 1 Nprotect Avs | 2024-11-21 | 6.1 MEDIUM | 7.8 HIGH |
In nProtect AVS V4.0 before 4.0.0.39, the driver file (TKFsAv.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x220c20. | |||||
CVE-2018-6523 | 1 Inca | 1 Nprotect Avs | 2024-11-21 | 6.1 MEDIUM | 7.8 HIGH |
In nProtect AVS V4.0 before 4.0.0.39, the driver file (TKFsAv.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x22045c. | |||||
CVE-2018-6522 | 1 Inca | 1 Nprotect Avs | 2024-11-21 | 6.1 MEDIUM | 7.8 HIGH |
In nProtect AVS V4.0 before 4.0.0.39, the driver file (TKRgFtXp.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x220408. | |||||
CVE-2018-6515 | 2 Microsoft, Puppet | 2 Windows, Puppet | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, and Puppet Agent 5.5.x prior to 5.5.2 on Windows only, with a specially crafted configuration file an attacker could get pxp-agent to load arbitrary code with privilege escalation. | |||||
CVE-2018-6490 | 1 Hp | 1 Operations Orchestration | 2024-11-21 | 7.8 HIGH | 5.9 MEDIUM |
Denial of Service vulnerability in Micro Focus Operations Orchestration Software, version 10.x. This vulnerability could be remotely exploited to allow Denial of Service. | |||||
CVE-2018-6476 | 1 Superantispyware | 1 Superantispyware | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
In SUPERAntiSpyware Professional Trial 6.0.1254, the SASKUTIL.SYS driver allows privilege escalation to NT AUTHORITY\SYSTEM because of not validating input values from IOCtl 0x9C402114 or 0x9C402124 or 0x9C40207c. | |||||
CVE-2018-6474 | 1 Superantispyware | 1 Superantispyware | 2024-11-21 | 6.1 MEDIUM | 7.8 HIGH |
In SUPERAntiSpyware Professional Trial 6.0.1254, the driver file (SASKUTIL.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C402148. | |||||
CVE-2018-6473 | 1 Superantispyware | 1 Superantispyware | 2024-11-21 | 6.1 MEDIUM | 7.8 HIGH |
In SUPERAntiSpyware Professional Trial 6.0.1254, the driver file (SASKUTIL.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C402080. | |||||
CVE-2018-6472 | 1 Superantispyware | 1 Superantispyware | 2024-11-21 | 6.1 MEDIUM | 7.8 HIGH |
In SUPERAntiSpyware Professional Trial 6.0.1254, the driver file (SASKUTIL.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C40204c. | |||||
CVE-2018-6471 | 1 Superantispyware | 1 Superantispyware | 2024-11-21 | 6.1 MEDIUM | 7.8 HIGH |
In SUPERAntiSpyware Professional Trial 6.0.1254, the driver file (SASKUTIL.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C402078. | |||||
CVE-2018-6433 | 1 Broadcom | 1 Fabric Operating System | 2024-11-21 | 2.1 LOW | 5.5 MEDIUM |
A vulnerability in the secryptocfg export command of Brocade Fabric OS versions before 8.2.1, 8.1.2f, 8.0.2f, 7.4.2d could allow a local attacker to bypass the export file access restrictions and initiate a file copy from the source to a remote system. | |||||
CVE-2018-6407 | 1 Conceptronic | 3 Cipcamptiwl, Cipcamptiwl Firmware, Cipcamptiwl Web Firmware | 2024-11-21 | 7.8 HIGH | 7.5 HIGH |
An issue was discovered on Conceptronic CIPCAMPTIWL V3 0.61.30.21 devices. An unauthenticated attacker can crash a device by sending a POST request with a huge body size to /hy-cgi/devices.cgi?cmd=searchlandevice. The crash completely freezes the device. | |||||
CVE-2018-6360 | 2 Debian, Mpv | 2 Debian Linux, Mpv | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
mpv through 0.28.0 allows remote attackers to execute arbitrary code via a crafted web site, because it reads HTML documents containing VIDEO elements, and accepts arbitrary URLs in a src attribute without a protocol whitelist in player/lua/ytdl_hook.lua. For example, an av://lavfi:ladspa=file= URL signifies that the product should call dlopen on a shared object file located at an arbitrary local pathname. The issue exists because the product does not consider that youtube-dl can provide a potentially unsafe URL. |