Vulnerabilities (CVE)

Filtered by CWE-254
Total 408 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2000-0277 1 Microsoft 1 Excel 2025-04-03 7.2 HIGH N/A
Microsoft Excel 97 and 2000 does not warn the user when executing Excel Macro Language (XLM) macros in external text files, which could allow an attacker to execute a macro virus, aka the "XLM Text Macro" vulnerability.
CVE-2019-5495 1 Netapp 1 Oncommand Unified Manager 2024-11-21 5.0 MEDIUM 7.5 HIGH
OnCommand Unified Manager for VMware vSphere, Linux and Windows prior to 9.5 shipped without certain HTTP Security headers configured which could allow an attacker to obtain sensitive information via unspecified vectors.
CVE-2019-15149 1 Networkgenomics 1 Mitogen 2024-11-21 6.8 MEDIUM 9.8 CRITICAL
core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-routing protection mechanism in the case of a child that is initiated by another child. The Ansible extension is unaffected. NOTE: the vendor disputes this issue because it is exploitable only in conjunction with hypothetical other factors, i.e., an affected use case within a library caller, and a bug in the message receiver policy code that led to reliance on this extra protection mechanism
CVE-2019-11636 1 Z.cash 1 Zcash 2024-11-21 5.0 MEDIUM 7.5 HIGH
Zcash 2.x allows an inexpensive approach to "fill all transactions of all blocks" and "prevent any real transaction from occurring" via a "Sapling Wood-Chipper" attack.
CVE-2019-10741 1 K-9 Mail Project 1 K-9 Mail 2024-11-21 4.3 MEDIUM 4.3 MEDIUM
K-9 Mail v5.600 can include the original quoted HTML code of a specially crafted, benign looking, email within (digitally signed) reply messages. The quoted part can contain conditional statements that show completely different text if opened in a different email client. This can be abused by an attacker to obtain valid S/MIME or PGP signatures for arbitrary content to be displayed to a third party. NOTE: the vendor states "We don't plan to take any action because of this."
CVE-2019-10059 1 Lexmark 142 6500e, 6500e Firmware, C734 and 139 more 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
The legacy finger service (TCP port 79) is enabled by default on various older Lexmark devices.
CVE-2018-4863 1 Sophos 1 Endpoint Protection 2024-11-21 2.1 LOW 5.5 MEDIUM
Sophos Endpoint Protection 10.7 allows local users to bypass an intended tamper protection mechanism by deleting the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Sophos Endpoint Defense\ registry key.
CVE-2017-8227 1 Amcrest 2 Ipm-721s, Ipm-721s Firmware 2024-11-21 5.0 MEDIUM 9.8 CRITICAL
Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices have a timeout policy to wait for 5 minutes in case 30 incorrect password attempts are detected using the Web and HTTP API interface provided by the device. However, if the same brute force attempt is performed using the ONVIF specification (which is supported by the same binary) then there is no account lockout or timeout executed. This can allow an attacker to circumvent the account protection mechanism and brute force the credentials. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that performs the credential check in the binary for the ONVIF specification. If one opens this binary in IDA-pro one will notice that this follows a ARM little endian format. The function at address 00671618 in IDA pro is parses the WSSE security token header. The sub_ 603D8 then performs the authentication check and if it is incorrect passes to the function sub_59F4C which prints the value "Sender not authorized."
CVE-2017-2752 1 Hp 1 Tommy Hilfiger Th24\/7 2024-11-21 2.1 LOW 2.1 LOW
A potential security vulnerability caused by incomplete obfuscation of application configuration information was discovered in Tommy Hilfiger TH24/7 Android app versions 2.0.0.11, 2.0.1.14, 2.1.0.16, and 2.2.0.19. HP has no access to customer data as a result of this issue.
CVE-2017-2748 1 Hp 1 Isaac Mizrahi Smartwatch 2024-11-21 5.0 MEDIUM 7.5 HIGH
A potential security vulnerability caused by the use of insecure (http) transactions during login has been identified with early versions of the Isaac Mizrahi Smartwatch mobile app. HP has no access to customer data as a result of this issue.
CVE-2017-2411 1 Apple 1 Iphone Os 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
In iOS before 11.2, exchange rates were retrieved from HTTP rather than HTTPS. This was addressed by enabling HTTPS for exchange rates.
CVE-2017-18480 1 Cpanel 1 Cpanel 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
cPanel before 62.0.4 does not enforce account ownership for has_mycnf_for_cpuser WHM API calls (SEC-210).
CVE-2017-18477 1 Cpanel 1 Cpanel 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
In cPanel before 62.0.4, Exim transports could execute in the context of the nobody account (SEC-206).
CVE-2017-18476 1 Cpanel 1 Cpanel 2024-11-21 5.0 MEDIUM 7.5 HIGH
Leech Protect in cPanel before 62.0.4 does not protect certain directories (SEC-205).
CVE-2017-18467 1 Cpanel 1 Cpanel 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
cPanel before 62.0.17 allows access to restricted resources because of a URL filtering error (SEC-229).
CVE-2017-18462 1 Cpanel 1 Cpanel 2024-11-21 5.0 MEDIUM 7.5 HIGH
cPanel before 62.0.17 allows a CPHulk one-day ban bypass when IP based protection is enabled (SEC-224).
CVE-2017-18445 1 Cpanel 1 Cpanel 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
cPanel before 64.0.21 does not enforce demo restrictions for SSL API calls (SEC-249).
CVE-2017-18429 1 Cpanel 1 Cpanel 2024-11-21 2.1 LOW 3.3 LOW
In cPanel before 66.0.2, Apache HTTP Server SSL domain logs can persist on disk after an account termination (SEC-291).
CVE-2017-13718 1 Starry 2 S00111, S00111 Firmware 2024-11-21 6.0 MEDIUM 8.0 HIGH
The HTTP API supported by Starry Station (aka Starry Router) allows brute forcing the PIN setup by the user on the device, and this allows an attacker to change the Wi-Fi settings and PIN, as well as port forward and expose any internal device's port to the Internet. It was identified that the device uses custom Python code called "rodman" that allows the mobile appication to interact with the device. The APIs that are a part of this rodman Python file allow the mobile application to interact with the device using a secret, which is a uuid4 based session identifier generated by the device the first time it is set up. However, in some cases, these APIs can also use a security code. This security code is nothing but the PIN number set by the user to interact with the device when using the touch interface on the router. This allows an attacker on the Internet to interact with the router's HTTP interface when a user navigates to the attacker's website, and brute force the credentials. Also, since the device's server sets the Access-Control-Allow-Origin header to "*", an attacker can easily interact with the JSON payload returned by the device and steal sensitive information about the device.
CVE-2017-11579 1 Blipcare 2 Wi-fi Blood Pressure Monitor, Wi-fi Blood Pressure Monitor Firmware 2024-11-21 4.8 MEDIUM 7.1 HIGH
In the most recent firmware for Blipcare, the device provides an open Wireless network called "Blip" for communicating with the device. The user connects to this open Wireless network and uses the web management interface of the device to provide the user's Wi-Fi credentials so that the device can connect to it and have Internet access. This device acts as a Wireless Blood pressure monitor and is used to measure blood pressure levels of a person. This allows an attacker who is in vicinity of Wireless signal generated by the Blipcare device to easily sniff the credentials. Also, an attacker can connect to the open wireless network "Blip" exposed by the device and modify the HTTP response presented to the user by the device to execute other attacks such as convincing the user to download and execute a malicious binary that would infect a user's computer or mobile device with malware.