Show filters
774 Total Results
Displaying 441-450 of 774
Sort by:
Attacker Value
Unknown
CVE-2017-3760
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
The Lenovo Service Framework Android application uses a set of nonsecure credentials when performing integrity verification of downloaded applications and/or data. This exposes the application to man-in-the-middle attacks leading to possible remote code execution.
0
Attacker Value
Unknown
CVE-2017-3759
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
The Lenovo Service Framework Android application accepts some responses from the server without proper validation. This exposes the application to man-in-the-middle attacks leading to possible remote code execution.
0
Attacker Value
Unknown
CVE-2017-3758
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Improper access controls on several Android components in the Lenovo Service Framework application can be exploited to enable remote code execution.
0
Attacker Value
Unknown
CVE-2017-3761
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
The Lenovo Service Framework Android application executes some system commands without proper sanitization of external input. In certain cases, this could lead to command injection which, in turn, could lead to remote code execution.
0
Attacker Value
Unknown
CVE-2015-7503
Disclosure Date: October 10, 2017 (last updated November 26, 2024)
Zend Framework before 2.4.9, zend-framework/zend-crypt 2.4.x before 2.4.9, and 2.5.x before 2.5.2 allows remote attackers to recover the RSA private key.
0
Attacker Value
Unknown
CVE-2014-8156
Disclosure Date: September 26, 2017 (last updated November 26, 2024)
The D-Bus security policy files in /etc/dbus-1/system.d/*.conf in fso-gsmd 0.12.0-3, fso-frameworkd 0.9.5.9+git20110512-4, and fso-usaged 0.12.0-2 as packaged in Debian, the upstream cornucopia.git (fsoaudiod, fsodatad, fsodeviced, fsogsmd, fsonetworkd, fsotdld, fsousaged) git master on 2015-01-19, the upstream framework.git 0.10.1 and git master on 2015-01-19, phonefsod 0.1+git20121018-1 as packaged in Debian, Ubuntu and potentially other packages, and potentially other fso modules do not properly filter D-Bus message paths, which might allow local users to cause a denial of service (dbus-daemon memory consumption), or execute arbitrary code as root by sending a crafted D-Bus message to any D-Bus system service.
0
Attacker Value
Unknown
CVE-2017-6771
Disclosure Date: August 17, 2017 (last updated November 26, 2024)
A vulnerability in the AutoVNF automation tool of the Cisco Ultra Services Framework could allow an unauthenticated, remote attacker to acquire sensitive information. The vulnerability is due to insufficient protection of sensitive data. An attacker could exploit this vulnerability by browsing to a specific URL of an affected device. An exploit could allow the attacker to view sensitive configuration information about the deployment. Cisco Bug IDs: CSCvd29358. Known Affected Releases: 21.0.v0.65839.
0
Attacker Value
Unknown
CVE-2016-6796
Disclosure Date: August 11, 2017 (last updated December 09, 2023)
A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.
0
Attacker Value
Unknown
CVE-2016-6797
Disclosure Date: August 10, 2017 (last updated December 09, 2023)
The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.
0
Attacker Value
Unknown
CVE-2016-6794
Disclosure Date: August 10, 2017 (last updated December 09, 2023)
When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.
0