WAFPlanet

CVE Database - 2017

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

4807
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2017-17873

CRITICAL
9.80 CVSS 3.0

Vanguard Marketplace Digital Products PHP 1.4 has SQL Injection via the PATH_INFO to the /p URI.

SQL Injection
WAF: High

CVE-2017-17872

CRITICAL
9.80 CVSS 3.0

The JEXTN Video Gallery extension 3.0.5 for Joomla! has SQL Injection via the id parameter in a view=category action.

SQL Injection
WAF: High

CVE-2017-17871

CRITICAL
9.80 CVSS 3.0

The "JEXTN Question And Answer" extension 3.1.0 for Joomla! has SQL Injection via the an parameter in a view=tags action, or the ques-srch parameter.

SQL Injection
WAF: High

CVE-2017-17870

CRITICAL
9.80 CVSS 3.0

The JBuildozer extension 1.4.1 for Joomla! has SQL Injection via the appid parameter in an entriessearch action.

SQL Injection
WAF: High

CVE-2017-17869

MEDIUM
6.10 CVSS 3.0

The mgl-instagram-gallery plugin for WordPress has XSS via the single-gallery.php media parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-17868

MEDIUM
6.10 CVSS 3.0

In Liferay Portal 6.1.0, the tags section has XSS via a Public Render Parameter (p_r_p) value, as demonstrated by p_r_p_564233524_tag.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-17862

MEDIUM
5.50 CVSS 3.0

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.

Improper Input Validation
WAF: Medium

CVE-2017-17859

MEDIUM
6.10 CVSS 3.0

Samsung Internet Browser 6.2.01.12 allows remote attackers to bypass the Same Origin Policy, and conduct UXSS attacks to obtain sensitive information, via vectors involving an IFRAME element inside XSLT data in one part of an MHTML file. Specifically, JavaScript code in another part of this MHTML file does not have a document.domain value corresponding to the domain that is hosting the MHTML file, but instead has a document.domain value corresponding to an arbitrary URL within the content of the MHTML file.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-17850

HIGH
7.50 CVSS 3.0

An issue was discovered in Asterisk 13.18.4 and older, 14.7.4 and older, 15.1.4 and older, and 13.18-cert1 and older. A select set of SIP messages create a dialog in Asterisk. Those SIP messages must contain a contact header. For those messages, if the header was not present and the PJSIP channel driver was used, Asterisk would crash. The severity of this vulnerability is somewhat mitigated if authentication is enabled. If authentication is enabled, a user would have to first be authorized before reaching the crash point.

Improper Input Validation
WAF: Medium

CVE-2017-17846

HIGH
7.50 CVSS 3.0

An issue was discovered in Enigmail before 1.9.9. Regular expressions are exploitable for Denial of Service, because of attempts to match arbitrarily long strings, aka TBE-01-003.

Improper Input Validation
WAF: Medium

CVE-2017-17832

MEDIUM
5.40 CVSS 3.0

ServersCheck Monitoring Software before 14.2.3 is prone to a cross-site scripting vulnerability as user supplied-data is not validated/sanitized when passed in the settings_SMS_ALERT_TYPE parameter, and JavaScript can be executed on settings-save.html (the Settings - SMS Alerts page).

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-1365

MEDIUM
5.40 CVSS 3.0

IBM Team Concert (RTC including IBM Rational Collaborative Lifecycle Management 4.0, 5.0., and 6.0) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-force ID: 126858.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-12741

HIGH
7.50 CVSS 3.0

Specially crafted packets sent to port 161/udp could cause a denial of service condition. The affected devices must be restarted manually.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2017-13858

HIGH
7.80 CVSS 3.0

An issue was discovered in certain Apple products. macOS before 10.13.2 is affected. The issue involves the "IOKit" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app.

Improper Input Validation
WAF: Medium

CVE-2017-13848

HIGH
7.80 CVSS 3.0

An issue was discovered in certain Apple products. macOS before 10.13.2 is affected. The issue involves the "IOKit" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app.

Improper Input Validation
WAF: Medium

CVE-2017-14022

HIGH
7.50 CVSS 3.0

An Improper Input Validation issue was discovered in Rockwell Automation FactoryTalk Alarms and Events, Version 2.90 and earlier. An unauthenticated attacker with remote access to a network with FactoryTalk Alarms and Events can send a specially crafted set of packets packet to Port 403/TCP (the history archiver service), causing the service to either stall or terminate.

Improper Input Validation
WAF: Medium

CVE-2017-15324

HIGH
7.50 CVSS 3.0

Huawei S5700 and S6700 with software of V200R005C00 have a DoS vulnerability due to insufficient validation of the Network Quality Analysis (NQA) packets. A remote attacker could exploit this vulnerability by sending malformed NQA packets to the target device. Successful exploitation could make the device restart.

Improper Input Validation
WAF: Medium

CVE-2017-15322

MEDIUM
6.50 CVSS 3.0

Some Huawei smartphones with software of BGO-L03C158B003CUSTC158D001 and BGO-L03C331B009CUSTC331D001 have a DoS vulnerability due to insufficient input validation. An attacker could exploit this vulnerability by sending specially crafted NFC messages to the target device. Successful exploit could make a service crash.

Improper Input Validation
WAF: Medium

CVE-2017-15312

MEDIUM
5.40 CVSS 3.0

Huawei SmartCare V200R003C10 has a stored XSS (cross-site scripting) vulnerability in the dashboard module. A remote authenticated attacker could exploit this vulnerability to inject malicious scripts in the affected device.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-15310

MEDIUM
6.50 CVSS 3.0

Huawei iReader app before 8.0.2.301 has an arbitrary file deletion vulnerability due to the lack of input validation. An attacker can exploit this vulnerability to delete specific files from the SD card.

Improper Input Validation
WAF: Medium

CVE-2017-15309

HIGH
7.10 CVSS 3.0

Huawei iReader app before 8.0.2.301 has a path traversal vulnerability due to insufficient validation on file storage paths. An attacker can exploit this vulnerability to store downloaded malicious files in an arbitrary directory.

Path Traversal
WAF: High

CVE-2017-15308

HIGH
8.80 CVSS 3.0

Huawei iReader app before 8.0.2.301 has an input validation vulnerability due to insufficient validation on the URL used for loading network data. An attacker can control app access and load malicious websites created by the attacker, and the code in webpages would be loaded and run.

Improper Input Validation
WAF: Medium

CVE-2017-10908

HIGH
7.50 CVSS 3.0

H2O version 2.2.3 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/2 header.

Improper Input Validation
WAF: Medium

CVE-2017-10907

MEDIUM
4.30 CVSS 3.0

Directory traversal vulnerability in OneThird CMS Show Off v1.85 and earlier. Show Off v1.85 en and earlier allows an attacker to read arbitrary files via unspecified vectors.

Path Traversal
WAF: High

CVE-2017-10868

HIGH
7.50 CVSS 3.1

H2O version 2.2.2 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/1 header.

Improper Input Validation
WAF: Medium

CVE-2017-14363

MEDIUM
5.40 CVSS 3.0

Cross-Site Scripting (XSS) vulnerability has been identified in Micro Focus Operations Manager i, versions 10.60, 10.61, 10.62. The vulnerability could be remotely exploited to allow Cross-Site Scripting (XSS).

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-6164

HIGH
8.10 CVSS 3.0

In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator and WebSafe software version 13.0.0, 12.0.0 - 12.1.2, 11.6.0 - 11.6.1 and 11.5.0 - 11.5.4, in some circumstances, Traffic Management Microkernel (TMM) does not properly handle certain malformed TLS1.2 records, which allows remote attackers to cause a denial-of-service (DoS) or possible remote command execution on the BIG-IP system.

Improper Input Validation
WAF: Medium

CVE-2017-6140

HIGH
7.50 CVSS 3.0

On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.

Improper Input Validation
WAF: Medium

CVE-2017-6138

HIGH
7.50 CVSS 3.0

In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM and WebSafe software version 13.0.0 and 12.1.0 - 12.1.2, malicious requests made to virtual servers with an HTTP profile can cause the TMM to restart. The issue is exposed with BIG-IP APM profiles, regardless of settings. The issue is also exposed with the non-default "normalize URI" configuration options used in iRules and/or BIG-IP LTM policies.

Improper Input Validation
WAF: Medium

CVE-2017-6136

MEDIUM
5.90 CVSS 3.0

In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM and WebSafe software version 13.0.0 and 12.0.0 - 12.1.2, undisclosed traffic patterns sent to BIG-IP virtual servers, with the TCP Fast Open and Tail Loss Probe options enabled in the associated TCP profile, may cause a disruption of service to the Traffic Management Microkernel (TMM).

Improper Input Validation
WAF: Medium

CVE-2017-6134

MEDIUM
6.50 CVSS 3.0

In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM and WebSafe software version 13.0.0, 12.1.0 - 12.1.2 and 11.5.1 - 11.6.1, an undisclosed sequence of packets, sourced from an adjacent network may cause TMM to crash.

Improper Input Validation
WAF: Medium

CVE-2017-6133

HIGH
7.50 CVSS 3.0

In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM and WebSafe software version 13.0.0 and 12.1.0 - 12.1.2, undisclosed HTTP requests may cause a denial of service.

Improper Input Validation
WAF: Medium

CVE-2017-6132

HIGH
7.50 CVSS 3.0

In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, GTM, Link Controller, PEM and Websafe software version 13.0.0, 12.0.0 to 12.1.2, 11.6.0 to 11.6.1 and 11.5.0 - 11.5.4, an undisclosed sequence of packets sent to BIG-IP High Availability state mirror listeners (primary and/or secondary IP) may cause TMM to restart.

Improper Input Validation
WAF: Medium

CVE-2017-6129

HIGH
7.50 CVSS 3.0

In F5 BIG-IP APM software version 13.0.0 and 12.1.2, in some circumstances, APM tunneled VPN flows can cause a VPN/PPP connflow to be prematurely freed or cause TMM to stop responding with a "flow not in use" assertion. An attacker may be able to disrupt traffic or cause the BIG-IP system to fail over to another device in the device group.

Improper Input Validation
WAF: Medium

CVE-2017-0304

MEDIUM
5.40 CVSS 3.0

A SQL injection vulnerability exists in the BIG-IP AFM management UI on versions 12.0.0, 12.1.0, 12.1.1, 12.1.2 and 13.0.0 that may allow a copy of the firewall rules to be tampered with and impact the Configuration Utility until there is a resync of the rules. Traffic processing and the live firewall rules in use are not affected.

SQL Injection
WAF: High

CVE-2015-7224

CRITICAL
9.80 CVSS 3.0

puppetlabs-mysql 3.1.0 through 3.6.0 allow remote attackers to bypass authentication by leveraging creation of a database account without a password when a 'mysql_user' user parameter contains a host with a netmask.

Improper Authentication
WAF: Low

CVE-2017-17411

CRITICAL
9.80 CVSS 3.0

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.

OS Command Injection
WAF: High

CVE-2017-17831

HIGH
8.80 CVSS 3.0

GitHub Git LFS before 2.1.1 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, located on a "url =" line in a .lfsconfig file within a repository.

Improper Input Validation
WAF: Medium

CVE-2017-17830

MEDIUM
6.80 CVSS 3.0

Bus Booking Script has CSRF via admin/new_master.php.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2017-17829

HIGH
7.20 CVSS 3.0

Bus Booking Script has SQL Injection via the admin/view_seatseller.php sp_id parameter or the admin/view_member.php memid parameter.

SQL Injection
WAF: High

CVE-2017-17828

MEDIUM
4.80 CVSS 3.1

Bus Booking Script has XSS via the results.php datepicker parameter or the admin/new_master.php spemail parameter.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-17827

HIGH
8.80 CVSS 3.0

Piwigo 2.9.2 is vulnerable to Cross-Site Request Forgery via /admin.php?page=configuration&section=main or /admin.php?page=batch_manager&mode=unit. An attacker can exploit this to coerce an admin user into performing unintended actions.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2017-17826

MEDIUM
6.10 CVSS 3.0

The Configuration component of Piwigo 2.9.2 is vulnerable to Persistent Cross Site Scripting via the gallery_title parameter in an admin.php?page=configuration&section=main request. An attacker can exploit this to hijack a client's browser along with the data stored in it.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-17825

MEDIUM
4.80 CVSS 3.0

The Batch Manager component of Piwigo 2.9.2 is vulnerable to Persistent Cross Site Scripting via tags-* array parameters in an admin.php?page=batch_manager&mode=unit request. An attacker can exploit this to hijack a client's browser along with the data stored in it.

Cross-Site Scripting (XSS)
WAF: High

CVE-2017-17824

MEDIUM
4.90 CVSS 3.0

The Batch Manager component of Piwigo 2.9.2 is vulnerable to SQL Injection via the admin/batch_manager_unit.php element_ids parameter in unit mode. An attacker can exploit this to gain access to the data in a connected MySQL database.

SQL Injection
WAF: High

CVE-2017-17823

MEDIUM
4.90 CVSS 3.0

The Configuration component of Piwigo 2.9.2 is vulnerable to SQL Injection via the admin/configuration.php order_by array parameter. An attacker can exploit this to gain access to the data in a connected MySQL database.

SQL Injection
WAF: High

CVE-2017-17822

MEDIUM
4.90 CVSS 3.0

The List Users API of Piwigo 2.9.2 is vulnerable to SQL Injection via the /admin/user_list_backend.php sSortDir_0 parameter. An attacker can exploit this to gain access to the data in a connected MySQL database.

SQL Injection
WAF: High

CVE-2017-17810

MEDIUM
5.50 CVSS 3.0

In Netwide Assembler (NASM) 2.14rc0, there is a "SEGV on unknown address" that will cause a remote denial of service attack, because asm/preproc.c mishandles macro calls that have the wrong number of arguments.

Improper Input Validation
WAF: Medium

CVE-2017-17807

LOW
3.30 CVSS 3.0

The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's "default request-key keyring" via the request_key() system call, allowing a local user to use a sequence of crafted system calls to add keys to a keyring with only Search permission (not Write permission) to that keyring, related to construct_get_dest_keyring() in security/keys/request_key.c.

Missing Authorization
WAF: Low

CVE-2017-17805

HIGH
7.80 CVSS 3.1

The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.

Improper Input Validation
WAF: Medium
Page 3 of 97 (4807 CVEs)