LibTIFF : buffer overflow via readSeparateStripsetoBuffer()open in new window An attacker can trigger a buffer overflow of LibTIFF, via readSeparateStripset Visit link for details Node.js tmp : directory traversal via Symbolic Link Dir Parameteropen in new window An attacker can traverse directories of Node.js tmp, via Symbolic Link Dir Parameter, in order to write a file outside the service root path... Visit link for details Check Point Mobile Access SSL VPN : directory traversal via File Share Applicationopen in new window An attacker can traverse directories of Check Point Mobile Access SSL VPN, via File Share Application, in order to read a file outside the service root path... Visit link for details Check Point : Man-in-the-Middle via Country Flags CSV Fileopen in new window An attacker can act as a Man-in-the-Middle on Check Point, via Country Flags CSV File, in order to read or write data in the session... Visit link for details 7-Zip : directory traversal via Symbolic Linksopen in new window An attacker can traverse directories of 7-Zip, via Symbolic Links, in order to write a file outside the service root path... Visit link for details libxml2 : overload via SGML Catalog Fileopen in new window An attacker can trigger an overload of libxml2, via SGML Catalog File, in order to trigger a denial of service... Visit link for details iperf : buffer overflow via skip-rx-copyopen in new window An attacker can trigger a buffer overflow of iperf, via skip-rx-copy, in order to trigger a denial of service, and possibly to run code... Visit link for details iperf : buffer overflow via iperf_authopen in new window An attacker can trigger a buffer overflow of iperf, via iperf_auth, in order to trigger a denial of service, and possibly to run code... Visit link for details Incus : ingress filtrering bypass via ARP Filteringopen in new window An attacker can bypass filtering rules of Incus, via ARP Filtering, in order to send malicious data... Visit link for details Incus : ingress filtrering bypass via DHCP Filteringopen in new window An attacker can bypass filtering rules of Incus, via DHCP Filtering, in order to send malicious data... Visit link for details