Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2026-31431 KEV |
|
[KEV] Vulnerability in Linux redhat (CVE-2026-31431)
vulnerability in Linux redhat (CVE-2026-31431). Successful exploitation can lead to full system takeover. Listed in CISA KEV — actively exploited.
|
| CVE-2024-6387 |
|
Vulnerability in sonicwall (CVE-2024-6387)
vulnerability in sonicwall (CVE-2024-6387). Successful exploitation can lead to full system takeover.
|
| CVE-2023-4911 KEV |
|
[KEV] Vulnerability in Gnu c (CVE-2023-4911)
vulnerability in Gnu c (CVE-2023-4911). Successful exploitation can lead to full system takeover. Listed in CISA KEV — actively exploited.
|
| CVE-2017-14491 |
|
Out-of-Bounds Write in platform/external/dnsmasq (CVE-2017-14491)
out-of-bounds write in platform/external/dnsmasq (CVE-2017-14491). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `11:2021-03-01` or later.
|
| CVE-2017-7160 |
|
Buffer Overflow in dos (CVE-2017-7160)
vulnerability in dos (CVE-2017-7160). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17934 |
|
Vulnerability in c (CVE-2017-17934)
vulnerability in c (CVE-2017-17934). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17881 |
|
Vulnerability in c (CVE-2017-17881)
vulnerability in c (CVE-2017-17881). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17879 |
|
Out-of-Bounds Read in c (CVE-2017-17879)
vulnerability in c (CVE-2017-17879). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17884 |
|
Vulnerability in c (CVE-2017-17884)
vulnerability in c (CVE-2017-17884). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17882 |
|
Vulnerability in c (CVE-2017-17882)
vulnerability in c (CVE-2017-17882). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17885 |
|
Vulnerability in c (CVE-2017-17885)
vulnerability in c (CVE-2017-17885). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17886 |
|
Vulnerability in c (CVE-2017-17886)
vulnerability in c (CVE-2017-17886). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17887 |
|
Vulnerability in c (CVE-2017-17887)
vulnerability in c (CVE-2017-17887). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-16995 |
|
Buffer Overflow in c (CVE-2017-16995)
vulnerability in c (CVE-2017-16995). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17813 |
|
Use-After-Free in c (CVE-2017-17813)
vulnerability in c (CVE-2017-17813). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17812 |
|
Out-of-Bounds Read in c (CVE-2017-17812)
vulnerability in c (CVE-2017-17812). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17810 |
|
Vulnerability in c (CVE-2017-17810)
vulnerability in c (CVE-2017-17810). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17820 |
|
Use-After-Free in c (CVE-2017-17820)
vulnerability in c (CVE-2017-17820). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17811 |
|
Buffer Overflow in c (CVE-2017-17811)
vulnerability in c (CVE-2017-17811). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17814 |
|
Use-After-Free in c (CVE-2017-17814)
vulnerability in c (CVE-2017-17814). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17818 |
|
Out-of-Bounds Read in c (CVE-2017-17818)
vulnerability in c (CVE-2017-17818). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17816 |
|
Use-After-Free in c (CVE-2017-17816)
vulnerability in c (CVE-2017-17816). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17815 |
|
Vulnerability in c (CVE-2017-17815)
vulnerability in c (CVE-2017-17815). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17817 |
|
Use-After-Free in c (CVE-2017-17817)
vulnerability in c (CVE-2017-17817). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17819 |
|
Vulnerability in c (CVE-2017-17819)
vulnerability in c (CVE-2017-17819). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17806 |
|
Out-of-Bounds Write in c (CVE-2017-17806)
out-of-bounds write in c (CVE-2017-17806). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17805 |
|
Vulnerability in c (CVE-2017-17805)
vulnerability in c (CVE-2017-17805). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17788 |
|
Out-of-Bounds Read in c (CVE-2017-17788)
vulnerability in c (CVE-2017-17788). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17786 |
|
Out-of-Bounds Read in c (CVE-2017-17786)
vulnerability in c (CVE-2017-17786). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17787 |
|
Out-of-Bounds Read in c (CVE-2017-17787)
vulnerability in c (CVE-2017-17787). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17789 |
|
Out-of-Bounds Write in c (CVE-2017-17789)
out-of-bounds write in c (CVE-2017-17789). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17785 |
|
Out-of-Bounds Write in c (CVE-2017-17785)
out-of-bounds write in c (CVE-2017-17785). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17784 |
|
Out-of-Bounds Read in c (CVE-2017-17784)
vulnerability in c (CVE-2017-17784). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17682 |
|
Vulnerability in c (CVE-2017-17682)
vulnerability in c (CVE-2017-17682). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17680 |
|
Vulnerability in c (CVE-2017-17680)
vulnerability in c (CVE-2017-17680). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17681 |
|
Vulnerability in c (CVE-2017-17681)
vulnerability in c (CVE-2017-17681). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17669 |
|
Out-of-Bounds Read in cpp (CVE-2017-17669)
vulnerability in cpp (CVE-2017-17669). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-1000407 |
|
Vulnerability in dos (CVE-2017-1000407)
vulnerability in dos (CVE-2017-1000407). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17504 |
|
Out-of-Bounds Read in c (CVE-2017-17504)
vulnerability in c (CVE-2017-17504). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17499 |
|
Use-After-Free in cpp (CVE-2017-17499)
vulnerability in cpp (CVE-2017-17499). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17480 |
|
Out-of-Bounds Write in c (CVE-2017-17480)
out-of-bounds write in c (CVE-2017-17480). Successful exploitation can lead to full system takeover.
|
| CVE-2017-13168 |
|
Vulnerability in google (CVE-2017-13168)
vulnerability in google (CVE-2017-13168). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15868 |
|
Vulnerability in c (CVE-2017-15868)
vulnerability in c (CVE-2017-15868). Successful exploitation can lead to full system takeover.
|
| CVE-2016-1255 |
|
Vulnerability in debian (CVE-2016-1255)
vulnerability in debian (CVE-2016-1255). Successful exploitation can lead to full system takeover.
|
| CVE-2016-1252 |
|
Vulnerability in debian (CVE-2016-1252)
vulnerability in debian (CVE-2016-1252). Data can be tampered with by attackers.
|
| CVE-2017-16612 |
|
Vulnerability in c (CVE-2017-16612)
vulnerability in c (CVE-2017-16612). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-16611 |
|
Vulnerability in debian (CVE-2017-16611)
vulnerability in debian (CVE-2017-16611). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17087 |
|
Vulnerability in c (CVE-2017-17087)
vulnerability in c (CVE-2017-17087). Confidential information can be exposed externally.
|
| CVE-2017-15275 |
|
Buffer Overflow in samba (CVE-2017-15275)
vulnerability in samba (CVE-2017-15275). Confidential information can be exposed externally.
|
| CVE-2017-14746 |
|
Use-After-Free in samba (CVE-2017-14746)
vulnerability in samba (CVE-2017-14746). Successful exploitation can lead to full system takeover.
|