Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2026-31431 KEV |
|
[KEV] Vulnerability in Linux redhat (CVE-2026-31431)
vulnerability in Linux redhat (CVE-2026-31431). Successful exploitation can lead to full system takeover. Listed in CISA KEV — actively exploited.
|
| CVE-2024-6387 |
|
Vulnerability in sonicwall (CVE-2024-6387)
vulnerability in sonicwall (CVE-2024-6387). Successful exploitation can lead to full system takeover.
|
| CVE-2023-4911 KEV |
|
[KEV] Vulnerability in Gnu c (CVE-2023-4911)
vulnerability in Gnu c (CVE-2023-4911). Successful exploitation can lead to full system takeover. Listed in CISA KEV — actively exploited.
|
| CVE-2017-14491 |
|
Out-of-Bounds Write in platform/external/dnsmasq (CVE-2017-14491)
out-of-bounds write in platform/external/dnsmasq (CVE-2017-14491). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `11:2021-03-01` or later.
|
| CVE-2017-7160 |
|
Buffer Overflow in dos (CVE-2017-7160)
vulnerability in dos (CVE-2017-7160). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17934 |
|
Vulnerability in c (CVE-2017-17934)
vulnerability in c (CVE-2017-17934). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17914 |
|
Vulnerability in c (CVE-2017-17914)
vulnerability in c (CVE-2017-17914). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17887 |
|
Vulnerability in c (CVE-2017-17887)
vulnerability in c (CVE-2017-17887). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17886 |
|
Vulnerability in c (CVE-2017-17886)
vulnerability in c (CVE-2017-17886). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17885 |
|
Vulnerability in c (CVE-2017-17885)
vulnerability in c (CVE-2017-17885). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17884 |
|
Vulnerability in c (CVE-2017-17884)
vulnerability in c (CVE-2017-17884). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17882 |
|
Vulnerability in c (CVE-2017-17882)
vulnerability in c (CVE-2017-17882). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17881 |
|
Vulnerability in c (CVE-2017-17881)
vulnerability in c (CVE-2017-17881). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17879 |
|
Out-of-Bounds Read in c (CVE-2017-17879)
vulnerability in c (CVE-2017-17879). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16995 |
|
Buffer Overflow in c (CVE-2017-16995)
vulnerability in c (CVE-2017-16995). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17806 |
|
Out-of-Bounds Write in c (CVE-2017-17806)
out-of-bounds write in c (CVE-2017-17806). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17805 |
|
Vulnerability in c (CVE-2017-17805)
vulnerability in c (CVE-2017-17805). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17682 |
|
Vulnerability in c (CVE-2017-17682)
vulnerability in c (CVE-2017-17682). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17681 |
|
Vulnerability in c (CVE-2017-17681)
vulnerability in c (CVE-2017-17681). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17680 |
|
Vulnerability in c (CVE-2017-17680)
vulnerability in c (CVE-2017-17680). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-1000407 |
|
Vulnerability in dos (CVE-2017-1000407)
vulnerability in dos (CVE-2017-1000407). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17504 |
|
Out-of-Bounds Read in c (CVE-2017-17504)
vulnerability in c (CVE-2017-17504). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-17499 |
|
Use-After-Free in cpp (CVE-2017-17499)
vulnerability in cpp (CVE-2017-17499). Successful exploitation can lead to full system takeover.
|
| CVE-2017-13168 |
|
Vulnerability in google (CVE-2017-13168)
vulnerability in google (CVE-2017-13168). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15868 |
|
Vulnerability in c (CVE-2017-15868)
vulnerability in c (CVE-2017-15868). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15275 |
|
Buffer Overflow in samba (CVE-2017-15275)
vulnerability in samba (CVE-2017-15275). Confidential information can be exposed externally.
|
| CVE-2017-14746 |
|
Use-After-Free in samba (CVE-2017-14746)
vulnerability in samba (CVE-2017-14746). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16544 |
|
Code Injection in c (CVE-2017-16544)
code injection in c (CVE-2017-16544). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15115 |
|
Use-After-Free in c (CVE-2017-15115)
vulnerability in c (CVE-2017-15115). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15102 |
|
Vulnerability in c (CVE-2017-15102)
vulnerability in c (CVE-2017-15102). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16642 |
|
Out-of-Bounds Read in c (CVE-2017-16642)
vulnerability in c (CVE-2017-16642). Confidential information can be exposed externally.
|
| CVE-2017-16548 |
|
Out-of-Bounds Read in c (CVE-2017-16548)
vulnerability in c (CVE-2017-16548). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16546 |
|
Buffer Overflow in c (CVE-2017-16546)
vulnerability in c (CVE-2017-16546). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16533 |
|
Out-of-Bounds Read in c (CVE-2017-16533)
vulnerability in c (CVE-2017-16533). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16532 |
|
Vulnerability in c (CVE-2017-16532)
vulnerability in c (CVE-2017-16532). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16526 |
|
Buffer Overflow in c (CVE-2017-16526)
vulnerability in c (CVE-2017-16526). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16525 |
|
Use-After-Free in c (CVE-2017-16525)
vulnerability in c (CVE-2017-16525). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16527 |
|
Use-After-Free in c (CVE-2017-16527)
vulnerability in c (CVE-2017-16527). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16528 |
|
Use-After-Free in c (CVE-2017-16528)
vulnerability in c (CVE-2017-16528). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16529 |
|
Out-of-Bounds Read in c (CVE-2017-16529)
vulnerability in c (CVE-2017-16529). Successful exploitation can lead to full system takeover.
|
| CVE-2017-12629 |
|
XXE (XML External Entity) in c (CVE-2017-12629)
vulnerability in c (CVE-2017-12629). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15298 |
|
Vulnerability in dos (CVE-2017-15298)
vulnerability in dos (CVE-2017-15298). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-15281 |
|
Buffer Overflow in c (CVE-2017-15281)
vulnerability in c (CVE-2017-15281). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15218 |
|
ImageMagick 7.0.7-2 has a memory leak in ReadOneJNGImage in coders/png.c.
ImageMagick 7.0.7-2 has a memory leak in ReadOneJNGImage in coders/png.c.
|
| CVE-2017-15217 |
|
ImageMagick 7.0.7-2 has a memory leak in ReadSGIImage in coders/sgi.c.
ImageMagick 7.0.7-2 has a memory leak in ReadSGIImage in coders/sgi.c.
|
| CVE-2017-15033 |
|
ImageMagick version 7.0.7-2 contains a memory leak in ReadYUVImage in coders/yuv.c.
ImageMagick version 7.0.7-2 contains a memory leak in ReadYUVImage in coders/yuv.c.
|
| CVE-2017-15032 |
|
ImageMagick version 7.0.7-2 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c.
ImageMagick version 7.0.7-2 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c.
|
| CVE-2017-15017 |
|
Vulnerability in c (CVE-2017-15017)
vulnerability in c (CVE-2017-15017). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15016 |
|
Vulnerability in c (CVE-2017-15016)
vulnerability in c (CVE-2017-15016). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15015 |
|
Vulnerability in c (CVE-2017-15015)
vulnerability in c (CVE-2017-15015). Successful exploitation can lead to full system takeover.
|