Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2017-17915 |
|
Out-of-Bounds Read in c (CVE-2017-17915)
vulnerability in c (CVE-2017-17915). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17913 |
|
Out-of-Bounds Read in c (CVE-2017-17913)
vulnerability in c (CVE-2017-17913). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17912 |
|
Out-of-Bounds Read in c (CVE-2017-17912)
vulnerability in c (CVE-2017-17912). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17783 |
|
Out-of-Bounds Read in c (CVE-2017-17783)
vulnerability in c (CVE-2017-17783). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17782 |
|
Out-of-Bounds Read in c (CVE-2017-17782)
vulnerability in c (CVE-2017-17782). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17500 |
|
Out-of-Bounds Read in c (CVE-2017-17500)
vulnerability in c (CVE-2017-17500). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17498 |
|
Buffer Overflow in c (CVE-2017-17498)
vulnerability in c (CVE-2017-17498). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17501 |
|
Out-of-Bounds Read in c (CVE-2017-17501)
vulnerability in c (CVE-2017-17501). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17502 |
|
Out-of-Bounds Read in c (CVE-2017-17502)
vulnerability in c (CVE-2017-17502). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17503 |
|
Out-of-Bounds Read in c (CVE-2017-17503)
vulnerability in c (CVE-2017-17503). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16669 |
|
Buffer Overflow in c (CVE-2017-16669)
vulnerability in c (CVE-2017-16669). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16547 |
|
Vulnerability in c (CVE-2017-16547)
vulnerability in c (CVE-2017-16547). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16545 |
|
Vulnerability in c (CVE-2017-16545)
vulnerability in c (CVE-2017-16545). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16353 |
|
Out-of-Bounds Read in c (CVE-2017-16353)
vulnerability in c (CVE-2017-16353). Confidential information can be exposed externally.
|
| CVE-2017-16352 |
|
Buffer Overflow in c (CVE-2017-16352)
vulnerability in c (CVE-2017-16352). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15930 |
|
Vulnerability in c (CVE-2017-15930)
vulnerability in c (CVE-2017-15930). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15277 |
|
Information Disclosure in c (CVE-2017-15277)
vulnerability in c (CVE-2017-15277). Confidential information can be exposed externally.
|
| CVE-2017-15238 |
|
Use-After-Free in c (CVE-2017-15238)
vulnerability in c (CVE-2017-15238). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14997 |
|
Vulnerability in c (CVE-2017-14997)
vulnerability in c (CVE-2017-14997). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-14994 |
|
Vulnerability in c (CVE-2017-14994)
vulnerability in c (CVE-2017-14994). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-14733 |
|
Out-of-Bounds Read in c (CVE-2017-14733)
vulnerability in c (CVE-2017-14733). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-14649 |
|
Vulnerability in c (CVE-2017-14649)
vulnerability in c (CVE-2017-14649). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-14504 |
|
Vulnerability in c (CVE-2017-14504)
vulnerability in c (CVE-2017-14504). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-14314 |
|
Out-of-Bounds Read in c (CVE-2017-14314)
vulnerability in c (CVE-2017-14314). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-14165 |
|
Buffer Overflow in c (CVE-2017-14165)
vulnerability in c (CVE-2017-14165). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-14103 |
|
Use-After-Free in c (CVE-2017-14103)
vulnerability in c (CVE-2017-14103). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14042 |
|
Buffer Overflow in c (CVE-2017-14042)
vulnerability in c (CVE-2017-14042). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-13777 |
|
Vulnerability in c (CVE-2017-13777)
vulnerability in c (CVE-2017-13777). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-13776 |
|
Vulnerability in c (CVE-2017-13776)
vulnerability in c (CVE-2017-13776). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-13775 |
|
Vulnerability in c (CVE-2017-13775)
vulnerability in c (CVE-2017-13775). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-13737 |
|
Use-After-Free in c (CVE-2017-13737)
vulnerability in c (CVE-2017-13737). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-13736 |
|
Vulnerability in c (CVE-2017-13736)
vulnerability in c (CVE-2017-13736). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-13648 |
|
Vulnerability in c (CVE-2017-13648)
vulnerability in c (CVE-2017-13648). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-13147 |
|
Vulnerability in c (CVE-2017-13147)
vulnerability in c (CVE-2017-13147). Successful exploitation can lead to full system takeover.
|
| CVE-2017-13065 |
|
Vulnerability in c (CVE-2017-13065)
vulnerability in c (CVE-2017-13065). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-13066 |
|
GraphicsMagick 1.3.26 has a memory leak vulnerability in the function CloneImage in magick/image.c.
GraphicsMagick 1.3.26 has a memory leak vulnerability in the function CloneImage in magick/image.c.
|
| CVE-2017-13064 |
|
Buffer Overflow in c (CVE-2017-13064)
vulnerability in c (CVE-2017-13064). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-13063 |
|
Buffer Overflow in c (CVE-2017-13063)
vulnerability in c (CVE-2017-13063). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-12937 |
|
Out-of-Bounds Read in c (CVE-2017-12937)
vulnerability in c (CVE-2017-12937). Successful exploitation can lead to full system takeover.
|
| CVE-2017-12936 |
|
Use-After-Free in c (CVE-2017-12936)
vulnerability in c (CVE-2017-12936). Successful exploitation can lead to full system takeover.
|
| CVE-2017-12935 |
|
Out-of-Bounds Read in c (CVE-2017-12935)
vulnerability in c (CVE-2017-12935). Successful exploitation can lead to full system takeover.
|
| CVE-2017-11722 |
|
Out-of-Bounds Read in c (CVE-2017-11722)
vulnerability in c (CVE-2017-11722). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-11642 |
|
Vulnerability in c (CVE-2017-11642)
vulnerability in c (CVE-2017-11642). Successful exploitation can lead to full system takeover.
|
| CVE-2017-11636 |
|
Buffer Overflow in c (CVE-2017-11636)
vulnerability in c (CVE-2017-11636). Successful exploitation can lead to full system takeover.
|
| CVE-2017-11637 |
|
Vulnerability in c (CVE-2017-11637)
vulnerability in c (CVE-2017-11637). Successful exploitation can lead to full system takeover.
|
| CVE-2017-11638 |
|
Vulnerability in c (CVE-2017-11638)
vulnerability in c (CVE-2017-11638). Successful exploitation can lead to full system takeover.
|
| CVE-2017-11641 |
|
Vulnerability in c (CVE-2017-11641)
vulnerability in c (CVE-2017-11641). Successful exploitation can lead to full system takeover.
|
| CVE-2017-11643 |
|
Buffer Overflow in c (CVE-2017-11643)
vulnerability in c (CVE-2017-11643). Successful exploitation can lead to full system takeover.
|
| CVE-2017-11403 |
|
Use-After-Free in c (CVE-2017-11403)
vulnerability in c (CVE-2017-11403). Successful exploitation can lead to full system takeover.
|
| CVE-2017-11140 |
|
Vulnerability in c (CVE-2017-11140)
vulnerability in c (CVE-2017-11140). Risk of unauthorized operations or information disclosure.
|