Vulnerabilities

Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.

Filtering: Tag: windows-10 Clear
ID Title
CVE-2017-11305 Vulnerability in adobe (CVE-2017-11305)
vulnerability in adobe (CVE-2017-11305). Data can be tampered with by attackers.
CVE-2017-11888 Buffer Overflow in microsoft (CVE-2017-11888)
vulnerability in microsoft (CVE-2017-11888). Successful exploitation can lead to full system takeover.
CVE-2017-11903 Buffer Overflow in microsoft (CVE-2017-11903)
vulnerability in microsoft (CVE-2017-11903). Successful exploitation can lead to full system takeover.
CVE-2017-11914 Buffer Overflow in microsoft (CVE-2017-11914)
vulnerability in microsoft (CVE-2017-11914). Successful exploitation can lead to full system takeover.
CVE-2017-11909 Buffer Overflow in microsoft (CVE-2017-11909)
vulnerability in microsoft (CVE-2017-11909). Successful exploitation can lead to full system takeover.
CVE-2017-11918 Buffer Overflow in microsoft (CVE-2017-11918)
vulnerability in microsoft (CVE-2017-11918). Successful exploitation can lead to full system takeover.
CVE-2017-11927 Information Disclosure in microsoft (CVE-2017-11927)
vulnerability in microsoft (CVE-2017-11927). Confidential information can be exposed externally.
CVE-2017-11930 Buffer Overflow in microsoft (CVE-2017-11930)
vulnerability in microsoft (CVE-2017-11930). Successful exploitation can lead to full system takeover.
CVE-2017-11899 Vulnerability in microsoft (CVE-2017-11899)
vulnerability in microsoft (CVE-2017-11899). Successful exploitation can lead to full system takeover.
CVE-2017-11894 Buffer Overflow in microsoft (CVE-2017-11894)
vulnerability in microsoft (CVE-2017-11894). Successful exploitation can lead to full system takeover.
CVE-2017-11889 Buffer Overflow in microsoft (CVE-2017-11889)
vulnerability in microsoft (CVE-2017-11889). Successful exploitation can lead to full system takeover.
CVE-2017-11905 Buffer Overflow in microsoft (CVE-2017-11905)
vulnerability in microsoft (CVE-2017-11905). Successful exploitation can lead to full system takeover.
CVE-2017-11893 Buffer Overflow in microsoft (CVE-2017-11893)
vulnerability in microsoft (CVE-2017-11893). Successful exploitation can lead to full system takeover.
CVE-2017-11912 Buffer Overflow in microsoft (CVE-2017-11912)
vulnerability in microsoft (CVE-2017-11912). Successful exploitation can lead to full system takeover.
CVE-2017-11919 Information Disclosure in microsoft (CVE-2017-11919)
vulnerability in microsoft (CVE-2017-11919). Confidential information can be exposed externally.
CVE-2017-11901 Buffer Overflow in microsoft (CVE-2017-11901)
vulnerability in microsoft (CVE-2017-11901). Successful exploitation can lead to full system takeover.
CVE-2017-11890 Buffer Overflow in microsoft (CVE-2017-11890)
vulnerability in microsoft (CVE-2017-11890). Successful exploitation can lead to full system takeover.
CVE-2017-11910 Buffer Overflow in microsoft (CVE-2017-11910)
vulnerability in microsoft (CVE-2017-11910). Successful exploitation can lead to full system takeover.
CVE-2017-11913 Buffer Overflow in microsoft (CVE-2017-11913)
vulnerability in microsoft (CVE-2017-11913). Successful exploitation can lead to full system takeover.
CVE-2017-11911 Buffer Overflow in microsoft (CVE-2017-11911)
vulnerability in microsoft (CVE-2017-11911). Successful exploitation can lead to full system takeover.
CVE-2017-11895 Buffer Overflow in microsoft (CVE-2017-11895)
vulnerability in microsoft (CVE-2017-11895). Successful exploitation can lead to full system takeover.
CVE-2017-11908 Buffer Overflow in microsoft (CVE-2017-11908)
vulnerability in microsoft (CVE-2017-11908). Successful exploitation can lead to full system takeover.
CVE-2017-11906 Information Disclosure in microsoft (CVE-2017-11906)
vulnerability in microsoft (CVE-2017-11906). Confidential information can be exposed externally.
CVE-2017-11907 Buffer Overflow in microsoft (CVE-2017-11907)
vulnerability in microsoft (CVE-2017-11907). Successful exploitation can lead to full system takeover.
CVE-2017-11887 Information Disclosure in microsoft (CVE-2017-11887)
vulnerability in microsoft (CVE-2017-11887). Confidential information can be exposed externally.
CVE-2017-11886 Buffer Overflow in microsoft (CVE-2017-11886)
vulnerability in microsoft (CVE-2017-11886). Successful exploitation can lead to full system takeover.
CVE-2017-11885 Vulnerability in microsoft (CVE-2017-11885)
vulnerability in microsoft (CVE-2017-11885). Successful exploitation can lead to full system takeover.
CVE-2017-3114 Out-of-Bounds Read in redhat (CVE-2017-3114)
vulnerability in redhat (CVE-2017-3114). Successful exploitation can lead to full system takeover.
CVE-2017-3112 Out-of-Bounds Read in redhat (CVE-2017-3112)
vulnerability in redhat (CVE-2017-3112). Successful exploitation can lead to full system takeover.
CVE-2017-11225 Use-After-Free in redhat (CVE-2017-11225)
vulnerability in redhat (CVE-2017-11225). Successful exploitation can lead to full system takeover.
CVE-2017-11213 Out-of-Bounds Read in redhat (CVE-2017-11213)
vulnerability in redhat (CVE-2017-11213). Successful exploitation can lead to full system takeover.
CVE-2017-11215 Use-After-Free in redhat (CVE-2017-11215)
vulnerability in redhat (CVE-2017-11215). Successful exploitation can lead to full system takeover.
CVE-2017-11940 Buffer Overflow in microsoft (CVE-2017-11940)
vulnerability in microsoft (CVE-2017-11940). Successful exploitation can lead to full system takeover.
CVE-2017-11937 Buffer Overflow in microsoft (CVE-2017-11937)
vulnerability in microsoft (CVE-2017-11937). Successful exploitation can lead to full system takeover.
CVE-2017-11281 Buffer Overflow in adobe (CVE-2017-11281)
vulnerability in adobe (CVE-2017-11281). Successful exploitation can lead to full system takeover.
CVE-2017-11282 Buffer Overflow in adobe (CVE-2017-11282)
vulnerability in adobe (CVE-2017-11282). Successful exploitation can lead to full system takeover.
CVE-2017-11848 Information Disclosure in microsoft (CVE-2017-11848)
vulnerability in microsoft (CVE-2017-11848). Risk of unauthorized operations or information disclosure.
CVE-2017-11862 Buffer Overflow in microsoft (CVE-2017-11862)
vulnerability in microsoft (CVE-2017-11862). Successful exploitation can lead to full system takeover.
CVE-2017-11872 Vulnerability in microsoft (CVE-2017-11872)
vulnerability in microsoft (CVE-2017-11872). Confidential information can be exposed externally.
CVE-2017-11871 Buffer Overflow in microsoft (CVE-2017-11871)
vulnerability in microsoft (CVE-2017-11871). Successful exploitation can lead to full system takeover.
CVE-2017-11863 Vulnerability in microsoft (CVE-2017-11863)
vulnerability in microsoft (CVE-2017-11863). Risk of unauthorized operations or information disclosure.
CVE-2017-11849 Information Disclosure in microsoft (CVE-2017-11849)
vulnerability in microsoft (CVE-2017-11849). Confidential information can be exposed externally.
CVE-2017-11861 Buffer Overflow in microsoft (CVE-2017-11861)
vulnerability in microsoft (CVE-2017-11861). Successful exploitation can lead to full system takeover.
CVE-2017-11850 Information Disclosure in microsoft (CVE-2017-11850)
vulnerability in microsoft (CVE-2017-11850). Risk of unauthorized operations or information disclosure.
CVE-2017-11873 Buffer Overflow in microsoft (CVE-2017-11873)
vulnerability in microsoft (CVE-2017-11873). Successful exploitation can lead to full system takeover.
CVE-2017-11880 Information Disclosure in microsoft (CVE-2017-11880)
vulnerability in microsoft (CVE-2017-11880). Confidential information can be exposed externally.
CVE-2017-11858 Buffer Overflow in microsoft (CVE-2017-11858)
vulnerability in microsoft (CVE-2017-11858). Successful exploitation can lead to full system takeover.
CVE-2017-11856 Buffer Overflow in microsoft (CVE-2017-11856)
vulnerability in microsoft (CVE-2017-11856). Successful exploitation can lead to full system takeover.
CVE-2017-11874 Vulnerability in microsoft (CVE-2017-11874)
vulnerability in microsoft (CVE-2017-11874). Risk of unauthorized operations or information disclosure.
CVE-2017-11870 Buffer Overflow in microsoft (CVE-2017-11870)
vulnerability in microsoft (CVE-2017-11870). Successful exploitation can lead to full system takeover.

🍪 About cookies

We use cookies to keep you logged in, remember your language, and improve the service.

Details →