Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2017-10074 |
|
Vulnerability in c (CVE-2017-10074)
vulnerability in c (CVE-2017-10074). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10067 |
|
Vulnerability in c (CVE-2017-10067)
vulnerability in c (CVE-2017-10067). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10053 |
|
Vulnerability in c (CVE-2017-10053)
vulnerability in c (CVE-2017-10053). Risk of unauthorized operations or information disclosure.
|
| CVE-2016-9843 |
|
Vulnerability in c (CVE-2016-9843)
vulnerability in c (CVE-2016-9843). Successful exploitation can lead to full system takeover.
|
| CVE-2016-9840 |
|
Vulnerability in c (CVE-2016-9840)
vulnerability in c (CVE-2016-9840). Successful exploitation can lead to full system takeover.
|
| CVE-2016-9841 |
|
Vulnerability in c (CVE-2016-9841)
vulnerability in c (CVE-2016-9841). Successful exploitation can lead to full system takeover.
|
| CVE-2016-9842 |
|
Vulnerability in c (CVE-2016-9842)
vulnerability in c (CVE-2016-9842). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3544 |
|
Vulnerability in c (CVE-2017-3544)
vulnerability in c (CVE-2017-3544). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-3539 |
|
Vulnerability in c (CVE-2017-3539)
vulnerability in c (CVE-2017-3539). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-3526 |
|
Vulnerability in c (CVE-2017-3526)
vulnerability in c (CVE-2017-3526). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-3509 |
|
Vulnerability in c (CVE-2017-3509)
vulnerability in c (CVE-2017-3509). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-3511 |
|
Vulnerability in c (CVE-2017-3511)
vulnerability in c (CVE-2017-3511). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3512 |
|
Vulnerability in c (CVE-2017-3512)
vulnerability in c (CVE-2017-3512). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3514 |
|
Vulnerability in c (CVE-2017-3514)
vulnerability in c (CVE-2017-3514). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3533 |
|
Vulnerability in c (CVE-2017-3533)
vulnerability in c (CVE-2017-3533). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-3289 |
|
Vulnerability in oracle (CVE-2017-3289)
vulnerability in oracle (CVE-2017-3289). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3272 |
|
Vulnerability in oracle (CVE-2017-3272)
vulnerability in oracle (CVE-2017-3272). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3262 |
|
Vulnerability in oracle (CVE-2017-3262)
vulnerability in oracle (CVE-2017-3262). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-3261 |
|
Vulnerability in oracle (CVE-2017-3261)
vulnerability in oracle (CVE-2017-3261). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-3260 |
|
Vulnerability in oracle (CVE-2017-3260)
vulnerability in oracle (CVE-2017-3260). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3259 |
|
Vulnerability in oracle (CVE-2017-3259)
vulnerability in oracle (CVE-2017-3259). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-3253 |
|
Vulnerability in dos (CVE-2017-3253)
vulnerability in dos (CVE-2017-3253). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-3252 |
|
Vulnerability in oracle (CVE-2017-3252)
vulnerability in oracle (CVE-2017-3252). Data can be tampered with by attackers.
|
| CVE-2017-3241 |
|
Vulnerability in oracle (CVE-2017-3241)
vulnerability in oracle (CVE-2017-3241). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3231 |
|
Information Disclosure in oracle (CVE-2017-3231)
vulnerability in oracle (CVE-2017-3231). Risk of unauthorized operations or information disclosure.
|
| CVE-2016-8328 |
|
Vulnerability in oracle (CVE-2016-8328)
vulnerability in oracle (CVE-2016-8328). Risk of unauthorized operations or information disclosure.
|
| CVE-2016-5547 |
|
Vulnerability in dos (CVE-2016-5547)
vulnerability in dos (CVE-2016-5547). Risk of unauthorized operations or information disclosure.
|
| CVE-2016-5546 |
|
Vulnerability in oracle (CVE-2016-5546)
vulnerability in oracle (CVE-2016-5546). Data can be tampered with by attackers.
|
| CVE-2016-5552 |
|
Vulnerability in oracle (CVE-2016-5552)
vulnerability in oracle (CVE-2016-5552). Risk of unauthorized operations or information disclosure.
|
| CVE-2016-5549 |
|
Vulnerability in oracle (CVE-2016-5549)
vulnerability in oracle (CVE-2016-5549). Confidential information can be exposed externally.
|
| CVE-2016-5548 |
|
Vulnerability in oracle (CVE-2016-5548)
vulnerability in oracle (CVE-2016-5548). Confidential information can be exposed externally.
|