Vulnerabilities

Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.

Filtering: Tag: canonical Clear
ID Title
CVE-2017-7610 Out-of-Bounds Read in c (CVE-2017-7610)
vulnerability in c (CVE-2017-7610). Risk of unauthorized operations or information disclosure.
CVE-2017-7611 Out-of-Bounds Read in c (CVE-2017-7611)
vulnerability in c (CVE-2017-7611). Risk of unauthorized operations or information disclosure.
CVE-2017-7612 Out-of-Bounds Read in c (CVE-2017-7612)
vulnerability in c (CVE-2017-7612). Risk of unauthorized operations or information disclosure.
CVE-2017-7613 Vulnerability in c (CVE-2017-7613)
vulnerability in c (CVE-2017-7613). Risk of unauthorized operations or information disclosure.
CVE-2017-7358 Path Traversal in path-traversal (CVE-2017-7358)
path traversal in path-traversal (CVE-2017-7358). Successful exploitation can lead to full system takeover.
CVE-2017-6964 Vulnerability in canonical (CVE-2017-6964)
vulnerability in canonical (CVE-2017-6964). Successful exploitation can lead to full system takeover.
CVE-2016-9243 Vulnerability in cryptographyio (CVE-2016-9243)
vulnerability in cryptographyio (CVE-2016-9243). Data can be tampered with by attackers.
CVE-2017-6507 Privilege Escalation in apparmor (CVE-2017-6507)
vulnerability in apparmor (CVE-2017-6507). Data can be tampered with by attackers.
CVE-2016-9388 Vulnerability in c (CVE-2016-9388)
vulnerability in c (CVE-2016-9388). Risk of unauthorized operations or information disclosure.
CVE-2016-9774 Vulnerability in tomcat (CVE-2016-9774)
vulnerability in tomcat (CVE-2016-9774). Successful exploitation can lead to full system takeover.
CVE-2016-9775 Vulnerability in tomcat (CVE-2016-9775)
vulnerability in tomcat (CVE-2016-9775). Successful exploitation can lead to full system takeover.
CVE-2017-5897 Out-of-Bounds Read in c (CVE-2017-5897)
vulnerability in c (CVE-2017-5897). Successful exploitation can lead to full system takeover.
CVE-2014-9847 The jng decoder in ImageMagick 6.8.9.9 allows remote attackers to have an unspecified impact.
The jng decoder in ImageMagick 6.8.9.9 allows remote attackers to have an unspecified impact.
CVE-2014-9848 Vulnerability in dos (CVE-2014-9848)
vulnerability in dos (CVE-2014-9848). Risk of unauthorized operations or information disclosure.
CVE-2014-9849 The png coder in ImageMagick allows remote attackers to cause a denial of service (crash).
The png coder in ImageMagick allows remote attackers to cause a denial of service (crash).
CVE-2014-9850 Vulnerability in dos (CVE-2014-9850)
vulnerability in dos (CVE-2014-9850). Risk of unauthorized operations or information disclosure.
CVE-2014-9851 ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (application crash).
ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (application crash).
CVE-2014-9841 Vulnerability in c (CVE-2014-9841)
vulnerability in c (CVE-2014-9841). Successful exploitation can lead to full system takeover.
CVE-2014-9842 Vulnerability in c (CVE-2014-9842)
vulnerability in c (CVE-2014-9842). Risk of unauthorized operations or information disclosure.
CVE-2014-9843 Buffer Overflow in c (CVE-2014-9843)
vulnerability in c (CVE-2014-9843). Successful exploitation can lead to full system takeover.
CVE-2014-9844 Out-of-Bounds Read in c (CVE-2014-9844)
vulnerability in c (CVE-2014-9844). Risk of unauthorized operations or information disclosure.
CVE-2014-9845 Buffer Overflow in c (CVE-2014-9845)
vulnerability in c (CVE-2014-9845). Risk of unauthorized operations or information disclosure.
CVE-2014-9846 Buffer Overflow in c (CVE-2014-9846)
vulnerability in c (CVE-2014-9846). Successful exploitation can lead to full system takeover.
CVE-2017-7184 Vulnerability in c (CVE-2017-7184)
vulnerability in c (CVE-2017-7184). Successful exploitation can lead to full system takeover.
CVE-2014-9853 Vulnerability in c (CVE-2014-9853)
vulnerability in c (CVE-2014-9853). Risk of unauthorized operations or information disclosure.
CVE-2014-9854 Vulnerability in c (CVE-2014-9854)
vulnerability in c (CVE-2014-9854). Risk of unauthorized operations or information disclosure.
CVE-2017-6960 Vulnerability in apng2gif-project (CVE-2017-6960)
vulnerability in apng2gif-project (CVE-2017-6960). Risk of unauthorized operations or information disclosure.
CVE-2017-6590 Authorization Flaw in canonical (CVE-2017-6590)
vulnerability in canonical (CVE-2017-6590). Successful exploitation can lead to full system takeover.
CVE-2017-5669 Vulnerability in c (CVE-2017-5669)
vulnerability in c (CVE-2017-5669). Successful exploitation can lead to full system takeover.
CVE-2016-10109 Use-After-Free in dos (CVE-2016-10109)
vulnerability in dos (CVE-2016-10109). Risk of unauthorized operations or information disclosure.
CVE-2017-6056 Vulnerability in apache (CVE-2017-6056)
vulnerability in apache (CVE-2017-6056). Risk of unauthorized operations or information disclosure.
CVE-2015-8768 Vulnerability in click-project (CVE-2015-8768)
vulnerability in click-project (CVE-2015-8768). Successful exploitation can lead to full system takeover.
CVE-2016-3616 Vulnerability in dos (CVE-2016-3616)
vulnerability in dos (CVE-2016-3616). Successful exploitation can lead to full system takeover.
CVE-2016-2147 Vulnerability in dos (CVE-2016-2147)
vulnerability in dos (CVE-2016-2147). Risk of unauthorized operations or information disclosure.
CVE-2016-2148 Buffer Overflow in busybox (CVE-2016-2148)
vulnerability in busybox (CVE-2016-2148). Successful exploitation can lead to full system takeover.
CVE-2016-10165 Out-of-Bounds Read in c (CVE-2016-10165)
vulnerability in c (CVE-2016-10165). Confidential information can be exposed externally.
CVE-2016-9963 Vulnerability in exim (CVE-2016-9963)
vulnerability in exim (CVE-2016-9963). Confidential information can be exposed externally.
CVE-2016-9119 Cross-Site Scripting (XSS) in moinmo (CVE-2016-9119)
cross-site scripting in moinmo (CVE-2016-9119). Risk of unauthorized operations or information disclosure.
CVE-2015-7973 Vulnerability in ntp (CVE-2015-7973)
vulnerability in ntp (CVE-2015-7973). Risk of unauthorized operations or information disclosure.
CVE-2015-7977 Vulnerability in dos (CVE-2015-7977)
vulnerability in dos (CVE-2015-7977). Risk of unauthorized operations or information disclosure.
CVE-2017-3313 Vulnerability in oracle (CVE-2017-3313)
vulnerability in oracle (CVE-2017-3313). Confidential information can be exposed externally.
CVE-2016-5824 Use-After-Free in dos (CVE-2016-5824)
vulnerability in dos (CVE-2016-5824). Risk of unauthorized operations or information disclosure.
CVE-2016-2090 Buffer Overflow in fedoraproject (CVE-2016-2090)
vulnerability in fedoraproject (CVE-2016-2090). Successful exploitation can lead to full system takeover.
CVE-2016-7426 Vulnerability in dos (CVE-2016-7426)
vulnerability in dos (CVE-2016-7426). Risk of unauthorized operations or information disclosure.

🍪 About cookies

We use cookies to keep you logged in, remember your language, and improve the service.

Details →