Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2017-14491 |
|
Out-of-Bounds Write in platform/external/dnsmasq (CVE-2017-14491)
out-of-bounds write in platform/external/dnsmasq (CVE-2017-14491). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `11:2021-03-01` or later.
|
| CVE-2017-16997 |
|
Vulnerability in c (CVE-2017-16997)
vulnerability in c (CVE-2017-16997). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17405 |
|
OS Command Injection in ruby-lang (CVE-2017-17405)
OS command injection in ruby-lang (CVE-2017-17405). Successful exploitation can lead to full system takeover.
|
| CVE-2017-11305 |
|
Vulnerability in adobe (CVE-2017-11305)
vulnerability in adobe (CVE-2017-11305). Data can be tampered with by attackers.
|
| CVE-2017-1000407 |
|
Vulnerability in dos (CVE-2017-1000407)
vulnerability in dos (CVE-2017-1000407). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-3114 |
|
Out-of-Bounds Read in redhat (CVE-2017-3114)
vulnerability in redhat (CVE-2017-3114). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3112 |
|
Out-of-Bounds Read in redhat (CVE-2017-3112)
vulnerability in redhat (CVE-2017-3112). Successful exploitation can lead to full system takeover.
|
| CVE-2017-11225 |
|
Use-After-Free in redhat (CVE-2017-11225)
vulnerability in redhat (CVE-2017-11225). Successful exploitation can lead to full system takeover.
|
| CVE-2017-11215 |
|
Use-After-Free in redhat (CVE-2017-11215)
vulnerability in redhat (CVE-2017-11215). Successful exploitation can lead to full system takeover.
|
| CVE-2017-11213 |
|
Out-of-Bounds Read in redhat (CVE-2017-11213)
vulnerability in redhat (CVE-2017-11213). Successful exploitation can lead to full system takeover.
|
| CVE-2017-1000410 |
|
Information Disclosure in linux (CVE-2017-1000410)
vulnerability in linux (CVE-2017-1000410). Confidential information can be exposed externally.
|
| CVE-2017-15121 |
|
Vulnerability in redhat (CVE-2017-15121)
vulnerability in redhat (CVE-2017-15121). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-11282 |
|
Buffer Overflow in adobe (CVE-2017-11282)
vulnerability in adobe (CVE-2017-11282). Successful exploitation can lead to full system takeover.
|
| CVE-2017-11281 |
|
Buffer Overflow in adobe (CVE-2017-11281)
vulnerability in adobe (CVE-2017-11281). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15275 |
|
Buffer Overflow in samba (CVE-2017-15275)
vulnerability in samba (CVE-2017-15275). Confidential information can be exposed externally.
|
| CVE-2017-14746 |
|
Use-After-Free in samba (CVE-2017-14746)
vulnerability in samba (CVE-2017-14746). Successful exploitation can lead to full system takeover.
|
| CVE-2017-3157 |
|
Information Disclosure in apache (CVE-2017-3157)
vulnerability in apache (CVE-2017-3157). Confidential information can be exposed externally.
|
| CVE-2016-8610 |
|
Vulnerability in dos (CVE-2016-8610)
vulnerability in dos (CVE-2016-8610). Risk of unauthorized operations or information disclosure.
|
| CVE-2015-7529 |
|
Vulnerability in sos-project (CVE-2015-7529)
vulnerability in sos-project (CVE-2015-7529). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16541 |
|
Information Disclosure in torproject (CVE-2017-16541)
vulnerability in torproject (CVE-2017-16541). Confidential information can be exposed externally.
|
| CVE-2017-5105 |
|
Vulnerability in google (CVE-2017-5105)
vulnerability in google (CVE-2017-5105). Data can be tampered with by attackers.
|
| CVE-2017-5103 |
|
Vulnerability in google (CVE-2017-5103)
vulnerability in google (CVE-2017-5103). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-5104 |
|
Vulnerability in google (CVE-2017-5104)
vulnerability in google (CVE-2017-5104). Data can be tampered with by attackers.
|
| CVE-2017-5106 |
|
Vulnerability in google (CVE-2017-5106)
vulnerability in google (CVE-2017-5106). Data can be tampered with by attackers.
|
| CVE-2017-5107 |
|
Vulnerability in google (CVE-2017-5107)
vulnerability in google (CVE-2017-5107). Confidential information can be exposed externally.
|
| CVE-2017-5108 |
|
Vulnerability in google (CVE-2017-5108)
vulnerability in google (CVE-2017-5108). Successful exploitation can lead to full system takeover.
|
| CVE-2017-5109 |
|
Vulnerability in google (CVE-2017-5109)
vulnerability in google (CVE-2017-5109). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-5111 |
|
Use-After-Free in google (CVE-2017-5111)
vulnerability in google (CVE-2017-5111). Successful exploitation can lead to full system takeover.
|
| CVE-2017-5113 |
|
Out-of-Bounds Write in google (CVE-2017-5113)
out-of-bounds write in google (CVE-2017-5113). Successful exploitation can lead to full system takeover.
|
| CVE-2017-5114 |
|
Buffer Overflow in google (CVE-2017-5114)
vulnerability in google (CVE-2017-5114). Successful exploitation can lead to full system takeover.
|
| CVE-2017-5116 |
|
Vulnerability in google (CVE-2017-5116)
vulnerability in google (CVE-2017-5116). Successful exploitation can lead to full system takeover.
|
| CVE-2017-5121 |
|
Vulnerability in google (CVE-2017-5121)
vulnerability in google (CVE-2017-5121). Successful exploitation can lead to full system takeover.
|
| CVE-2017-5118 |
|
Vulnerability in google (CVE-2017-5118)
vulnerability in google (CVE-2017-5118). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-5120 |
|
Vulnerability in google (CVE-2017-5120)
vulnerability in google (CVE-2017-5120). Data can be tampered with by attackers.
|
| CVE-2017-5110 |
|
Vulnerability in google (CVE-2017-5110)
vulnerability in google (CVE-2017-5110). Data can be tampered with by attackers.
|
| CVE-2017-5088 |
|
Out-of-Bounds Read in google (CVE-2017-5088)
vulnerability in google (CVE-2017-5088). Successful exploitation can lead to full system takeover.
|
| CVE-2017-5075 |
|
Information Disclosure in google (CVE-2017-5075)
vulnerability in google (CVE-2017-5075). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-5076 |
|
Vulnerability in google (CVE-2017-5076)
vulnerability in google (CVE-2017-5076). Data can be tampered with by attackers.
|
| CVE-2017-5077 |
|
Out-of-Bounds Read in google (CVE-2017-5077)
vulnerability in google (CVE-2017-5077). Successful exploitation can lead to full system takeover.
|
| CVE-2017-5078 |
|
Vulnerability in c (CVE-2017-5078)
vulnerability in c (CVE-2017-5078). Successful exploitation can lead to full system takeover.
|
| CVE-2017-5079 |
|
Vulnerability in google (CVE-2017-5079)
vulnerability in google (CVE-2017-5079). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-5081 |
|
Vulnerability in google (CVE-2017-5081)
vulnerability in google (CVE-2017-5081). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-5083 |
|
Vulnerability in google (CVE-2017-5083)
vulnerability in google (CVE-2017-5083). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-5086 |
|
Vulnerability in google (CVE-2017-5086)
vulnerability in google (CVE-2017-5086). Data can be tampered with by attackers.
|
| CVE-2017-5087 |
|
Use-After-Free in google (CVE-2017-5087)
vulnerability in google (CVE-2017-5087). Successful exploitation can lead to full system takeover.
|
| CVE-2017-5101 |
|
Vulnerability in google (CVE-2017-5101)
vulnerability in google (CVE-2017-5101). Data can be tampered with by attackers.
|
| CVE-2017-5098 |
|
Use-After-Free in google (CVE-2017-5098)
vulnerability in google (CVE-2017-5098). Successful exploitation can lead to full system takeover.
|
| CVE-2017-5100 |
|
Use-After-Free in google (CVE-2017-5100)
vulnerability in google (CVE-2017-5100). Successful exploitation can lead to full system takeover.
|
| CVE-2017-5091 |
|
Use-After-Free in google (CVE-2017-5091)
vulnerability in google (CVE-2017-5091). Successful exploitation can lead to full system takeover.
|
| CVE-2017-5102 |
|
Vulnerability in google (CVE-2017-5102)
vulnerability in google (CVE-2017-5102). Risk of unauthorized operations or information disclosure.
|