Welcome to the Security Tapestry CVE Report! This report provides a comprehensive list of Common Vulnerabilities and Exposures (CVEs) sourced from the National Vulnerability Database (NVD). The report is designed to help you quickly find and analyze vulnerabilities based on specific keywords.
Version 240703
Date of last report run: 2026-05-18
CVE Impact Score (1-10, 10 being the worst) Keyword Description Last Modified Link
CVE-2017-0160 5.9 .NET Framework Microsoft .NET Framework 2.0, 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allows an attacker with access to the local system to execute malicious code, aka ".NET Remote Code Execution Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0160
CVE-2017-0248 3.6 .NET Framework Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka ".NET Security Feature Bypass Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0248
CVE-2017-8585 3.6 .NET Framework Microsoft .NET Framework 4.6, 4.6.1, 4.6.2, and 4.7 allow an attacker to send specially crafted requests to a .NET web application, resulting in denial of service, aka .NET Denial of Service Vulnerability. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8585
CVE-2026-42212 N/A .NET Framework SolidCAM-GPPL-IDE is an unofficial, independently developed extension, Postprocessor IDE for SolidCAM. From version 1.0.0 to before version 1.0.2, Opening a .gpp file in the SolidCAM Postprocessor IDE extension causes the language server to parse a companion .vmid file from the same directory (naming convention: foo.gpp to foo.vmid). The VMID parser called XDocument.Load(path) without any XmlReaderSettings, inheriting the framework defaults which in .NET 8 allow DTD processing. A malicious .vmid file could therefore: disclose local files via external entity references, exhaust memory via recursive entity expansion, and cause denial of service via oversized or deeply nested XML. This issue has been patched in version 1.0.2. 2026-05-12T16:43:27.870 https://cve.circl.lu/cve/CVE-2026-42212
CVE-2017-3736 3.6 ADX There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3736
CVE-2017-3738 3.6 ADX There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3738
CVE-2026-43307 5.9 ADX In the Linux kernel, the following vulnerability has been resolved:iio: accel: adxl380: Avoid reading more entries than present in FIFOThe interrupt handler reads FIFO entries in batches of N samples, where Nis the number of scan elements that have been enabled. However, the sensorfills the FIFO one sample at a time, even when more than one channel isenabled. Therefore,the number of entries reported by the FIFO statusregisters may not be a multiple of N; if this number is not a multiple, thenumber of entries read from the FIFO may exceed the number of entriesactually present.To fix the above issue, round down the number of FIFO entries read from thestatus registers so that it is always a multiple of N. 2026-05-15T19:51:42.040 https://cve.circl.lu/cve/CVE-2026-43307
CVE-2017-5527 1.4 AWS TIBCO Spotfire Server 7.0.X before 7.0.2, 7.5.x before 7.5.1, 7.6.x before 7.6.1, 7.7.x before 7.7.1, and 7.8.x before 7.8.1 and Spotfire Analytics Platform for AWS Marketplace 7.8.0 and earlier contain multiple vulnerabilities which may allow authorized users to perform SQL injection attacks. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5527
CVE-2017-5528 5.9 AWS Multiple JasperReports Server components contain vulnerabilities which may allow authorized users to perform cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks. The impact of this vulnerability includes the theoretical disclosure of sensitive information. Affects TIBCO JasperReports Server (versions 6.1.1 and below, 6.2.0, 6.2.1, and 6.3.0), TIBCO JasperReports Server Community Edition (versions 6.3.0 and below), TIBCO JasperReports Server for ActiveMatrix BPM (versions 6.2.0 and below), TIBCO Jaspersoft for AWS with Multi-Tenancy (versions 6.2.0 and below), and TIBCO Jaspersoft Reporting and Analytics for AWS (versions 6.2.0 and below). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5528
CVE-2017-5529 1.4 AWS JasperReports library components contain an information disclosure vulnerability. This vulnerability includes the theoretical disclosure of any accessible information from the host file system. Affects TIBCO JasperReports Library Community Edition (versions 6.4.0 and below), TIBCO JasperReports Library for ActiveMatrix BPM (versions 6.2.0 and below), TIBCO JasperReports Professional (versions 6.2.1 and below, and 6.3.0), TIBCO JasperReports Server (versions 6.1.1 and below, 6.2.0, 6.2.1, 6.3.0), TIBCO JasperReports Server Community Edition (versions 6.3.0 and below), TIBCO JasperReports Server for ActiveMatrix BPM (versions 6.2.0 and below), TIBCO Jaspersoft for AWS with Multi-Tenancy (versions 6.3.0 and below), TIBCO Jaspersoft Reporting and Analytics for AWS (versions 6.3.0 and below), and TIBCO Jaspersoft Studio for ActiveMatrix BPM (versions 6.2.0 and below). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5529
CVE-2017-14705 5.9 AWS DenyAll WAF before 6.4.1 allows unauthenticated remote command execution via TCP port 3001 because shell metacharacters can be inserted into the type parameter to the tailDateFile function in /webservices/stream/tail.php. An iToken authentication parameter is required but can be obtained by exploiting CVE-2017-14706. This affects DenyAll i-Suite LTS 5.5.0 through 5.5.12, i-Suite 5.6, Web Application Firewall 5.7, and Web Application Firewall 6.x before 6.4.1, with On Premises or AWS/Azure cloud deployments. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-14705
CVE-2017-14706 5.9 AWS DenyAll WAF before 6.4.1 allows unauthenticated remote attackers to obtain authentication information by making a typeOf=debug request to /webservices/download/index.php, and then reading the iToken field in the reply. This affects DenyAll i-Suite LTS 5.5.0 through 5.5.12, i-Suite 5.6, Web Application Firewall 5.7, and Web Application Firewall 6.x before 6.4.1, with On Premises or AWS/Azure cloud deployments. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-14706
CVE-2017-2929 2.7 Adobe Adobe Acrobat Chrome extension version 15.1.0.3 and earlier have a DOM-based cross-site scripting vulnerability. Successful exploitation could lead to JavaScript code execution. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2929
CVE-2017-2970 5.9 Adobe Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability in the XSLT engine related to template manipulation. Successful exploitation could lead to arbitrary code execution. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2970
CVE-2017-2971 5.9 Adobe Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability in the JPEG decoder routine. Successful exploitation could lead to arbitrary code execution. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2971
CVE-2017-2972 5.9 Adobe Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion module related to JPEG parsing. Successful exploitation could lead to arbitrary code execution. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2972
CVE-2017-2968 5.2 Adobe Adobe Campaign versions 16.4 Build 8724 and earlier have a code injection vulnerability. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2968
CVE-2017-4895 6.0 Airwatch Airwatch Agent for Android contains a vulnerability that may allow a device to bypass root detection. Successful exploitation of this issue may result in an enrolled device having unrestricted access over local Airwatch security controls and data. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-4895
CVE-2017-4896 1.4 Airwatch Airwatch Inbox for Android contains a vulnerability that may allow a rooted device to decrypt the local data used by the application. Successful exploitation of this issue may result in an unauthorized disclosure of confidential data. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-4896
CVE-2017-4930 2.7 Airwatch VMware AirWatch Console 9.x prior to 9.2.0 contains a vulnerability that could allow an authenticated AWC user to add a malicious URL to an enrolled device's 'Links' page. Successful exploitation of this issue could result in an unsuspecting AWC user being redirected to a malicious URL. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-4930
CVE-2017-4931 5.9 Airwatch VMware AirWatch Console 9.x prior to 9.2.0 contains a vulnerability that could allow an authenticated AWC user to add malicious data to an enrolled device's log files. Successful exploitation of this issue could result in an unsuspecting AWC user opening a CSV file which contains malicious content. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-4931
CVE-2017-4932 5.9 Airwatch VMware AirWatch Launcher for Android prior to 3.2.2 contains a vulnerability that could allow an escalation of privilege from the launcher UI context menu to native UI functionality and privilege. Successful exploitation of this issue could result in an escalation of privilege. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-4932
CVE-2017-6189 5.9 Amazon Untrusted search path vulnerability in Amazon Kindle for PC before 1.19 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse DLL in the current working directory of the Kindle Setup installer. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6189
CVE-2015-7292 5.9 Amazon Stack-based buffer overflow in the havok_write function in drivers/staging/havok/havok.c in Amazon Fire OS before 2016-01-15 allows attackers to cause a denial of service (panic) or possibly have unspecified other impact via a long string to /dev/hv. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-7292
CVE-2017-14622 2.7 Amazon Multiple cross-site scripting (XSS) vulnerabilities in the 2kb Amazon Affiliates Store plugin before 2.1.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) page parameter or (2) kbAction parameter in the kbAmz page to wp-admin/admin.php. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-14622
CVE-2017-9450 5.9 Amazon The Amazon Web Services (AWS) CloudFormation bootstrap tools package (aka aws-cfn-bootstrap) before 1.4-19.10 allows local users to execute arbitrary code with root privileges by leveraging the ability to create files in an unspecified directory. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9450
CVE-2017-16867 3.6 Amazon Amazon Key through 2017-11-16 mishandles Cloud Cam 802.11 deauthentication frames during the delivery process, which makes it easier for (1) delivery drivers to freeze a camera and re-enter a house for unfilmed activities or (2) attackers to freeze a camera and enter a house if a delivery driver failed to ensure a locked door before leaving. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-16867
CVE-2016-10140 3.6 Apache Information disclosure and authentication bypass vulnerability exists in the Apache HTTP Server configuration bundled with ZoneMinder v1.30 and v1.29, which allows a remote unauthenticated attacker to browse all directories in the web root, e.g., a remote unauthenticated attacker can view all CCTV images on the server via the /events URI. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10140
CVE-2015-3188 5.9 Apache The UI daemon in Apache Storm 0.10.0 before 0.10.0-beta1 allows remote attackers to execute arbitrary code via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-3188
CVE-2016-6497 3.6 Apache main/java/org/apache/directory/groovyldap/LDAP.java in the Groovy LDAP API in Apache allows attackers to conduct LDAP entry poisoning attacks by leveraging setting returnObjFlag to true for all search methods. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6497
CVE-2017-5169 5.9 Apache An issue was discovered in Hanwha Techwin Smart Security Manager Versions 1.5 and prior. Multiple Cross Site Request Forgery vulnerabilities have been identified. The flaws exist within the Redis and Apache Felix Gogo servers that are installed as part of this product. By issuing specific HTTP Post requests, an attacker can gain system level access to a remote shell session. Smart Security Manager Versions 1.5 and prior are affected by these vulnerabilities. These vulnerabilities can allow for remote code execution. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5169
CVE-2017-6056 3.6 Apache It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6056
CVE-2017-5545 5.2 Apple The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5545
CVE-2016-5546 3.6 Apple Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Integrity impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5546
CVE-2016-5547 1.4 Apple Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Availability impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5547
CVE-2016-5548 3.6 Apple Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5548
CVE-2016-5549 3.6 Apple Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5549
CVE-2017-9476 3.6 Arris The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices makes it easy for remote attackers to determine the hidden SSID and passphrase for a Home Security Wi-Fi network. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9476
CVE-2017-9490 5.9 Arris The Comcast firmware on Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices allows configuration changes via CSRF. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9490
CVE-2017-9491 1.4 Arris The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices does not set the secure flag for cookies in an https session to an administration application, which makes it easier for remote attackers to capture these cookies by intercepting their transmission within an http session. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9491
CVE-2017-9492 3.6 Arris The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices does not include the HTTPOnly flag in a Set-Cookie header for administration applications, which makes it easier for remote attackers to obtain potentially sensitive information via script access to cookies. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9492
CVE-2017-9521 5.9 Arris The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices allows remote attackers to execute arbitrary code via a specific (but unstated) exposed service. NOTE: the scope of this CVE does NOT include the concept of "Unnecessary Services" in general; the scope is only a single service that is unnecessarily exposed, leading to remote code execution. The details of that service might be disclosed at a later date. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9521
CVE-2015-3653 5.9 Aruba Aruba Networks ClearPass Policy Manager before 6.4.7 and 6.5.x before 6.5.2 allows remote authenticated administrators to write to arbitrary files within the underlying operating system and consequently cause a denial of service or gain privileges by leveraging incorrect permission checking. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-3653
CVE-2015-3654 5.9 Aruba Aruba Networks ClearPass Policy Manager before 6.4.7 and 6.5.x before 6.5.2 allows remote authenticated administrators to gain root privileges via unspecified vectors, a different vulnerability than CVE-2015-4649. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-3654
CVE-2015-3655 5.9 Aruba Cross-site request forgery (CSRF) vulnerability in Aruba Networks ClearPass Policy Manager before 6.4.7 and 6.5.x before 6.5.2 allows remote attackers to hijack the authentication of administrators by leveraging improper enforcement of the anti-CSRF token. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-3655
CVE-2015-3656 5.9 Aruba Aruba Networks ClearPass Policy Manager before 6.4.7 and 6.5.x before 6.5.2 allows remote authenticated lower-level administrators to gain privileges by leveraging failure to properly enforce authorization checks. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-3656
CVE-2015-3657 5.9 Aruba Aruba Networks ClearPass Policy Manager before 6.4.7 and 6.5.x before 6.5.2 allows remote authenticated lower-level administrators to gain "Super Admin" privileges via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-3657
CVE-2016-6283 2.7 Atlassian Cross-site scripting (XSS) vulnerability in Atlassian Confluence before 5.10.6 allows remote attackers to inject arbitrary web script or HTML via the newFileName parameter to pages/doeditattachment.action. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6283
CVE-2016-6668 3.6 Atlassian The Atlassian Hipchat Integration Plugin for Bitbucket Server 6.26.0 before 6.27.5, 6.28.0 before 7.3.7, and 7.4.0 before 7.8.17; Confluence HipChat plugin 6.26.0 before 7.8.17; and HipChat for JIRA plugin 6.26.0 before 7.8.17 allows remote attackers to obtain the secret key for communicating with HipChat instances by reading unspecified pages. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6668
CVE-2016-6285 2.7 Atlassian Cross-site scripting (XSS) vulnerability in includes/decorators/global-translations.jsp in Atlassian JIRA before 7.2.2 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6285
CVE-2016-4317 2.7 Atlassian Atlassian Confluence Server before 5.9.11 has XSS on the viewmyprofile.action page. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4317
CVE-2016-4318 2.7 Atlassian Atlassian JIRA Server before 7.1.9 has XSS in project/ViewDefaultProjectRoleActors.jspa via a role name. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4318
CVE-2017-6506 5.9 Azure In Azure Data Expert Ultimate 2.2.16, the SMTP verification function suffers from a buffer overflow vulnerability, leading to remote code execution. The attack vector is a crafted SMTP daemon that sends a long 220 (aka "Service ready") string. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6506
CVE-2017-4964 6.0 Azure Cloud Foundry Foundation BOSH Azure CPI v22 could potentially allow a maliciously crafted stemcell to execute arbitrary code on VMs created by the director, aka a "CPI code injection vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-4964
CVE-2017-6131 5.9 Azure In some circumstances, an F5 BIG-IP version 12.0.0 to 12.1.2 and 13.0.0 Azure cloud instance may contain a default administrative password which could be used to remotely log into the BIG-IP system. The impacted administrative account is the Azure instance administrative user that was created at deployment. The root and admin accounts are not vulnerable. An attacker may be able to remotely access the BIG-IP host via SSH. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6131
CVE-2017-8613 5.9 Azure Azure AD Connect Password writeback, if misconfigured during enablement, allows an attacker to reset passwords and gain unauthorized access to arbitrary on-premises AD privileged user accounts aka "Azure AD Connect Elevation of Privilege Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8613
CVE-2017-9653 5.9 Azure An Improper Authorization issue was discovered in OSIsoft PI Integrator for Business Analytics before 2016 R2, PI Integrator for Microsoft Azure before 2016 R2 SP1, and PI Integrator for SAP HANA before 2017. An attacker is able to gain privileged access to the system while unauthorized. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9653
CVE-2016-10142 4.0 Atom An issue was discovered in the IPv6 protocol specification, related to ICMP Packet Too Big (PTB) messages. (The scope of this CVE is all affected IPv6 implementations from all vendors.) The security implications of IP fragmentation have been discussed at length in [RFC6274] and [RFC7739]. An attacker can leverage the generation of IPv6 atomic fragments to trigger the use of fragmentation in an arbitrary IPv6 flow (in scenarios in which actual fragmentation of packets is not needed) and can subsequently perform any type of fragmentation-based attack against legacy IPv6 nodes that do not implement [RFC6946]. That is, employing fragmentation where not actually needed allows for fragmentation-based attack vectors to be employed, unnecessarily. We note that, unfortunately, even nodes that already implement [RFC6946] can be subject to DoS attacks as a result of the generation of IPv6 atomic fragments. Let us assume that Host A is communicating with Host B and that, as a result of the widespread dropping of IPv6 packets that contain extension headers (including fragmentation) [RFC7872], some intermediate node filters fragments between Host B and Host A. If an attacker sends a forged ICMPv6 PTB error message to Host B, reporting an MTU smaller than 1280, this will trigger the generation of IPv6 atomic fragments from that moment on (as required by [RFC2460]). When Host B starts sending IPv6 atomic fragments (in response to the received ICMPv6 PTB error message), these packets will be dropped, since we previously noted that IPv6 packets with extension headers were being dropped between Host B and Host A. Thus, this situation will result in a DoS scenario. Another possible scenario is that in which two BGP peers are employing IPv6 transport and they implement Access Control Lists (ACLs) to drop IPv6 fragments (to avoid control-plane attacks). If the aforementioned BGP peers drop IPv6 fragments but still honor received ICMPv6 PTB error messages, an attacker could easily attack the corresponding peering session by simply sending an ICMPv6 PTB message with a reported MTU smaller than 1280 bytes. Once the attack packet has been sent, the aforementioned routers will themselves be the ones dropping their own traffic. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10142
CVE-2016-2399 5.9 Atom Integer overflow in the quicktime_read_pascal function in libquicktime 1.2.4 and earlier allows remote attackers to cause a denial of service or possibly have other unspecified impact via a crafted hdlr MP4 atom. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-2399
CVE-2016-8739 3.6 Atom The JAX-RS module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 provides a number of Atom JAX-RS MessageBodyReaders. These readers use Apache Abdera Parser which expands XML entities by default which represents a major XXE risk. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8739
CVE-2017-12980 2.7 Atom DokuWiki through 2017-02-19c has stored XSS when rendering a malicious RSS or Atom feed, in /inc/parser/xhtml.php. An attacker can create or edit a wiki that uses RSS or Atom data from an attacker-controlled server to trigger JavaScript execution. The JavaScript can be in an author field, as demonstrated by the dc:creator element. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-12980
CVE-2017-13723 5.9 Atom In X.Org Server (aka xserver and xorg-server) before 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-13723
CVE-2017-0247 3.6 ASP.NET A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0247
CVE-2017-0249 3.4 ASP.NET An elevation of privilege vulnerability exists when the ASP.NET Core fails to properly sanitize web requests. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0249
CVE-2017-0256 1.4 ASP.NET A spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0256
CVE-2017-9140 2.7 ASP.NET Cross-site scripting (XSS) vulnerability in Telerik.ReportViewer.WebForms.dll in Telerik Reporting for ASP.NET WebForms Report Viewer control before R1 2017 SP2 (11.0.17.406) allows remote attackers to inject arbitrary web script or HTML via the bgColor parameter to Telerik.ReportViewer.axd. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9140
CVE-2017-11879 5.9 ASP.NET ASP.NET Core 2.0 allows an attacker to steal log-in session information such as cookies or authentication tokens via a specially crafted URL aka "ASP.NET Core Elevation Of Privilege Vulnerability". 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-11879
CVE-2026-41432 4.2 Artificial Intelligence New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.12.10, a vulnerability exists in the Stripe webhook handler that allows an unauthenticated attacker to forge webhook events and credit arbitrary quota to their account without making any payment. This issue has been patched in version 0.12.10. 2026-05-18T18:28:06.997 https://cve.circl.lu/cve/CVE-2026-41432
CVE-2026-42339 4.2 Artificial Intelligence New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. In versions 0.11.9-alpha.1 and prior, the SSRF protection introduced in v0.9.0.5 (CVE-2025-59146) and hardened in v0.9.6 (CVE-2025-62155) does not block the unspecified address 0.0.0.0. A regular (non-admin) user holding any valid API token can send a multimodal request to /v1/chat/completions, /v1/responses, or /v1/messages with 0.0.0.0 as the image/file URL host, bypassing the private-IP filter and causing the server to issue HTTP requests to localhost. This constitutes at minimum a blind SSRF; when the request is routed through an AWS/Bedrock Claude adaptor, the fetched content is inlined into the model response, upgrading it to a full-read SSRF. At time of publication, there are no publicly available patches. 2026-05-18T14:56:00.500 https://cve.circl.lu/cve/CVE-2026-42339
CVE-2026-43899 6.0 Artificial Intelligence DeepChat is an open-source artificial intelligence agent platform that unifies models, tools, and agents. Prior to v1.0.4-beta.1, An incomplete mitigation for CVE-2025-55733 leaves DeepChat vulnerable to an arbitrary protocol execution bypass (RCE). While the patch correctly restricted api.openExternal() inside the renderer's preload/index.ts script, it structurally neglected to sanitize native Electron pop-up window handlers. An attacker or a compromised AI endpoint returning a Markdown link can trigger a target="_blank" native window interception in tabPresenter.ts, which forwards the malicious URL directly to shell.openExternal(url) and completely bypasses the isValidExternalUrl security boundary. This vulnerability is fixed in v1.0.4-beta.1. 2026-05-12T14:50:18.527 https://cve.circl.lu/cve/CVE-2026-43899
CVE-2026-43900 5.8 Artificial Intelligence DeepChat is an open-source artificial intelligence agent platform that unifies models, tools, and agents. Prior to v1.0.4-beta.1, a Cross-Site Scripting (XSS) vulnerability exists due to a discrepancy between the backend validation layer and the frontend browser rendering engine. The SVGSanitizer (src/main/lib/svgSanitizer.ts) restricts script execution by scrubbing javascript: protocols using plain-text regular expressions. However, it fails to account for HTML entity decoding prior to Vue's v-html DOM insertion inside the SvgArtifact.vue component. By feeding an SVG artifact with obfuscated entities (e.g., javascript:alert(1)), an attacker can completely bypass the sanitizer, culminating in arbitrary JavaScript execution when a victim interacts with the rendered SVG Element. This vulnerability is fixed in v1.0.4-beta.1. 2026-05-12T14:50:18.527 https://cve.circl.lu/cve/CVE-2026-43900
CVE-2025-32425 N/A Artificial Intelligence AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. In AutoGPT, the execution process is recorded to the console (stdout/stderr), and deployed in container mode, which is automatically captured by Docker and stored as "container logs". However, prior to 0.6.32, there is no limit on the log size when the container is deployed. When the number of user accesses is too large, the log on the server disk will be too large, causing disk resource exhaustion and eventually causing DoS. autogpt-platform-beta-v0.6.32 fixes the issue. 2026-05-13T16:32:31.457 https://cve.circl.lu/cve/CVE-2025-32425
CVE-2017-14397 5.9 AnyDesk AnyDesk before 3.6.1 on Windows has a DLL injection vulnerability. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-14397
CVE-2017-3813 5.9 AnyConnect A vulnerability in the Start Before Logon (SBL) module of Cisco AnyConnect Secure Mobility Client Software for Windows could allow an unauthenticated, local attacker to open Internet Explorer with the privileges of the SYSTEM user. The vulnerability is due to insufficient implementation of the access controls. An attacker could exploit this vulnerability by opening the Internet Explorer browser. An exploit could allow the attacker to use Internet Explorer with the privileges of the SYSTEM user. This may allow the attacker to execute privileged commands on the targeted system. This vulnerability affects versions prior to released versions 4.4.00243 and later and 4.3.05017 and later. Cisco Bug IDs: CSCvc43976. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3813
CVE-2017-6638 5.9 AnyConnect A vulnerability in how DLL files are loaded with Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to install and run an executable file with privileges equivalent to the Microsoft Windows SYSTEM account. The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. The attacker would need valid user credentials to exploit this vulnerability. This vulnerability affects all Cisco AnyConnect Secure Mobility Client for Windows software versions prior to 4.4.02034. Cisco Bug IDs: CSCvc97928. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6638
CVE-2017-6788 2.7 AnyConnect The WebLaunch functionality of Cisco AnyConnect Secure Mobility Client Software contains a vulnerability that could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the affected software. The vulnerability is due to insufficient input validation of some parameters that are passed to the WebLaunch function of the affected software. An attacker could exploit this vulnerability by convincing a user to access a malicious link or by intercepting a user request and injecting malicious code into the request. Cisco Bug IDs: CSCvf12055. Known Affected Releases: 98.89(40). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6788
CVE-2017-12268 4.0 AnyConnect A vulnerability in the Network Access Manager (NAM) of Cisco AnyConnect Secure Mobility Client could allow an authenticated, local attacker to enable multiple network adapters, aka a Dual-Homed Interface vulnerability. The vulnerability is due to insufficient NAM policy enforcement. An attacker could exploit this vulnerability by manipulating network interfaces of the device to allow multiple active network interfaces. A successful exploit could allow the attacker to send traffic over a non-authorized network interface. Cisco Bug IDs: CSCvf66539. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-12268
CVE-2016-4948 2.7 Active Directory Multiple cross-site scripting (XSS) vulnerabilities in Cloudera Manager 5.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) Template Name field when renaming a template; (2) KDC Server host, (3) Kerberos Security Realm, (4) Kerberos Encryption Types, (5) Advanced Configuration Snippet (Safety Valve) for [libdefaults] section of krb5.conf, (6) Advanced Configuration Snippet (Safety Valve) for the Default Realm in krb5.conf, (7) Advanced Configuration Snippet (Safety Valve) for remaining krb5.conf, or (8) Active Directory Account Prefix fields in the Kerberos wizard; or (9) classicWizard parameter to cmf/cloudera-director/redirect. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4948
CVE-2017-0043 3.6 Active Directory Active Directory Federation Services in Microsoft Windows 10 1607, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 Gold and R2, and Windows Server 2016 allows local users to obtain sensitive information via a crafted application, aka "Microsoft Active Directory Federation Services Information Disclosure Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0043
CVE-2017-6183 5.9 Active Directory In Sophos Web Appliance (SWA) before 4.3.1.2, a section of the machine's configuration utilities for adding (and detecting) Active Directory servers was vulnerable to remote command injection, aka NSWA-1314. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6183
CVE-2017-2402 5.9 Active Directory An issue was discovered in certain Apple products. macOS before 10.12.4 is affected. The issue involves mishandling of profile uninstall actions in the "MCX Client" component when a profile has multiple payloads. It allows remote attackers to bypass intended access restrictions by leveraging Active Directory certificate trust that should not have remained. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2402
CVE-2017-0164 3.6 Active Directory A denial of service vulnerability exists in Windows 10 1607 and Windows Server 2016 Active Directory when an authenticated attacker sends malicious search queries, aka "Active Directory Denial of Service Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0164
CVE-2015-6240 5.9 Ansible The chroot, jail, and zone connection plugins in ansible before 1.9.2 allow local users to escape a restricted environment via a symlink attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-6240
CVE-2014-3498 5.9 Ansible The user module in ansible before 1.6.6 allows remote authenticated users to execute arbitrary commands. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-3498
CVE-2017-2809 5.9 Ansible An exploitable vulnerability exists in the yaml loading functionality of ansible-vault before 1.0.5. A specially crafted vault can execute arbitrary python commands resulting in command execution. An attacker can insert python into the vault to trigger this vulnerability. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2809
CVE-2017-7550 5.9 Ansible A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords to be specified in the "params" argument, and noting this in the module documentation. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7550
CVE-2017-1000379 5.9 AMD64 The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-1000379
CVE-2017-8932 3.6 AMD64 A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go before 1.7.6 and 1.8.x before 1.8.2 causes incorrect results to be generated for specific input points. An adaptive attack can be mounted to progressively extract the scalar input to ScalarMult by submitting crafted points and observing failures to the derive correct output. This leads to a full key recovery attack against static ECDH, as used in popular JWT libraries. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8932
CVE-2019-11840 3.6 AMD64 An issue was discovered in the supplementary Go cryptography library, golang.org/x/crypto, before v0.0.0-20190320223903-b7391e95e576. A flaw was found in the amd64 implementation of the golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa packages. If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to predictability in CSPRNG applications. 2026-05-18T12:04:40.143 https://cve.circl.lu/cve/CVE-2019-11840
CVE-2016-10157 5.9 Akamai Akamai NetSession 1.9.3.1 is vulnerable to DLL Hijacking: it tries to load CSUNSAPI.dll without supplying the complete path. The issue is aggravated because the mentioned DLL is missing from the installation, thus making it possible to hijack the DLL and subsequently inject code within the Akamai NetSession process space. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10157
CVE-2017-12256 3.6 Akamai A vulnerability in the Akamai Connect feature of Cisco Wide Area Application Services (WAAS) Appliances could allow an unauthenticated, remote attacker to cause a denial-of-service (DoS) condition on an affected device. The vulnerability is due to certain file-handling inefficiencies of the affected system. An attacker could exploit this vulnerability by directing client systems to access a corrupted file that the client systems cannot decompress correctly. A successful exploit could allow the attacker to cause the affected device to crash or hang unexpectedly and result in a DoS condition that may require manual intervention to regain normal operating conditions. Cisco Bug IDs: CSCve82472. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-12256
CVE-2026-34354 5.9 Akamai Akamai Guardicore Platform Agent (GPA) and Zero Trust Client on Linux and macOS allow TOCTOU-based local privilege escalation. The GPA service creates an IPC socket in the world-writable /tmp directory. It accepts unauthenticated IPC control messages. This enables a TOCTOU vulnerability in the HandleSaveLogs() function of the GPA service, by creating a log file and manipulating it into a symlink that points to the targeted path; this can allow an unprivileged local user to make arbitrary root-owned files world-writable. In addition, a diagnostic collection tool (gimmelogs) running with root privileges was vulnerable to command injection from the dbstore, offering a second privilege escalation vector. (On Windows, gimmelogs does not have command injection but does allow writing a ZIP archive to an unintended location.) This affects Akamai Guardicore Platform Agent 7.0 through 7.3.1 and Akamai Zero Trust Client 6.0 through 6.1.5. 2026-05-12T15:10:27.993 https://cve.circl.lu/cve/CVE-2026-34354
CVE-2017-5682 5.9 AMP Intel PSET Application Install wrapper of Intel Parallel Studio XE, Intel System Studio, Intel VTune Amplifier, Intel Inspector, Intel Advisor, Intel MPI Library, Intel Trace Analyzer and Collector, Intel Integrated Performance Primitives, Cryptography for Intel Integrated Performance Primitives, Intel Math Kernel Library, Intel Data Analytics Acceleration Library, and Intel Threading Building Blocks before 2017 Update 2 allows an attacker to launch a process with escalated privileges. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5682
CVE-2017-5661 5.2 AMP In Apache FOP before 2.2, files lying on the filesystem of the server which uses FOP can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5661
CVE-2017-5662 5.2 AMP In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5662
CVE-2017-6519 5.2 AMP avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6519
CVE-2017-6520 5.2 AMP The Multicast DNS (mDNS) responder used in BOSE Soundtouch 30 inadvertently responds to IPv4 unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6520
CVE-2016-3128 4.2 BlackBerry A spoofing vulnerability in the Core of BlackBerry Enterprise Server (BES) 12 through 12.5.2 allows remote attackers to enroll an illegitimate device to the BES, gain access to device parameters for the BES, or send false information to the BES by gaining access to specific information about a device that was legitimately enrolled on the BES. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-3128
CVE-2016-3130 5.9 BlackBerry An information disclosure vulnerability in the Core and Management Console in BlackBerry Enterprise Server (BES) 12 through 12.5.2 allows remote attackers to obtain local or domain credentials of an administrator or user account by sniffing traffic between the two elements during a login attempt. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-3130
CVE-2017-3890 2.7 BlackBerry A reflected cross-site scripting vulnerability in the BlackBerry WatchDox Server components Appliance-X, version 1.8.1 and earlier, and vAPP, versions 4.6.0 to 5.4.1, allows remote attackers to execute script commands in the context of the affected browser by persuading a user to click an attacker-supplied malicious link. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3890
CVE-2016-3127 3.6 BlackBerry An information disclosure vulnerability in the logging implementation of BlackBerry Good Control Server versions earlier than 2.3.53.62 allows remote attackers to gain and use logged encryption keys to access certain resources within a customer's Good deployment by gaining access to certain diagnostic log files through either a valid logon or an unrelated compromise of the server. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-3127
CVE-2016-1914 5.9 BlackBerry Multiple SQL injection vulnerabilities in the com.rim.mdm.ui.server.ImageServlet servlet in BlackBerry Enterprise Server 12 (BES12) Self-Service before 12.4 allow remote attackers to execute arbitrary SQL commands via the imageName parameter to (1) mydevice/client/image, (2) admin/client/image, (3) myapps/client/image, (4) ssam/client/image, or (5) all/client/image. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-1914
CVE-2016-2147 3.6 BusyBox Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-2147
CVE-2016-2148 5.9 BusyBox Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-2148
CVE-2014-9645 3.6 BusyBox The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-9645
CVE-2017-5671 6.0 BusyBox Honeywell Intermec PM23, PM42, PM43, PC23, PC43, PD43, and PC42 industrial printers before 10.11.013310 and 10.12.x before 10.12.013309 have /usr/bin/lua installed setuid to the itadmin account, which allows local users to conduct a BusyBox jailbreak attack and obtain root privileges by overwriting the /etc/shadow file. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5671
CVE-2011-5325 3.6 BusyBox Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2011-5325
CVE-2017-17876 3.6 Biometric Biometric Shift Employee Management System 3.0 allows remote attackers to bypass intended file-read restrictions via a user=download request with a pathname in the path parameter. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-17876
CVE-2017-17989 2.7 Biometric Biometric Shift Employee Management System has XSS via the index.php holiday_name parameter in an edit_holiday action. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-17989
CVE-2017-17990 5.9 Biometric Biometric Shift Employee Management System has CSRF via index.php in an edit_holiday action. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-17990
CVE-2017-17991 2.7 Biometric Biometric Shift Employee Management System has XSS via the expense_name parameter in an index.php?user=expenses request. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-17991
CVE-2017-17992 5.9 Biometric Biometric Shift Employee Management System allows Arbitrary File Download via directory traversal sequences in the index.php form_file_name parameter in a download_form action. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-17992
CVE-2017-9230 3.6 Bitcoin The Bitcoin Proof-of-Work algorithm does not consider a certain attack methodology related to 80-byte block headers with a variety of initial 64-byte chunks followed by the same 16-byte chunk, multiple candidate root values ending with the same 4 bytes, and calculations involving sqrt numbers. This violates the security assumptions of (1) the choice of input, outside of the dedicated nonce area, fed into the Proof-of-Work function should not change its difficulty to evaluate and (2) every Proof-of-Work function execution should be independent. NOTE: a number of persons feel that this methodology is a benign mining optimization, not a vulnerability 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9230
CVE-2026-44714 3.6 Bitcoin The bitcoinj library is a Java implementation of the Bitcoin protocol. Prior to 0.17.1, ScriptExecution.correctlySpends() contains two fast-path verification bugs for standard P2PKH and native P2WPKH spends in core/src/main/java/org/bitcoinj/script/ScriptExecution.java. In both branches, bitcoinj verifies an attacker-controlled signature/public-key pair but fails to verify that the public key is the one committed to by the output being spent. As a result, any attacker keypair can satisfy bitcoinj's local verification for arbitrary P2PKH and P2WPKH outputs. This vulnerability is fixed in 0.17.1. 2026-05-18T19:59:59.590 https://cve.circl.lu/cve/CVE-2026-44714
CVE-2017-6320 5.9 Barracuda A remote command injection vulnerability exists in the Barracuda Load Balancer product line (confirmed on v5.4.0.004 (2015-11-26) and v6.0.1.006 (2016-08-19); fixed in 6.1.0.003 (2017-01-17)) in which an authenticated user can execute arbitrary shell commands and gain root privileges. The vulnerability stems from unsanitized data being processed in a system call when the delete_assessment command is issued. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6320
CVE-2014-8426 5.9 Barracuda Hard coded weak credentials in Barracuda Load Balancer 5.0.0.015. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-8426
CVE-2014-8428 5.9 Barracuda Privilege escalation vulnerability in Barracuda Load Balancer 5.0.0.015 via the use of an improperly protected SSH key. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-8428
CVE-2026-43487 N/A Barracuda In the Linux kernel, the following vulnerability has been resolved:ata: libata-core: Disable LPM on ST1000DM010-2EP102According to a user report, the ST1000DM010-2EP102 has problems with LPM,causing random system freezes. The drive belongs to the same BarraCudafamily as the ST2000DM008-2FR102 which has the same issue. 2026-05-13T16:16:51.997 https://cve.circl.lu/cve/CVE-2026-43487
CVE-2017-9860 5.9 Botnet An issue was discovered in SMA Solar Technology products. An attacker can use Sunny Explorer or the SMAdata2+ network protocol to update the device firmware without ever having to authenticate. If an attacker is able to create a custom firmware version that is accepted by the inverter, the inverter is compromised completely. This allows the attacker to do nearly anything: for example, giving access to the local OS, creating a botnet, using the inverters as a stepping stone into companies, etc. NOTE: the vendor reports that this attack has always been blocked by "a final integrity and compatibility check." Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9860
CVE-2017-15361 3.6 BitLocker The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-15361
CVE-2014-9909 5.9 Broadcom An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31676542. References: B-RB#26684. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-9909
CVE-2014-9910 5.9 Broadcom An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31746399. References: B-RB#26710. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-9910
CVE-2017-0430 5.9 Broadcom An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32838767. References: B-RB#107459. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0430
CVE-2017-0449 5.9 Broadcom An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.10. Android ID: A-31707909. References: B-RB#32094. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0449
CVE-2017-0509 5.9 Broadcom An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-32124445. References: B-RB#110688. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0509
CVE-2017-6186 5.9 BitDefender Code injection vulnerability in Bitdefender Total Security 12.0 (and earlier), Internet Security 12.0 (and earlier), and Antivirus Plus 12.0 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Bitdefender process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Image File Execution Options in the registry; (2) the self-protection mechanism is intended to block all local processes (regardless of privileges) from modifying Image File Execution Options for these products; and (3) this mechanism can be bypassed by an attacker who temporarily renames Image File Execution Options during the attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6186
CVE-2017-10950 5.9 BitDefender This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Bitdefender Total Security 21.0.24.62. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within processing of the 0x8000E038 IOCTL in the bdfwfpf driver. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker could leverage this vulnerability to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-4776. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-10950
CVE-2017-10954 5.9 BitDefender This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security Internet Security 2018 prior to build 7.72918. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within pdf.xmd. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code under the context of SYSTEM. Was ZDI-CAN-4361. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-10954
CVE-2017-17408 5.9 BitDefender This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security 2018. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within cevakrnl.xmd. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code under the context of SYSTEM. Was ZDI-CAN-5101. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-17408
CVE-2017-17409 5.9 BitDefender This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security 2018. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within emulator 0x10A in cevakrnl.xmd. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code under the context of SYSTEM. Was ZDI-CAN-5102. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-17409
CVE-2017-5475 5.9 CSRF comment.php in Serendipity through 2.0.5 allows CSRF in deleting any comments. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5475
CVE-2017-5476 5.9 CSRF Serendipity through 2.0.5 allows CSRF for the installation of an event plugin or a sidebar plugin. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5476
CVE-2016-8201 5.9 CSRF A CSRF vulnerability in Brocade Virtual Traffic Manager versions released prior to and including 11.0 could allow an attacker to trick a logged-in user into making administrative changes on the traffic manager cluster. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8201
CVE-2017-5368 5.9 CSRF ZoneMinder v1.30 and v1.29, an open-source CCTV server web application, is vulnerable to CSRF (Cross Site Request Forgery) which allows a remote attack to make changes to the web application as the current logged in victim. If the victim visits a malicious web page, the attacker can silently and automatically create a new admin user within the web application for remote persistence and further attacks. The URL is /zm/index.php and sample parameters could include action=user uid=0 newUser[Username]=attacker1 newUser[Password]=Password1234 conf_password=Password1234 newUser[System]=Edit (among others). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5368
CVE-2016-5809 5.9 CSRF An issue was discovered on Schneider Electric IONXXXX series power meters ION73XX series, ION75XX series, ION76XX series, ION8650 series, ION8800 series, and PM5XXX series. There is no CSRF Token generated to authenticate the user during a session. Successful exploitation of this vulnerability can allow unauthorized configuration changes to be made and saved. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5809
CVE-2016-9216 1.4 Cisco An IKE Packet Parsing Denial of Service Vulnerability in the ipsecmgr process of Cisco ASR 5000 Software could allow an unauthenticated, remote attacker to cause the ipsecmgr process to reload. More Information: CSCuy06917 CSCuy45036 CSCuy59525. Known Affected Releases: 20.0.0 20.0.M0.62842 20.0.v0 20.0.M0.63229 20.1.0 20.1.a0 20.1.v0 21.0.0 21.0.v0. Known Fixed Releases: 20.0.0 20.0.0.63250 20.0.M0.63148 20.0.R0.63294 20.0.R0.63316 20.0.V0.63170 20.0.VG0.63188 20.0.v0 20.0.v0.64175 20.0.vg0.63522 20.1.A0.63166 20.2.A0.63174 20.1.A0.63232 20.2.A0.63237 20.0.M0.63226 20.0.M0.63229 20.0.R0.63294 20.0.R0.63316 20.0.V0.63263 20.0.VG0.63233 20.0.v0 20.0.v0.64175 20.0.vg0.63522 20.1.0 20.1.0.63959 20.1.M0.63876 20.1.T0.63886 20.1.V0.64231 20.1.VA0.64194 20.1.VB0.64210 20.1.a0 20.1.a0.64023 20.1.v0 20.1.v0.64607 20.2.A0.63895 21.0.0 21.0.0.65256 21.0.M0.63881 21.0.M0.64281 21.0.PP0.64366 21.0.V0.65052 21.0.v0 21.0.v0.65831 21.0.vb0.65887 21.1.R0.65130 21.1.R0.65135. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9216
CVE-2016-9218 5.9 Cisco A vulnerability in Cisco Hybrid Meeting Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against the user of the web interface. More Information: CSCvc28662. Known Affected Releases: 1.0. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9218
CVE-2016-9220 1.4 Cisco A Denial of Service Vulnerability in 802.11 ingress packet processing of the Cisco Mobility Express 2800 and 3800 Access Points (APs) could allow an unauthenticated, adjacent attacker to cause the connection table to be full of invalid connections and be unable to process new incoming requests. More Information: CSCvb66659. Known Affected Releases: 8.2(130.0). Known Fixed Releases: 8.2(131.10) 8.2(131.6) 8.2(141.0) 8.3(104.56) 8.4(1.88) 8.4(1.91). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9220
CVE-2016-9221 1.4 Cisco A Denial of Service Vulnerability in 802.11 ingress connection authentication handling for the Cisco Mobility Express 2800 and 3800 Access Points (APs) could allow an unauthenticated, adjacent attacker to cause authentication to fail. Affected Products: This vulnerability affects Cisco Mobility Express 2800 Series and 3800 Series Access Points when configured in local mode in 40 MHz. More Information: CSCvb33575. Known Affected Releases: 8.2(121.12) 8.4(1.82). Known Fixed Releases: 8.2(131.2) 8.2(131.3) 8.2(131.4) 8.2(141.0) 8.3(104.53) 8.3(104.54) 8.4(1.80) 8.4(1.85). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9221
CVE-2016-9222 2.7 Cisco A vulnerability in the web-based management interface of Cisco NetFlow Generation Appliance could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. More Information: CSCvb15229. Known Affected Releases: 1.0(2). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9222
CVE-2016-9676 5.9 Citrix Buffer overflow in Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9676
CVE-2016-9677 1.4 Citrix Citrix Provisioning Services before 7.12 allows attackers to obtain sensitive kernel address information via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9677
CVE-2016-9678 5.9 Citrix Use-after-free vulnerability in Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9678
CVE-2016-9679 5.9 Citrix Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code by overwriting a function pointer. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9679
CVE-2016-9680 3.6 Citrix Citrix Provisioning Services before 7.12 allows attackers to obtain sensitive information from kernel memory via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9680
CVE-2013-7459 5.9 Cryptograph Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2013-7459
CVE-2016-5919 3.6 Cryptograph IBM Security Access Manager for Web 7.0.0, 8.0.0, and 9.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM Reference #: 1996868. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5919
CVE-2016-4693 3.6 Cryptograph An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Security" component, which makes it easier for attackers to bypass cryptographic protection mechanisms by leveraging use of the 3DES cipher. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4693
CVE-2015-4056 5.9 Cryptograph The System Library in VCE Vision Intelligent Operations before 2.6.5 does not properly implement cryptography, which makes it easier for local users to discover credentials by leveraging administrative access. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-4056
CVE-2017-3264 1.4 CRM Vulnerability in the Siebel UI Framework component of Oracle Siebel CRM (subcomponent: Open UI). The supported version that is affected is 16.1. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Siebel UI Framework. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Siebel UI Framework accessible data. CVSS v3.0 Base Score 3.1 (Integrity impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3264
CVE-2017-3325 4.7 CRM Vulnerability in the Siebel UI Framework component of Oracle Siebel CRM (subcomponent: EAI). The supported version that is affected is 16.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel UI Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Siebel UI Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Siebel UI Framework accessible data as well as unauthorized update, insert or delete access to some of Siebel UI Framework accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3325
CVE-2017-3330 4.7 CRM Vulnerability in the Siebel UI Framework component of Oracle Siebel CRM (subcomponent: Open UI). The supported version that is affected is 16.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Siebel UI Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Siebel UI Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Siebel UI Framework accessible data as well as unauthorized update, insert or delete access to some of Siebel UI Framework accessible data. CVSS v3.0 Base Score 7.6 (Confidentiality and Integrity impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3330
CVE-2017-3418 4.7 CRM Vulnerability in the Oracle CRM Technical Foundation component of Oracle E-Business Suite (subcomponent: User Interface). The supported version that is affected is 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data as well as unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3418
CVE-2017-3419 4.7 CRM Vulnerability in the Oracle CRM Technical Foundation component of Oracle E-Business Suite (subcomponent: User Interface). The supported version that is affected is 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle CRM Technical Foundation accessible data as well as unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3419
CVE-2017-7174 5.9 Chef The user-account creation feature in Chef Manage 2.1.0 through 2.4.4 allows remote attackers to execute arbitrary code. This is fixed in 2.4.5. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7174
CVE-2017-1000026 3.6 Chef Chef Software's mixlib-archive versions 0.3.0 and older are vulnerable to a directory traversal attack allowing attackers to overwrite arbitrary files by using ".." in tar archive entries 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-1000026
CVE-2015-8559 3.6 Chef The knife bootstrap command in chef Infra client before version 15.4.45 leaks the validator.pem private RSA key to /var/log/messages. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-8559
CVE-2016-10177 5.9 D-Link An issue was discovered on the D-Link DWR-932B router. Undocumented TELNET and SSH services provide logins to admin with the password admin and root with the password 1234. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10177
CVE-2016-10178 5.9 D-Link An issue was discovered on the D-Link DWR-932B router. HELODBG on port 39889 (UDP) launches the "/sbin/telnetd -l /bin/sh" command. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10178
CVE-2016-10179 3.6 D-Link An issue was discovered on the D-Link DWR-932B router. There is a hardcoded WPS PIN of 28296607. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10179
CVE-2016-10180 3.6 D-Link An issue was discovered on the D-Link DWR-932B router. WPS PIN generation is based on srand(time(0)) seeding. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10180
CVE-2016-10181 3.6 D-Link An issue was discovered on the D-Link DWR-932B router. qmiweb provides sensitive information for CfgType=get_homeCfg requests. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10181
CVE-2017-0290 5.9 Defender The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 does not properly scan a specially crafted file leading to memory corruption, aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0290
CVE-2017-8535 3.6 Defender The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8536, CVE-2017-8537, CVE-2017-8539, and CVE-2017-8542. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8535
CVE-2017-8536 3.6 Defender The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8535, CVE-2017-8537, CVE-2017-8539, and CVE-2017-8542. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8536
CVE-2017-8537 3.6 Defender The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8535, CVE-2017-8536, CVE-2017-8539, and CVE-2017-8542. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8537
CVE-2017-8538 5.9 Defender The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability", a different vulnerability than CVE-2017-8540 and CVE-2017-8541. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8538
CVE-2015-7270 5.9 Dell Dell Integrated Remote Access Controller (iDRAC) 6 before 2.80 and 7/8 before 2.21.21.21 allows directory traversal. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-7270
CVE-2015-7271 5.9 Dell Dell Integrated Remote Access Controller (iDRAC) 7/8 before 2.21.21.21 has a format string issue in racadm getsystinfo. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-7271
CVE-2015-7272 5.9 Dell Dell Integrated Remote Access Controller (iDRAC) 6 before 2.80 and 7/8 before 2.21.21.21 allows attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long SSH username or input. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-7272
CVE-2015-7273 5.9 Dell Dell Integrated Remote Access Controller (iDRAC) 7/8 before 2.21.21.21 has XXE. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-7273
CVE-2015-7274 5.9 Dell Dell Integrated Remote Access Controller (iDRAC) 6 before 2.80 allows remote attackers to execute arbitrary administrative HTTP commands. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-7274
CVE-2026-32244 1.4 Discourse Discourse is an open-source discussion platform. In versions prior to 2026.1.4, 2026.3.1, 2026.4.1 and 2026.5.0-latest.1, outdated cached AI summaries can leak removed content to anonymous and unprivileged users who cannot regenerate summaries. This issue has been fixed in versions 2026.1.4, 2026.3.1, 2026.4.1 and 2026.5.0-latest.1. To work around this issue, restrict summary generation by tightening the allowed groups on the summarization Personas. 2026-05-19T00:16:37.100 https://cve.circl.lu/cve/CVE-2026-32244
CVE-2026-33514 N/A Discourse Discourse is an open-source discussion platform. In versions prior to 2026.1.4, 2026.3.1, 2026.4.1 and 2026.5.0-latest.1, an authenticated user on a Discourse instance with the form templates feature enabled can read the name and structured content of form templates that are intended exclusively for categories they are not authorized to access. Impact is limited to disclosure of site configuration metadata. This issue has been fixed in versions 2026.1.4, 2026.3.1, 2026.4.1 and 2026.5.0-latest.1. 2026-05-19T02:16:16.210 https://cve.circl.lu/cve/CVE-2026-33514
CVE-2017-6591 2.7 Django There is a cross-site scripting vulnerability in django-epiceditor 0.2.3 via crafted content in a form field. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6591
CVE-2017-7233 2.7 Django Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7233
CVE-2017-7234 2.7 Django A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7234
CVE-2015-5081 5.9 Django Cross-site request forgery (CSRF) vulnerability in django CMS before 3.0.14, 3.1.x before 3.1.1 allows remote attackers to manipulate privileged users into performing unknown actions via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-5081
CVE-2017-12794 2.7 Django In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with "DEBUG = True" (which makes this page accessible) in your production settings. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-12794
CVE-2016-7569 3.6 Docker Directory traversal vulnerability in docker2aci before 0.13.0 allows remote attackers to write to arbitrary files via a .. (dot dot) in the embedded layer data in an image. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7569
CVE-2016-8954 5.9 Docker IBM dashDB Local uses hard-coded credentials that could allow a remote attacker to gain access to the Docker container or database. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8954
CVE-2017-6507 3.6 Docker An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6507
CVE-2017-7412 5.9 Docker NixOS 17.03 before 17.03.887 has a world-writable Docker socket, which allows local users to gain privileges by executing docker commands. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7412
CVE-2017-8928 5.9 Docker mailcow 0.14, as used in "mailcow: dockerized" and other products, has CSRF. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8928
CVE-2017-7886 5.9 Dolibarr Dolibarr ERP/CRM 4.0.4 has SQL Injection in doli/theme/eldy/style.css.php via the lang parameter. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7886
CVE-2017-7887 2.7 Dolibarr Dolibarr ERP/CRM 4.0.4 has XSS in doli/societe/list.php via the sall parameter. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7887
CVE-2017-7888 5.9 Dolibarr Dolibarr ERP/CRM 4.0.4 stores passwords with the MD5 algorithm, which makes brute-force attacks easier. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7888
CVE-2017-8879 5.9 Dolibarr Dolibarr ERP/CRM 4.0.4 allows password changes without supplying the current password, which makes it easier for physically proximate attackers to obtain access via an unattended workstation. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8879
CVE-2017-9435 5.9 Dolibarr Dolibarr ERP/CRM before 5.0.3 is vulnerable to a SQL injection in user/index.php (search_supervisor and search_statut parameters). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9435
CVE-2016-4484 5.9 Debian The Debian initrd script for the cryptsetup package 2:1.7.3-2 and earlier allows physically proximate attackers to gain shell access via many log in attempts with an invalid password. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4484
CVE-2016-9774 5.9 Debian The postinst script in the tomcat6 package before 6.0.45+dfsg-1~deb7u4 on Debian wheezy, before 6.0.35-1ubuntu3.9 on Ubuntu 12.04 LTS and on Ubuntu 14.04 LTS; the tomcat7 package before 7.0.28-4+deb7u8 on Debian wheezy, before 7.0.56-3+deb8u6 on Debian jessie, before 7.0.52-1ubuntu0.8 on Ubuntu 14.04 LTS, and on Ubuntu 12.04 LTS, 16.04 LTS, and 16.10; and the tomcat8 package before 8.0.14-1+deb8u5 on Debian jessie, before 8.0.32-1ubuntu1.3 on Ubuntu 16.04 LTS, before 8.0.37-1ubuntu0.1 on Ubuntu 16.10, and before 8.0.38-2ubuntu1 on Ubuntu 17.04 might allow local users with access to the tomcat account to obtain sensitive information or gain root privileges via a symlink attack on the Catalina localhost directory. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9774
CVE-2016-9775 5.9 Debian The postrm script in the tomcat6 package before 6.0.45+dfsg-1~deb7u3 on Debian wheezy, before 6.0.45+dfsg-1~deb8u1 on Debian jessie, before 6.0.35-1ubuntu3.9 on Ubuntu 12.04 LTS and on Ubuntu 14.04 LTS; the tomcat7 package before 7.0.28-4+deb7u7 on Debian wheezy, before 7.0.56-3+deb8u6 on Debian jessie, before 7.0.52-1ubuntu0.8 on Ubuntu 14.04 LTS, and on Ubuntu 12.04 LTS, 16.04 LTS, and 16.10; and the tomcat8 package before 8.0.14-1+deb8u5 on Debian jessie, before 8.0.32-1ubuntu1.3 on Ubuntu 16.04 LTS, before 8.0.37-1ubuntu0.1 on Ubuntu 16.10, and before 8.0.38-2ubuntu1 on Ubuntu 17.04 might allow local users with access to the tomcat account to gain root privileges via a setgid program in the Catalina directory, as demonstrated by /etc/tomcat8/Catalina/attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9775
CVE-2017-6964 5.9 Debian dmcrypt-get-device, as shipped in the eject package of Debian and Ubuntu, does not check the return value of the (1) setuid or (2) setgid function, which might cause dmcrypt-get-device to execute code, which was intended to run as an unprivileged user, as root. This affects eject through 2.1.5+deb1+cvs20081104-13.1 on Debian, eject before 2.1.5+deb1+cvs20081104-13.1ubuntu0.16.10.1 on Ubuntu 16.10, eject before 2.1.5+deb1+cvs20081104-13.1ubuntu0.16.04.1 on Ubuntu 16.04 LTS, eject before 2.1.5+deb1+cvs20081104-13.1ubuntu0.14.04.1 on Ubuntu 14.04 LTS, and eject before 2.1.5+deb1+cvs20081104-9ubuntu0.1 on Ubuntu 12.04 LTS. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6964
CVE-2026-33821 4.0 Dynamics 365 Improper privilege management in Microsoft Dynamics 365 Customer Insights allows an authorized attacker to elevate privileges over a network. 2026-05-15T18:26:18.667 https://cve.circl.lu/cve/CVE-2026-33821
CVE-2026-42833 6.0 Dynamics 365 Execution with unnecessary privileges in Microsoft Dynamics 365 (on-premises) allows an authorized attacker to execute code over a network. 2026-05-14T14:26:21.660 https://cve.circl.lu/cve/CVE-2026-42833
CVE-2026-42898 6.0 Dynamics 365 Improper control of generation of code ('code injection') in Microsoft Dynamics 365 (on-premises) allows an authorized attacker to execute code over a network. 2026-05-14T14:31:46.783 https://cve.circl.lu/cve/CVE-2026-42898
CVE-2016-8213 2.7 EMC EMC Documentum WebTop Version 6.8, prior to P18 and Version 6.8.1, prior to P06; and EMC Documentum TaskSpace version 6.7SP3, prior to P02; and EMC Documentum Capital Projects Version 1.9, prior to P30 and Version 1.10, prior to P17; and EMC Documentum Administrator Version 7.0, Version 7.1, and Version 7.2 prior to P18 contain a Stored Cross-Site Scripting Vulnerability that could potentially be exploited by malicious users to compromise the affected system. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8213
CVE-2016-9870 5.9 EMC EMC Isilon OneFS 8.0.0.0, EMC Isilon OneFS 7.2.1.0 - 7.2.1.2, EMC Isilon OneFS 7.2.0.x, EMC Isilon OneFS 7.1.1.0 - 7.1.1.10, and EMC Isilon OneFS 7.1.0.x is affected by an LDAP injection vulnerability that could potentially be exploited by a malicious user to compromise the system. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9870
CVE-2016-8214 5.9 EMC EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) versions 7.3.0 and 7.3.1 contain a vulnerability that may allow malicious administrators to compromise Avamar servers. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8214
CVE-2016-8215 2.7 EMC EMC RSA Security Analytics 10.5.3 and 10.6.2 contains fixes for a Reflected Cross-Site Scripting vulnerability that could potentially be exploited by malicious users to compromise the affected system. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8215
CVE-2016-0890 4.7 EMC EMC PowerPath Virtual (Management) Appliance 2.0, EMC PowerPath Virtual (Management) Appliance 2.0 SP1 is affected by a sensitive information disclosure vulnerability that may potentially be exploited by malicious users to compromise the affected system. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-0890
CVE-2017-4902 6.0 ESXi VMware ESXi 6.5 without patch ESXi650-201703410-SG and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have a Heap Buffer Overflow in SVGA. This issue may allow a guest to execute code on the host. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-4902
CVE-2017-4903 6.0 ESXi VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have an uninitialized stack memory usage in SVGA. This issue may allow a guest to execute code on the host. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-4903
CVE-2017-4904 6.0 ESXi The XHCI controller in VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 has uninitialized memory usage. This issue may allow a guest to execute code on the host. The issue is reduced to a Denial of Service of the guest on ESXi 5.5. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-4904
CVE-2017-4905 3.6 ESXi VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have uninitialized memory usage. This issue may lead to an information leak. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-4905
CVE-2017-4924 6.0 ESXi VMware ESXi (ESXi 6.5 without patch ESXi650-201707101-SG), Workstation (12.x before 12.5.7) and Fusion (8.x before 8.5.8) contain an out-of-bounds write vulnerability in SVGA device. This issue may allow a guest to execute code on the host. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-4924
CVE-2017-7243 3.6 Eclipse Eclipse tinydtls 0.8.2 for Eclipse IoT allows remote attackers to cause a denial of service (DTLS peer crash) by sending a "Change cipher spec" packet without pre-handshake. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7243
CVE-2016-4800 5.9 Eclipse The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x before 9.3.9 on Windows allows remote attackers to bypass protected resource restrictions and other security constraints via a URL with certain escaped characters, related to backslashes. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4800
CVE-2016-1000221 3.6 Elasticsearch Logstash prior to version 2.3.4, Elasticsearch Output plugin would log to file HTTP authorization headers which could contain sensitive information. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-1000221
CVE-2016-10362 3.6 Elasticsearch Prior to Logstash version 5.0.1, Elasticsearch Output plugin when updating connections after sniffing, would log to file HTTP basic auth credentials. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10362
CVE-2017-8442 3.6 Elasticsearch Elasticsearch X-Pack Security versions 5.0.0 to 5.4.3, when enabled, can result in the Elasticsearch _nodes API leaking sensitive configuration information, such as the paths and passphrases of SSL keys that were configured as part of an authentication realm. This could allow an authenticated Elasticsearch user to improperly view these details. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8442
CVE-2015-4165 5.9 Elasticsearch The snapshot API in Elasticsearch before 1.6.0 when another application exists on the system that can read Lucene files and execute code from them, is accessible by the attacker, and the Java VM on which Elasticsearch is running can write to a location that the other application can read and execute from, allows remote authenticated users to write to and create arbitrary snapshot metadata files, and potentially execute arbitrary code. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-4165
CVE-2017-12629 5.9 Elasticsearch Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-12629
CVE-2017-2790 5.9 Excel When processing a record type of 0x3c from a Workbook stream from an Excel file (.xls), JustSystems Ichitaro Office trusts that the size is greater than zero, subtracts one from the length, and uses this result as the size for a memcpy. This results in a heap-based buffer overflow and can lead to code execution under the context of the application. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2790
CVE-2017-0006 5.9 Excel Microsoft Excel 2007 SP3, Office Compatibility Pack SP3, Excel Viewer, and Excel Services on SharePoint Server 2007 SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0019, CVE-2017-0020, CVE-2017-0030, CVE-2017-0031, CVE-2017-0052, and CVE-2017-0053. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0006
CVE-2017-0020 5.9 Excel Microsoft Excel 2016, Excel 2010 SP2, Excel 2013 RT SP1, and Office Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0030, CVE-2017-0031, CVE-2017-0052, and CVE-2017-0053. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0020
CVE-2017-0027 3.6 Excel Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, and Excel Services on SharePoint Server 2013 SP1 allow remote attackers to obtain sensitive information from process memory via a crafted Office document, aka "Microsoft Office Information Disclosure Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0027
CVE-2017-0052 5.9 Excel Microsoft Office Compatibility Pack SP3, Excel 2007 SP3, Excel Viewer, and Excel Services on SharePoint Server 2007 SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0020, CVE-2017-0030, CVE-2017-0031, and CVE-2017-0053. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0052
CVE-2016-6886 3.6 Exchange The pstm_reverse function in MatrixSSL before 3.8.4 allows remote attackers to cause a denial of service (invalid memory read and crash) via a (1) zero value or (2) the key's modulus for the secret key during RSA key exchange. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6886
CVE-2014-9754 3.6 Exchange The hardware VPN client in Viprinet MultichannelVPN Router 300 version 2013070830/2013080900 does not validate the remote VPN endpoint identity (through the checking of the endpoint's SSL key) before initiating the exchange, which allows an attacker to perform a Man in the Middle attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-9754
CVE-2014-9755 3.6 Exchange The hardware VPN client in Viprinet MultichannelVPN Router 300 version 2013070830/2013080900 does not validate the remote VPN endpoint identity (through the checking of the endpoint's SSL key) before initiating the exchange, which allows remote attackers to perform a replay attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-9755
CVE-2017-0110 2.7 Exchange Cross-site scripting (XSS) vulnerability in Microsoft Exchange Outlook Web Access (OWA) allows remote attackers to inject arbitrary web script or HTML via a crafted email or chat client, aka "Microsoft Exchange Server Elevation of Privilege Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0110
CVE-2017-2414 1.4 Exchange An issue was discovered in certain Apple products. iOS before 10.3 is affected. The issue involves the "DataAccess" component. It allows remote attackers to access Exchange traffic in opportunistic circumstances by leveraging a mistake in typing an e-mail address. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2414
CVE-2016-10141 5.9 Exploit An integer overflow vulnerability was observed in the regemit function in regexp.c in Artifex Software, Inc. MuJS before fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045. The attack requires a regular expression with nested repetition. A successful exploitation of this issue can lead to code execution or a denial of service (buffer overflow) condition. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10141
CVE-2016-5199 5.9 Exploit An off by one error resulting in an allocation of zero size in FFmpeg in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted video file. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5199
CVE-2016-5200 5.9 Exploit V8 in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android incorrectly applied type rules, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5200
CVE-2016-5203 5.9 Exploit A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5203
CVE-2016-5209 5.9 Exploit Bad casting in bitmap manipulation in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5209
CVE-2016-0296 1.4 Endpoint IBM Tivoli Endpoint Manager - Mobile Device Management (MDM) stores potentially sensitive information in log files that could be available to a local user. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-0296
CVE-2016-0297 1.4 Endpoint IBM Tivoli Endpoint Manager - Mobile Device Management (MDM) could allow a remote attacker to obtain sensitive information due to a missing HTTP Strict-Transport-Security Header through man in the middle techniques. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-0297
CVE-2016-0396 5.9 Endpoint IBM Tivoli Endpoint Manager could allow a user under special circumstances to inject commands that would be executed with unnecessary higher privileges than expected. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-0396
CVE-2016-8491 5.2 Fortinet The presence of a hardcoded account named 'core' in Fortinet FortiWLC allows attackers to gain unauthorized read/write access via a remote shell. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8491
CVE-2016-8492 3.6 Fortinet The implementation of an ANSI X9.31 RNG in Fortinet FortiGate allows attackers to gain unauthorized read access to data handled by the device via IPSec/TLS decryption. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8492
CVE-2016-8495 5.2 Fortinet An improper certificate validation vulnerability in Fortinet FortiManager 5.0.6 through 5.2.7 and 5.4.0 through 5.4.1 allows remote attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack via the Fortisandbox devices probing feature. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8495
CVE-2016-7541 3.6 Fortinet Long lived sessions in Fortinet FortiGate devices with FortiOS 5.x before 5.4.0 could violate a security policy during IPS signature updates when the FortiGate's IPSengine is configured in flow mode. All FortiGate versions with IPS configured in proxy mode (the default mode) are not affected. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7541
CVE-2016-7542 3.6 Fortinet A read-only administrator on Fortinet devices with FortiOS 5.2.x before 5.2.10 GA and 5.4.x before 5.4.2 GA may have access to read-write administrators password hashes (not including super-admins) stored on the appliance via the webui REST API, and may therefore be able to crack them. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7542
CVE-2017-3806 3.4 Firewall A vulnerability in CLI command processing in the Cisco Firepower 4100 Series Next-Generation Firewall and Cisco Firepower 9300 Security Appliance could allow an authenticated, local attacker to inject arbitrary shell commands that are executed by the device. More Information: CSCvb61343. Known Affected Releases: 2.0(1.68). Known Fixed Releases: 2.0(1.118) 2.1(1.47) 92.1(1.1646) 92.1(1.1763) 92.2(1.101). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3806
CVE-2017-3807 5.9 Firewall A vulnerability in Common Internet Filesystem (CIFS) code in the Clientless SSL VPN functionality of Cisco ASA Software, Major Releases 9.0-9.6, could allow an authenticated, remote attacker to cause a heap overflow. The vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by sending a crafted URL to the affected system. An exploit could allow the remote attacker to cause a reload of the affected system or potentially execute code. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 or IPv6 traffic. A valid TCP connection is needed to perform the attack. The attacker needs to have valid credentials to log in to the Clientless SSL VPN portal. Vulnerable Cisco ASA Software running on the following products may be affected by this vulnerability: Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco ASA for Firepower 9300 Series, Cisco ASA for Firepower 4100 Series. Cisco Bug IDs: CSCvc23838. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3807
CVE-2016-8352 6.0 Firewall An issue was discovered in Schneider Electric ConneXium firewalls TCSEFEC23F3F20 all versions, TCSEFEC23F3F21 all versions, TCSEFEC23FCF20 all versions, TCSEFEC23FCF21 all versions, and TCSEFEC2CF3F20 all versions. A stack-based buffer overflow can be triggered during the SNMP login authentication process that may allow an attacker to remotely execute code. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8352
CVE-2017-6411 5.9 Firewall Cross Site Request Forgery (CSRF) on D-Link DSL-2730U C1 IN_1.00 devices allows remote attackers to change the DNS or firewall configuration or any password. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6411
CVE-2016-5933 2.5 Firewall IBM Tivoli Monitoring 6.2 and 6.3 is vulnerable to possible host header injection attack that could lead to HTTP cache poisoning or firewall bypass. IBM Reference #: 1997223. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5933
CVE-2017-11145 3.6 GIS In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, an error in the date extension's timelib_meridian parsing code could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads affecting the php_parse_date function. NOTE: the correct fix is in the e8b7698f5ee757ce2c8bd10a192a491a498f891c commit, not the bd77ac90d3bdf31ce2a5251ad92e9e75 gist. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-11145
CVE-2026-42030 2.7 GIS MapServer is a system for developing web-based GIS applications. From version 6.0 to before version 8.6.2, a reflected XSS vulnerability in MapServer's WMS server allows an unauthenticated attacker to inject arbitrary HTML/JavaScript into the browser of any user who opens a crafted WMS URL. The vulnerability is triggered via FORMAT=application/openlayers combined with an unsanitized SRS parameter in WMS 1.3.0 requests. This issue has been patched in version 8.6.2. 2026-05-14T18:04:33.627 https://cve.circl.lu/cve/CVE-2026-42030
CVE-2016-4340 5.9 GitLab The impersonate feature in Gitlab 8.7.0, 8.6.0 through 8.6.7, 8.5.0 through 8.5.11, 8.4.0 through 8.4.9, 8.3.0 through 8.3.8, and 8.2.0 through 8.2.4 allows remote authenticated users to "log in" as any other user via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4340
CVE-2016-9469 4.2 GitLab Multiple versions of GitLab expose a dangerous method to any authenticated user that could lead to the deletion of all Issue and MergeRequest objects on a GitLab instance. For GitLab instances with publicly available projects this vulnerability could be exploited by an unauthenticated user. A fix was included in versions 8.14.3, 8.13.8, and 8.12.11, which were released on December 5th 2016 at 3:59 PST. The GitLab versions vulnerable to this are 8.13.0, 8.13.0-ee, 8.13.1, 8.13.1-ee, 8.13.2, 8.13.2-ee, 8.13.3, 8.13.3-ee, 8.13.4, 8.13.4-ee, 8.13.5, 8.13.5-ee, 8.13.6, 8.13.6-ee, 8.13.7, 8.14.0, 8.14.0-ee, 8.14.1, 8.14.2, and 8.14.2-ee. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9469
CVE-2017-0882 3.4 GitLab Multiple versions of GitLab expose sensitive user credentials when assigning a user to an issue or merge request. A fix was included in versions 8.15.8, 8.16.7, and 8.17.4, which were released on March 20th 2017 at 23:59 UTC. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0882
CVE-2017-8778 2.7 GitLab GitLab before 8.14.9, 8.15.x before 8.15.6, and 8.16.x before 8.16.5 has XSS via a SCRIPT element in an issue attachment or avatar that is an SVG document. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8778
CVE-2017-11437 3.6 GitLab GitLab Enterprise Edition (EE) before 8.17.7, 9.0.11, 9.1.8, 9.2.8, and 9.3.8 allows an authenticated user with the ability to create a project to use the mirroring feature to potentially read repositories belonging to other users. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-11437
CVE-2023-48795 3.6 Golang The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust. 2026-05-12T11:16:15.010 https://cve.circl.lu/cve/CVE-2023-48795
CVE-2016-5196 5.9 Google The content renderer client in Google Chrome prior to 54.0.2840.85 for Android insufficiently enforced the Same Origin Policy amongst downloaded files, which allowed a remote attacker to access any downloaded file and interact with sites, including those the user was logged into, via a crafted HTML page. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5196
CVE-2016-5197 5.9 Google The content view client in Google Chrome prior to 54.0.2840.85 for Android insufficiently validated intent URLs, which allowed a remote attacker who had compromised the renderer process to start arbitrary activity on the system via a crafted HTML page. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5197
CVE-2016-5201 3.6 Google A leak of privateClass in the extensions API in Google Chrome prior to 54.0.2840.100 for Linux, and 54.0.2840.99 for Windows, and 54.0.2840.98 for Mac allowed a remote attacker to access privileged JavaScript code via a crafted HTML page. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5201
CVE-2016-6199 5.9 Gradle ObjectSocketWrapper.java in Gradle 2.12 allows remote attackers to execute arbitrary code via a crafted serialized object. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6199
CVE-2026-28376 3.6 Grafana The Grafana Live push endpoint can be exploited to cause unbounded memory allocation by sending a large or streaming request body, potentially leading to out-of-memory conditions. An authenticated user with access to the Grafana Live API can trigger this issue. 2026-05-18T14:57:04.407 https://cve.circl.lu/cve/CVE-2026-28376
CVE-2026-28379 3.6 Grafana A race condition in Grafana Live allows authenticated users with Viewer role to trigger a server crash by sending concurrent requests that cause a fatal map access error. This results in complete service unavailability requiring restart of the Grafana server. 2026-05-14T19:16:31.880 https://cve.circl.lu/cve/CVE-2026-28379
CVE-2026-28383 3.6 Grafana A request to the Grafana plugin resources endpoint can cause unbounded memory allocation by reading the entire request body into memory. An authenticated user can exploit this to trigger an out-of-memory condition, potentially causing a denial of service. 2026-05-14T16:21:02.930 https://cve.circl.lu/cve/CVE-2026-28383
CVE-2026-33380 4.0 Grafana A vulnerability in SQL Expressions allows an authenticated attacker to read arbitrary files from the Grafana server's filesystem. Only instances with the sqlExpressions feature toggle enabled are vulnerable. 2026-05-14T16:21:02.930 https://cve.circl.lu/cve/CVE-2026-33380
CVE-2017-16522 5.9 GPT MitraStar GPT-2541GNAC (HGU) 1.00(VNJ0)b1 and DSL-100HN-T1 ES_113WJY0b16 devices allow remote authenticated users to obtain root access by specifying /bin/sh as the command to execute. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-16522
CVE-2017-16523 5.9 GPT MitraStar GPT-2541GNAC (HGU) 1.00(VNJ0)b1 and DSL-100HN-T1 ES_113WJY0b16 devices have a zyad1234 password for the zyad1234 account, which is equivalent to root and undocumented. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-16523
CVE-2026-31246 2.5 GPT GPT-Pilot thru commit 0819827ce20346ef5f25b3fe29293cb448840565 (2025-09-03) contains a command injection vulnerability (CWE-78) in the Executor.run() method. During project execution, when the system prompts the user to confirm or modify a command to be run, it accepts free-text input without proper validation. The user-supplied input is directly passed to asyncio.create_subprocess_shell() for execution. This allows an attacker to replace the intended command with arbitrary shell commands, leading to remote code execution with the privileges of the GPT-Pilot process. 2026-05-13T15:47:35.667 https://cve.circl.lu/cve/CVE-2026-31246
CVE-2017-5972 3.6 GitHub The TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie protection mechanism for the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP SYN packets, as demonstrated by an attack against the kernel-3.10.0 package in CentOS Linux 7. NOTE: third parties have been unable to discern any relationship between the GitHub Engineering finding and the Trigemini.c attack code. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5972
CVE-2017-5135 5.2 GitHub Certain Technicolor devices have an SNMP access-control bypass, possibly involving an ISP customization in some cases. The Technicolor (formerly Cisco) DPC3928SL with firmware D3928SL-P15-13-A386-c3420r55105-160127a could be reached by any SNMP community string from the Internet; also, you can write in the MIB because it provides write properties, aka Stringbleed. NOTE: the string-bleed/StringBleed-CVE-2017-5135 GitHub repository is not a valid reference as of 2017-04-27; it contains Trojan horse code purported to exploit this vulnerability. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5135
CVE-2017-8833 2.7 GitHub Zen Cart 1.6.0 has XSS in the main_page parameter to index.php. NOTE: 1.6.0 is not an official release but the vendor's README.md file offers a link to v160.zip with a description of "Download latest in-development version from github." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8833
CVE-2017-12581 5.9 GitHub GitHub Electron before 1.6.8 allows remote command execution because of a nodeIntegration bypass vulnerability. This also affects all applications that bundle Electron code equivalent to 1.6.8 or earlier. Bypassing the Same Origin Policy (SOP) is a precondition; however, recent Electron versions do not have strict SOP enforcement. Combining an SOP bypass with a privileged URL internally used by Electron, it was possible to execute native Node.js primitives in order to run OS commands on the user's host. Specifically, a chrome-devtools://devtools/bundled/inspector.html window could be used to eval a Node.js child_process.execFile API call. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-12581
CVE-2017-12963 3.6 GitHub There is an illegal address access in Sass::Eval::operator() in eval.cpp of LibSass 3.4.5, leading to a remote denial of service attack. NOTE: this is similar to CVE-2017-11555 but remains exploitable after the vendor's CVE-2017-11555 fix (available from GitHub after 2017-07-24). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-12963
CVE-2016-4383 6.0 HPE The glance-manage db in all versions of HPE Helion Openstack Glance allows deleted image ids to be reassigned, which allows remote authenticated users to cause other users to boot into a modified image without notification of the change. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4383
CVE-2017-9987 3.6 HPE There is a heap-based buffer overflow in the function hpel_motion in mpegvideo_motion.c in libav 12.1. A crafted input can lead to a remote denial of service attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9987
CVE-2017-13982 5.9 HPE A directory traversal vulnerability in HPE BSM Platform Application Performance Management System Health product versions 9.26, 9.30 and 9.40, allows users to upload unrestricted files. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-13982
CVE-2017-13983 5.9 HPE An authentication vulnerability in HPE BSM Platform Application Performance Management System Health product versions 9.26, 9.30 and 9.40, allows remote users to bypass authentication. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-13983
CVE-2017-13984 3.6 HPE An authentication vulnerability in HPE BSM Platform Application Performance Management System Health product versions 9.26, 9.30 and 9.40, allows remote users to delete arbitrary files via servlet directory traversal. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-13984
CVE-2014-0229 3.6 Hadoop Apache Hadoop 0.23.x before 0.23.11 and 2.x before 2.4.1, as used in Cloudera CDH 5.0.x before 5.0.2, do not check authorization for the (1) refreshNamenodes, (2) deleteBlockPool, and (3) shutdownDatanode HDFS admin commands, which allows remote authenticated users to cause a denial of service (DataNodes shutdown) or perform unnecessary operations by issuing a command. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-0229
CVE-2017-7565 5.9 Hadoop Splunk Hadoop Connect App has a path traversal vulnerability that allows remote authenticated users to execute arbitrary code, aka ERP-2041. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7565
CVE-2016-6811 5.9 Hadoop In Apache Hadoop 2.x before 2.7.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6811
CVE-2017-3161 2.7 Hadoop The HDFS web UI in Apache Hadoop before 2.7.0 is vulnerable to a cross-site scripting (XSS) attack through an unescaped query parameter. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3161
CVE-2017-3162 3.4 Hadoop HDFS clients interact with a servlet on the DataNode to browse the HDFS namespace. The NameNode is provided as a query parameter that is not validated in Apache Hadoop before 2.7.0. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3162
CVE-2017-7642 5.9 HashiCorp The sudo helper in the HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) before 4.0.21 allows local users to gain root privileges by leveraging failure to verify the path to the encoded ruby script or scrub the PATH variable. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7642
CVE-2017-11741 6.0 HashiCorp HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) before 4.0.24 uses weak permissions for the sudo helper scripts, allows local users to execute arbitrary code with root privileges by overwriting one of the scripts. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-11741
CVE-2017-12579 5.9 HashiCorp An insecure suid wrapper binary in the HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 4.0.24 and earlier allows a non-root user to obtain a root shell. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-12579
CVE-2017-15884 5.9 HashiCorp In HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 5.0.0, a local attacker or malware can silently subvert the plugin update process in order to escalate to root privileges. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-15884
CVE-2017-16001 5.9 HashiCorp In HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) 5.0.1, a local attacker or malware can silently subvert the plugin update process in order to escalate to root privileges. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-16001
CVE-2017-0021 6.0 Hyper-V Hyper-V in Microsoft Windows 10 1607 and Windows Server 2016 does not properly validate vSMB packet data, which allows attackers to execute arbitrary code on a target OS, aka "Hyper-V System Data Structure Vulnerability." This vulnerability is different from that described in CVE-2017-0095. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0021
CVE-2017-0051 4.0 Hyper-V Microsoft Windows 10 1607 and Windows Server 2016 allow remote attackers to cause a denial of service (application hang) via a crafted Office document, aka "Microsoft Hyper-V Network Switch Denial of Service Vulnerability." This vulnerability is different from those described in CVE-2017-0074, CVE-2017-0076, CVE-2017-0097, CVE-2017-0098, and CVE-2017-0099. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0051
CVE-2017-0074 4.0 Hyper-V Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and 2008 R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 and R2; Windows 10, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka "Hyper-V Denial of Service Vulnerability." This vulnerability is different from those described in CVE-2017-0098, CVE-2017-0076, CVE-2017-0097, and CVE-2017-0099. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0074
CVE-2017-0075 6.0 Hyper-V Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka "Hyper-V Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0109. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0075
CVE-2017-0076 4.0 Hyper-V Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and 2008 R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 and R2; Windows 10, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka "Hyper-V Denial of Service Vulnerability." This vulnerability is different from those described in CVE-2017-0098, CVE-2017-0074, CVE-2017-0097, and CVE-2017-0099. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0076
CVE-2016-0265 2.7 IBM IBM Campaign is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-0265
CVE-2016-0394 1.4 IBM IBM Integration Bus and WebSphere Message broker sets incorrect permissions for an object that could allow a local attacker to manipulate certain files. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-0394
CVE-2020-37223 5.9 IOBit IObit Uninstaller 9.5.0.15 contains an unquoted service path vulnerability in the IObitUnSvr service that allows local attackers to escalate privileges to SYSTEM level. Attackers can place a malicious executable named IObit.exe in the C:\Program Files (x86)\IObit directory and restart the service to execute code with SYSTEM privileges. 2026-05-13T17:07:21.030 https://cve.circl.lu/cve/CVE-2020-37223
CVE-2017-3359 4.7 Intel Vulnerability in the Oracle Customer Intelligence component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Customer Intelligence. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Customer Intelligence, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Customer Intelligence accessible data as well as unauthorized update, insert or delete access to some of Oracle Customer Intelligence accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3359
CVE-2017-3360 4.7 Intel Vulnerability in the Oracle Customer Intelligence component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Customer Intelligence. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Customer Intelligence, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Customer Intelligence accessible data as well as unauthorized update, insert or delete access to some of Oracle Customer Intelligence accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3360
CVE-2016-0217 2.7 Intel IBM Cognos Business Intelligence and IBM Cognos Analytics are vulnerable to stored cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-0217
CVE-2016-0218 2.7 Intel IBM Cognos Business Intelligence and IBM Cognos Analytics are vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-0218
CVE-2017-3896 3.6 Intel Unvalidated parameter vulnerability in the remote log viewing capability in Intel Security McAfee Agent 5.0.x versions prior to 5.0.4.449 allows remote attackers to pass unexpected input parameters via a URL that was not completely validated. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3896
CVE-2017-7911 5.9 IoT A Code Injection issue was discovered in CyberVision Kaa IoT Platform, Version 0.7.4. An insufficient-encapsulation vulnerability has been identified, which may allow remote code execution. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7911
CVE-2017-6780 3.6 IoT A vulnerability in the TCP throttling process for Cisco IoT Field Network Director (IoT-FND) could allow an unauthenticated, remote attacker to cause the system to consume additional memory, eventually forcing the device to restart, aka Memory Exhaustion. The vulnerability is due to insufficient rate-limiting protection. An attacker could exploit this vulnerability by sending a high rate of TCP packets to a specific group of open listening ports on a targeted device. An exploit could allow the attacker to cause the system to consume additional memory. If enough available memory is consumed, the system will restart, creating a temporary denial of service (DoS) condition. The DoS condition will end after the device has finished the restart process. This vulnerability affects the following Cisco products: Connected Grid Network Management System, if running a software release prior to IoT-FND Release 4.0; IoT Field Network Director, if running a software release prior to IoT-FND Release 4.0. Cisco Bug IDs: CSCvc77164. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6780
CVE-2017-16567 2.7 IoT Persistent Cross-Site Scripting (XSS) vulnerability in Logitech Media Server 7.9.0, affecting the "Favorites" feature. This vulnerability allows remote attackers to inject and permanently store malicious JavaScript payloads, which are executed when users access the affected functionality. Exploitation of this vulnerability can lead to Session Hijacking and Credential Theft, Execution of unauthorized actions on behalf of users, and Exfiltration of sensitive data. This vulnerability presents a potential risk for widespread exploitation in connected IoT environments. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-16567
CVE-2026-33356 4.0 IoT In Meari IoT Cloud MQTT Broker deployments running EMQX 4.x, any authenticated low-privilege account can subscribe to global wildcard topics and receive telemetry from devices the user does not own. The broker enforces publish restrictions but does not enforce equivalent subscribe authorization at per-device scope. 2026-05-13T15:36:30.533 https://cve.circl.lu/cve/CVE-2026-33356
CVE-2017-5600 5.9 Insight The Data Warehouse component in NetApp OnCommand Insight before 7.2.3 allows remote attackers to obtain administrative access by leveraging a default privileged account. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5600
CVE-2017-2765 5.9 Insight EMC Isilon InsightIQ 4.1.0, 4.0.1, 4.0.0, 3.2.2, 3.2.1, 3.2.0, 3.1.1, 3.1.0, 3.0.1, 3.0.0 is affected by an authentication bypass vulnerability that could potentially be exploited by attackers to compromise the affected system. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2765
CVE-2017-5234 5.9 Insight Rapid7 Insight Collector installers prior to version 1.0.16 contain a DLL preloading vulnerability, wherein it is possible for the installer to load a malicious DLL located in the current working directory of the installer. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5234
CVE-2017-1141 1.4 Insight IBM Insights Foundation for Energy 1.0, 1.5, and 1.6 could allow an authenticated user to obtain sensitive information from error messages. IBM X-Force ID: 121907. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-1141
CVE-2017-1311 5.9 Insight IBM Insights Foundation for Energy 2.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 125719. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-1311
CVE-2012-4549 2.5 Java A flaw was found in JBoss Enterprise Application Platform. The `processInvocation` function within the `org.jboss.as.ejb3.security.AuthorizationInterceptor` component incorrectly authorizes all requests when no roles are defined for an Enterprise Java Beans (EJB) method invocation. This allows attackers to bypass intended access restrictions for EJB methods, leading to unauthorized access to sensitive functionalities. 2026-05-14T23:16:32.133 https://cve.circl.lu/cve/CVE-2012-4549
CVE-2012-4550 1.4 Java A flaw was found in JBoss Enterprise Application Platform. When role-based authorization is used for Enterprise Java Beans (EJB) access, the system does not correctly call the necessary authorization modules. This prevents Java Authorization Contract for Containers (JACC) permissions from being applied, allowing remote attackers to gain unauthorized access to EJBs. 2026-05-14T23:16:34.130 https://cve.circl.lu/cve/CVE-2012-4550
CVE-2016-9299 5.9 Java The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9299
CVE-2016-5226 2.7 Java Blink in Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac executed javascript: URLs entered in the URL bar in the context of the current tab, which allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5226
CVE-2016-3101 2.7 Jenkins Cross-site scripting (XSS) vulnerability in the Extra Columns plugin before 1.17 in Jenkins allows remote attackers to inject arbitrary web script or HTML by leveraging failure to filter tool tips through the configured markup formatter. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-3101
CVE-2016-3102 3.4 Jenkins The Script Security plugin before 1.18.1 in Jenkins might allow remote attackers to bypass a Groovy sandbox protection mechanism via a plugin that performs (1) direct field access or (2) get/set array operations. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-3102
CVE-2016-4986 3.6 Jenkins Directory traversal vulnerability in the TAP plugin before 1.25 in Jenkins allows remote attackers to read arbitrary files via an unspecified parameter. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4986
CVE-2016-4987 3.6 Jenkins Directory traversal vulnerability in the Image Gallery plugin before 1.4 in Jenkins allows remote attackers to list arbitrary directories and read arbitrary files via unspecified form fields. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4987
CVE-2026-44413 4.2 JetBrains In JetBrains TeamCity before 2026.12025.11.5 authenticated users could expose server API to unauthorised access 2026-05-12T19:59:34.543 https://cve.circl.lu/cve/CVE-2026-44413
CVE-2016-7929 5.9 Juniper The Juniper PPPoE ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-juniper.c:juniper_parse_header(). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7929
CVE-2017-2312 3.6 Juniper On Juniper Networks devices running Junos OS affected versions and with LDP enabled, a specific LDP packet destined to the RE (Routing Engine) will consume a small amount of the memory allocated for the rpd (routing protocol daemon) process. Over time, repeatedly receiving this type of LDP packet(s) will cause the memory to exhaust and the rpd process to crash and restart. It is not possible to free up the memory that has been consumed without restarting the rpd process. This issue affects Junos OS based devices with either IPv4 or IPv6 LDP enabled via the [protocols ldp] configuration (the native IPv6 support for LDP is available in Junos OS 16.1 and higher). The interface on which the packet arrives needs to have LDP enabled. The affected Junos versions are: 13.3 prior to 13.3R10; 14.1 prior to 14.1R8; 14.2 prior to 14.2R7-S6 or 14.2R8; 15.1 prior to 15.1F2-S14, 15.1F6-S4, 15.1F7, 15.1R4-S7, 15.1R5; 15.1X49 before 15.1X49-D70; 15.1X53 before 15.1X53-D230, 15.1X53-D63, 15.1X53-D70; 16.1 before 16.1R2. 16.2R1 and all subsequent releases have a resolution for this vulnerability. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2312
CVE-2017-2313 3.6 Juniper Juniper Networks devices running affected Junos OS versions may be impacted by the receipt of a crafted BGP UPDATE which can lead to an rpd (routing process daemon) crash and restart. Repeated crashes of the rpd daemon can result in an extended denial of service condition. The affected Junos OS versions are: 15.1 prior to 15.1F2-S15, 15.1F5-S7, 15.1F6-S5, 15.1F7, 15.1R4-S7, 15.1R5-S2, 15.1R6; 15.1X49 prior to 15.1X49-D78, 15.1X49-D80; 15.1X53 prior to 15.1X53-D230, 15.1X53-D63, 15.1X53-D70; 16.1 prior to 16.1R3-S3, 16.1R4; 16.2 prior to 16.2R1-S3, 16.2R2; Releases prior to Junos OS 15.1 are unaffected by this vulnerability. 17.1R1, 17.2R1, and all subsequent releases have a resolution for this vulnerability. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2313
CVE-2017-2315 3.6 Juniper On Juniper Networks EX Series Ethernet Switches running affected Junos OS versions, a vulnerability in IPv6 processing has been discovered that may allow a specially crafted IPv6 Neighbor Discovery (ND) packet destined to an EX Series Ethernet Switch to cause a slow memory leak. A malicious network-based packet flood of these crafted IPv6 NDP packets may eventually lead to resource exhaustion and a denial of service. The affected Junos OS versions are: 12.3 prior to 12.3R12-S4, 12.3R13; 13.3 prior to 13.3R10; 14.1 prior to 14.1R8-S3, 14.1R9; 14.1X53 prior ro 14.1X53-D12, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8; 15.1 prior to 15.1R5; 16.1 before 16.1R3; 16.2 before 16.2R1-S3, 16.2R2. 17.1R1 and all subsequent releases have a resolution for this vulnerability. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2315
CVE-2017-2316 4.0 Juniper A buffer overflow vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an authenticated malicious user to cause a buffer overflow leading to a denial of service. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2316
CVE-2016-7103 2.7 JQuery Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7103
CVE-2015-7943 2.7 JQuery Open redirect vulnerability in the Overlay module in Drupal 7.x before 7.41, the jQuery Update module 7.x-2.x before 7.x-2.7 for Drupal, and the LABjs module 7.x-1.x before 7.x-1.8 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3233. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-7943
CVE-2017-1000170 3.6 JQuery jqueryFileTree 2.1.5 and older Directory Traversal 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-1000170
CVE-2026-43892 5.9 JQuery AntSword is a cross-platform website management toolkit. Prior to 2.1.16, incomplete noxss() sanitization leads to 1-click RCE via jquery.terminal format code injection. This vulnerability is fixed in 2.1.16. 2026-05-13T18:24:31.310 https://cve.circl.lu/cve/CVE-2026-43892
CVE-2026-21821 6.0 JQuery The HCL BigFix SCM Reporting site contains an outdated and unsupported version of the jQuery 1.x library. Since jQuery 1.x has reached end-of-life and no longer receives security updates, it may expose the application to publicly known security weaknesses and increase the risk of client-side attacks such as Cross-Site Scripting (XSS) or manipulation through vulnerable third-party components. 2026-05-14T18:24:08.747 https://cve.circl.lu/cve/CVE-2026-21821
CVE-2016-4319 5.9 Jira Atlassian JIRA Server before 7.1.9 has CSRF in auditing/settings. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4319
CVE-2017-5983 5.9 Jira The JIRA Workflow Designer Plugin in Atlassian JIRA Server before 6.3.0 improperly uses an XML parser and deserializer, which allows remote attackers to execute arbitrary code, read arbitrary files, or cause a denial of service via a crafted serialized Java object. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5983
CVE-2017-5553 2.7 JavaScript Cross-site scripting (XSS) vulnerability in plugins/markdown_plugin/_markdown.plugin.php in b2evolution before 6.8.5 allows remote authenticated users to inject arbitrary web script or HTML via a javascript: URL. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5553
CVE-2013-7452 2.7 JavaScript The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via a crafted javascript URI. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2013-7452
CVE-2015-8857 5.9 JavaScript The uglify-js package before 2.4.24 for Node.js does not properly account for non-boolean values when rewriting boolean expressions, which might allow attackers to bypass security mechanisms or possibly have unspecified other impact by leveraging improperly rewritten Javascript. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-8857
CVE-2017-17383 2.7 JDK Jenkins through 2.93 allows remote authenticated administrators to conduct XSS attacks via a crafted tool name in a job configuration form, as demonstrated by the JDK tool in Jenkins core and the Ant tool in the Ant plugin, aka SECURITY-624. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-17383
CVE-2025-53057 3.6 JDK Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N). 2026-05-12T13:17:21.593 https://cve.circl.lu/cve/CVE-2025-53057
CVE-2025-53066 3.6 JDK Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). 2026-05-12T13:17:21.753 https://cve.circl.lu/cve/CVE-2025-53066
CVE-2025-61748 1.4 JDK Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 21.0.8 and 25; Oracle GraalVM for JDK: 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N). 2026-05-12T13:17:23.393 https://cve.circl.lu/cve/CVE-2025-61748
CVE-2026-21925 2.5 JDK Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: RMI). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N). 2026-05-12T13:17:31.180 https://cve.circl.lu/cve/CVE-2026-21925
CVE-2017-1541 3.4 JRE A flaw in the AIX 5.3, 6.1, 7.1, and 7.2 JRE/SDK installp and updatep packages prevented the java.security, java.policy and javaws.policy files from being updated correctly. IBM X-Force ID: 130809. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-1541
CVE-2017-8439 2.7 Kibana Kibana version 5.4.0 was affected by a Cross Site Scripting (XSS) bug in the Time Series Visual Builder. This bug could allow an attacker to obtain sensitive information from Kibana users. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8439
CVE-2017-8440 2.7 Kibana Starting in version 5.3.0, Kibana had a cross-site scripting (XSS) vulnerability in the Discover page that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8440
CVE-2015-9056 2.7 Kibana Kibana versions prior to 4.1.3 and 4.2.1 are vulnerable to a XSS attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-9056
CVE-2016-1000218 5.9 Kibana Kibana Reporting plugin version 2.4.0 is vulnerable to a CSRF vulnerability that could allow an attacker to generate superfluous reports whenever an authenticated Kibana user navigates to a specially-crafted page. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-1000218
CVE-2016-1000219 3.6 Kibana Kibana before 4.5.4 and 4.1.11 when a custom output is configured for logging in, cookies and authorization headers could be written to the log files. This information could be used to hijack sessions of other users when using Kibana behind some form of authentication such as Shield. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-1000219
CVE-2017-1000056 5.9 Kubernetes Kubernetes version 1.5.0-1.5.4 is vulnerable to a privilege escalation in the PodSecurityPolicy admission plugin resulting in the ability to make use of any existing PodSecurityPolicy object. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-1000056
CVE-2015-7561 1.4 Kubernetes Kubernetes in OpenShift3 allows remote authenticated users to use the private images of other users should they know the name of said image. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-7561
CVE-2017-1002100 3.6 Kubernetes Default access permissions for Persistent Volumes (PVs) created by the Kubernetes Azure cloud provider in versions 1.6.0 to 1.6.5 are set to "container" which exposes a URI that can be accessed without authentication on the public internet. Access to the URI string requires privileged access to the Kubernetes cluster or authenticated access to the Azure portal. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-1002100
CVE-2026-29773 1.4 Kubernetes Kubewarden is a policy engine for Kubernetes. Kubewarden cluster operators can grant permissions to users to deploy namespaced AdmissionPolicies and AdmissionPolicyGroups in their Namespaces. One of Kubewarden promises is that configured users can deploy namespaced policies in a safe manner, without privilege escalation. An attacker with privileged "AdmissionPolicy" create permissions (which isn't the default) could make use of 3 deprecated host-callback APIs: kubernetes/ingresses, kubernetes/namespaces, kubernetes/services. The attacker can craft a policy that exercises these deprecated API calls and would allow them read access to Ingresses, Namespaces, and Services resources respectively. This attack is read-only, there is no write capability and no access to Secrets, ConfigMaps, or other resource types beyond these three. 2026-05-13T20:44:20.023 https://cve.circl.lu/cve/CVE-2026-29773
CVE-2026-39961 4.0 Kubernetes Aiven Operator allows you to provision and manage Aiven Services from your Kubernetes cluster. From 0.31.0 to before 0.37.0, a developer with create permission on ClickhouseUser CRDs in their own namespace can exfiltrate secrets from any other namespace — production database credentials, API keys, service tokens — with a single kubectl apply. The operator reads the victim's secret using its ClusterRole and writes the password into a new secret in the attacker's namespace. The operator acts as a confused deputy: its ServiceAccount has cluster-wide secret read/write (aiven-operator-role ClusterRole), and it trusts user-supplied namespace values in spec.connInfoSecretSource.namespace without validation. No admission webhook enforces this boundary — the ServiceUser webhook returns nil, and no ClickhouseUser webhook exists. This vulnerability is fixed in 0.37.0. 2026-05-13T16:06:00.737 https://cve.circl.lu/cve/CVE-2026-39961
CVE-2016-5119 5.9 KeePass The automatic update feature in KeePass 2.33 and earlier allows man-in-the-middle attackers to execute arbitrary code by spoofing the version check response and supplying a crafted update. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5119
CVE-2015-8378 3.6 KeePass In KeePassX before 0.4.4, a cleartext copy of password data is created upon a cancel of an XML export action. This allows context-dependent attackers to obtain sensitive information by reading the .xml dotfile. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-8378
CVE-2017-1000066 3.6 KeePass The entry details view function in KeePass version 1.32 inadvertently decrypts certain database entries into memory, which may result in the disclosure of sensitive information. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-1000066
CVE-2017-9810 5.9 Kaspersky There are no Anti-CSRF tokens in any forms on the web interface in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312). This would allow an attacker to submit authenticated requests when an authenticated user browses an attacker-controlled domain. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9810
CVE-2017-9811 5.9 Kaspersky The kluser is able to interact with the kav4fs-control binary in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312). By abusing the quarantine read and write operations, it is possible to elevate the privileges to root. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9811
CVE-2017-9812 3.6 Kaspersky The reportId parameter of the getReportStatus action method can be abused in the web interface in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312) to read arbitrary files with kluser privileges. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9812
CVE-2017-9813 2.7 Kaspersky In Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312), the scriptName parameter of the licenseKeyInfo action method is vulnerable to cross-site scripting (XSS). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9813
CVE-2017-12816 5.9 Kaspersky In Kaspersky Internet Security for Android 11.12.4.1622, some of application exports activities have weak permissions, which might be used by a malware application to get unauthorized access to the product functionality by using Android IPC. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-12816
CVE-2016-8225 5.9 Lenovo Unquoted service path vulnerability in Lenovo Edge and Lenovo Slim USB Keyboard Driver versions earlier than 1.21 allows local users to execute code with elevated privileges. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8225
CVE-2016-8226 3.6 Lenovo The BIOS in Lenovo System X M5, M6, and X6 systems allows administrators to cause a denial of service via updating a UEFI data structure. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8226
CVE-2016-8227 5.9 Lenovo Privilege escalation vulnerability in Lenovo Transition application used in Lenovo Yoga, Flex and Miix systems running Windows allows local users to execute code with elevated privileges. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8227
CVE-2016-8232 2.7 Lenovo Document Object Model-(DOM) based cross-site scripting vulnerability in the Advanced Management Module (AMM) versions earlier than 66Z of Lenovo IBM BladeCenter HS22, HS22V, HS23, HS23E, HX5 allows an unauthenticated attacker with access to the AMM's IP address to send a crafted URL that could inject a malicious script to access a user's AMM data such as cookies or other session information. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8232
CVE-2016-8233 5.9 Lenovo Log files generated by Lenovo XClarity Administrator (LXCA) versions earlier than 1.2.2 may contain user credentials in a non-secure, clear text form that could be viewed by a non-privileged user. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8233
CVE-2016-6492 5.9 Linux The MT6573FDVT_SetRegHW function in camera_fdvt.c in the MediaTek driver for Linux allows local users to gain privileges via a crafted application that makes an MT6573FDVTIOC_T_SET_FDCONF_CMD IOCTL call. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6492
CVE-2017-2584 5.2 Linux arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2584
CVE-2016-10147 3.6 Linux crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10147
CVE-2016-5720 5.9 MSI Multiple untrusted search path vulnerabilities in Microsoft Skype allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) msi.dll, (2) dpapi.dll, or (3) cryptui.dll that is located in the current working directory. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5720
CVE-2017-11421 5.9 MSI gnome-exe-thumbnailer before 0.9.5 is prone to a VBScript Injection when generating thumbnails for MSI files, aka the "Bad Taste" issue. There is a local attack if the victim uses the GNOME Files file manager, and navigates to a directory containing a .msi file with VBScript code in its filename. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-11421
CVE-2017-12414 5.9 MSI Format Factory 4.1.0 has a DLL Hijacking Vulnerability because an untrusted search path is used for msimg32.dll, WindowsCodecs.dll, and dwmapi.dll. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-12414
CVE-2017-15590 6.0 MSI An issue was discovered in Xen through 4.9.x allowing x86 guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because MSI mapping was mishandled. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-15590
CVE-2015-7549 4.0 MSI The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-7549
CVE-2016-10086 5.2 Management RESTful web services in CA Service Desk Manager 12.9 and CA Service Desk Management 14.1 might allow remote authenticated users to read or modify task information by leveraging incorrect permissions applied to a RESTful request. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10086
CVE-2016-3147 5.9 Management Buffer overflow in the collector.exe listener of the Landesk Management Suite 10.0.0.271 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large packet. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-3147
CVE-2016-9012 5.9 Management CloudVision Portal (CVP) before 2016.1.2.1 allows remote authenticated users to gain access to the internal configuration mechanisms via the management plane, related to a request to /web/system/console/bundle. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9012
CVE-2026-45003 3.6 Mattermost OpenClaw before 2026.4.22 allows workspace dotenv files to override connector endpoint hosts for Matrix, Mattermost, IRC, and Synology connectors. Attackers with workspace access can redirect runtime traffic to malicious endpoints by setting endpoint variables in dotenv files. 2026-05-13T14:13:30.933 https://cve.circl.lu/cve/CVE-2026-45003
CVE-2026-4053 1.4 Mattermost Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13 fail to enforce the PostEditTimeLimit on non-message post fields which allows an authenticated user to modify post file attachments, props, and pin status after the edit window has expired via the post patch and update API endpoints.. Mattermost Advisory ID: MMSA-2026-00631 2026-05-18T18:37:37.347 https://cve.circl.lu/cve/CVE-2026-4053
CVE-2026-4054 1.4 Mattermost Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 Fail to validate the response body of proxied images, which allows a remote attacker to enact client-side DoS via an SVG file served from an attacker-controlled origin under a non-SVG Content-Type header (e.g. image/png) embedded in an og:image meta tag or Markdown image link.. Mattermost Advisory ID: MMSA-2026-00630 2026-05-18T18:36:00.877 https://cve.circl.lu/cve/CVE-2026-4054
CVE-2026-28759 1.4 Mattermost Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to validate that a remote cluster has access to a channel before processing membership removal requests during shared channel membership sync, which allows a malicious remote cluster to remove any user from any channel, including private channels, via crafted membership sync messages targeting channels the remote cluster is not authorized to access. Mattermost Advisory ID: MMSA-2026-00576 2026-05-18T19:17:19.280 https://cve.circl.lu/cve/CVE-2026-28759
CVE-2026-2325 1.4 Mattermost Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to limit the size of the request body on the start meeting API endpoint, which allows an authenticated attacker to cause resource exhaustion or denial of service via a crafted oversized HTTP POST request to {{/api/v1/meetings}}.. Mattermost Advisory ID: MMSA-2026-00608 2026-05-18T19:17:11.097 https://cve.circl.lu/cve/CVE-2026-2325
CVE-2016-7544 3.6 Microsoft Crypto++ 5.6.4 incorrectly uses Microsoft's stack-based _malloca and _freea functions. The library will request a block of memory to align a table in memory. If the table is later reallocated, then the wrong pointer could be freed. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7544
CVE-2017-3823 5.9 Microsoft An issue was discovered in the Cisco WebEx Extension before 1.0.7 on Google Chrome, the ActiveTouch General Plugin Container before 106 on Mozilla Firefox, the GpcContainer Class ActiveX control plugin before 10031.6.2017.0126 on Internet Explorer, and the Download Manager ActiveX control plugin before 2.1.0.10 on Internet Explorer. A vulnerability in these Cisco WebEx browser extensions could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server and Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center) when they are running on Microsoft Windows. The vulnerability is a design defect in an application programing interface (API) response parser within the extension. An attacker that can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3823
CVE-2017-0038 3.6 Microsoft gdi32.dll in Graphics Device Interface (GDI) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process heap memory via a crafted EMF file, as demonstrated by an EMR_SETDIBITSTODEVICE record with modified Device Independent Bitmap (DIB) dimensions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-3216, CVE-2016-3219, and/or CVE-2016-3220. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0038
CVE-2016-3104 3.6 MongoDB mongod in MongoDB 2.6, when using 2.4-style users, and 2.4 allow remote attackers to cause a denial of service (memory consumption and process termination) by leveraging in-memory database representation when authenticating against a non-existent database. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-3104
CVE-2014-8180 3.6 MongoDB MongoDB on Red Hat Satellite 6 allows local users to bypass authentication by logging in with an empty password and delete information which can cause a Denial of Service. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-8180
CVE-2017-14227 3.6 MongoDB In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-14227
CVE-2017-15535 5.2 MongoDB MongoDB 3.4.x before 3.4.10, and 3.5.x-development, has a disabled-by-default configuration setting, networkMessageCompressors (aka wire protocol compression), which exposes a vulnerability when enabled that could be exploited by a malicious attacker to deny service or modify memory. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-15535
CVE-2026-8431 5.9 MongoDB An administrative user with access to configure webhooks can execute arbitrary commands by configuring and then triggering webhooks containing specific FreeMarker template syntax. This issue affects all MongoDB Ops Manager 7.0 versions and MongoDB Ops Manager versions 8.0.22 and prior. 2026-05-13T15:34:29.847 https://cve.circl.lu/cve/CVE-2026-8431
CVE-2016-4338 5.9 MySQL The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4338
CVE-2016-5541 2.5 MySQL Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: NDBAPI). Supported versions that are affected are 7.2.26 and earlier, 7.3.14 and earlier and 7.4.12 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS v3.0 Base Score 4.8 (Integrity and Availability impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5541
CVE-2016-5590 5.9 MySQL Vulnerability in the MySQL Enterprise Monitor component of Oracle MySQL (subcomponent: Monitoring: Agent). Supported versions that are affected are 3.1.3.7856 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via TLS to compromise MySQL Enterprise Monitor. Successful attacks of this vulnerability can result in takeover of MySQL Enterprise Monitor. CVSS v3.0 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5590
CVE-2016-8318 4.0 MySQL Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.8 (Availability impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8318
CVE-2016-8327 3.6 MySQL Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8327
CVE-2016-4617 6.0 MacOS An issue was discovered in certain Apple products. macOS before 10.12 is affected. The issue involves a sandbox escape related to launchctl process spawning in the "libxpc" component. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4617
CVE-2016-4660 4.2 MacOS An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "FontParser" component. It allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted font. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4660
CVE-2016-4661 3.6 MacOS An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "ntfs" component, which misparses disk images and allows attackers to cause a denial of service via a crafted app. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4661
CVE-2016-4662 5.9 MacOS An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "AppleGraphicsControl" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4662
CVE-2016-4663 3.6 MacOS An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "NVIDIA Graphics Drivers" component. It allows attackers to cause a denial of service (memory corruption) via a crafted app. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4663
CVE-2017-3302 3.6 MariaDB Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3302
CVE-2026-46446 5.5 MariaDB SOGo before 5.12.7, when PostgreSQL or MariaDB is used, and cleartext passwords are stored, allows SQL injection. This is related to c_password = '%@' in changePasswordForLogin. 2026-05-14T16:49:18.583 https://cve.circl.lu/cve/CVE-2026-46446
CVE-2015-8986 3.6 Malware Sandbox detection evasion vulnerability in hardware appliances in McAfee (now Intel Security) Advanced Threat Defense (MATD) 3.4.2.32 and earlier allows attackers to detect the sandbox environment, then bypass proper malware detection resulting in failure to detect a malware file (false-negative) via specially crafted malware. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-8986
CVE-2015-8990 3.6 Malware Detection bypass vulnerability in Intel Security Advanced Threat Defense (ATD) 3.4.6 and earlier allows malware samples to bypass ATD detection via renaming the malware. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-8990
CVE-2015-8991 5.9 Malware Malicious file execution vulnerability in Intel Security McAfee Security Scan+ (MSS+) before 3.11.266.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-8991
CVE-2015-8992 5.9 Malware Malicious file execution vulnerability in Intel Security WebAdvisor before 4.0.2, 4.0.1 and 3.7.2 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-8992
CVE-2015-8993 5.9 Malware Malicious file execution vulnerability in Intel Security CloudAV (Beta) before 0.5.0.151.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-8993
CVE-2026-44987 2.5 MFA SysReptor is a fully customizable pentest reporting platform. Prior to version 2026.29, users with "User Admin" permissions can change the email addresses of users with "Superuser" permissions. If the SysReptor installation has the "Forgot Password" functionality enabled (non-default), they can reset the Superusers' passwords and authenticate, if the Superuser has no MFA enabled. User managers can then access the Django backend (/admin) or manipulate the settings of the SysReptor installation. Note that user managers have the ability to access all pentest projects by assigning themselves "Project Admin" permissions. This is intentional and by design. This issue has been patched in version 2026.29. 2026-05-13T16:49:32.233 https://cve.circl.lu/cve/CVE-2026-44987
CVE-2026-43930 N/A MFA Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.76 and 9.9.0-alpha.2, a race condition in the MFA SMS one-time password (OTP) login path allows two concurrent /login requests carrying the same OTP to both succeed and both receive valid session tokens, breaking the single-use property of the OTP. The vulnerability requires the attacker to already possess the victim's password and intercept the active SMS OTP (e.g. via SIM swap, network mirror, or phishing relay) and to race the legitimate login request, so the practical attack surface is narrow. This vulnerability is fixed in 8.6.76 and 9.9.0-alpha.2. 2026-05-13T18:26:47.613 https://cve.circl.lu/cve/CVE-2026-43930
CVE-2026-28510 5.2 Multi-factor Authentication eLabFTW is an open source electronic lab notebook. In elabftw versions through 5.4.1, the login flow did not reliably preserve the multi-factor authentication state across authentication steps. Under certain conditions, an attacker with valid primary credentials could complete authentication with an attacker-controlled TOTP secret and bypass the additional factor. This could result in unauthorized account access. This issue is fixed in version 5.4.2. 2026-05-12T13:58:22.663 https://cve.circl.lu/cve/CVE-2026-28510
CVE-2026-33833 4.7 Machine Learning Improper neutralization of special elements in output used by a downstream component ('injection') in Azure Machine Learning allows an unauthorized attacker to perform spoofing over a network. 2026-05-13T15:34:52.573 https://cve.circl.lu/cve/CVE-2026-33833
CVE-2017-8001 5.9 MDM An issue was discovered in EMC ScaleIO 2.0.1.x. In a Linux environment, one of the support scripts saves the credentials of the ScaleIO MDM user who executed the script in clear text in temporary log files. The temporary files may potentially be read by an unprivileged user with access to the server where the script was executed to recover exposed credentials. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8001
CVE-2026-23998 3.6 MDM Fleet is open source device management software. Prior to version 4.81.0, a vulnerability in Fleet’s Windows MDM management endpoint could allow requests to be processed without proper client certificate validation. In certain circumstances, this could allow an attacker to impersonate an enrolled Windows device and retrieve sensitive configuration data. Fleet’s Windows MDM management endpoint relies on mutual TLS (mTLS) client certificates to authenticate enrolled devices. In affected versions, requests that did not present a client certificate could be incorrectly treated as trusted. As a result, an attacker with prior knowledge of a valid enrolled device identifier could potentially impersonate that device and receive configuration payloads intended for it. These payloads may contain sensitive information such as Wi-Fi or VPN configuration data, certificates, or other secrets delivered through MDM profiles. This issue does not allow enrollment of new devices, administrative access to Fleet, or compromise of the Fleet control plane. Impact is limited to the targeted Windows device. Version 4.81.0 contains a patch. If an immediate upgrade is not possible, affected Fleet users should temporarily disable Windows MDM. 2026-05-15T18:08:13.130 https://cve.circl.lu/cve/CVE-2026-23998
CVE-2026-24899 N/A MDM Fleet is open source device management software. Prior to version 4.82.0, a vulnerability in Fleet's Windows MDM enrollment flow allows authentication tokens from any Azure AD tenant to be accepted. Because Fleet validates JWT signatures using Microsoft's multi-tenant JWKS endpoint but does not enforce the `aud` (audience) or `iss` (issuer) claims, any Microsoft-signed Azure AD access token containing the expected scopes can be used to authenticate to Fleet's MDM endpoints. If Windows MDM is enabled, an attacker with access to any Azure AD tenant can obtain a valid Microsoft-signed token and use it to enroll unauthorized devices and interact with Fleet's MDM management APIs. During device management, Fleet may expose sensitive enrollment secrets embedded in MDM command payloads, enabling further unauthorized access. Version 4.82.0 contains a patch. If an immediate upgrade is not possible, affected Fleet users should temporarily disable Windows MDM. 2026-05-14T21:24:23.440 https://cve.circl.lu/cve/CVE-2026-24899
CVE-2013-7460 3.6 McAfee A write protection and execution bypass vulnerability in McAfee (now Intel Security) Application Control (MAC) 6.1.0 for Linux and earlier allows authenticated users to change binaries that are part of the Application Control whitelist and allows execution of binaries via specific conditions. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2013-7460
CVE-2013-7461 3.6 McAfee A write protection and execution bypass vulnerability in McAfee (now Intel Security) Change Control (MCC) 6.1.0 for Linux and earlier allows authenticated users to change files that are part of write protection rules via specific conditions. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2013-7461
CVE-2013-7462 3.6 McAfee A directory traversal vulnerability in the web application in McAfee (now Intel Security) SaaS Control Console (SCC) Platform 6.14 before patch 1070, and 6.15 before patch 1076 allows unauthenticated users to view contents of arbitrary system files that did not have file system level read access restrictions via a null-byte injection exploit. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2013-7462
CVE-2014-9920 3.6 McAfee Unauthorized execution of binary vulnerability in McAfee (now Intel Security) McAfee Application Control (MAC) 6.0.0 before hotfix 9726, 6.0.1 before hotfix 9068, 6.1.0 before hotfix 692, 6.1.1 before hotfix 399, 6.1.2 before hotfix 426, and 6.1.3 before hotfix 357 and earlier allows attackers to create a malformed Windows binary that is considered non-executable and is not protected through the whitelisting protection feature via a specific set of circumstances. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-9920
CVE-2017-5461 5.9 Mozilla Mozilla Network Security Services (NSS) before 3.21.4, 3.22.x through 3.28.x before 3.28.4, 3.29.x before 3.29.5, and 3.30.x before 3.30.1 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by leveraging incorrect base64 operations. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5461
CVE-2017-6753 5.9 Mozilla A vulnerability in Cisco WebEx browser extensions for Google Chrome and Mozilla Firefox could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server, Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center), and Cisco WebEx Meetings when they are running on Microsoft Windows. The vulnerability is due to a design defect in the extension. An attacker who can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser. The following versions of the Cisco WebEx browser extensions are affected: Versions prior to 1.0.12 of the Cisco WebEx extension on Google Chrome, Versions prior to 1.0.12 of the Cisco WebEx extension on Mozilla Firefox. Cisco Bug IDs: CSCvf15012 CSCvf15020 CSCvf15030 CSCvf15033 CSCvf15036 CSCvf15037. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6753
CVE-2007-5341 5.9 Mozilla Remote code execution in the Venkman script debugger in Mozilla Firefox before 2.0.0.8. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2007-5341
CVE-2017-14632 5.9 Mozilla Xiph.Org libvorbis 1.3.5 allows Remote Code Execution upon freeing uninitialized memory in the function vorbis_analysis_headerout() in info.c when vi->channels<=0, a similar issue to Mozilla bug 550184. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-14632
CVE-2017-0428 5.9 NVIDIA An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-32401526. References: N-CVE-2017-0428. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0428
CVE-2017-0429 5.9 NVIDIA An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-32636619. References: N-CVE-2017-0429. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0429
CVE-2017-0448 3.6 NVIDIA An information disclosure vulnerability in the NVIDIA video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as High because it could be used to access sensitive data without explicit user permission. Product: Android. Versions: Kernel-3.10. Android ID: A-32721029. References: N-CVE-2017-0448. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0448
CVE-2017-0308 6.0 NVIDIA All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where untrusted input is used for buffer size calculation leading to denial of service or escalation of privileges. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0308
CVE-2017-0309 6.0 NVIDIA All versions of NVIDIA GPU Display Driver contain a vulnerability in the kernel mode layer handler where multiple integer overflows may cause improper memory allocation leading to a denial of service or potential escalation of privileges. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0309
CVE-2016-10175 5.9 Netgear The NETGEAR WNR2000v5 router leaks its serial number when performing a request to the /BRS_netgear_success.html URI. This serial number allows a user to obtain the administrator username and password, when used in combination with the CVE-2016-10176 vulnerability that allows resetting the answers to the password-recovery questions. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10175
CVE-2016-10176 5.9 Netgear The NETGEAR WNR2000v5 router allows an administrator to perform sensitive actions by invoking the apply.cgi URL on the web server of the device. This special URL is handled by the embedded web server (uhttpd) and processed accordingly. The web server also contains another URL, apply_noauth.cgi, that allows an unauthenticated user to perform sensitive actions on the device. This functionality can be exploited to change the router settings (such as the answers to the password-recovery questions) and achieve remote code execution. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10176
CVE-2017-6366 5.9 Netgear Cross-site request forgery (CSRF) vulnerability in NETGEAR DGN2200 routers with firmware 10.0.0.20 through 10.0.0.50 allows remote attackers to hijack the authentication of users for requests that perform DNS lookups via the host_name parameter to dnslookup.cgi. NOTE: this issue can be combined with CVE-2017-6334 to execute arbitrary code remotely. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6366
CVE-2016-1556 3.6 Netgear Information disclosure in Netgear WN604 before 3.3.3; WNAP210, WNAP320, WNDAP350, and WNDAP360 before 3.5.5.0; and WND930 before 2.0.11 allows remote attackers to read the wireless WPS PIN or passphrase by visiting unauthenticated webpages. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-1556
CVE-2016-1557 5.9 Netgear Netgear WNAP320, WNDAP350, and WNDAP360 before 3.5.5.0 reveal wireless passwords and administrative usernames and passwords over SNMP. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-1557
CVE-2016-9459 2.7 Nextcloud Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are vulnerable to a log pollution vulnerability potentially leading to a local XSS. The download log functionality in the admin screen is delivering the log in JSON format to the end-user. The file was delivered with an attachment disposition forcing the browser to download the document. However, Firefox running on Microsoft Windows would offer the user to open the data in the browser as an HTML document. Thus any injected data in the log would be executed. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9459
CVE-2016-9460 1.4 Nextcloud Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are vulnerable to a content-spoofing attack in the files app. The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9460
CVE-2016-9461 1.4 Nextcloud Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are not properly verifying edit check permissions on WebDAV copy actions. The WebDAV endpoint was not properly checking the permission on a WebDAV COPY action. This allowed an authenticated attacker with access to a read-only share to put new files in there. It was not possible to modify existing files. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9461
CVE-2016-9462 1.4 Nextcloud Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are not properly verifying restore privileges when restoring a file. The restore capability of Nextcloud/ownCloud was not verifying whether a user has only read-only access to a share. Thus a user with read-only access was able to restore old versions. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9462
CVE-2016-9463 5.9 Nextcloud Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.1.2, 9.0.6, and 8.2.9 suffer from SMB User Authentication Bypass. Nextcloud/ownCloud include an optional and not by default enabled SMB authentication component that allows authenticating users against an SMB server. This backend is implemented in a way that tries to connect to a SMB server and if that succeeded consider the user logged-in. The backend did not properly take into account SMB servers that have any kind of anonymous auth configured. This is the default on SMB servers nowadays and allows an unauthenticated attacker to gain access to an account without valid credentials. Note: The SMB backend is disabled by default and requires manual configuration in the Nextcloud/ownCloud config file. If you have not configured the SMB backend then you're not affected by this vulnerability. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9463
CVE-2017-8301 3.6 Nginx LibreSSL 2.5.1 to 2.5.3 lacks TLS certificate verification if SSL_get_verify_result is relied upon for a later check of a verification result, in a use case where a user-provided verification callback returns 1, as demonstrated by acceptance of invalid certificates by nginx. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8301
CVE-2017-7529 3.6 Nginx Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7529
CVE-2026-8430 5.9 Nginx SPIP versions prior to 4.4.14 contain a remote code execution vulnerability in the public space that is limited to certain nginx configurations, allowing attackers to execute arbitrary code in the context of the web server. Attackers can exploit this vulnerability through specific nginx configuration scenarios to achieve code execution, and this issue is not mitigated by the SPIP security screen. 2026-05-13T15:26:44.333 https://cve.circl.lu/cve/CVE-2026-8430
CVE-2026-42268 3.6 Nginx ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. From 3.0.0 to before 3.0.15, there is an unhandled exception (std::out_of_range) caused by unsigned integer underflow in libmodsecurity3 if the user (administrator) uses a rule any of @verifySSN, @verifyCPF, or @verifySVNR. This vulnerability is fixed in 3.0.15. 2026-05-14T14:49:57.730 https://cve.circl.lu/cve/CVE-2026-42268
CVE-2026-44015 4.7 Nginx Nginx UI is a web user interface for the Nginx web server. In 2.3.4 and earlier, an authenticated user can perform Server-Side Request Forgery (SSRF) by creating a cluster node pointing to an arbitrary internal URL and then sending API requests with the X-Node-ID header. The Proxy middleware forwards these requests to the attacker-specified internal address, bypassing network segmentation and enabling access to services bound to localhost or internal networks. 2026-05-14T22:16:43.797 https://cve.circl.lu/cve/CVE-2026-44015
CVE-2013-7451 2.7 Node.js The validator module before 1.1.0 for Node.js allows remote attackers to bypass the XSS filter via a nested tag. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2013-7451
CVE-2013-7453 2.7 Node.js The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via vectors related to UI redressing. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2013-7453
CVE-2013-7454 2.7 Node.js The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via nested forbidden strings. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2013-7454
CVE-2014-9772 2.7 Node.js The validator package before 2.0.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via hex-encoded characters. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-9772
CVE-2026-29198 5.9 NoSQL In Rocket.Chat <8.3.0, <8.2.1, <8.1.2, <8.0.3, <7.13.5, <7.12.6, <7.11.6, and <7.10.9, a NoSQL injection vulnerability can lead to account takeover of the first user with a generated token when an OAuth app is configured. 2026-05-13T20:39:44.683 https://cve.circl.lu/cve/CVE-2026-29198
CVE-2026-44666 N/A NoSQL HRConvert2 is a self-hosted, drag-and-drop & nosql file conversion server & share tool. Prior to 3.3.8, the sanitizeString() function in convertCore.php is missing backtick (`) and tab (\t) from its strip list. User input then reaches shell_exec(), where the shell interprets these characters and commands within filenames execute. This vulnerability is fixed in 3.3.8. 2026-05-15T15:16:53.630 https://cve.circl.lu/cve/CVE-2026-44666
CVE-2017-5230 5.9 Nexpose The Java keystore in all versions and editions of Rapid7 Nexpose prior to 6.4.50 is encrypted with a static password of 'r@p1d7k3y5t0r3' which is not modifiable by the user. The keystore provides storage for saved scan credentials in an otherwise secure location on disk. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5230
CVE-2017-5232 5.9 Nexpose All editions of Rapid7 Nexpose installers prior to version 6.4.24 contain a DLL preloading vulnerability, wherein it is possible for the installer to load a malicious DLL located in the current working directory of the installer. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5232
CVE-2017-5243 6.0 Nexpose The default SSH configuration in Rapid7 Nexpose hardware appliances shipped before June 2017 does not specify desired algorithms for key exchange and other important functions. As a result, it falls back to allowing ALL algorithms supported by the relevant version of OpenSSH and makes the installations vulnerable to a range of MITM, downgrade, and decryption attacks. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5243
CVE-2017-5264 5.9 Nexpose Versions of Nexpose prior to 6.4.66 fail to adequately validate the source of HTTP requests intended for the Automated Actions administrative web application, and are susceptible to a cross-site request forgery (CSRF) attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5264
CVE-2016-9260 2.7 Nessus Cross-site scripting (XSS) vulnerability in Tenable Nessus before 6.9 allows remote authenticated users to inject arbitrary web script or HTML via vectors related to handling of .nessus files. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9260
CVE-2016-9259 2.7 Nessus Cross-site scripting (XSS) vulnerability in Tenable Nessus before 6.9.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9259
CVE-2017-6543 5.9 Nessus Tenable Nessus before 6.10.2 (as used alone or in Tenable Appliance before 4.5.0) was found to contain a flaw that allowed a remote, authenticated attacker to upload a crafted file that could be written to anywhere on the system. This could be used to subsequently gain elevated privileges on the system (e.g., after a reboot). This issue only affects installations on Windows. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6543
CVE-2017-7199 5.9 Nessus Nessus 6.6.2 - 6.10.3 contains a flaw related to insecure permissions that may allow a local attacker to escalate privileges when the software is running in Agent Mode. Version 6.10.4 fixes this issue. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7199
CVE-2017-7849 3.6 Nessus Nessus 6.10.x before 6.10.5 was found to be vulnerable to a local denial of service condition due to insecure permissions when running in Agent Mode. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7849
CVE-2017-8914 3.7 NPM sinopia, as used in SAP HANA XS 1.00 and 2.00, allows remote attackers to hijack npm packages or host arbitrary files by leveraging an insecure user creation policy, aka SAP Security Note 2407694. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8914
CVE-2017-1000219 5.9 NPM npm/KyleRoss windows-cpu all versions vulnerable to command injection resulting in code execution as Node.js user 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-1000219
CVE-2016-10703 3.6 NPM A regular expression Denial of Service (DoS) vulnerability in the file lib/ecstatic.js of the ecstatic npm package, before version 2.0.0, allows a remote attacker to overload and crash a server by passing a maliciously crafted string. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10703
CVE-2026-45321 6.0 NPM On 2026-05-11, between approximately 19:20 and 19:26 UTC, 84 malicious versions across 42 @tanstack/* packages were published to the npm registry. The publishes were authenticated via the legitimate GitHub Actions OIDC trusted-publisher binding for TanStack/router, but the publish workflow itself was not modified. The attacker chained three known vulnerability classes — a pull_request_target "Pwn Request" misconfiguration, GitHub Actions cache poisoning across the fork↔base trust boundary, and runtime memory extraction of the OIDC token from the Actions runner process — to publish credential-stealing malware under a trusted identity. Each affected package received exactly two malicious versions, published a few minutes apart. 2026-05-14T17:05:28.793 https://cve.circl.lu/cve/CVE-2026-45321
CVE-2016-7997 3.6 NULL Pointer The WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (assertion failure and crash) via vectors related to a ReferenceBlob and a NULL pointer. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7997
CVE-2016-10025 3.6 NULL Pointer VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10025
CVE-2016-10087 3.6 NULL Pointer The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10087
CVE-2016-6604 5.9 NULL Pointer NULL pointer dereference in Samsung Exynos fimg2d driver for Android L(5.0/5.1) and M(6.0) allows attackers to have unspecified impact via unknown vectors. The Samsung ID is SVE-2016-6382. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6604
CVE-2017-5991 3.6 NULL Pointer An issue was discovered in Artifex MuPDF before 1912de5f08e90af1d9d0a9791f58ba3afdb9d465. The pdf_run_xobject function in pdf-op-run.c encounters a NULL pointer dereference during a Fitz fz_paint_pixmap_with_mask painting operation. Versions 1.11 and later are unaffected. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5991
CVE-2016-6582 5.2 OAuth The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6582
CVE-2017-6062 4.0 OAuth The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.5 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "OIDCUnAuthAction pass" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6062
CVE-2017-6413 4.0 OAuth The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6413
CVE-2017-4960 3.6 OAuth An issue was discovered in Cloud Foundry release v247 through v252, UAA stand-alone release v3.9.0 through v3.11.0, and UAA Bosh Release v21 through v26. There is a potential to subject the UAA OAuth clients to a denial of service attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-4960
CVE-2016-0781 2.7 OAuth The UAA OAuth approval pages in Cloud Foundry v208 to v231, Login-server v1.6 to v1.14, UAA v2.0.0 to v2.7.4.1, UAA v3.0.0 to v3.2.0, UAA-Release v2 to v7 and Pivotal Elastic Runtime 1.6.x versions prior to 1.6.20 are vulnerable to an XSS attack by specifying malicious java script content in either the OAuth scopes (SCIM groups) or SCIM group descriptions. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-0781
CVE-2026-33376 5.2 Okta When using an IPv6 allow-list for the Auth Proxy feature, it defaults to /32 addresses. Addresses specifying a mask explicitly are not affected; to mitigate easily, add the desired mask (usually /128) to the addresses. Only auth proxy is affected; Okta, SAML, LDAP, etc are unaffected here. 2026-05-14T16:21:02.930 https://cve.circl.lu/cve/CVE-2026-33376
CVE-2016-2217 1.4 OpenSSL The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does not use a prime number for the DH, which makes it easier for remote attackers to obtain the shared secret. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-2217
CVE-2016-7798 3.6 OpenSSL The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7798
CVE-2017-5681 3.6 OpenSSL The RSA-CRT implementation in the Intel QuickAssist Technology (QAT) Engine for OpenSSL versions prior to 0.5.19 may allow remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5681
CVE-2016-7053 3.6 OpenSSL In OpenSSL 1.1.0 before 1.1.0c, applications parsing invalid CMS structures can crash with a NULL pointer dereference. This is caused by a bug in the handling of the ASN.1 CHOICE type in OpenSSL 1.1.0 which can result in a NULL value being passed to the structure callback if an attempt is made to free certain invalid encodings. Only CHOICE structures using a callback which do not handle NULL value are affected. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7053
CVE-2016-7054 3.6 OpenSSL In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7054
CVE-2016-5509 1.4 Oracle Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Core). Supported versions that are affected are 12.0.1, 12.0.2,12.0.4,12.1.0 and 12.3.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle FLEXCUBE Investor Servicing accessible data. CVSS v3.0 Base Score 3.1 (Confidentiality impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5509
CVE-2016-5528 6.0 Oracle Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Security). Supported versions that are affected are 2.1.1, 3.0.1 and 3.1.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GlassFish Server. While the vulnerability is in Oracle GlassFish Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle GlassFish Server. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5528
CVE-2016-5545 3.4 Oracle Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: GUI). Supported versions that are affected are VirtualBox prior to 5.0.32 and prior to 5.1.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS v3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5545
CVE-2017-0106 5.9 Outlook Microsoft Excel 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1, and Microsoft Outlook 2016 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0106
CVE-2017-0204 3.6 Outlook Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1, and Microsoft Outlook 2016 allow remote attackers to bypass the Office Protected View via a specially crafted document, aka "Microsoft Office Security Feature Bypass Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0204
CVE-2017-0207 3.6 Outlook Microsoft Outlook for Mac 2011 allows remote attackers to spoof web content via a crafted email with specific HTML tags, aka "Microsoft Browser Spoofing Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0207
CVE-2017-8545 3.6 Outlook A spoofing vulnerability exists in when Microsoft Outlook for Mac does not sanitize html properly, aka "Microsoft Outlook for Mac Spoofing Vulnerability". 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8545
CVE-2017-2789 5.9 Office When copying filedata into a buffer, JustSystems Ichitaro Office 2016 Trial will calculate two values to determine how much data to copy from the document. If both of these values are larger than the size of the buffer, the application will choose the smaller of the two and trust it to copy data from the file. This value is larger than the buffer size, which leads to a heap-based buffer overflow. This overflow corrupts an offset in the heap used in pointer arithmetic for writing data and can lead to code execution under the context of the application. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2789
CVE-2017-0014 5.9 Office The Windows Graphics Component in Microsoft Office 2010 SP2; Windows Server 2008 R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Graphics Component Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0108. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0014
CVE-2017-0019 5.9 Office Microsoft Word 2016 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0020, CVE-2017-0030, CVE-2017-0031, CVE-2017-0052, and CVE-2017-0053. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0019
CVE-2026-42203 5.9 OpenAI LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.80.5 to before version 1.83.7, the POST /prompts/test endpoint accepted user-supplied prompt templates and rendered them without sandboxing. A crafted template could run arbitrary code inside the LiteLLM Proxy process. The endpoint only checks that the caller presents a valid proxy API key, so any authenticated user could reach it. Depending on how the proxy is deployed, this could expose secrets in the process environment (such as provider API keys or database credentials) and allow commands to be run on the host. This issue has been patched in version 1.83.7. 2026-05-13T17:14:58.667 https://cve.circl.lu/cve/CVE-2026-42203
CVE-2026-44556 4.2 OpenAI Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the /responses endpoint in the OpenAI router accepts any authenticated user and forwards requests directly to upstream LLM providers without enforcing per-model access control. While the primary chat completion endpoint (generate_chat_completion) checks model ownership, group membership, and AccessGrants before allowing a request, the /responses proxy only validates that the user has a valid session via get_verified_user. This allows any authenticated user to interact with any model configured on the instance by sending a POST request to /api/openai/responses with an arbitrary model ID. This vulnerability is fixed in 0.9.0. 2026-05-19T03:12:44.393 https://cve.circl.lu/cve/CVE-2026-44556
CVE-2017-5842 3.6 OneNote The html_context_handle_element function in gst/subparse/samiparse.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted SMI file, as demonstrated by OneNote_Manager.smi. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5842
CVE-2017-0197 5.9 OneNote Microsoft OneNote 2007 SP3 and Microsoft OneNote 2010 SP2 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office DLL Loading Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0197
CVE-2026-22810 6.0 OneNote Joplin is an open source note-taking and to-do application that organises notes and lists into notebooks. Versions prior to 3.5.7 contain a path traversal vulnerability in the importer which allows overwriting arbitrary files on disk. The OneNote converter does not sanitize the names of embedded files before writing them to disk. As a result, it's possible for an attacker to create a malicious .one file that includes file names containing ../../, that are then interpreted as part of the target path when extracting attachments from the .one file. This issue has been patched in version 3.5.7. 2026-05-18T21:16:39.373 https://cve.circl.lu/cve/CVE-2026-22810
CVE-2016-6210 3.6 OpenSSH sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6210
CVE-2016-7407 5.9 OpenSSH The dropbearconvert command in Dropbear SSH before 2016.74 allows attackers to execute arbitrary code via a crafted OpenSSH key file. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7407
CVE-2016-1908 5.9 OpenSSH The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-1908
CVE-2017-15906 1.4 OpenSSH The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-15906
CVE-2017-8994 5.9 Orchestration A input validation vulnerability in HPE Operations Orchestration product all versions prior to 10.80, allows for the execution of code remotely. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8994
CVE-2026-42047 4.0 Orchestration Inngest is a platform for running event-driven and scheduled background functions with queueing, retries, and step orchestration. Versions 3.22.0 through 3.53.1 contain a vulnerability that allows unauthenticated remote attackers to exfiltrate environment variables from the host process via the serve() HTTP handler. The serve() handler implements GET, POST, and PUT methods. Requests using PATCH, OPTIONS, or DELETE fall through to a generic handler that returns diagnostic information. A change introduced in v3.22.0 caused this diagnostic response to include the contents of process.env, exposing any secrets, API keys, or credentials present in the environment. An application is vulnerable if its serve() endpoint is reachable via PATCH, OPTIONS, or DELETE requests, which is common in setups like Next.js Pages Router or Express's app.use(...). Not affected are Next.js App Router handlers that export only GET, POST, and PUT, and applications using the connect worker method. This issue has been fixed in version 3.54.0. To work around this issue if upgrading is not immediately possible, restrict the serve() endpoint at the framework or reverse-proxy layer to accept only GET, POST, and PUT. The Inngest serve() endpoint does not require any other HTTP methods. 2026-05-13T14:06:01.727 https://cve.circl.lu/cve/CVE-2026-42047
CVE-2026-25244 5.9 Orchestration WebdriverIO is a test automation framework for unit, e2e and component testing using WebDriver, WebDriver BiDi and Appium. Versions below 9.24.0 contain a command injection vulnerability leading to remote code execution (RCE) in test orchestration. Git permits branch names containing shell metacharacters, and getGitMetadataForAISelection() interpolates these names directly into execSync() calls without sanitization. An attacker can exploit this by supplying a malicious repository (via testOrchestrationOptions.runSmartSelection.source, or the current directory if unset) whose branch name carries a payload, causing the shell to execute arbitrary code. This enables remote code execution on CI/CD servers and developer machines, leading to credential and secret disclosure, source code and SSH key exfiltration, system compromise, and supply chain attacks via tampered build artifacts. The issue has been fixed in version 9.24.0. 2026-05-18T21:16:39.547 https://cve.circl.lu/cve/CVE-2026-25244
CVE-2015-7494 1.4 Orchestrator A vulnerability has been identified in IBM Cloud Orchestrator services/[action]/launch API. An authenticated domain admin user might modify cross domain resources via a /services/[action]/launch API call, provided it would have been possible for the domain admin user to gain access to a resource identifier of the other domain. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-7494
CVE-2016-0202 1.4 Orchestrator A vulnerability has been identified in tasks, backend object generated for handling any action performed by the application in IBM Cloud Orchestrator. It is possible for an authenticated user to view any task of the current users domain. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-0202
CVE-2016-0203 3.6 Orchestrator A vulnerability has been identified in the IBM Cloud Orchestrator task API. The task API might allow an authenticated user to view background information associated with actions performed on virtual machines in projects where the user belongs to. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-0203
CVE-2016-0206 1.4 Orchestrator IBM Cloud Orchestrator could allow a local authenticated attacker to cause the server to slow down for a short period of time by using a specially crafted and malformed URL. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-0206
CVE-2016-8027 6.0 Orchestrator SQL injection vulnerability in core services in Intel Security McAfee ePolicy Orchestrator (ePO) 5.3.2 and earlier and 5.1.3 and earlier allows attackers to alter a SQL query, which can result in disclosure of information within the database or impersonation of an agent without authentication via a specially crafted HTTP post. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8027
CVE-2017-5223 3.6 PHP An issue was discovered in PHPMailer before 5.2.22. PHPMailer's msgHTML method applies transformations to an HTML document to make it usable as an email message body. One of the transformations is to convert relative image URLs into attachments using a script-provided base directory. If no base directory is provided, it resolves to /, meaning that relative image URLs get treated as absolute local file paths and added as attachments. To form a remote vulnerability, the msgHTML method must be called, passed an unfiltered, user-supplied HTML document, and must not set a base directory. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5223
CVE-2017-5520 5.9 PHP The media rename feature in GeniXCMS through 0.0.8 does not consider alternative PHP file extensions when checking uploaded files for PHP content, which enables a user to rename and execute files with the `.php6`, `.php7` and `.phtml` extensions. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5520
CVE-2016-7980 5.9 PHP Cross-site request forgery (CSRF) vulnerability in ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to hijack the authentication of administrators for requests that execute the XML validator on a local file via a crafted valider_xml request. NOTE: this issue can be combined with CVE-2016-7998 to execute arbitrary PHP code. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7980
CVE-2016-7998 5.9 PHP The SPIP template composer/compiler in SPIP 3.1.2 and earlier allows remote authenticated users to execute arbitrary PHP code by uploading an HTML file with a crafted (1) INCLUDE or (2) INCLURE tag and then accessing it with a valider_xml action. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7998
CVE-2017-5543 5.9 PHP includes/classes/ia.core.users.php in Subrion CMS 4.0.5 allows remote attackers to conduct PHP Object Injection attacks via crafted serialized data in a salt cookie in a login request. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5543
CVE-2017-5328 3.6 Palo Alto Palo Alto Networks Terminal Services Agent before 7.0.7 allows attackers to spoof arbitrary users via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5328
CVE-2017-5329 5.9 Palo Alto Palo Alto Networks Terminal Services Agent before 7.0.7 allows local users to gain privileges via vectors that trigger an out-of-bounds write operation. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5329
CVE-2017-5583 3.6 Palo Alto The Management Web Interface in Palo Alto Networks PAN-OS before 6.1.16, 7.0.x before 7.0.13, and 7.1.x before 7.1.8 allows remote authenticated users to read arbitrary files via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5583
CVE-2017-5584 2.7 Palo Alto Cross-site scripting (XSS) vulnerability in the Management Web Interface in Palo Alto Networks PAN-OS 5.1, 6.x before 6.1.16, 7.0.x before 7.0.13, and 7.1.x before 7.1.8 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5584
CVE-2017-6356 1.4 Palo Alto Palo Alto Networks Terminal Services (aka TS) Agent 6.0, 7.0, and 8.0 before 8.0.1 uses weak permissions for unspecified resources, which allows attackers to obtain sensitive session information via unknown vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6356
CVE-2017-2791 5.9 Powerpoint JustSystems Ichitaro 2016 Trial contains a vulnerability that exists when trying to open a specially crafted PowerPoint file. Due to the application incorrectly handling the error case for a function's result, the application will use this result in a pointer calculation for reading file data into. Due to this, the application will read data from the file into an invalid address thus corrupting memory. Under the right conditions, this can lead to code execution under the context of the application. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2791
CVE-2017-0264 5.9 Powerpoint Microsoft PowerPoint for Mac 2011 allows a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-0254 and CVE-2017-0265. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0264
CVE-2017-0265 5.9 Powerpoint Microsoft PowerPoint for Mac 2011 allows a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-0254 and CVE-2017-0264. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0265
CVE-2017-8513 5.9 Powerpoint A remote code execution vulnerability exists in Microsoft PowerPoint when the software fails to properly handle objects in memory, aka "Microsoft PowerPoint Remote Code Execution Vulnerability". 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8513
CVE-2017-8742 5.9 Powerpoint A remote code execution vulnerability exists in Microsoft PowerPoint 2007 Service Pack 3, Microsoft PowerPoint 2010 Service Pack 2, Microsoft PowerPoint 2013 Service Pack 1, Microsoft PowerPoint 2013 RT Service Pack 1, Microsoft PowerPoint 2016, Microsoft PowerPoint Viewer 2007, Microsoft SharePoint Server 2013 Service Pack 1, Microsoft SharePoint Enterprise Server 2016, Microsoft Office Web Apps 2010 Service Pack 2, and Microsoft Office Compatibility Pack Service Pack 3 when they fail to properly handle objects in memory, aka "PowerPoint Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8743. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8742
CVE-2016-7036 5.9 Python python-jose before 1.3.2 allows attackers to have unspecified impact by leveraging failure to use a constant time comparison for HMAC keys. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7036
CVE-2016-4043 3.6 Python Chameleon (five.pt) in Plone 5.0rc1 through 5.1a1 allows remote authenticated users to bypass Restricted Python by leveraging permissions to create or edit templates. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4043
CVE-2017-7235 5.9 Python An issue was discovered in cloudflare-scrape 1.6.6 through 1.7.1. A malicious website owner could craft a page that executes arbitrary Python code against any cfscrape user who scrapes that website. This is fixed in 1.8.0. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7235
CVE-2017-5524 1.4 Python Plone 4.x through 4.3.11 and 5.x through 5.0.6 allow remote attackers to bypass a sandbox protection mechanism and obtain sensitive information by leveraging the Python string format method. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5524
CVE-2016-5715 2.7 Phishing Open redirect vulnerability in the Console in Puppet Enterprise 2015.x and 2016.x before 2016.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a // (slash slash) followed by a domain in the redirect parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6501. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5715
CVE-2017-5474 2.7 Phishing Open redirect vulnerability in comment.php in Serendipity through 2.0.5 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the HTTP Referer header. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5474
CVE-2016-6020 2.7 Phishing IBM Sterling B2B Integrator Standard Edition could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6020
CVE-2016-8961 2.7 Phishing IBM BigFix Inventory v9 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8961
CVE-2016-0214 5.9 Phishing IBM Tivoli Endpoint Manager could allow a remote attacker to upload arbitrary files. A remote attacker could exploit this vulnerability to upload a malicious file. The only way that file would be executed would be through a phishing attack to trick an unsuspecting victim to execute the file. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-0214
CVE-2016-5737 2.7 Puppet The Gerrit configuration in the Openstack Puppet module for Gerrit (aka puppet-gerrit) improperly marks text/html as a safe mimetype, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a crafted review. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5737
CVE-2015-7331 4.7 Puppet The mcollective-puppet-agent plugin before 1.11.1 for Puppet allows remote attackers to execute arbitrary code via vectors involving the --server argument. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-7331
CVE-2016-9686 1.4 Puppet The Puppet Communications Protocol (PCP) Broker incorrectly validates message header sizes. An attacker could use this to crash the PCP Broker, preventing commands from being sent to agents. This is resolved in Puppet Enterprise 2016.4.3 and 2016.5.2. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9686
CVE-2016-2787 1.4 Puppet The Puppet Communications Protocol in Puppet Enterprise 2015.3.x before 2015.3.3 does not properly validate certificates for the broker node, which allows remote non-whitelisted hosts to prevent runs from triggering via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-2787
CVE-2026-0300 5.9 Prisma A buffer overflow vulnerability in the User-IDâ„¢ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-IDâ„¢ Authentication Portal per the best practice guidelines https://knowledgebase.paloaltonetworks.com/KCSArticleDetail by restricting access to only trusted internal IP addresses.Prisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability. 2026-05-12T18:47:21.360 https://cve.circl.lu/cve/CVE-2026-0300
CVE-2026-0237 N/A Prisma An improper protection of alternate path vulnerability in Palo Alto Networks Prisma® Browser on macOS fails to properly restrict access to an internal automation bridge. This allows a locally authenticated non-admin user to leverage an exposed communication channel to send unauthorized commands to the browser, bypassing security controls. 2026-05-13T18:17:47.830 https://cve.circl.lu/cve/CVE-2026-0237
CVE-2026-0263 N/A Prisma A buffer overflow vulnerability in the IKEv2 processing of Palo Alto Networks PAN-OS® software allows an unauthenticated network-based attacker to execute arbitrary code with elevated privileges on the firewall, or cause a denial of service (DoS) condition.Panorama, Cloud NGFW, and Prisma® Access are not impacted by these vulnerabilities. 2026-05-13T18:17:47.830 https://cve.circl.lu/cve/CVE-2026-0263
CVE-2026-0264 N/A Prisma A buffer overflow vulnerability in the DNS proxy and DNS Server features of Palo Alto Networks PAN-OS® Software allows an unauthenticated attacker with network access to cause a denial of service (DoS) condition (all PAN-OS platforms except Cloud NGFW and Prisma Access) or potentially execute arbitrary code by sending specially crafted network traffic (PA-Series hardware only).Panorama, Cloud NGFW, and Prisma® Access are not impacted by this vulnerability. 2026-05-13T18:17:47.830 https://cve.circl.lu/cve/CVE-2026-0264
CVE-2026-0265 N/A Prisma An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Service (CAS) is enabled.The risk is higher if CAS is enabled on the management interface and lower when any other login interfaces are used.The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .This issue is applicable to PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series).Cloud NGFW and Prisma Access® are not impacted by this vulnerability. 2026-05-13T18:17:47.830 https://cve.circl.lu/cve/CVE-2026-0265
CVE-2016-9381 6.0 QEMU Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9381
CVE-2016-9637 6.0 QEMU The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9637
CVE-2016-10028 3.6 QEMU The virgl_cmd_get_capset function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a VIRTIO_GPU_CMD_GET_CAPSET command with a maximum capabilities size with a value of 0. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10028
CVE-2016-10029 3.6 QEMU The virtio_gpu_set_scanout function in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a scanout id in a VIRTIO_GPU_CMD_SET_SCANOUT command larger than num_scanouts. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10029
CVE-2017-6209 4.0 QEMU Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6209
CVE-2017-6335 3.6 Quantum The QuantumTransferMode function in coders/tiff.c in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a small samples per pixel value in a CMYKA TIFF file. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6335
CVE-2014-9822 5.9 Quantum Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted quantum file. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-9822
CVE-2016-7530 3.6 Quantum The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7530
CVE-2017-10794 3.6 Quantum When GraphicsMagick 1.3.25 processes an RGB TIFF picture (with metadata indicating a single sample per pixel) in coders/tiff.c, a buffer overflow occurs, related to QuantumTransferMode. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-10794
CVE-2017-11724 3.6 Quantum The ReadMATImage function in coders/mat.c in ImageMagick through 6.9.9-3 and 7.x through 7.0.6-3 has memory leaks involving the quantum_info and clone_info data structures. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-11724
CVE-2017-5156 5.9 RDP A Cross-Site Request Forgery issue was discovered in Schneider Electric Wonderware InTouch Access Anywhere, version 11.5.2 and prior. The client request may be forged from a different site. This will allow an external site to access internal RDP systems on behalf of the currently logged in user. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5156
CVE-2017-4897 3.6 RDP VMware Horizon DaaS before 7.0.0 contains a vulnerability that exists due to insufficient validation of data. An attacker may exploit this issue by tricking DaaS client users into connecting to a malicious server and sharing all their drives and devices. Successful exploitation of this vulnerability requires a victim to download a specially crafted RDP file through DaaS client by clicking on a malicious link. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-4897
CVE-2017-9948 5.9 RDP A stack buffer overflow vulnerability has been discovered in Microsoft Skype 7.2, 7.35, and 7.36 before 7.37, involving MSFTEDIT.DLL mishandling of remote RDP clipboard content within the message box. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9948
CVE-2017-8673 3.6 RDP The Remote Desktop Protocol (RDP) implementation in Microsoft Windows 10 1703 allows an attacker to connect to a target system using RDP and send specially crafted requests, aka "Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8673
CVE-2017-5228 5.5 Rapid7 All editions of Rapid7 Metasploit prior to version 4.13.0-2017020701 contain a directory traversal vulnerability in the Meterpreter stdapi Dir.download() function. By using a specially-crafted build of Meterpreter, it is possible to write to an arbitrary directory on the Metasploit console with the permissions of the running Metasploit instance. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5228
CVE-2017-5229 5.5 Rapid7 All editions of Rapid7 Metasploit prior to version 4.13.0-2017020701 contain a directory traversal vulnerability in the Meterpreter extapi Clipboard.parse_dump() function. By using a specially-crafted build of Meterpreter, it is possible to write to an arbitrary directory on the Metasploit console with the permissions of the running Metasploit instance. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5229
CVE-2017-5231 5.5 Rapid7 All editions of Rapid7 Metasploit prior to version 4.13.0-2017020701 contain a directory traversal vulnerability in the Meterpreter stdapi CommandDispatcher.cmd_download() function. By using a specially-crafted build of Meterpreter, it is possible to write to an arbitrary directory on the Metasploit console with the permissions of the running Metasploit instance. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5231
CVE-2016-2104 2.7 Red Hat Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5) <input:hidden> or (6) <bean:message> tags. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-2104
CVE-2016-7060 3.6 Red Hat The web interface in Red Hat QuickStart Cloud Installer (QCI) 1.0 does not mask passwords fields, which allows physically proximate attackers to obtain sensitive password information by reading the display. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7060
CVE-2016-5409 3.6 Red Hat Red Hat OpenShift Enterprise 2 does not include the HTTPOnly flag in a Set-Cookie header for the GEARID cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to the cookies. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5409
CVE-2016-6338 5.9 Red Hat ovirt-engine-webadmin, as used in Red Hat Enterprise Virtualization Manager (aka RHEV-M) for Servers and RHEV-M 4.0, allows physically proximate attackers to bypass a webadmin session timeout restriction via vectors related to UI selections, which trigger repeating queries. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6338
CVE-2016-5401 5.9 Red Hat Cross-site request forgery (CSRF) vulnerability in Red Hat JBoss BRMS and BPMS 6 allows remote attackers to hijack the authentication of users for requests that modify instances via a crafted web page. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5401
CVE-2017-7969 5.9 Redis A cross-site request forgery vulnerability exists on the Secure Gateway component of Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 and Citect Anywhere version 1.0 for multiple state-changing requests. This type of attack requires some level of social engineering in order to get a legitimate user to click on or access a malicious link/site containing the CSRF attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7969
CVE-2017-7970 3.6 Redis A vulnerability exists in Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 and Citect Anywhere version 1.0 that allows the ability to specify Arbitrary Server Target Nodes in connection requests to the Secure Gateway and Server components. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7970
CVE-2017-7971 3.6 Redis A vulnerability exists in Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 and Citect Anywhere version 1.0 that allows the use of outdated cipher suites and improper verification of peer SSL Certificate. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7971
CVE-2017-7972 3.4 Redis A vulnerability exists in Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 and Citect Anywhere version 1.0 that allows the ability to escape out of remote PowerSCADA Anywhere applications and launch other processes. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7972
CVE-2017-8083 5.9 Rootkit CompuLab Intense PC and MintBox 2 devices with BIOS before 2017-05-21 do not use the CloseMnf protection mechanism for write protection of flash memory regions, which allows local users to install a firmware rootkit by leveraging administrative privileges. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8083
CVE-2017-6341 3.6 Remote Desktop Dahua DHI-HCVR7216A-S3 devices with NVR Firmware 3.210.0001.10 2016-06-06, Camera Firmware 2.400.0000.28.R 2016-03-29, and SmartPSS Software 1.16.1 2017-01-19 send cleartext passwords in response to requests from the Web Page, Mobile Application, and Desktop Application interfaces, which allows remote attackers to obtain sensitive information by sniffing the network, a different vulnerability than CVE-2013-6117. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6341
CVE-2016-8508 3.6 Remote Desktop Yandex Browser for desktop before 17.1.1.227 does not show Protect (similar to Safebrowsing in Chromium) warnings in web-sites with special content-type, which could be used by remote attacker for prevention Protect warning on own malicious web-site. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8508
CVE-2016-4947 1.4 Remote Desktop Cloudera HUE 3.9.0 and earlier allows remote attackers to enumerate user accounts via a request to desktop/api/users/autocomplete. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4947
CVE-2017-2108 5.9 Remote Desktop Untrusted search path vulnerability in PrimeDrive Desktop Application 1.4.3 and earlier allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2108
CVE-2017-7440 3.6 Remote Desktop Kerio Connect 8.0.0 through 9.2.2, and Kerio Connect Client desktop application for Windows and Mac 9.2.0 through 9.2.2, when e-mail preview is enabled, allows remote attackers to conduct clickjacking attacks via a crafted e-mail message. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7440
CVE-2024-36334 N/A Radeon Improper verification of cryptographic signature in the Radeon RGB tool could allow a malicious file placed in the installation directory to be run with elevated privileges potentially leading to arbitrary code execution. 2026-05-15T14:10:17.083 https://cve.circl.lu/cve/CVE-2024-36334
CVE-2016-7793 5.9 Repository sociomantic-tsunami git-hub before 0.10.3 allows remote attackers to execute arbitrary code via a crafted repository URL. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7793
CVE-2016-7794 5.9 Repository sociomantic-tsunami git-hub before 0.10.3 allows remote attackers to execute arbitrary code via a crafted repository name. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7794
CVE-2014-9938 5.9 Repository contrib/completion/git-prompt.sh in Git before 1.9.3 does not sanitize branch names in the PS1 variable, allowing a malicious repository to cause code execution. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-9938
CVE-2017-8386 5.9 Repository git-shell in git before 2.4.12, 2.5.x before 2.5.6, 2.6.x before 2.6.7, 2.7.x before 2.7.5, 2.8.x before 2.8.5, 2.9.x before 2.9.4, 2.10.x before 2.10.3, 2.11.x before 2.11.2, and 2.12.x before 2.12.3 might allow remote authenticated users to gain privileges via a repository name that starts with a - (dash) character. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8386
CVE-2016-10075 5.9 Repo The tqdm._version module in tqdm versions 4.4.1 and 4.10 allows local users to execute arbitrary code via a crafted repo with a malicious git log in the current working directory. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10075
CVE-2016-5897 2.7 Repo IBM Jazz Reporting Service (JRS) is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5897
CVE-2017-5371 3.6 SAP Odata Server in SAP Adaptive Server Enterprise (ASE) 16 allows remote attackers to cause a denial of service (process crash) via a series of crafted requests, aka SAP Security Note 2330422. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5371
CVE-2017-5372 3.6 SAP The function msp (aka MSPRuntimeInterface) in the P4 SERVERCORE component in SAP AS JAVA allows remote attackers to obtain sensitive system information by leveraging a missing authorization check for the (1) getInformation, (2) getParameters, (3) getServiceInfo, (4) getStatistic, or (5) getClientStatistic function, aka SAP Security Note 2331908. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5372
CVE-2016-10079 3.6 SAP SAPlpd through 7400.3.11.33 in SAP GUI 7.40 on Windows has a Denial of Service vulnerability (service crash) with a long string to TCP port 515. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10079
CVE-2017-5997 3.6 SAP The SAP Message Server HTTP daemon in SAP KERNEL 7.21-7.49 allows remote attackers to cause a denial of service (memory consumption and process crash) via multiple msgserver/group?group= requests with a crafted size of the group parameter, aka SAP Security Note 2358972. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5997
CVE-2015-8994 5.9 SAP An issue was discovered in PHP 5.x and 7.x, when the configuration uses apache2handler/mod_php or php-fpm with OpCache enabled. With 5.x after 5.6.28 or 7.x after 7.0.13, the issue is resolved in a non-default configuration with the opcache.validate_permission=1 setting. The vulnerability details are as follows. In PHP SAPIs where PHP interpreters share a common parent process, Zend OpCache creates a shared memory object owned by the common parent during initialization. Child PHP processes inherit the SHM descriptor, using it to cache and retrieve compiled script bytecode ("opcode" in PHP jargon). Cache keys vary depending on configuration, but filename is a central key component, and compiled opcode can generally be run if a script's filename is known or can be guessed. Many common shared-hosting configurations change EUID in child processes to enforce privilege separation among hosted users (for example using mod_ruid2 for the Apache HTTP Server, or php-fpm user settings). In these scenarios, the default Zend OpCache behavior defeats script file permissions by sharing a single SHM cache among all child PHP processes. PHP scripts often contain sensitive information: Think of CMS configurations where reading or running another user's script usually means gaining privileges to the CMS database. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-8994
CVE-2017-5483 5.9 SNMP The SNMP parser in tcpdump before 4.9.0 has a buffer overflow in print-snmp.c:asn1_parse(). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5483
CVE-2016-6267 5.9 SNMP SnmpUtils in Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) spare_Community, (2) spare_AllowGroupIP, or (3) spare_AllowGroupNetmask parameter to admin_notification.php. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6267
CVE-2015-5677 3.6 SNMP bsnmpd, as used in FreeBSD 9.3, 10.1, and 10.2, uses world-readable permissions on the snmpd.config file, which allows local users to obtain the secret key for USM authentication by reading the file. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-5677
CVE-2014-9695 5.9 SNMP The Hyper Module Management (HMM) software of Huawei Tecal E9000 Chassis V100R001C00SPC160 and earlier versions could allow a non-super-domain user who accesses HMM through SNMPv3 to perform operations on a server as a super-domain user. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-9695
CVE-2017-5517 5.9 SQL SQL injection vulnerability in author.control.php in GeniXCMS through 0.0.8 allows remote attackers to execute arbitrary SQL commands via the type parameter. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5517
CVE-2017-5519 5.9 SQL SQL injection vulnerability in Posts.class.php in GeniXCMS through 0.0.8 allows remote attackers to execute arbitrary SQL commands via the id parameter. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5519
CVE-2017-5574 5.9 SQL SQL injection vulnerability in register.php in GeniXCMS before 1.0.0 allows unauthenticated users to execute arbitrary SQL commands via the activation parameter. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5574
CVE-2017-5575 5.9 SQL SQL injection vulnerability in inc/lib/Options.class.php in GeniXCMS before 1.0.0 allows remote attackers to execute arbitrary SQL commands via the modules parameter. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5575
CVE-2017-5569 5.9 SQL An issue was discovered in eClinicalWorks Patient Portal 7.0 build 13. This is a blind SQL injection within the template.jsp, which can be exploited without the need of authentication and via an HTTP POST request, and which can be used to dump database data out to a malicious server, using an out-of-band technique such as select_loadfile(). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5569
CVE-2016-5958 3.6 SSL IBM Security Privileged Identity Manager could allow a remote attacker to obtain sensitive information, caused by the failure to set the secure flag for the session cookie in SSL mode. By intercepting its transmission within an HTTP session, an attacker could exploit this vulnerability to capture the cookie and obtain sensitive information. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5958
CVE-2016-5935 3.6 SSL IBM Jazz for Service Management could allow a remote attacker to obtain sensitive information, caused by the failure to properly validate the SSL certificate. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5935
CVE-2016-9244 3.6 SSL A BIG-IP virtual server configured with a Client SSL profile that has the non-default Session Tickets option enabled may leak up to 31 bytes of uninitialized memory. A remote attacker may exploit this vulnerability to obtain Secure Sockets Layer (SSL) session IDs from other sessions. It is possible that other data from uninitialized memory may be returned as well. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9244
CVE-2017-15042 3.6 STARTTLS An unintended cleartext issue exists in Go before 1.8.4 and 1.9.x before 1.9.1. RFC 4954 requires that, during SMTP, the PLAIN auth scheme must only be used on network connections secured with TLS. The original implementation of smtp.PlainAuth in Go 1.0 enforced this requirement, and it was documented to do so. In 2013, upstream issue #5184, this was changed so that the server may decide whether PLAIN is acceptable. The result is that if you set up a man-in-the-middle SMTP server that doesn't advertise STARTTLS and does advertise that PLAIN auth is OK, the smtp.PlainAuth implementation sends the username and password. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-15042
CVE-2016-1602 5.9 SUSE A code injection in the supportconfig data collection tool in supportutils in SUSE Linux Enterprise Server 12 and 12-SP1 and SUSE Linux Enterprise Desktop 12 and 12-SP1 could be used by local attackers to execute code as the user running supportconfig (usually root). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-1602
CVE-2017-15638 2.5 SUSE The SuSEfirewall2 package before 3.6.312-2.13.1 in SUSE Linux Enterprise (SLE) Desktop 12 SP2, Server 12 SP2, and Server for Raspberry Pi 12 SP2; before 3.6.312.333-3.10.1 in SLE Desktop 12 SP3 and Server 12 SP3; before 3.6_SVNr208-2.18.3.1 in SLE Server 11 SP4; before 3.6.312-5.9.1 in openSUSE Leap 42.2; and before 3.6.312.333-7.1 in openSUSE Leap 42.3 might allow remote attackers to bypass intended access restrictions on the portmap service by leveraging a missing source net restriction for _rpc_ services. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-15638
CVE-2017-0030 5.9 SharePoint Microsoft Office 2010 SP2, Office Compatibility Pack SP3, Office Web Apps Server 2010 SP2, Word 2007 SP3, Word 2010 SP2, and Word Automation Services on SharePoint Server 2010 SP2 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0020, CVE-2017-0031, CVE-2017-0052, and CVE-2017-0053. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0030
CVE-2017-0105 3.6 SharePoint Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from out-of-bound memory via a crafted Office document, aka "Microsoft Office Information Disclosure Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0105
CVE-2026-44695 4.0 Slack Outline is a service that allows for collaborative documentation. Prior to 1.7.1, the Slack integration callback for GET /auth/slack.post accepts an unsigned, session-independent OAuth state value. A third party who can obtain a Slack OAuth code for the same Outline Slack client can make a logged-in Outline user complete the callback and link that user's Outline account to the attacker's Slack team_id and user_id. The linked Slack identity can then use the Slack /outline search command as the victim Outline user. This vulnerability is fixed in 1.7.1. 2026-05-15T20:21:42.197 https://cve.circl.lu/cve/CVE-2026-44695
CVE-2017-6803 5.9 Solarwinds Multiple cross-site request forgery (CSRF) vulnerabilities in the web interface in the Scheduler in SolarWinds (formerly Serv-U) FTP Voyager 16.2.0 allow remote attackers to hijack the authentication of users for requests that (1) change the admin password, (2) terminate the scheduler, or (3) possibly execute arbitrary commands via crafted requests to Admin/XML/Result.xml. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6803
CVE-2017-5198 6.0 Solarwinds SolarWinds LEM (aka SIEM) before 6.3.1 has an incorrect sudo configuration, which allows local users to obtain root access by editing /usr/local/contego/scripts/hostname.sh. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5198
CVE-2017-5199 5.9 Solarwinds The editbanner feature in SolarWinds LEM (aka SIEM) through 6.3.1 allows remote authenticated users to execute arbitrary code by editing /usr/local/contego/scripts/mgrconfig.pl. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5199
CVE-2017-7646 3.6 Solarwinds SolarWinds Log & Event Manager (LEM) before 6.3.1 Hotfix 4 allows an authenticated user to browse the server's filesystem and read the contents of arbitrary files contained within. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7646
CVE-2017-7647 5.9 Solarwinds SolarWinds Log & Event Manager (LEM) before 6.3.1 Hotfix 4 allows an authenticated user to execute arbitrary commands. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7647
CVE-2016-2126 3.6 Samba Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-2126
CVE-2017-9461 3.6 Samba smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9461
CVE-2017-14746 5.9 Samba Use-after-free vulnerability in Samba 4.x before 4.7.3 allows remote attackers to execute arbitrary code via a crafted SMB1 request. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-14746
CVE-2017-15275 3.6 Samba Samba before 4.7.3 might allow remote attackers to obtain sensitive information by leveraging failure of the server to clear allocated heap memory. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-15275
CVE-2017-15943 1.4 Spyware The configuration file import for applications, spyware and vulnerability objects functionality in the web interface in Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, and 7.1.x before 7.1.14 allows remote attackers to conduct server-side request forgery (SSRF) attacks and consequently obtain sensitive information via vectors related to parsing of external entities. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-15943
CVE-2016-10259 3.6 Symantec Symantec SSL Visibility (SSLV) 3.8.4FC, 3.9, 3.10 before 3.10.4.1, and 3.11 before 3.11.3.1 is susceptible to a denial-of-service vulnerability that impacts the SSL servers for intercepted SSL connections. A malicious SSL client can, under certain circumstances, temporarily exhaust the TCP connection pool of an SSL server. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10259
CVE-2016-5313 5.9 Symantec Symantec Web Gateway (SWG) before 5.2.5 allows remote authenticated users to execute arbitrary OS commands. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5313
CVE-2016-5309 3.6 Symantec The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted RAR file that is mishandled during decompression. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5309
CVE-2016-5310 3.6 Symantec The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (memory corruption) via a crafted RAR file that is mishandled during decompression. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5310
CVE-2016-5312 3.6 Symantec Directory traversal vulnerability in the charting component in Symantec Messaging Gateway before 10.6.2 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the sn parameter to brightmail/servlet/com.ve.kavachart.servlet.ChartStream. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5312
CVE-2016-10324 5.9 SIP In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the osip_clrncpy() function defined in osipparser2/osip_port.c. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10324
CVE-2016-10325 3.6 SIP In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the _osip_message_to_str() function defined in osipparser2/osip_message_to_str.c, resulting in a remote DoS. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10325
CVE-2016-10326 3.6 SIP In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the osip_body_to_str() function defined in osipparser2/osip_body.c, resulting in a remote DoS. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10326
CVE-2017-7853 3.6 SIP In libosip2 in GNU oSIP 4.1.0 and 5.0.0, a malformed SIP message can lead to a heap buffer overflow in the msg_osip_body_parse() function defined in osipparser2/osip_message_parse.c, resulting in a remote DoS. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7853
CVE-2017-3808 3.6 SIP A vulnerability in the Session Initiation Protocol (SIP) UDP throttling process of Cisco Unified Communications Manager (Cisco Unified CM) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient rate limiting protection. An attacker could exploit this vulnerability by sending the affected device a high rate of SIP messages. An exploit could allow the attacker to cause the device to reload unexpectedly. The device and services will restart automatically. This vulnerability affects Cisco Unified Communications Manager (CallManager) releases prior to the first fixed release; the following list indicates the first minor release that includes the fix for this vulnerability: 10.5.2.14900-16 11.0.1.23900-5 11.5.1.12900-2. Cisco Bug IDs: CSCuz72455. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3808
CVE-2016-10102 5.9 SSH hitek.jar in Hitek Software's Automize uses weak encryption when encrypting SSH/SFTP and Encryption profile passwords. This allows an attacker to retrieve the encrypted passwords from sshProfiles.jsd and encryptionProfiles.jsd and decrypt them to recover cleartext passwords. All 10.x up to and including 10.25 and all 11.x up to and including 11.14 are verified to be affected. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10102
CVE-2016-10104 3.6 SSH Information Disclosure can occur in sshProfiles.jsd in Hitek Software's Automize because of the Read attribute being set for Users. This allows an attacker to recover encrypted passwords for SSH/SFTP profiles. Verified in all 10.x versions up to and including 10.25, and all 11.x versions up to and including 11.14. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10104
CVE-2017-5544 3.6 SSH An issue was discovered on FiberHome Fengine S5800 switches V210R240. An unauthorized attacker can access the device's SSH service, using a password cracking tool to establish SSH connections quickly. This will trigger an increase in the SSH login timeout (each of the login attempts will occupy a connection slot for a longer time). Once this occurs, legitimate login attempts via SSH/telnet will be refused, resulting in a denial of service; you must restart the device. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5544
CVE-2017-3310 6.0 SES Vulnerability in the OJVM component of Oracle Database Server. Supported versions that are affected are 11.2.0.4 and 12.1.0.2. Easily exploitable vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via multiple protocols to compromise OJVM. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in OJVM, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of OJVM. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3310
CVE-2016-6329 3.6 SES OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6329
CVE-2016-2938 2.7 SES IBM iNotes is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-2938
CVE-2016-2939 2.7 SES IBM iNotes is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-2939
CVE-2016-0270 3.6 TLS IBM Domino 9.0.1 Fix Pack 3 Interim Fix 2 through 9.0.1 Fix Pack 5 Interim Fix 1, when using TLS and AES GCM, uses random nonce generation, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a "forbidden attack." NOTE: this CVE has been incorrectly used for GCM nonce reuse issues in other products; see CVE-2016-10213 for the A10 issue, CVE-2016-10212 for the Radware issue, and CVE-2017-5933 for the Citrix issue. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-0270
CVE-2016-5900 3.6 TLS IBM Tealeaf Customer Experience on Cloud Network Capture Add-On could allow a remote attacker to obtain sensitive information, caused by the failure to properly validate the TLS certificate. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5900
CVE-2016-10207 3.6 TLS The Xvnc server in TigerVNC allows remote attackers to cause a denial of service (invalid memory access and crash) by terminating a TLS handshake early. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10207
CVE-2017-2685 5.2 TLS Siemens SINUMERIK Integrate Operate Clients between 2.0.3.00.016 (including) and 2.0.6 (excluding) and between 3.0.4.00.032 (including) and 3.0.6 (excluding) contain a vulnerability that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2685
CVE-2017-9138 5.9 Tenda There is a debug-interface vulnerability on some Tenda routers (FH1202/F1202/F1200: versions before 1.2.0.20). After connecting locally to a router in a wired or wireless manner, one can bypass intended access restrictions by sending shell commands directly and reading their results, or by entering shell commands that change this router's username and password. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9138
CVE-2017-9139 1.4 Tenda There is a stack-based buffer overflow on some Tenda routers (FH1202/F1202/F1200: versions before 1.2.0.20). Crafted POST requests to an unspecified URL result in DoS, interrupting the HTTP service (used to login to the web UI of a router) for 1 to 2 seconds. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-9139
CVE-2017-14514 3.6 Tenda Directory Traversal on Tenda W15E devices before 15.11.0.14 allows remote attackers to read unencrypted files via a crafted URL. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-14514
CVE-2017-14515 3.6 Tenda Heap-based Buffer Overflow on Tenda W15E devices before 15.11.0.14 allows remote attackers to cause a denial of service (temporary HTTP outage and forced logout) via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-14515
CVE-2017-16923 5.9 Tenda Command Injection vulnerability in app_data_center on Shenzhen Tenda Ac9 US_AC9V1.0BR_V15.03.05.14_multi_TD01, Ac9 ac9_kf_V15.03.05.19(6318_)_cn, Ac15 US_AC15V1.0BR_V15.03.05.18_multi_TD01, Ac15 US_AC15V1.0BR_V15.03.05.19_multi_TD01, Ac18 US_AC18V1.0BR_V15.03.05.05_multi_TD01, and Ac18 ac18_kf_V15.03.05.19(6318_)_cn devices allows remote unauthenticated attackers to execute arbitrary OS commands via a crafted cgi-bin/luci/usbeject?dev_name= GET request from the LAN. This occurs because the "sub_A6E8 usbeject_process_entry" function executes a system function with untrusted input. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-16923
CVE-2026-2695 3.4 TeamViewer A commandinjection vulnerability was discovered in TeamViewer DEX Platform On-Premises(former 1E DEX Platform On-Premises) prior to version 9.2. Improper input validation allowsauthenticated users with at least questioner privileges to inject commands in specificinstructions. Exploitation could lead to execution of elevated commands ondevices connected to the platform. 2026-05-13T18:10:51.227 https://cve.circl.lu/cve/CVE-2026-2695
CVE-2016-9005 5.9 TAP IBM System Storage TS3100-TS3200 Tape Library could allow an unauthenticated user with access to the company network, to change a user's password and gain remote access to the system. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9005
CVE-2016-8362 3.6 TAP An issue was discovered in Moxa OnCell OnCellG3470A-LTE, AWK-1131A/3131A/4131A Series, AWK-3191 Series, AWK-5232/6232 Series, AWK-1121/1127 Series, WAC-1001 V2 Series, WAC-2004 Series, AWK-3121-M12-RTG Series, AWK-3131-M12-RCC Series, AWK-5232-M12-RCC Series, TAP-6226 Series, AWK-3121/4121 Series, AWK-3131/4131 Series, and AWK-5222/6222 Series. Any user is able to download log files by accessing a specific URL. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8362
CVE-2016-8363 6.0 TAP An issue was discovered in Moxa OnCell OnCellG3470A-LTE, AWK-1131A/3131A/4131A Series, AWK-3191 Series, AWK-5232/6232 Series, AWK-1121/1127 Series, WAC-1001 V2 Series, WAC-2004 Series, AWK-3121-M12-RTG Series, AWK-3131-M12-RCC Series, AWK-5232-M12-RCC Series, TAP-6226 Series, AWK-3121/4121 Series, AWK-3131/4131 Series, and AWK-5222/6222 Series. User is able to execute arbitrary OS commands on the server. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-8363
CVE-2014-9680 1.4 TAP sudo before 1.8.12 does not ensure that the TZ environment variable is associated with a zoneinfo file, which allows local users to open arbitrary files for read access (but not view file contents) by running a program within an sudo session, as demonstrated by interfering with terminal output, discarding kernel-log messages, or repositioning tape drives. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-9680
CVE-2015-8768 5.9 Ubuntu click/install.py in click does not require files in package filesystem tarballs to start with ./ (dot slash), which allows remote attackers to install an alternate security policy and gain privileges via a crafted package, as demonstrated by the test.mmrow app for Ubuntu phone. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-8768
CVE-2017-6590 5.9 Ubuntu An issue was discovered in network-manager-applet (aka network-manager-gnome) in Ubuntu 12.04 LTS, 14.04 LTS, 16.04 LTS, and 16.10. A local attacker could use this issue at the default Ubuntu login screen to access local files and execute arbitrary commands as the lightdm user. The exploitation requires physical access to the locked computer and the Wi-Fi must be turned on. An access point that lets you use a certificate to login is required as well, but it's easy to create one. Then, it's possible to open a nautilus window and browse directories. One also can open some applications such as Firefox, which is useful for downloading malicious binaries. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6590
CVE-2017-7184 5.9 Ubuntu The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7184
CVE-2016-6110 4.0 VMware IBM Tivoli Storage Manager discloses unencrypted login credentials to Vmware vCenter that could be obtained by a local user. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6110
CVE-2016-5711 5.9 VMware NetApp Virtual Storage Console for VMware vSphere before 6.2.1 uses a non-unique certificate, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-5711
CVE-2015-4057 3.6 VMware The "Plug-in for VMware vCenter" in VCE Vision Intelligent Operations before 2.6.5 sends a cleartext HTTP response upon a request for the Settings screen, which allows remote attackers to discover the admin user password by sniffing the network. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-4057
CVE-2015-8568 4.0 VMware Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-8568
CVE-2016-6368 4.0 VMware A vulnerability in the detection engine parsing of Pragmatic General Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper input validation of the fields in the PGM protocol packet. An attacker could exploit this vulnerability by sending a crafted PGM packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. This vulnerability affects Cisco Firepower System Software that has one or more file action policies configured and is running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services; Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls; Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances; Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances; Firepower 4100 Series Security Appliances; FirePOWER 7000 Series Appliances; FirePOWER 8000 Series Appliances; Firepower 9300 Series Security Appliances; FirePOWER Threat Defense for Integrated Services Routers (ISRs); Industrial Security Appliance 3000; Sourcefire 3D System Appliances; Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. Fixed versions: 5.4.0.10 5.4.1.9 6.0.1.3 6.1.0 6.2.0. Cisco Bug IDs: CSCuz00876. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6368
CVE-2017-5885 5.9 VNC Multiple integer overflows in the (1) vnc_connection_server_message and (2) vnc_color_map_set functions in gtk-vnc before 0.7.0 allow remote servers to cause a denial of service (crash) or possibly execute arbitrary code via vectors involving SetColorMapEntries, which triggers a buffer overflow. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5885
CVE-2017-7393 5.9 VNC In TigerVNC 1.7.1 (VNCSConnectionST.cxx VNCSConnectionST::fence), an authenticated client can cause a double free, leading to denial of service or potentially code execution. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7393
CVE-2015-8504 3.6 VNC Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-8504
CVE-2017-7980 5.9 VNC Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7980
CVE-2017-4933 5.9 VNC VMware ESXi (6.5 before ESXi650-201710401-BG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a heap overflow via a specific set of VNC packets resulting in heap corruption. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-4933
CVE-2014-2045 2.7 VPN Multiple cross-site scripting (XSS) vulnerabilities in the old and new interfaces in Viprinet Multichannel VPN Router 300 allow remote attackers to inject arbitrary web script or HTML via the username when (1) logging in or (2) creating an account in the old interface, (3) username when creating an account in the new interface, (4) hostname in the old interface, (5) inspect parameter in the config module, (6) commands parameter in the atcommands tool, or (7) host parameter in the ping tool. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2014-2045
CVE-2016-1920 3.6 VPN Samsung KNOX 1.0.0 uses the shared certificate on Android, which allows local users to conduct man-in-the-middle attacks as demonstrated by installing a certificate and running a VPN service. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-1920
CVE-2026-41109 5.9 Visual Studio Improper neutralization of special elements in output used by a downstream component ('injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to bypass a security feature over a network. 2026-05-15T15:27:35.300 https://cve.circl.lu/cve/CVE-2026-41109
CVE-2026-41610 4.0 Visual Studio Improper neutralization of input during web page generation ('cross-site scripting') in Visual Studio Code allows an unauthorized attacker to bypass a security feature locally. 2026-05-15T15:11:18.460 https://cve.circl.lu/cve/CVE-2026-41610
CVE-2026-41611 5.9 Visual Studio Improper neutralization of script-related html tags in a web page (basic xss) in Visual Studio Code allows an unauthorized attacker to execute code locally. 2026-05-15T15:05:19.573 https://cve.circl.lu/cve/CVE-2026-41611
CVE-2026-41612 3.6 Visual Studio Relative path traversal in Visual Studio Code allows an unauthorized attacker to disclose information locally. 2026-05-15T14:25:28.623 https://cve.circl.lu/cve/CVE-2026-41612
CVE-2026-41613 5.9 Visual Studio Session fixation in Visual Studio Code allows an unauthorized attacker to elevate privileges over a network. 2026-05-15T14:23:50.983 https://cve.circl.lu/cve/CVE-2026-41613
CVE-2017-3290 5.8 VirtualBox Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Shared Folder). Supported versions that are affected are VirtualBox prior to 5.0.32 and prior to 5.1.14. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS v3.0 Base Score 7.9 (Integrity and Availability impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3290
CVE-2017-3316 6.0 VirtualBox Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: GUI). Supported versions that are affected are VirtualBox prior to 5.0.32 and prior to 5.1.14. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS v3.0 Base Score 8.4 (Confidentiality, Integrity and Availability impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3316
CVE-2017-3332 5.8 VirtualBox Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: VirtualBox SVGA Emulation). Supported versions that are affected are VirtualBox prior to 5.0.32 and prior to 5.1.14. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS v3.0 Base Score 8.4 (Integrity and Availability impacts). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3332
CVE-2017-3513 1.4 VirtualBox Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 2.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3513
CVE-2017-0095 6.0 VS Code Hyper-V in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 does not properly validate vSMB packet data, which allows attackers to execute arbitrary code on a target OS, aka "Hyper-V vSMB Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0021. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0095
CVE-2017-11170 5.9 VS Code The ReadTGAImage function in coders\tga.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via invalid colors data in the header of a TGA or VST file. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-11170
CVE-2024-38587 1.4 VS Code In the Linux kernel, the following vulnerability has been resolved:speakup: Fix sizeof() vs ARRAY_SIZE() bugThe "buf" pointer is an array of u16 values. This code should beusing ARRAY_SIZE() (which is 256) instead of sizeof() (which is 512),otherwise it can the still got out of bounds. 2026-05-12T12:16:53.990 https://cve.circl.lu/cve/CVE-2024-38587
CVE-2024-57901 3.6 VS Code In the Linux kernel, the following vulnerability has been resolved:af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEKBlamed commit forgot MSG_PEEK case, allowing a crash [1] as foundby syzbot.Rework vlan_get_protocol_dgram() to not touch skb at all,so that it can be used from many cpus on the same skb.Add a const qualifier to skb argument.[1]skbuff: skb_under_panic: text:ffffffff8a8ccd05 len:29 put:14 head:ffff88807fc8e400 data:ffff88807fc8e3f4 tail:0x11 end:0x140 dev:<NULL>------------[ cut here ]------------ kernel BUG at net/core/skbuff.c:206 !Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTICPU: 1 UID: 0 PID: 5892 Comm: syz-executor883 Not tainted 6.13.0-rc4-syzkaller-00054-gd6ef8b40d075 #0Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:skb_panic net/core/skbuff.c:206 [inline] RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216Code: 0b 8d 48 c7 c6 86 d5 25 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 5a 69 79 f7 48 83 c4 20 90 <0f> 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3RSP: 0018:ffffc900038d7638 EFLAGS: 00010282RAX: 0000000000000087 RBX: dffffc0000000000 RCX: 609ffd18ea660600RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000RBP: ffff88802483c8d0 R08: ffffffff817f0a8c R09: 1ffff9200071ae60R10: dffffc0000000000 R11: fffff5200071ae61 R12: 0000000000000140R13: ffff88807fc8e400 R14: ffff88807fc8e3f4 R15: 0000000000000011FS: 00007fbac5e006c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033CR2: 00007fbac5e00d58 CR3: 000000001238e000 CR4: 00000000003526f0DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400Call Trace: <TASK> skb_push+0xe5/0x100 net/core/skbuff.c:2636 vlan_get_protocol_dgram+0x165/0x290 net/packet/af_packet.c:585 packet_recvmsg+0x948/0x1ef0 net/packet/af_packet.c:3552 sock_recvmsg_nosec net/socket.c:1033 [inline] sock_recvmsg+0x22f/0x280 net/socket.c:1055 ____sys_recvmsg+0x1c6/0x480 net/socket.c:2803 ___sys_recvmsg net/socket.c:2845 [inline] do_recvmmsg+0x426/0xab0 net/socket.c:2940 __sys_recvmmsg net/socket.c:3014 [inline] __do_sys_recvmmsg net/socket.c:3037 [inline] __se_sys_recvmmsg net/socket.c:3030 [inline] __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3030 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f 2026-05-12T13:16:23.287 https://cve.circl.lu/cve/CVE-2024-57901
CVE-2017-8865 3.6 VoIP Elemental Path's CogniToys Dino smart toys through firmware version 0.0.794 do not provide sufficient protections against capture-replay attacks, allowing an attacker on the network to replay VoIP traffic between a Dino device and remote server to any other Dino device. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8865
CVE-2017-8866 3.6 VoIP Elemental Path's CogniToys Dino smart toys through firmware version 0.0.794 share a fixed small pool of hardcoded keys, allowing a remote attacker to use a different Dino device to decrypt VoIP traffic between a child's Dino and remote server. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8866
CVE-2017-6094 5.9 VoIP CPEs used by subscribers on the access network receive their individual configuration settings from a central GAPS instance. A CPE identifies itself by the MAC address of its WAN interface and a certain "chk" value (48bit) derived from the MAC. The algorithm used to compute the "chk" was disclosed by reverse engineering the CPE's firmware. As a result, it is possible to forge valid "chk" values for any given MAC address and therefore receive the configuration settings of other subscribers' CPEs. The configuration settings often contain sensitive values, for example credentials (username/password) for VoIP services. This issue affects Genexis B.V. GAPS up to 7.2. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6094
CVE-2017-5953 5.9 Vim vim before patch 8.0.0322 does not properly validate values for tree length when handling a spell file, which may result in an integer overflow at a memory allocation site and a resultant buffer overflow. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5953
CVE-2017-6349 5.9 Vim An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6349
CVE-2017-6350 5.9 Vim An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 8.0.0378, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6350
CVE-2017-5870 2.7 Vim Multiple cross-site scripting (XSS) vulnerabilities in ViMbAdmin 3.0.15 allow remote attackers to inject arbitrary web script or HTML via the (1) domain or (2) transport parameter to domain/add; the (3) name parameter to mailbox/add/did/<domain id>; the (4) goto parameter to alias/add/did/<domain id>; or the (5) captchatext parameter to auth/lost-password. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5870
CVE-2017-6086 5.9 Vim Multiple cross-site request forgery (CSRF) vulnerabilities in the addAction and purgeAction functions in ViMbAdmin 3.0.15 allow remote attackers to hijack the authentication of logged administrators to (1) add an administrator user via a crafted POST request to <vimbadmin directory>/application/controllers/DomainController.php, (2) remove an administrator user via a crafted GET request to <vimbadmin directory>/application/controllers/DomainController.php, (3) change an administrator password via a crafted POST request to <vimbadmin directory>/application/controllers/DomainController.php, (4) add a mailbox via a crafted POST request to <vimbadmin directory>/application/controllers/MailboxController.php, (5) delete a mailbox via a crafted POST request to <vimbadmin directory>/application/controllers/MailboxController.php, (6) archive a mailbox address via a crafted GET request to <vimbadmin directory>/application/controllers/ArchiveController.php, (7) add an alias address via a crafted POST request to <vimbadmin directory>/application/controllers/AliasController.php, or (8) remove an alias address via a crafted GET request to <vimbadmin directory>/application/controllers/AliasController.php. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6086
CVE-2016-6648 3.6 Virtual Machine EMC RecoverPoint versions before 4.4.1.1 and EMC RecoverPoint for Virtual Machines versions before 5.0 are affected by sensitive information disclosure vulnerability as a result of incorrect permissions set on a sensitive system file. A malicious administrator with configuration privileges may access this sensitive system file and compromise the affected system. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6648
CVE-2016-6649 5.9 Virtual Machine EMC RecoverPoint versions before 4.4.1.1 and EMC RecoverPoint for Virtual Machines versions before 5.0 are affected by multiple command injection vulnerabilities where a malicious administrator with configuration privileges may bypass the user interface and escalate his privileges to root. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6649
CVE-2016-9314 5.9 Virtual Machine Sensitive Information Disclosure in com.trend.iwss.gui.servlet.ConfigBackup in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allows authenticated, remote users with least privileges to backup the system configuration and download it onto their local machine. This backup file contains sensitive information like passwd/shadow files, RSA certificates, Private Keys and Default Passphrase, etc. This was resolved in Version 6.5 CP 1737. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9314
CVE-2017-6513 6.0 Virtual Machine The WHMCS Reseller Module V2 2.0.2 in Softaculous Virtualizor before 2.9.1.0 does not verify the user correctly, which allows remote authenticated users to control other virtual machines managed by Virtualizor by accessing a modified URL. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-6513
CVE-2017-0058 3.6 Win32k A Win32k information disclosure vulnerability exists in Microsoft Windows when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system, aka "Win32k Information Disclosure Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0058
CVE-2017-0188 1.4 Win32k A Win32k information disclosure vulnerability exists in Windows 8.1, Windows RT 8.1, Windows Server 2012, Windows Server 2012 R2, Windows 10, and Windows Server 2016 when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system, aka "Win32k Information Disclosure Vulnerability." This CVE ID is unique from CVE-2017-0189. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0188
CVE-2017-8577 5.9 Win32k Win32k in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8578, CVE-2017-8580, CVE-2017-8581, and CVE-2017-8467. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8577
CVE-2017-8578 5.9 Win32k Win32k in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8577, CVE-2017-8580, CVE-2017-8581, and CVE-2017-8467. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8578
CVE-2017-8580 5.9 Win32k Win32k in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8577, CVE-2017-8578, CVE-2017-8581, and CVE-2017-8467. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8580
CVE-2016-9312 3.6 Windows ntpd in NTP before 4.2.8p9, when running on Windows, allows remote attackers to cause a denial of service via a large UDP packet. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9312
CVE-2016-9811 3.6 Windows The windows_icon_typefind function in gst-plugins-base in GStreamer before 1.10.2, when G_SLICE is set to always-malloc, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted ico file. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9811
CVE-2017-5487 1.4 WordPress wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5487
CVE-2017-5488 2.7 WordPress Multiple cross-site scripting (XSS) vulnerabilities in wp-admin/update-core.php in WordPress before 4.7.1 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) version header of a plugin. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5488
CVE-2017-5489 5.9 WordPress Cross-site request forgery (CSRF) vulnerability in WordPress before 4.7.1 allows remote attackers to hijack the authentication of unspecified victims via vectors involving a Flash file upload. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5489
CVE-2017-5490 2.7 WordPress Cross-site scripting (XSS) vulnerability in the theme-name fallback functionality in wp-includes/class-wp-theme.php in WordPress before 4.7.1 allows remote attackers to inject arbitrary web script or HTML via a crafted directory name of a theme, related to wp-admin/includes/class-theme-installer-skin.php. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5490
CVE-2017-5491 1.4 WordPress wp-mail.php in WordPress before 4.7.1 might allow remote attackers to bypass intended posting restrictions via a spoofed mail server with the mail.example.com name. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5491
CVE-2024-26897 3.6 WMI In the Linux kernel, the following vulnerability has been resolved:wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is completeThe ath9k_wmi_event_tasklet() used in ath9k_htc assumes that all the datastructures have been fully initialised by the time it runs. However, because ofthe order in which things are initialised, this is not guaranteed to be thecase, because the device is exposed to the USB subsystem before the ath9k driverinitialisation is completed.We already committed a partial fix for this in commit:8b3046abc99e ("ath9k_htc: fix NULL pointer dereference at ath9k_htc_tx_get_packet()")However, that commit only aborted the WMI_TXSTATUS_EVENTID command in the eventtasklet, pairing it with an "initialisation complete" bit in the TX struct. Itseems syzbot managed to trigger the race for one of the other commands as well,so let's just move the existing synchronisation bit to cover the wholetasklet (setting it at the end of ath9k_htc_probe_device() instead of insideath9k_tx_init()). 2026-05-12T12:16:24.847 https://cve.circl.lu/cve/CVE-2024-26897
CVE-2024-36004 3.6 WMI In the Linux kernel, the following vulnerability has been resolved:i40e: Do not use WQ_MEM_RECLAIM flag for workqueueIssue reported by customer during SRIOV testing, call trace:When both i40e and the i40iw driver are loaded, a warningin check_flush_dependency is being triggered. This seemsto be because of the i40e driver workqueue is allocated withthe WQ_MEM_RECLAIM flag, and the i40iw one is not.Similar error was encountered on ice too and it was fixed byremoving the flag. Do the same for i40e too.[Feb 9 09:08] ------------[ cut here ]------------[ +0.000004] workqueue: WQ_MEM_RECLAIM i40e:i40e_service_task [i40e] isflushing !WQ_MEM_RECLAIM infiniband:0x0[ +0.000060] WARNING: CPU: 0 PID: 937 at kernel/workqueue.c:2966check_flush_dependency+0x10b/0x120[ +0.000007] Modules linked in: snd_seq_dummy snd_hrtimer snd_seqsnd_timer snd_seq_device snd soundcore nls_utf8 cifs cifs_arc4nls_ucs2_utils rdma_cm iw_cm ib_cm cifs_md4 dns_resolver netfs qrtrrfkill sunrpc vfat fat intel_rapl_msr intel_rapl_common irdmaintel_uncore_frequency intel_uncore_frequency_common ice ipmi_ssifisst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermalintel_powerclamp gnss coretemp ib_uverbs rapl intel_cstate ib_coreiTCO_wdt iTCO_vendor_support acpi_ipmi mei_me ipmi_si intel_uncoreioatdma i2c_i801 joydev pcspkr mei ipmi_devintf lpc_ichintel_pch_thermal i2c_smbus ipmi_msghandler acpi_power_meter acpi_padxfs libcrc32c ast sd_mod drm_shmem_helper t10_pi drm_kms_helper sg ixgbedrm i40e ahci crct10dif_pclmul libahci crc32_pclmul igb crc32c_intellibata ghash_clmulni_intel i2c_algo_bit mdio dca wmi dm_mirrordm_region_hash dm_log dm_mod fuse[ +0.000050] CPU: 0 PID: 937 Comm: kworker/0:3 Kdump: loaded Nottainted 6.8.0-rc2-Feb-net_dev-Qiueue-00279-gbd43c5687e05 #1[ +0.000003] Hardware name: Intel Corporation S2600BPB/S2600BPB, BIOSSE5C620.86B.02.01.0013.121520200651 12/15/2020[ +0.000001] Workqueue: i40e i40e_service_task [i40e][ +0.000024] RIP: 0010:check_flush_dependency+0x10b/0x120[ +0.000003] Code: ff 49 8b 54 24 18 48 8d 8b b0 00 00 00 49 89 e8 4881 c6 b0 00 00 00 48 c7 c7 b0 97 fa 9f c6 05 8a cc 1f 02 01 e8 35 b3 fdff <0f> 0b e9 10 ff ff ff 80 3d 78 cc 1f 02 00 75 94 e9 46 ff ff ff 90[ +0.000002] RSP: 0018:ffffbd294976bcf8 EFLAGS: 00010282[ +0.000002] RAX: 0000000000000000 RBX: ffff94d4c483c000 RCX:0000000000000027[ +0.000001] RDX: ffff94d47f620bc8 RSI: 0000000000000001 RDI:ffff94d47f620bc0[ +0.000001] RBP: 0000000000000000 R08: 0000000000000000 R09:00000000ffff7fff[ +0.000001] R10: ffffbd294976bb98 R11: ffffffffa0be65e8 R12:ffff94c5451ea180[ +0.000001] R13: ffff94c5ab5e8000 R14: ffff94c5c20b6e05 R15:ffff94c5f1330ab0[ +0.000001] FS: 0000000000000000(0000) GS:ffff94d47f600000(0000)knlGS:0000000000000000[ +0.000002] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033[ +0.000001] CR2: 00007f9e6f1fca70 CR3: 0000000038e20004 CR4:00000000007706f0[ +0.000000] DR0: 0000000000000000 DR1: 0000000000000000 DR2:0000000000000000[ +0.000001] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:0000000000000400[ +0.000001] PKRU: 55555554[ +0.000001] Call Trace:[ +0.000001] <TASK>[ +0.000002] ? __warn+0x80/0x130[ +0.000003] ? check_flush_dependency+0x10b/0x120[ +0.000002] ? report_bug+0x195/0x1a0[ +0.000005] ? handle_bug+0x3c/0x70[ +0.000003] ? exc_invalid_op+0x14/0x70[ +0.000002] ? asm_exc_invalid_op+0x16/0x20[ +0.000006] ? check_flush_dependency+0x10b/0x120[ +0.000002] ? check_flush_dependency+0x10b/0x120[ +0.000002] __flush_workqueue+0x126/0x3f0[ +0.000015] ib_cache_cleanup_one+0x1c/0xe0 [ib_core][ +0.000056] __ib_unregister_device+0x6a/0xb0 [ib_core][ +0.000023] ib_unregister_device_and_put+0x34/0x50 [ib_core][ +0.000020] i40iw_close+0x4b/0x90 [irdma][ +0.000022] i40e_notify_client_of_netdev_close+0x54/0xc0 [i40e][ +0.000035] i40e_service_task+0x126/0x190 [i40e][ +0.000024] process_one_work+0x174/0x340[ +0.000003] worker_th---truncated--- 2026-05-12T12:16:46.777 https://cve.circl.lu/cve/CVE-2024-36004
CVE-2026-43298 3.6 WMI In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: Skip vcn poison irq release on VFVF doesn't enable VCN poison irq in VCNv2.5. Skip releasing it and avoidcall trace during deinitialization.[ 71.913601] [drm] clean up the vf2pf work item[ 71.915088] ------------[ cut here ]------------[ 71.915092] WARNING: CPU: 3 PID: 1079 at /tmp/amd.aFkFvSQl/amd/amdgpu/amdgpu_irq.c:641 amdgpu_irq_put+0xc6/0xe0 [amdgpu][ 71.915355] Modules linked in: amdgpu(OE-) amddrm_ttm_helper(OE) amdttm(OE) amddrm_buddy(OE) amdxcp(OE) amddrm_exec(OE) amd_sched(OE) amdkcl(OE) drm_suballoc_helper drm_display_helper cec rc_core i2c_algo_bit video wmi binfmt_misc nls_iso8859_1 intel_rapl_msr intel_rapl_common input_leds joydev serio_raw mac_hid qemu_fw_cfg sch_fq_codel dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua efi_pstore ip_tables x_tables autofs4 btrfs blake2b_generic raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 hid_generic crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel usbhid 8139too sha256_ssse3 sha1_ssse3 hid psmouse bochs i2c_i801 ahci drm_vram_helper libahci i2c_smbus lpc_ich drm_ttm_helper 8139cp mii ttm aesni_intel crypto_simd cryptd[ 71.915484] CPU: 3 PID: 1079 Comm: rmmod Tainted: G OE 6.8.0-87-generic #88~22.04.1-Ubuntu[ 71.915489] Hardware name: Red Hat KVM/RHEL, BIOS 1.16.3-2.el9_5.1 04/01/2014[ 71.915492] RIP: 0010:amdgpu_irq_put+0xc6/0xe0 [amdgpu][ 71.915768] Code: 75 84 b8 ea ff ff ff eb d4 44 89 ea 48 89 de 4c 89 e7 e8 fd fc ff ff 5b 41 5c 41 5d 41 5e 5d 31 d2 31 f6 31 ff e9 55 30 3b c7 <0f> 0b eb d4 b8 fe ff ff ff eb a8 e9 b7 3b 8a 00 66 2e 0f 1f 84 00[ 71.915771] RSP: 0018:ffffcf0800eafa30 EFLAGS: 00010246[ 71.915775] RAX: 0000000000000000 RBX: ffff891bda4b0668 RCX: 0000000000000000[ 71.915777] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000[ 71.915779] RBP: ffffcf0800eafa50 R08: 0000000000000000 R09: 0000000000000000[ 71.915781] R10: 0000000000000000 R11: 0000000000000000 R12: ffff891bda480000[ 71.915782] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000[ 71.915792] FS: 000070cff87c4c40(0000) GS:ffff893abfb80000(0000) knlGS:0000000000000000[ 71.915795] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033[ 71.915797] CR2: 00005fa13073e478 CR3: 000000010d634006 CR4: 0000000000770ef0[ 71.915800] PKRU: 55555554[ 71.915802] Call Trace:[ 71.915805] <TASK>[ 71.915809] vcn_v2_5_hw_fini+0x19e/0x1e0 [amdgpu] 2026-05-15T14:53:00.510 https://cve.circl.lu/cve/CVE-2026-43298
CVE-2022-23650 5.9 WireGuard Netmaker is a platform for creating and managing virtual overlay networks using WireGuard. Prior to versions 0.8.5, 0.9.4, and 010.0, there is a hard-coded cryptographic key in the code base which can be exploited to run admin commands on a remote server if the exploiter know the address and username of the admin. This effects the server (netmaker) component, and not clients. This has been patched in Netmaker v0.8.5, v0.9.4, and v0.10.0. There are currently no known workarounds. 2026-05-18T16:44:17.500 https://cve.circl.lu/cve/CVE-2022-23650
CVE-2022-36110 5.9 WireGuard Netmaker makes networks with WireGuard. Prior to version 0.15.1, Improper Authorization functions lead to non-privileged users running privileged API calls. If someone adds users to the Netmaker platform who do not have admin privileges, they can use their auth tokens to run admin-level functions via the API. This problem has been patched in v0.15.1. 2026-05-18T16:44:17.500 https://cve.circl.lu/cve/CVE-2022-36110
CVE-2023-32077 3.6 WireGuard Netmaker makes networks with WireGuard. Prior to versions 0.17.1 and 0.18.6, hardcoded DNS key usage has been found in Netmaker allowing unauth users to interact with DNS API endpoints. The issue is patched in 0.17.1 and fixed in 0.18.6. If users are using 0.17.1, they should run `docker pull gravitl/netmaker:v0.17.1` and `docker-compose up -d`. This will switch them to the patched users. If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later. As a workaround, someone who is using version 0.17.1 can pull the latest docker image of the backend and restart the server. 2026-05-18T16:44:17.500 https://cve.circl.lu/cve/CVE-2023-32077
CVE-2023-32078 3.6 WireGuard Netmaker makes networks with WireGuard. An Insecure Direct Object Reference (IDOR) vulnerability was found in versions prior to 0.17.1 and 0.18.6 in the user update function. By specifying another user's username, it was possible to update the other user's password. The issue is patched in 0.17.1 and fixed in 0.18.6. If Users are using 0.17.1, they should run `docker pull gravitl/netmaker:v0.17.1` and `docker-compose up -d`. This will switch them to the patched users. If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later. As a workaround, someone using version 0.17.1 can pull the latest docker image of the backend and restart the server. 2026-05-18T16:44:17.500 https://cve.circl.lu/cve/CVE-2023-32078
CVE-2023-32079 5.9 WireGuard Netmaker makes networks with WireGuard. A Mass assignment vulnerability was found in versions prior to 0.17.1 and 0.18.6 that allows a non-admin user to escalate privileges to those of an admin user. The issue is patched in 0.17.1 and fixed in 0.18.6. If Users are using 0.17.1, they should run `docker pull gravitl/netmaker:v0.17.1` and `docker-compose up -d`. This will switch them to the patched users If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later. As a workaround, someone using version 0.17.1 can pull the latest docker image of the backend and restart the server. 2026-05-18T16:44:17.500 https://cve.circl.lu/cve/CVE-2023-32079
CVE-2017-3794 5.9 Webex A vulnerability in Cisco WebEx Meetings Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against an administrative user. More Information: CSCuz03317. Known Affected Releases: 2.6. Known Fixed Releases: 2.7.1.12. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3794
CVE-2017-3795 2.5 Webex A vulnerability in Cisco WebEx Meetings Server could allow an authenticated, remote attacker to conduct arbitrary password changes against any non-administrative user. More Information: CSCuz03345. Known Affected Releases: 2.6. Known Fixed Releases: 2.7.1.12. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3795
CVE-2017-3796 5.9 Webex A vulnerability in Cisco WebEx Meetings Server could allow an authenticated, remote attacker to execute predetermined shell commands on other hosts. More Information: CSCuz03353. Known Affected Releases: 2.6. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3796
CVE-2017-3797 1.4 Webex A vulnerability in Cisco WebEx Meetings Server could allow an unauthenticated, remote attacker to view the fully qualified domain name of the Cisco WebEx administration server. More Information: CSCvb60655. Known Affected Releases: 2.7. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3797
CVE-2017-3799 2.7 Webex A vulnerability in a URL parameter of Cisco WebEx Meeting Center could allow an unauthenticated, remote attacker to perform site redirection. More Information: CSCzu78401. Known Affected Releases: T28.1. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3799
CVE-2016-9379 5.8 Xen The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9379
CVE-2016-9380 5.8 Xen The pygrub boot loader emulator in Xen, when nul-delimited output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via NUL bytes in the bootloader configuration file. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9380
CVE-2016-9382 5.9 Xen Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9382
CVE-2016-9383 6.0 Xen Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9383
CVE-2026-45036 5.9 Xterm Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1.0.233, Tabby before 1.0.233 automatically confirms ZMODEM protocol detection on all terminal session output without user interaction, enabling shell command execution when a user displays attacker-controlled content. The ZModemMiddleware in tabby-terminal consumes all session output through a Zmodem.Sentry, and when a ZMODEM ZRQINIT header is detected, unconditionally calls detection.confirm() and writes a fixed ZRINIT response ( **\x18B0100000023be50\r\n\x11) back into the active PTY as input. When the process that triggered the detection (e.g., cat) exits, the injected bytes are consumed by the user's shell as a command line. Under fish (default configuration), the ** prefix triggers recursive glob expansion against the current directory, allowing an attacker-placed executable at a matching nested path (e.g., d/xB0100000023be50) to be executed by relative pathname without relying on PATH. Under bash and zsh, a secondary xterm.js terminal color-query feedback (OSC 10) can be combined in the same file to inject a slash-containing command word that similarly bypasses PATH resolution. An attacker can exploit this by providing a crafted file (e.g., in a cloned Git repository) that a user displays with cat, achieving code execution with no interaction beyond viewing the file. This vulnerability is fixed in 1.0.233. 2026-05-18T19:34:25.260 https://cve.circl.lu/cve/CVE-2026-45036
CVE-2017-2578 2.7 XSS In Moodle 3.x, there is XSS in the assignment submission page. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-2578
CVE-2017-3798 2.7 XSS A cross-site scripting (XSS) filter bypass vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to mount XSS attacks against a user of an affected device. More Information: CSCvb97237. Known Affected Releases: 11.0(1.10000.10) 11.5(1.10000.6). Known Fixed Releases: 11.5(1.12029.1) 11.5(1.12900.11) 12.0(0.98000.369) 12.0(0.98000.370) 12.0(0.98000.398) 12.0(0.98000.457). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3798
CVE-2017-5875 2.7 XSS XSS was discovered in dotCMS 3.7.0, with an authenticated attack against the /myAccount addressID parameter. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5875
CVE-2016-9385 4.0 X86 The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9385
CVE-2016-9386 5.9 X86 The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-9386
CVE-2017-0244 5.9 X64 The kernel in Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows locally authenticated attackers to gain privileges via a crafted application, or in Windows 7 for x64-based systems, cause denial of service, aka "Windows Kernel Elevation of Privilege Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0244
CVE-2017-0246 5.9 X64 The Graphics Component in the kernel-mode drivers in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to gain privileges via a crafted application or in Windows 7 for x64-based Systems and later, cause denial of service, aka "Win32k Elevation of Privilege Vulnerability." 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-0246
CVE-2017-8552 5.9 X64 A kernel-mode driver in Microsoft Windows XP SP3, Windows XP x64 XP2, Windows Server 2003 SP2, Windows Vista, Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, and Windows 8 allows an elevation of privilege when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE is unique from CVE-2017-0263. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-8552
CVE-2024-35849 5.2 X64 In the Linux kernel, the following vulnerability has been resolved:btrfs: fix information leak in btrfs_ioctl_logical_to_ino()Syzbot reported the following information leak for inbtrfs_ioctl_logical_to_ino(): BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline] BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x110 lib/usercopy.c:40 instrument_copy_to_user include/linux/instrumented.h:114 [inline] _copy_to_user+0xbc/0x110 lib/usercopy.c:40 copy_to_user include/linux/uaccess.h:191 [inline] btrfs_ioctl_logical_to_ino+0x440/0x750 fs/btrfs/ioctl.c:3499 btrfs_ioctl+0x714/0x1260 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:904 [inline] __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890 __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890 x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Uninit was created at: __kmalloc_large_node+0x231/0x370 mm/slub.c:3921 __do_kmalloc_node mm/slub.c:3954 [inline] __kmalloc_node+0xb07/0x1060 mm/slub.c:3973 kmalloc_node include/linux/slab.h:648 [inline] kvmalloc_node+0xc0/0x2d0 mm/util.c:634 kvmalloc include/linux/slab.h:766 [inline] init_data_container+0x49/0x1e0 fs/btrfs/backref.c:2779 btrfs_ioctl_logical_to_ino+0x17c/0x750 fs/btrfs/ioctl.c:3480 btrfs_ioctl+0x714/0x1260 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:904 [inline] __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890 __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890 x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Bytes 40-65535 of 65536 are uninitialized Memory access of size 65536 starts at ffff888045a40000This happens, because we're copying a 'struct btrfs_data_container' backto user-space. This btrfs_data_container is allocated in'init_data_container()' via kvmalloc(), which does not zero-fill thememory.Fix this by using kvzalloc() which zeroes out the memory on allocation. 2026-05-12T12:16:37.930 https://cve.circl.lu/cve/CVE-2024-35849
CVE-2024-38596 3.6 X64 In the Linux kernel, the following vulnerability has been resolved:af_unix: Fix data races in unix_release_sock/unix_stream_sendmsgA data-race condition has been identified in af_unix. In one data path,the write function unix_release_sock() atomically writes tosk->sk_shutdown using WRITE_ONCE. However, on the reader side,unix_stream_sendmsg() does not read it atomically. Consequently, thisissue is causing the following KCSAN splat to occur:\tBUG: KCSAN: data-race in unix_release_sock / unix_stream_sendmsg\twrite (marked) to 0xffff88867256ddbb of 1 bytes by task 7270 on cpu 28:\tunix_release_sock (net/unix/af_unix.c:640)\tunix_release (net/unix/af_unix.c:1050)\tsock_close (net/socket.c:659 net/socket.c:1421)\t__fput (fs/file_table.c:422)\t__fput_sync (fs/file_table.c:508)\t__se_sys_close (fs/open.c:1559 fs/open.c:1541)\t__x64_sys_close (fs/open.c:1541)\tx64_sys_call (arch/x86/entry/syscall_64.c:33)\tdo_syscall_64 (arch/x86/entry/common.c:?)\tentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\tread to 0xffff88867256ddbb of 1 bytes by task 989 on cpu 14:\tunix_stream_sendmsg (net/unix/af_unix.c:2273)\t__sock_sendmsg (net/socket.c:730 net/socket.c:745)\t____sys_sendmsg (net/socket.c:2584)\t__sys_sendmmsg (net/socket.c:2638 net/socket.c:2724)\t__x64_sys_sendmmsg (net/socket.c:2753 net/socket.c:2750 net/socket.c:2750)\tx64_sys_call (arch/x86/entry/syscall_64.c:33)\tdo_syscall_64 (arch/x86/entry/common.c:?)\tentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\tvalue changed: 0x01 -> 0x03The line numbers are related to commit dd5a440a31fa ("Linux 6.9-rc7").Commit e1d09c2c2f57 ("af_unix: Fix data races around sk->sk_shutdown.")addressed a comparable issue in the past regarding sk->sk_shutdown.However, it overlooked resolving this particular data path.This patch only offending unix_stream_sendmsg() function, since theother reads seem to be protected by unix_state_lock() as discussed in 2026-05-12T12:16:54.490 https://cve.circl.lu/cve/CVE-2024-38596
CVE-2017-3732 3.6 X86_64 There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-3732
CVE-2016-7062 5.9 X86_64 rhscon-ceph in Red Hat Storage Console 2 x86_64 and Red Hat Storage Console Node 2 x86_64 allows local users to obtain the password as cleartext. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-7062
CVE-2017-17879 5.9 X86_64 In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-21, there is a heap-based buffer over-read in ReadOneMNGImage in coders/png.c, related to length calculation and caused by an off-by-one error. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-17879
CVE-2017-17880 5.9 X86_64 In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-21, there is a stack-based buffer over-read in WriteWEBPImage in coders/webp.c, related to a WEBP_DECODER_ABI_VERSION check. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-17880
CVE-2016-6600 5.9 Zoho Directory traversal vulnerability in the file upload functionality in ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to upload and execute arbitrary JSP files via a .. (dot dot) in the fileName parameter to servlets/FileUploadServlet. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6600
CVE-2016-6601 3.6 Zoho Directory traversal vulnerability in the file download functionality in ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to read arbitrary files via a .. (dot dot) in the fileName parameter to servlets/FetchFile. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6601
CVE-2016-6602 5.9 Zoho ZOHO WebNMS Framework 5.2 and 5.2 SP1 use a weak obfuscation algorithm to store passwords, which allows context-dependent attackers to obtain cleartext passwords by leveraging access to WEB-INF/conf/securitydbData.xml. NOTE: this issue can be combined with CVE-2016-6601 for a remote exploit. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6602
CVE-2016-6603 5.9 Zoho ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to bypass authentication and impersonate arbitrary users via the UserName HTTP header. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-6603
CVE-2016-4888 2.7 Zoho Cross-site scripting (XSS) vulnerability in ZOHO ManageEngine ServiceDesk Plus before 9.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-4888
CVE-2015-2888 5.9 Zoom Summer Baby Zoom Wifi Monitor & Internet Viewing System allows remote attackers to bypass authentication, related to the MySnapCam web service. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-2888
CVE-2015-2889 5.9 Zoom Summer Baby Zoom Wifi Monitor & Internet Viewing System allows remote attackers to gain privileges via manual entry of a Settings URL. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-2889
CVE-2017-15048 5.9 Zoom Stack-based buffer overflow in the ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-15048
CVE-2017-15049 5.9 Zoom The ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 does not properly sanitize user input when constructing a shell command, which allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-15049
CVE-2025-27441 2.5 Zoom Cross site scripting in some Zoom Workplace Apps may allow an unauthenticated user to conduct a loss of integrity via adjacent network access. 2026-05-15T19:16:56.747 https://cve.circl.lu/cve/CVE-2025-27441
CVE-2016-10227 3.6 Zyxel Zyxel USG50 Security Appliance and NWA3560-N Access Point allow remote attackers to cause a denial of service (CPU consumption) via a flood of ICMPv4 Port Unreachable packets. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10227
CVE-2017-7964 6.0 Zyxel Zyxel WRE6505 devices have a default TELNET password of 1234 for the root and admin accounts, which makes it easier for remote attackers to conduct DNS hijacking attacks by reconfiguring the built-in dnshijacker process. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-7964
CVE-2016-10401 5.9 Zyxel ZyXEL PK5001Z devices have zyad5001 as the su password, which makes it easier for remote attackers to obtain root access if a non-root account password is known (or a non-root default account exists within an ISP's deployment of these devices). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10401
CVE-2015-7256 3.6 Zyxel ZyXEL NWA1100-N, NWA1100-NH, NWA1121-NI, NWA1123-AC, and NWA1123-NI access points; P-660HN-51, P-663HN-51, VMG1312-B10A, VMG1312-B30A, VMG1312-B30B, VMG4380-B10A, VMG8324-B10A, VMG8924-B10A, VMG8924-B30A, and VSG1435-B101 DSL CPEs; PMG5318-B20A GPONs; SBG3300-N000, SBG3300-NB00, and SBG3500-N000 small business gateways; GS1900-8 and GS1900-24 switches; and C1000Z, Q1000, FR1000Z, and P8702N project models use non-unique X.509 certificates and SSH host keys. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2015-7256
CVE-2017-15226 5.9 Zyxel Zyxel NBG6716 V1.00(AAKG.9)C0 devices allow command injection in the ozkerz component because beginIndex and endIndex are used directly in a popen call. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-15226
CVE-2017-5367 2.7 ZoneMinder Multiple reflected XSS vulnerabilities exist within form and link input parameters of ZoneMinder v1.30 and v1.29, an open-source CCTV server web application, which allows a remote attacker to execute malicious scripts within an authenticated client's browser. The URL is /zm/index.php and sample parameters could include action=login&view=postlogin[XSS] view=console[XSS] view=groups[XSS] view=events&filter[terms][1][cnj]=and[XSS] view=events&filter%5Bterms%5D%5B1%5D%5Bcnj%5D=and[XSS] view=events&filter%5Bterms%5D%5B1%5D%5Bcnj%5D=[XSS]and view=events&limit=1%22%3E%3C/a%3E[XSS] (among others). 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5367
CVE-2017-5595 3.6 ZoneMinder A file disclosure and inclusion vulnerability exists in web/views/file.php in ZoneMinder 1.x through v1.30.0 because of unfiltered user-input being passed to readfile(), which allows an authenticated attacker to read local system files (e.g., /etc/passwd) in the context of the web server user (www-data). The attack vector is a .. (dot dot) in the path parameter within a zm/index.php?view=file&path= request. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2017-5595
CVE-2016-10201 2.7 ZoneMinder Cross-site scripting (XSS) vulnerability in Zoneminder 1.30 and earlier allows remote attackers to inject arbitrary web script or HTML via the format parameter in a download log request to index.php. 2026-05-13T00:24:29.033 https://cve.circl.lu/cve/CVE-2016-10201