Total
12270 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2017-12491 | 1 Hp | 1 Intelligent Management Center | 2024-11-21 | N/A |
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. | ||||
CVE-2017-12490 | 1 Hp | 1 Intelligent Management Center | 2024-11-21 | N/A |
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. | ||||
CVE-2017-12489 | 1 Hp | 1 Intelligent Management Center | 2024-11-21 | N/A |
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. | ||||
CVE-2017-12488 | 1 Hp | 1 Intelligent Management Center | 2024-11-21 | N/A |
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. | ||||
CVE-2017-12487 | 1 Hp | 1 Intelligent Management Center | 2024-11-21 | N/A |
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. | ||||
CVE-2017-12473 | 1 Ccn-lite | 1 Ccn-lite | 2024-11-21 | N/A |
ccnl_ccntlv_bytes2pkt in CCN-lite allows context-dependent attackers to cause a denial of service (application crash) via vectors involving packets with "wrong L values." | ||||
CVE-2017-12197 | 3 Debian, Libpam4j Project, Redhat | 5 Debian Linux, Libpam4j, Enterprise Linux and 2 more | 2024-11-21 | N/A |
It was found that libpam4j up to and including 1.8 did not properly validate user accounts when authenticating. A user with a valid password for a disabled account would be able to bypass security restrictions and possibly access sensitive information. | ||||
CVE-2017-12194 | 1 Spice-gtk Project | 1 Spice-gtk | 2024-11-21 | N/A |
A flaw was found in the way spice-client processed certain messages sent from the server. An attacker, having control of malicious spice-server, could use this flaw to crash the client or execute arbitrary code with permissions of the user running the client. spice-gtk versions through 0.34 are believed to be vulnerable. | ||||
CVE-2017-12187 | 2 Debian, X.org | 2 Debian Linux, Xorg-server | 2024-11-21 | N/A |
xorg-x11-server before 1.19.5 was missing length validation in RENDER extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | ||||
CVE-2017-12186 | 2 Debian, X.org | 2 Debian Linux, Xorg-server | 2024-11-21 | N/A |
xorg-x11-server before 1.19.5 was missing length validation in X-Resource extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | ||||
CVE-2017-12185 | 2 Debian, X.org | 2 Debian Linux, Xorg-server | 2024-11-21 | N/A |
xorg-x11-server before 1.19.5 was missing length validation in MIT-SCREEN-SAVER extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | ||||
CVE-2017-12184 | 2 Debian, X.org | 2 Debian Linux, Xorg-server | 2024-11-21 | N/A |
xorg-x11-server before 1.19.5 was missing length validation in XINERAMA extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | ||||
CVE-2017-12183 | 2 Debian, X.org | 2 Debian Linux, Xorg-server | 2024-11-21 | N/A |
xorg-x11-server before 1.19.5 was missing length validation in XFIXES extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | ||||
CVE-2017-12182 | 2 Debian, X.org | 2 Debian Linux, Xorg-server | 2024-11-21 | N/A |
xorg-x11-server before 1.19.5 was missing length validation in XFree86 DRI extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | ||||
CVE-2017-12181 | 2 Debian, X.org | 2 Debian Linux, Xorg-server | 2024-11-21 | N/A |
xorg-x11-server before 1.19.5 was missing length validation in XFree86 DGA extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | ||||
CVE-2017-12180 | 2 Debian, X.org | 2 Debian Linux, Xorg-server | 2024-11-21 | N/A |
xorg-x11-server before 1.19.5 was missing length validation in XFree86 VidModeExtension allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | ||||
CVE-2017-12178 | 2 Debian, X.org | 2 Debian Linux, Xorg-server | 2024-11-21 | N/A |
xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | ||||
CVE-2017-12176 | 2 Debian, X.org | 2 Debian Linux, Xorg-server | 2024-11-21 | N/A |
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | ||||
CVE-2017-12174 | 2 Apache, Redhat | 5 Activemq Artemis, Enterprise Linux, Hornetq and 2 more | 2024-11-21 | 7.5 High |
It was found that when Artemis and HornetQ before 2.4.0 are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError. | ||||
CVE-2017-12173 | 2 Fedoraproject, Redhat | 7 Sssd, Enterprise Linux, Enterprise Linux Desktop and 4 more | 2024-11-21 | N/A |
It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it. |