Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.5

    HIGH
    CVE-2017-3139

    A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.... Read more

    • Published: Apr. 09, 2019
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2017-3138

    named contains a feature which allows operators to issue commands to a running server by communicating with the server process over a control channel, using a utility program such as rndc. A regression introduced in a recent feature change has created a s... Read more

    • Published: Jan. 16, 2019
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2017-3137

    Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which records occ... Read more

    • Published: Jan. 16, 2019
    • Modified: Nov. 21, 2024
  • 5.9

    MEDIUM
    CVE-2017-3136

    A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the ... Read more

    • Published: Jan. 16, 2019
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2017-3135

    Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -... Read more

    • Published: Jan. 16, 2019
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2017-2924

    An exploitable heap-based buffer overflow vulnerability exists in the read_legacy_biff function of FreeXL 1.0.3. A specially crafted XLS file can cause a memory corruption resulting in remote code execution. An attacker can send malicious XLS file to trig... Read more

    Affected Products : debian_linux freexl
    • Published: Apr. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2017-2923

    An exploitable heap based buffer overflow vulnerability exists in the 'read_biff_next_record function' of FreeXL 1.0.3. A specially crafted XLS file can cause a memory corruption resulting in remote code execution. An attacker can send malicious XLS file ... Read more

    Affected Products : debian_linux freexl
    • Published: Apr. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2017-2918

    An exploitable integer overflow exists in the Image loading functionality of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution ... Read more

    Affected Products : debian_linux blender
    • Published: Apr. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2017-2910

    An exploitable Out-of-bounds Write vulnerability exists in the xls_addCell function of libxls 2.0. A specially crafted xls file can cause a memory corruption resulting in remote code execution. An attacker can send malicious xls file to trigger this vulne... Read more

    Affected Products : libxls
    • Published: Dec. 02, 2020
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2017-2908

    An exploitable integer overflow exists in the thumbnail functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code executi... Read more

    Affected Products : debian_linux blender
    • Published: Apr. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2017-2907

    An exploitable integer overflow exists in the animation playing functionality of the Blender open-source 3d creation suite version 2.78c. A specially created '.avi' file can cause an integer overflow resulting in a buffer overflow which can allow for code... Read more

    Affected Products : debian_linux blender
    • Published: Apr. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2017-2906

    An exploitable integer overflow exists in the animation playing functionality of the Blender open-source 3d creation suite version 2.78c. A specially created '.avi' file can cause an integer overflow resulting in a buffer overflow which can allow for code... Read more

    Affected Products : debian_linux blender
    • Published: Apr. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2017-2905

    An exploitable integer overflow exists in the bmp loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.bmp' file can cause an integer overflow resulting in a buffer overflow which can allow for code execu... Read more

    Affected Products : debian_linux blender
    • Published: Apr. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2017-2904

    An exploitable integer overflow exists in the RADIANCE loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.hdr' file can cause an integer overflow resulting in a buffer overflow which can allow for code ... Read more

    Affected Products : debian_linux blender
    • Published: Apr. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2017-2903

    An exploitable integer overflow exists in the DPX loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.cin' file can cause an integer overflow resulting in a buffer overflow which can allow for code execu... Read more

    Affected Products : debian_linux blender
    • Published: Apr. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2017-2902

    An exploitable integer overflow exists in the DPX loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.cin' file can cause an integer overflow resulting in a buffer overflow which can allow for code execu... Read more

    Affected Products : debian_linux blender
    • Published: Apr. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2017-2901

    An exploitable integer overflow exists in the IRIS loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.iris' file can cause an integer overflow resulting in a buffer overflow which can allow for code exe... Read more

    Affected Products : debian_linux blender
    • Published: Apr. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2017-2900

    An exploitable integer overflow exists in the PNG loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.png' file can cause an integer overflow resulting in a buffer overflow which can allow for code execu... Read more

    Affected Products : debian_linux blender
    • Published: Apr. 24, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2017-2899

    An exploitable integer overflow exists in the TIFF loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.tif' file can cause an integer overflow resulting in a buffer overflow which can allow for code exec... Read more

    Affected Products : debian_linux blender
    • Published: Apr. 24, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2017-2885

    An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server... Read more

    • Published: Apr. 24, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 293360 Results