Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.8

    HIGH
    CVE-2017-2742

    A potential security vulnerability has been identified with HP Web Jetadmin before 10.4 SR2. This vulnerability could potentially be exploited to create a denial of service.... Read more

    Affected Products : web_jetadmin
    • Published: Jan. 23, 2018
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2017-2741

    A potential security vulnerability has been identified with HP PageWide Printers, HP OfficeJet Pro Printers, with firmware before 1708D. This vulnerability could potentially be exploited to execute arbitrary code.... Read more

    • Published: Jan. 23, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2017-2740

    A potential security vulnerability has been identified with the command line shell of the HP ThinPro operating system 6.1, 5.2.1, 5.2, 5.1, 5.0, and 4.4. The vulnerability could result in a local unauthorized elevation of privilege on an HP thin client de... Read more

    Affected Products : thinpro
    • Published: Jan. 23, 2018
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2017-2674

    JBoss BRMS 6 and BPM Suite 6 before 6.4.3 are vulnerable to a stored XSS via several lists in Business Central. The flaw is due to lack of sanitation of user input when creating new lists. Remote, authenticated attackers that have privileges to create lis... Read more

    Affected Products : jboss_bpm_suite
    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 7.2

    HIGH
    CVE-2017-2673

    An authorization-check flaw was discovered in federation configurations of the OpenStack Identity service (keystone). An authenticated federated user could request permissions to a project and unintentionally be granted all related roles including adminis... Read more

    Affected Products : openstack
    • Published: Jul. 19, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2017-2672

    A flaw was found in foreman before version 1.15 in the logging of adding and registering images. An attacker with access to the foreman log file would be able to view passwords for provisioned systems in the log file, allowing them to access those systems... Read more

    Affected Products : satellite foreman
    • Published: Jun. 21, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2017-2670

    It was found in Undertow before 1.3.28 that with non-clean TCP close, the Websocket server gets into infinite loop on every IO thread, effectively causing DoS.... Read more

    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2017-2669

    Dovecot before version 2.2.29 is vulnerable to a denial of service. When 'dict' passdb and userdb were used for user authentication, the username sent by the IMAP/POP3 client was sent through var_expand() to perform %variable expansion. Sending specially ... Read more

    Affected Products : debian_linux dovecot
    • Published: Jun. 21, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2017-2668

    389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind req... Read more

    • Published: Jun. 22, 2018
    • Modified: Nov. 21, 2024
  • 8.1

    HIGH
    CVE-2017-2667

    Hammer CLI, a CLI utility for Foreman, before version 0.10.0, did not explicitly set the verify_ssl flag for apipie-bindings that disable it by default. As a result the server certificates are not checked and connections are prone to man-in-the-middle att... Read more

    Affected Products : satellite satellite_capsule hammer_cli
    • Published: Mar. 12, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2017-2666

    It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data... Read more

    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 7.0

    HIGH
    CVE-2017-2665

    The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any local user who has access to system running skyring se... Read more

    Affected Products : storage_console mongodb
    • Published: Jul. 06, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2017-2664

    CloudForms Management Engine (cfme) before 5.7.3 and 5.8.x before 5.8.1 lacks RBAC controls on certain methods in the rails application portion of CloudForms. An attacker with access could use a variety of methods within the rails application portion of C... Read more

    • Published: Jul. 26, 2018
    • Modified: Nov. 21, 2024
  • 8.2

    HIGH
    CVE-2017-2663

    It was found that subscription-manager's DBus interface before 1.19.4 let unprivileged user access the com.redhat.RHSM1.Facts.GetFacts and com.redhat.RHSM1.Config.Set methods. An unprivileged local attacker could use these methods to gain access to privat... Read more

    Affected Products : subscription-manager
    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2017-2662

    A flaw was found in Foreman's katello plugin version 3.4.5. After setting a new role to allow restricted access on a repository with a filter (filter set on the Product Name), the filter is not respected when the actions are done via hammer using the repo... Read more

    Affected Products : katello subscription_asset_manager
    • Published: Aug. 22, 2018
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2017-2661

    ClusterLabs pcs before version 0.9.157 is vulnerable to a cross-site scripting vulnerability due to improper validation of Node name field when creating new cluster or adding existing cluster.... Read more

    Affected Products : pcs
    • Published: Mar. 12, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2017-2659

    It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password att... Read more

    Affected Products : dropbear_ssh
    • Published: Mar. 21, 2019
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2017-2658

    It was discovered that the Dashbuilder login page as used in Red Hat JBoss BPM Suite before 6.4.2 and Red Hat JBoss Data Virtualization & Services before 6.4.3 could be opened in an IFRAME, which made it possible to intercept and manipulate requests. An a... Read more

    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2017-2654

    jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful buil... Read more

    Affected Products : email_extension
    • Published: Aug. 06, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2017-2653

    A number of unused delete routes are present in CloudForms before 5.7.2.1 which can be accessed via GET requests instead of just POST requests. This could allow an attacker to bypass the protect_from_forgery XSRF protection causing the routes to be used. ... Read more

    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 293350 Results