Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 4.3

    MEDIUM
    CVE-2017-2598

    Jenkins before versions 2.44, 2.32.2 uses AES ECB block cipher mode without IV for encrypting secrets which makes Jenkins and the stored secrets vulnerable to unnecessary risks (SECURITY-304).... Read more

    Affected Products : jenkins
    • Published: May. 23, 2018
    • Modified: Nov. 21, 2024
  • 7.7

    HIGH
    CVE-2017-2595

    It was found that the log file viewer in Red Hat JBoss Enterprise Application 6 and 7 allows arbitrary file read to authenticated user via path traversal.... Read more

    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2017-2594

    hawtio before versions 2.0-beta-1, 2.0-beta-2 2.0-m1, 2.0-m2, 2.0-m3, and 1.5 is vulnerable to a path traversal that leads to a NullPointerException with a full stacktrace. An attacker could use this flaw to gather undisclosed information from within hawt... Read more

    Affected Products : hawtio
    • Published: May. 08, 2018
    • Modified: Nov. 21, 2024
  • 5.9

    MEDIUM
    CVE-2017-2592

    python-oslo-middleware before versions 3.8.1, 3.19.1, 3.23.1 is vulnerable to an information disclosure. Software using the CatchError class could include sensitive values in a traceback's error message. System users could exploit this flaw to obtain sens... Read more

    Affected Products : ubuntu_linux oslo.middleware
    • Published: May. 08, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2017-2591

    389-ds-base before version 1.3.6 is vulnerable to an improperly NULL terminated array in the uniqueness_entry_to_config() function in the "attribute uniqueness" plugin of 389 Directory Server. An authenticated, or possibly unauthenticated, attacker could ... Read more

    • Published: Apr. 30, 2018
    • Modified: Nov. 21, 2024
  • 8.1

    HIGH
    CVE-2017-2590

    A vulnerability was found in ipa before 4.4. IdM's ca-del, ca-disable, and ca-enable commands did not properly check the user's permissions while modifying CAs in Dogtag. An authenticated, unauthorized attacker could use this flaw to delete, disable, or e... Read more

    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 9.0

    CRITICAL
    CVE-2017-2589

    It was discovered that the hawtio servlet 1.4 uses a single HttpClient instance to proxy requests with a persistent cookie store (cookies are stored locally and are not passed between the client and the end URL) which means all clients using that proxy ar... Read more

    Affected Products : hawtio jboss_fuse
    • Published: Jul. 26, 2018
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2017-2587

    A memory allocation vulnerability was found in netpbm before 10.61. A maliciously crafted SVG file could cause the application to crash.... Read more

    Affected Products : netpbm
    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2017-2586

    A null pointer dereference vulnerability was found in netpbm before 10.61. A maliciously crafted SVG file could cause the application to crash.... Read more

    Affected Products : netpbm
    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 5.9

    MEDIUM
    CVE-2017-2585

    Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.... Read more

    • Published: Mar. 12, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2017-2582

    It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the ... Read more

    • Published: Jul. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2017-2581

    An out-of-bounds write vulnerability was found in netpbm before 10.61. A maliciously crafted file could cause the application to crash or possibly allow code execution.... Read more

    Affected Products : netpbm
    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2017-2580

    An out-of-bounds write vulnerability was found in netpbm before 10.61. A maliciously crafted file could cause the application to crash or possibly allow code execution.... Read more

    Affected Products : netpbm
    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2017-2579

    An out-of-bounds read vulnerability was found in netpbm before 10.61. The expandCodeOntoStack() function has an insufficient code value check, so that a maliciously crafted file could cause the application to crash or possibly allows code execution.... Read more

    Affected Products : netpbm
    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2017-2575

    A vulnerability was found while fuzzing libbpg 0.9.7. It is a NULL pointer dereference issue due to missing check of the return value of function malloc in the BPG encoder. This vulnerability appeared while converting a malicious JPEG file to BPG.... Read more

    Affected Products : libbpg
    • Published: Aug. 22, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2017-2493

    An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. iCloud before 6.2 on Windows is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers t... Read more

    Affected Products : iphone_os tvos safari icloud windows
    • Published: Apr. 03, 2018
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2017-2492

    An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. tvOS before 10.2 is affected. The issue involves the "JavaScriptCore" component. It allows remote attackers to conduct Universal XSS (UXSS) att... Read more

    Affected Products : iphone_os tvos safari
    • Published: Apr. 03, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2017-2488

    A cryptographic weakness existed in the authentication protocol of Remote Desktop. This issue was addressed by implementing the Secure Remote Password authentication protocol. This issue is fixed in Apple Remote Desktop 3.9. An attacker may be able to cap... Read more

    Affected Products : remote_desktop
    • Published: Dec. 23, 2021
    • Modified: Nov. 21, 2024
  • 5.9

    MEDIUM
    CVE-2017-2411

    In iOS before 11.2, exchange rates were retrieved from HTTP rather than HTTPS. This was addressed by enabling HTTPS for exchange rates.... Read more

    Affected Products : iphone_os
    • Published: Jan. 11, 2019
    • Modified: Nov. 21, 2024
  • 3.3

    LOW
    CVE-2017-2375

    An issue existed in preventing the uploading of CallKit call history to iCloud. This issue was addressed through improved logic. This issue is fixed in iOS 10.2.1. Updates for CallKit call history are sent to iCloud.... Read more

    Affected Products : iphone_os
    • Published: Dec. 23, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 293309 Results