Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.0

    HIGH
    CVE-2017-2652

    It was found that there were no permission checks performed in the Distributed Fork plugin before and including 1.5.0 for Jenkins that provides the dist-fork CLI command beyond the basic check for Overall/Read permission, allowing anyone with that permiss... Read more

    Affected Products : distributed_fork
    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2017-2651

    jenkins-mailer-plugin before version 1.20 is vulnerable to an information disclosure while using the feature to send emails to a dynamically created list of users based on the changelogs. This could in some cases result in emails being sent to people who ... Read more

    Affected Products : mailer
    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 8.5

    HIGH
    CVE-2017-2650

    It was found that the use of Pipeline: Classpath Step Jenkins plugin enables a bypass of the Script Security sandbox for users with SCM commit access, as well as users with e.g. Job/Configure permission in Jenkins.... Read more

    Affected Products : pipeline_classpath_step
    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 8.1

    HIGH
    CVE-2017-2649

    It was found that the Active Directory Plugin for Jenkins up to and including version 2.2 did not verify certificates of the Active Directory server, thereby enabling Man-in-the-Middle attacks.... Read more

    Affected Products : active_directory
    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 6.8

    MEDIUM
    CVE-2017-2648

    It was found that jenkins-ssh-slaves-plugin before version 1.15 did not perform host key verification, thereby enabling Man-in-the-Middle attacks.... Read more

    Affected Products : ssh_slaves
    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2017-2646

    It was found that when Keycloak before 2.5.5 receives a Logout request with a Extensions in the middle of the request, the SAMLSloRequestParser.parse() method ends in a infinite loop. An attacker could use this flaw to conduct denial of service attacks.... Read more

    Affected Products : keycloak
    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2017-2640

    An out-of-bounds write flaw was found in the way Pidgin before 2.12.0 processed XML content. A malicious remote server could potentially use this flaw to crash Pidgin or execute arbitrary code in the context of the pidgin process.... Read more

    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2017-2639

    It was found that CloudForms does not verify that the server hostname matches the domain name in the certificate when using a custom CA and communicating with Red Hat Virtualization (RHEV) and OpenShift. This would allow an attacker to spoof RHEV or OpenS... Read more

    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2017-2638

    It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.... Read more

    Affected Products : infinispan jboss_data_grid
    • Published: Jul. 16, 2018
    • Modified: Nov. 21, 2024
  • 10.0

    CRITICAL
    CVE-2017-2637

    A design flaw issue was found in the Red Hat OpenStack Platform director use of TripleO to enable libvirtd based live-migration. Libvirtd is deployed by default (by director) listening on 0.0.0.0 (all interfaces) with no-authentication or encryption. Anyo... Read more

    Affected Products : openstack
    • Published: Jul. 26, 2018
    • Modified: Nov. 21, 2024
  • 7.7

    HIGH
    CVE-2017-2635

    A NULL pointer deference flaw was found in the way libvirt from 2.5.0 to 3.0.0 handled empty drives. A remote authenticated attacker could use this flaw to crash libvirtd daemon resulting in denial of service.... Read more

    Affected Products : libvirt
    • Published: Aug. 22, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2017-2634

    It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remo... Read more

    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2017-2633

    An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user inside a guest could use this f... Read more

    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 4.9

    MEDIUM
    CVE-2017-2632

    A logic error in valid_role() in CloudForms role validation before 5.7.1.3 could allow a tenant administrator to create groups with a higher privilege level than the tenant administrator should have. This would allow an attacker with tenant administration... Read more

    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2017-2630

    A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use ... Read more

    Affected Products : qemu
    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2017-2629

    curl before 7.53.0 has an incorrect TLS Certificate Status Request extension feature that asks for a fresh proof of the server's certificate's validity in the code that checks for a test success or failure. It ends up always thinking there's valid proof, ... Read more

    Affected Products : curl
    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2017-2628

    curl, as shipped in Red Hat Enterprise Linux 6 before version 7.19.7-53, did not correctly backport the fix for CVE-2015-3148 because it did not reflect the fact that the HAVE_GSSAPI define was meanwhile substituted by USE_HTTP_NEGOTIATE. This issue was i... Read more

    • Published: Mar. 12, 2018
    • Modified: Nov. 21, 2024
  • 8.2

    HIGH
    CVE-2017-2627

    A flaw was found in openstack-tripleo-common as shipped with Red Hat Openstack Enterprise 10 and 11. The sudoers file as installed with OSP's openstack-tripleo-common package is much too permissive. It contains several lines for the mistral user that have... Read more

    Affected Products : openstack tripleo-common
    • Published: Aug. 22, 2018
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2017-2626

    It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.... Read more

    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2017-2625

    It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them... Read more

    • Published: Jul. 27, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 293350 Results