Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 6.1

    MEDIUM
    CVE-2017-14190

    A Cross-site Scripting vulnerability in Fortinet FortiOS 5.6.0 to 5.6.2, 5.4.0 to 5.4.7, 5.2 and earlier, allows attacker to inject arbitrary web script or HTML via maliciously crafted "Host" header in user HTTP requests.... Read more

    Affected Products : fortios
    • EPSS Score: %0.33
    • Published: Jan. 29, 2018
    • Modified: Nov. 21, 2024
  • 7.2

    HIGH
    CVE-2017-14187

    A local privilege escalation and local code execution vulnerability in Fortinet FortiOS 5.6.0 to 5.6.2, 5.4.0 to 5.4.8, and 5.2 and below versions allows attacker to execute unauthorized binary program contained on an USB drive plugged into a FortiGate vi... Read more

    Affected Products : fortios
    • EPSS Score: %0.06
    • Published: May. 24, 2018
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2017-14185

    An Information Disclosure vulnerability in Fortinet FortiOS 5.6.0 to 5.6.2, 5.4.0 to 5.4.8 and 5.2 all versions allows SSL VPN web portal users to access internal FortiOS configuration information (eg:addresses) via specifically crafted URLs inside the SS... Read more

    Affected Products : fortios
    • EPSS Score: %0.33
    • Published: May. 25, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2017-14180

    Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root... Read more

    Affected Products : ubuntu_linux apport
    • EPSS Score: %0.05
    • Published: Feb. 02, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2017-14179

    Apport before 2.13 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privilege... Read more

    Affected Products : ubuntu_linux apport
    • EPSS Score: %0.03
    • Published: Feb. 02, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2017-14178

    In snapd 2.27 through 2.29.2 the 'snap logs' command could be made to call journalctl without match arguments and therefore allow unprivileged, unauthenticated users to bypass systemd-journald's access restrictions.... Read more

    Affected Products : snapd
    • EPSS Score: %1.17
    • Published: Feb. 02, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2017-14177

    Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. ... Read more

    Affected Products : ubuntu_linux apport
    • EPSS Score: %0.05
    • Published: Feb. 02, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2017-14097

    An improper access control vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to decrypt contents of a database with information that could be used to access a vulnerable system.... Read more

    Affected Products : smart_protection_server
    • EPSS Score: %16.25
    • Published: Jan. 19, 2018
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2017-14096

    A stored cross site scripting (XSS) vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to execute a malicious payload on vulnerable systems.... Read more

    Affected Products : smart_protection_server
    • EPSS Score: %2.54
    • Published: Jan. 19, 2018
    • Modified: Nov. 21, 2024
  • 8.1

    HIGH
    CVE-2017-14095

    A vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to perform remote command execution via a local file inclusion on a vulnerable system.... Read more

    Affected Products : smart_protection_server
    • EPSS Score: %2.92
    • Published: Jan. 19, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2017-14094

    A vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to perform remote command execution via a cron job injection on a vulnerable system.... Read more

    Affected Products : smart_protection_server
    • EPSS Score: %56.27
    • Published: Jan. 19, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2017-14082

    An uninitialized pointer information disclosure vulnerability in Trend Micro Mobile Security (Enterprise) versions 9.7 and below could allow an unauthenticated remote attacker to disclosure sensitive information on a vulnerable system.... Read more

    Affected Products : mobile_security
    • EPSS Score: %2.74
    • Published: Jan. 19, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2017-14030

    An issue was discovered in Moxa MXview v2.8 and prior. The unquoted service path escalation vulnerability could allow an authorized user with file access to escalate privileges by inserting arbitrary code into the unquoted service path.... Read more

    Affected Products : mxview
    • EPSS Score: %0.10
    • Published: Jan. 12, 2018
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2017-14026

    In Ice Qube Thermal Management Center versions prior to version 4.13, the web application does not properly authenticate users which may allow an attacker to gain access to sensitive information.... Read more

    • EPSS Score: %0.40
    • Published: Sep. 06, 2018
    • Modified: Nov. 21, 2024
  • 4.6

    MEDIUM
    CVE-2017-14014

    Boston Scientific ZOOM LATITUDE PRM Model 3120 uses a hard-coded cryptographic key to encrypt PHI prior to having it transferred to removable media. CVSS v3 base score: 4.6; CVSS vector string: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N.... Read more

    • EPSS Score: %0.12
    • Published: May. 01, 2018
    • Modified: Nov. 21, 2024
  • 4.6

    MEDIUM
    CVE-2017-14012

    Boston Scientific ZOOM LATITUDE PRM Model 3120 does not encrypt PHI at rest. CVSS v3 base score: 4.6; CVSS vector string: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N.... Read more

    • EPSS Score: %0.06
    • Published: May. 01, 2018
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2017-14010

    In SpiderControl MicroBrowser Windows XP, Vista 7, 8 and 10, Versions 1.6.30.144 and prior, an uncontrolled search path element vulnerability has been identified which could be exploited by placing a specially crafted DLL file in the search path. If the ... Read more

    • EPSS Score: %0.37
    • Published: Apr. 26, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2017-14008

    GE Centricity PACS RA1000, diagnostic image analysis, all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access... Read more

    Affected Products : centricity_pacs_ra1000
    • EPSS Score: %6.94
    • Published: Mar. 20, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2017-14006

    GE Xeleris versions 1.0,1.1,2.1,3.0,3.1, medical imaging systems, all current versions are affected, these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication an... Read more

    Affected Products : xeleris_firmware xeleris
    • EPSS Score: %0.91
    • Published: Mar. 20, 2018
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2017-14004

    GE GEMNet License server (EchoServer) all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected... Read more

    Affected Products : gemnet_license_server
    • EPSS Score: %0.91
    • Published: Mar. 20, 2018
    • Modified: Nov. 21, 2024
Showing 20 of 291890 Results