Max CVSS 7.5 Min CVSS 2.1 Total Count2
IDCVSSSummaryLast (major) updatePublished
CVE-2017-10972 4.0
Uninitialized data in endianness conversion in the XEvent handling of the X.Org X Server before 2017-06-19 allowed authenticated malicious users to access potentially privileged data from the X server.
03-10-2019 - 00:03 06-07-2017 - 11:29
CVE-2017-2584 3.6
arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, f
24-08-2018 - 10:29 15-01-2017 - 02:59
CVE-2017-0357 7.5
A heap-overflow flaw exists in the -tr loader of iucode-tool starting with v1.4 and before v2.1.1, potentially leading to SIGSEGV, or heap corruption.
18-05-2018 - 14:39 13-04-2018 - 15:29
CVE-2010-1621 5.0
The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command.
05-01-2018 - 02:29 14-05-2010 - 19:30
CVE-2006-4215 5.1
PHP remote file inclusion vulnerability in index.php in Zen Cart 1.3.0.2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the autoLoadConfig[999][0][loadFile] parameter.
20-07-2017 - 01:32 17-08-2006 - 21:04
CVE-2006-4218 7.5
Directory traversal vulnerability in Zen Cart 1.3.0.2 and earlier allows remote attackers to include and possibly execute arbitrary local files via directory traversal sequences in the typefilter parameter.
20-07-2017 - 01:32 17-08-2006 - 23:04
CVE-2003-0618 2.1
Multiple vulnerabilities in suidperl 5.6.1 and earlier allow a local user to obtain sensitive information about files for which the user does not have appropriate permissions.
11-07-2017 - 01:29 04-05-2004 - 04:00
CVE-2015-8555 5.0
Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains
01-07-2017 - 01:29 13-04-2016 - 15:59
CVE-2016-9005 7.5
IBM System Storage TS3100-TS3200 Tape Library could allow an unauthenticated user with access to the company network, to change a user's password and gain remote access to the system.
17-02-2017 - 14:35 08-02-2017 - 22:59
CVE-2016-5953 4.3
IBM Sterling Order Management transmits the session identifier within the URL. When a user is unable to view a certain view due to not being allowed permissions, the website responds with an error page where the session identifier is encoded as Base6
15-02-2017 - 15:31 01-02-2017 - 22:59
CVE-2016-8929 5.5
IBM Kenexa LMS on Cloud is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database.
07-02-2017 - 21:44 01-02-2017 - 22:59
CVE-2016-8933 4.0
IBM Kenexa LMS on Cloud could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing dot dot sequences (/../) to view arbitrary files on the system.
07-02-2017 - 20:31 01-02-2017 - 22:59
CVE-2016-5941 3.5
IBM Kenexa LMS on Cloud could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing dot dot sequences (/../) to view arbitrary files on the system.
05-02-2017 - 20:41 01-02-2017 - 22:59
CVE-2016-5940 3.5
IBM Kenexa LMS on Cloud is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted se
05-02-2017 - 20:30 01-02-2017 - 22:59
CVE-2016-8671 4.3
The pstm_exptmod function in MatrixSSL 3.8.6 and earlier does not properly perform modular exponentiation, which might allow remote attackers to predict the secret key via unspecified vectors. NOTE: this vulnerability exists because of an incomplete
19-01-2017 - 02:59 13-01-2017 - 16:59
Back to Top Mark selected
Back to Top