Max CVSS | 9.3 | Min CVSS | 3.5 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2018-2668 | 6.8 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged at
|
18-07-2022 - 17:46 | 18-01-2018 - 02:29 | |
CVE-2018-2665 | 6.8 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged at
|
18-07-2022 - 17:45 | 18-01-2018 - 02:29 | |
CVE-2018-2640 | 6.8 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged at
|
18-07-2022 - 17:43 | 18-01-2018 - 02:29 | |
CVE-2018-2622 | 6.8 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker
|
18-07-2022 - 17:42 | 18-01-2018 - 02:29 | |
CVE-2018-2562 | 7.5 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows low privileged a
|
01-07-2022 - 14:13 | 18-01-2018 - 02:29 | |
CVE-2018-1000007 | 5.0 |
libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow r
|
13-06-2022 - 19:10 | 24-01-2018 - 22:29 | |
CVE-2017-17081 | 4.3 |
The gmc_mmx function in libavcodec/x86/mpegvideodsp.c in FFmpeg 2.3 and 3.4 does not properly validate widths and heights, which allows remote attackers to cause a denial of service (integer signedness error and out-of-array read) via a crafted MPEG
|
05-01-2021 - 19:15 | 30-11-2017 - 21:29 | |
CVE-2018-5345 | 6.8 |
A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
|
24-08-2020 - 17:37 | 12-01-2018 - 00:29 | |
CVE-2018-5095 | 7.5 |
An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 8 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerabilit
|
24-08-2020 - 17:37 | 11-06-2018 - 21:29 | |
CVE-2017-1000501 | 7.5 |
Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the "config" and "migrate" parameters resulting in unauthenticated remote code execution.
|
27-07-2020 - 03:15 | 03-01-2018 - 15:29 | |
CVE-2018-5117 | 5.0 |
If right-to-left text is used in the addressbar with left-to-right alignment, it is possible in some circumstances to scroll this text to spoof the displayed URL. This issue could result in the wrong URL being displayed as a location, which can misle
|
03-10-2019 - 00:03 | 11-06-2018 - 21:29 | |
CVE-2017-17091 | 6.5 |
wp-admin/user-new.php in WordPress before 4.9.1 sets the newbloguser key to a string that can be directly derived from the user ID, which allows remote attackers to bypass intended access restrictions by entering this string.
|
03-10-2019 - 00:03 | 02-12-2017 - 06:29 | |
CVE-2017-14929 | 5.0 |
In Poppler 0.59.0, memory corruption occurs in a call to Object::dictLookup() in Object.h after a repeating series of Gfx::display, Gfx::go, Gfx::execOp, Gfx::opFill, Gfx::doPatternFill, Gfx::doTilingPatternFill and Gfx::drawForm calls (aka a Gfx.cc
|
03-10-2019 - 00:03 | 30-09-2017 - 01:29 | |
CVE-2018-1000005 | 6.4 |
libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one b
|
18-06-2019 - 22:15 | 24-01-2018 - 22:29 | |
CVE-2017-1000456 | 6.8 |
freedesktop.org libpoppler 0.60.1 fails to validate boundaries in TextPool::addWord, leading to overflow in subsequent calculations.
|
30-04-2019 - 17:54 | 02-01-2018 - 18:29 | |
CVE-2017-17092 | 3.5 |
wp-includes/functions.php in WordPress before 4.9.1 does not require the unfiltered_html capability for upload of .js files, which might allow remote attackers to conduct XSS attacks via a crafted file.
|
26-04-2019 - 15:19 | 02-12-2017 - 06:29 | |
CVE-2017-17093 | 3.5 |
wp-includes/general-template.php in WordPress before 4.9.1 does not properly restrict the lang attribute of an HTML element, which might allow attackers to conduct XSS attacks via the language setting of a site.
|
26-04-2019 - 15:18 | 02-12-2017 - 06:29 | |
CVE-2017-17094 | 3.5 |
wp-includes/feed.php in WordPress before 4.9.1 does not properly restrict enclosures in RSS and Atom fields, which might allow attackers to conduct XSS attacks via a crafted URL.
|
26-04-2019 - 15:18 | 02-12-2017 - 06:29 | |
CVE-2017-9066 | 5.0 |
In WordPress before 4.7.5, there is insufficient redirect validation in the HTTP class, leading to SSRF.
|
15-03-2019 - 11:52 | 18-05-2017 - 14:29 | |
CVE-2003-0914 | 4.3 |
ISC BIND 8.3.x before 8.3.7, and 8.4.x before 8.4.3, allows remote attackers to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value.
|
30-10-2018 - 16:26 | 15-12-2003 - 05:00 | |
CVE-2018-5091 | 7.5 |
A use-after-free vulnerability can occur during WebRTC connections when interacting with the DTMF timers. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.6 and Firefox < 58.
|
09-08-2018 - 16:29 | 11-06-2018 - 21:29 | |
CVE-2018-5096 | 7.5 |
A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.6 and Thunderbird < 52.6.
|
07-08-2018 - 12:46 | 11-06-2018 - 21:29 | |
CVE-2018-5104 | 7.5 |
A use-after-free vulnerability can occur during font face manipulation when a font face is freed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
|
03-08-2018 - 16:57 | 11-06-2018 - 21:29 | |
CVE-2018-5102 | 7.5 |
A use-after-free vulnerability can occur when manipulating HTML media elements with media streams, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
|
03-08-2018 - 16:56 | 11-06-2018 - 21:29 | |
CVE-2018-5103 | 7.5 |
A use-after-free vulnerability can occur during mouse event handling due to issues with multiprocess support. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
|
03-08-2018 - 16:56 | 11-06-2018 - 21:29 | |
CVE-2018-5098 | 7.5 |
A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefo
|
03-08-2018 - 16:55 | 11-06-2018 - 21:29 | |
CVE-2018-5099 | 7.5 |
A use-after-free vulnerability can occur when the widget listener is holding strong references to browser objects that have previously been freed, resulting in a potentially exploitable crash when these references are used. This vulnerability affects
|
03-08-2018 - 16:55 | 11-06-2018 - 21:29 | |
CVE-2018-5097 | 7.5 |
A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. This results in a potentially exploitable crash. This vulnerability affect
|
03-08-2018 - 16:55 | 11-06-2018 - 21:29 | |
CVE-2018-5089 | 7.5 |
Memory safety bugs were reported in Firefox 57 and Firefox ESR 52.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affect
|
03-08-2018 - 16:53 | 11-06-2018 - 21:29 | |
CVE-2018-5704 | 9.3 |
Open On-Chip Debugger (OpenOCD) 0.10.0 does not block attempts to use HTTP POST for sending data to 127.0.0.1 port 4444, which allows remote attackers to conduct cross-protocol scripting attacks, and consequently execute arbitrary commands, via a cra
|
09-02-2018 - 17:55 | 16-01-2018 - 09:29 | |
CVE-2017-16510 | 7.5 |
WordPress before 4.8.3 is affected by an issue where $wpdb->prepare() can create unexpected and unsafe queries leading to potential SQL injection (SQLi) in plugins and themes, as demonstrated by a "double prepare" approach, a different vulnerability
|
04-02-2018 - 02:29 | 02-11-2017 - 16:29 | |
CVE-2017-1000480 | 7.5 |
Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name.
|
04-02-2018 - 02:29 | 03-01-2018 - 18:29 |