Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-2807 | 1 Ledger-cli | 1 Ledger | 2022-04-19 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable buffer overflow vulnerability exists in the tag parsing functionality of Ledger-CLI 3.1.1. A specially crafted journal file can cause an integer underflow resulting in code execution. An attacker can construct a malicious journal file to trigger this vulnerability. | |||||
CVE-2017-2779 | 1 Ni | 1 Labview | 2022-04-19 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable memory corruption vulnerability exists in the RSRC segment parsing functionality of LabVIEW 2017, LabVIEW 2016, LabVIEW 2015, and LabVIEW 2014. A specially crafted Virtual Instrument (VI) file can cause an attacker controlled looping condition resulting in an arbitrary null write. An attacker controlled VI file can be used to trigger this vulnerability and can potentially result in code execution. | |||||
CVE-2017-2818 | 1 Freedesktop | 1 Poppler | 2022-04-19 | 6.8 MEDIUM | 8.8 HIGH |
An exploitable heap overflow vulnerability exists in the image rendering functionality of Poppler 0.53.0. A specifically crafted PDF can cause an overly large number of color components during image rendering, resulting in heap corruption. An attacker controlled PDF file can be used to trigger this vulnerability. | |||||
CVE-2017-2814 | 1 Freedesktop | 1 Poppler | 2022-04-19 | 6.8 MEDIUM | 8.8 HIGH |
An exploitable heap overflow vulnerability exists in the image rendering functionality of Poppler 0.53.0. A specifically crafted pdf can cause an image resizing after allocation has already occurred, resulting in heap corruption which can lead to code execution. An attacker controlled PDF file can be used to trigger this vulnerability. | |||||
CVE-2017-2782 | 1 Matrixssl | 1 Matrixssl | 2022-04-19 | 6.4 MEDIUM | 9.1 CRITICAL |
An integer overflow vulnerability exists in the X509 certificate parsing functionality of InsideSecure MatrixSSL 3.8.7b. A specially crafted x509 certificate can cause a length counter to overflow, leading to a controlled out of bounds copy operation. To trigger this vulnerability, a specially crafted x509 certificate must be presented to the vulnerable client or server application when initiating secure connection | |||||
CVE-2017-2813 | 1 Irfanview | 1 Irfanview | 2022-04-19 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable integer overflow vulnerability exists in the JPEG 2000 parser functionality of IrfanView 4.44. A specially crafted jpeg2000 image can cause an integer overflow leading to wrong memory allocation resulting in arbitrary code execution. Vulnerability can be triggered by viewing the image in via the application or by using thumbnailing feature of IrfanView. | |||||
CVE-2017-2810 | 1 Python | 1 Tablib | 2022-04-19 | 7.5 HIGH | 9.8 CRITICAL |
An exploitable vulnerability exists in the Databook loading functionality of Tablib 0.11.4. A yaml loaded Databook can execute arbitrary python commands resulting in command execution. An attacker can insert python into loaded yaml to trigger this vulnerability. | |||||
CVE-2017-2819 | 1 Hancom | 2 Hangul Word Processor, Thinkfree Office Neo | 2022-04-19 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable heap-based buffer overflow exists in the Hangul Word Processor component (version 9.6.1.4350) of Hancom Thinkfree Office NEO 9.6.1.4902. A specially crafted document stream can cause an integer underflow resulting in a buffer overflow which can lead to code execution under the context of the application. An attacker can entice a user to open up a document in order to trigger this vulnerability. | |||||
CVE-2017-2817 | 1 Poweriso | 1 Poweriso | 2022-04-19 | 6.8 MEDIUM | 7.8 HIGH |
A stack buffer overflow vulnerability exists in the ISO parsing functionality of Power Software Ltd PowerISO 6.8. A specially crafted ISO file can cause a vulnerability resulting in potential code execution. An attacker can send a specific ISO file to trigger this vulnerability. | |||||
CVE-2017-2801 | 1 Botan Project | 1 Botan | 2022-04-19 | 7.5 HIGH | 9.8 CRITICAL |
A programming error exists in a way Randombit Botan cryptographic library version 2.0.1 implements x500 string comparisons which could lead to certificate verification issues and abuse. A specially crafted X509 certificate would need to be delivered to the client or server application in order to trigger this vulnerability. | |||||
CVE-2017-2799 | 1 Marklogic | 1 Marklogic | 2022-04-19 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable heap corruption vulnerability exists in the AddSst functionality of Antenna House DMC HTMLFilter as used by MarkLogic 8.0-6. A specially crafted XLS file can cause a heap corruption resulting in arbitrary code execution. An attacker can send or provide a malicious XLS file to trigger this vulnerability. | |||||
CVE-2017-2798 | 1 Marklogic | 1 Marklogic | 2022-04-19 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable heap corruption vulnerability exists in the GetIndexArray functionality of Antenna House DMC HTMLFilter as used by MarkLogic 8.0-6. A specially crafted XLS file can cause a heap corruption resulting in arbitrary code execution. An attacker can send or provide a malicious XLS file to trigger this vulnerability. | |||||
CVE-2017-2797 | 1 Marklogic | 1 Marklogic | 2022-04-19 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable heap overflow vulnerability exists in the ParseEnvironment functionality of AntennaHouse DMC HTMLFilter as used by MarkLogic 8.0-6. | |||||
CVE-2017-2794 | 1 Marklogic | 1 Marklogic | 2022-04-19 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable stack-based buffer overflow vulnerability exists in the DHFSummary functionality of AntennaHouse DMC HTMLFilter as used by MarkLogic 8.0-6. A specially crafted PPT file can cause a stack corruption resulting in arbitrary code execution. An attacker can send/provide malicious PPT file to trigger this vulnerability. | |||||
CVE-2017-2793 | 1 Marklogic | 1 Marklogic | 2022-04-19 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable heap corruption vulnerability exists in the UnCompressUnicode functionality of Antenna House DMC HTMLFilter used by MarkLogic 8.0-6. A specially crafted xls file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide malicious XLS file to trigger this vulnerability. | |||||
CVE-2017-2783 | 1 Marklogic | 1 Marklogic | 2022-04-19 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable heap corruption vulnerability exists in the FillRowFormat functionality of Antenna House DMC HTMLFilter that is shipped with MarkLogic 8.0-6. A specially crafted xls file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide malicious xls file to trigger this vulnerability. | |||||
CVE-2017-2806 | 1 Lexmark | 1 Perceptive Document Filters | 2022-04-19 | 4.3 MEDIUM | 3.3 LOW |
An exploitable arbitrary read exists in the XLS parsing of the Lexmark Perspective Document Filters conversion functionality. A crafted XLS document can lead to a arbitrary read resulting in memory disclosure. The vulnerability was confirmed on versions 11.3.0.2228 and 11.3.0.2400 | |||||
CVE-2017-2784 | 1 Arm | 1 Mbed Tls | 2022-04-19 | 6.8 MEDIUM | 8.1 HIGH |
An exploitable free of a stack pointer vulnerability exists in the x509 certificate parsing code of ARM mbed TLS before 1.3.19, 2.x before 2.1.7, and 2.4.x before 2.4.2. A specially crafted x509 certificate, when parsed by mbed TLS library, can cause an invalid free of a stack pointer leading to a potential remote code execution. In order to exploit this vulnerability, an attacker can act as either a client or a server on a network to deliver malicious x509 certificates to vulnerable applications. | |||||
CVE-2017-2775 | 1 Ni | 1 Labview | 2022-04-19 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable memory corruption vulnerability exists in the LvVariantUnflatten functionality in 64-bit versions of LabVIEW before 2015 SP1 f7 Patch and 2016 before f2 Patch. A specially crafted VI file can cause a user controlled value to be used as a loop terminator resulting in internal heap corruption. An attacker controlled VI file can be used to trigger this vulnerability, exploitation could lead to remote code execution. | |||||
CVE-2017-2787 | 1 Pharos | 1 Popup | 2022-04-19 | 9.3 HIGH | 9.0 CRITICAL |
A buffer overflows exists in the psnotifyd application of the Pharos PopUp printer client version 9.0. A specially crafted packet can be sent to the victim's computer and can lead to a heap based buffer overflow resulting in potential remote code execution. This client is always listening, has root privileges, and requires no user interaction to exploit. |