Update Reports

OVAL Vulnerability Bulletins




ID:
CISEC:3713
Title:
Windows Wireless WPA Group Key Reinstallation Vulnerability
Type:
Software
Bulletins:
CISEC:3713
CVE-2017-13080
Severity:
Low
Description:
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
Applies to:
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3721
Title:
Vulnerability in the MySQL Serverk component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:3721
CVE-2017-10294
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3709
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication
Type:
Software
Bulletins:
CISEC:3709
CVE-2017-10268
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3718
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth
Type:
Software
Bulletins:
CISEC:3718
CVE-2017-10155
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3719
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema
Type:
Software
Bulletins:
CISEC:3719
CVE-2017-10283
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3710
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:3710
CVE-2017-10279
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3707
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:3707
CVE-2017-10378
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3717
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:3717
CVE-2017-10227
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3722
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached
Type:
Software
Bulletins:
CISEC:3722
CVE-2017-10314
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3720
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB
Type:
Software
Bulletins:
CISEC:3720
CVE-2017-10286
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3723
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: FTS
Type:
Software
Bulletins:
CISEC:3723
CVE-2017-10276
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: FTS). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3708
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL
Type:
Software
Bulletins:
CISEC:3708
CVE-2017-10384
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.57 and earlier 5.6.37 and earlier 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3706
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs
Type:
Software
Bulletins:
CISEC:3706
CVE-2017-10379
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3711
Title:
Vulnerability in MySQL Server 5.6.35 and earlier, 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:3711
CVE-2017-3731
Severity:
Medium
Description:
If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3724
Title:
Type confusion vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3724
CVE-2017-16367
Severity:
High
Description:
Type confusion vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3725
Title:
Type confusion vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3725
CVE-2017-16379
Severity:
High
Description:
Type confusion vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3727
Title:
Type confusion vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3727
CVE-2017-16406
Severity:
High
Description:
Type confusion vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3726
Title:
Stack exhaustion vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3726
CVE-2017-16419
Severity:
Medium
Description:
Stack exhaustion vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3675
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3675
CVE-2017-16403
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3714
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3714
CVE-2017-11884
Severity:
High
Description:
Microsoft Excel 2016 Click-to-Run (C2R) allows an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11882.
Applies to:
Microsoft Office 2016
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3705
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3705
CVE-2017-11882
Severity:
High
Description:
Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.
Applies to:
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3716
Title:
Microsoft Excel Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3716
CVE-2017-11877
Severity:
Medium
Description:
Microsoft Excel 2007 Service Pack 3, Microsoft Excel 2010 Service Pack 2, Microsoft Excel 2013 Service Pack 1, Microsoft Excel 2013 RT Service Pack 1, Microsoft Excel 2016, Microsoft Office Compatibility Pack Service Pack 3, Microsoft Excel Viewer 2007 Service Pack 3, and Microsoft Excel 2016 for Mac allow a security feature bypass by not enforcing macro settings on an Excel document, aka "Microsoft Excel Security Feature Bypass Vulnerability".
Applies to:
Microsoft Excel 2007
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office Compatibility Pack
Created:
2017-12-29
Updated:
2024-01-17

ID:
CISEC:3715
Title:
Microsoft Excel Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3715
CVE-2017-11878
Severity:
High
Description:
Microsoft Excel 2007 Service Pack 3, Microsoft Excel 2010 Service Pack 2, Microsoft Excel 2013 Service Pack 1, Microsoft Excel 2013 RT Service Pack 1, Microsoft Excel 2016, Microsoft Office Compatibility Pack Service Pack 3, and Microsoft Excel Viewer 2007 Service Pack 3 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Excel Memory Corruption Vulnerability".
Applies to:
Microsoft Excel 2007
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel Viewer 2007
Microsoft Office Compatibility Pack
Created:
2017-12-29
Updated:
2024-01-17

ID:
CVE-2015-7889
Title:
The SecEmailComposer/EmailComposer application in the Samsung S6 Edge before the October 2015 MR uses weak permissions for the com.samsung.android.email.intent.action.QUICK_REPLY_BACKGROUND service action, which might allow remote...
Type:
Mobile Devices
Bulletins:
CVE-2015-7889
SFBID77339
Severity:
Medium
Description:
The SecEmailComposer/EmailComposer application in the Samsung S6 Edge before the October 2015 MR uses weak permissions for the com.samsung.android.email.intent.action.QUICK_REPLY_BACKGROUND service action, which might allow remote attackers with knowledge of the local email address to obtain sensitive information via a crafted application that sends a crafted intent.
Applies to:
Created:
2017-12-27
Updated:
2024-01-17

ID:
CISEC:3654
Title:
Windows Search Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:3654
CVE-2017-11788
Severity:
Medium
Description:
Windows Search in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows server, version 1709 allows an unauthenticated attacker to remotely send specially crafted messages that could cause a denial of service against the system due to improperly handing objects in memory, aka "Windows Search Denial of Service Vulnerability".
Applies to:
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3648
Title:
Windows Media Player Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3648
CVE-2017-11768
Severity:
Low
Description:
Windows Media Player in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows remote attackers to test for the presence of files on disk via a specially crafted application. due to the way Windows Media Player discloses file information, aka "Windows Media Player Information Disclosure Vulnerability."
Applies to:
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3653
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3653
CVE-2017-11842
Severity:
Low
Description:
Windows kernel in Windows 8.1 and RT 8.1, Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to log in and run a specially crafted application due to the Windows kernel improperly initializing a memory address, aka "Windows Kernel Information Disclosure Vulnerability".
Applies to:
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3655
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3655
CVE-2017-11851
Severity:
Low
Description:
The Windows kernel component on Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709, allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11842, CVE-2017-11849, and CVE-2017-11853.
Applies to:
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3656
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3656
CVE-2017-11849
Severity:
Low
Description:
Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to log in and run a specially crafted application due to the Windows kernel improperly initializing a memory address, aka "Windows Kernel Information Disclosure Vulnerability".
Applies to:
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3657
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3657
CVE-2017-11847
Severity:
High
Description:
Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to run arbitrary code in kernel mode, install programs, view, change or delete data, and create new accounts with full user rights due to improperly handing objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3658
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3658
CVE-2017-11853
Severity:
Medium
Description:
Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to log in and run a specially crafted application due to the Windows kernel improperly initializing a memory address, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11842, CVE-2017-11849, and CVE-2017-11851.
Applies to:
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3642
Title:
Windows Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3642
CVE-2017-11831
Severity:
Medium
Description:
Windows kernel in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to log on to an affected system, and run a specially crafted application that can compromise the user's system due to how the Windows kernel initializes memory, aka "Windows Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11880.
Applies to:
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3644
Title:
Windows Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3644
CVE-2017-11880
Severity:
Low
Description:
Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to run a specially crafted application and obtain information to further compromise the user's system due to the Windows kernel improperly initializing objects in memory, aka "Windows Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11831.
Applies to:
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3652
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3652
CVE-2017-11852
Severity:
Low
Description:
Microsoft GDI Component in Windows 7 SP1 and Windows Server 2008 SP2 and R2 SP1 allows an attacker to log on to an affected system and run a specially crafted application to compromise the user's system, due improperly disclosing kernel memory addresses, aka "Windows GDI Information Disclosure Vulnerability".
Applies to:
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3641
Title:
Windows EOT Font Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3641
CVE-2017-11835
Severity:
Low
Description:
Microsoft graphics in Windows 7 SP1 and Windows Server 2008 SP2 and R2 SP1 allows an attacker to potentially read data that was not intended to be disclosed due to the way that the Microsoft Windows Embedded OpenType (EOT) font engine parses specially crafted embedded fonts, aka "Windows EOT Font Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11832.
Applies to:
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3643
Title:
Windows EOT Font Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3643
CVE-2017-11832
Severity:
Low
Description:
The Microsoft Windows embedded OpenType (EOT) font engine in Windows 7 SP1, Windows Server 2008 SP2 and 2008 R2 SP1, and Windows Server 2012 allows an attacker to potentially read data that was not intended to be disclosed, due to the way that the Microsoft Windows EOT font engine parses specially crafted embedded fonts, aka "Windows EOT Font Engine Information Disclosure Vulnerability." This CVE ID is unique from CVE-2017-11835.
Applies to:
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3635
Title:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAX-WS
Type:
Software
Bulletins:
CISEC:3635
CVE-2017-10350
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Applies to:
Java Development Kit 1.7
Java Development Kit 1.8
Java Development Kit 1.9
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Java Runtime Environment 1.9
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3637
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Javadoc
Type:
Software
Bulletins:
CISEC:3637
CVE-2017-10293
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Javadoc). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Development Kit 1.9
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Java Runtime Environment 1.9
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3638
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment
Type:
Software
Bulletins:
CISEC:3638
CVE-2017-10309
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u144 and 9. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).
Applies to:
Java Development Kit 1.8
Java Development Kit 1.9
Java Runtime Environment 1.8
Java Runtime Environment 1.9
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3636
Title:
Vulnerability in Java SE: 7u151, 8u144, 9; Java SE Embedded: 8u144; JRockit: R28.3.15
Type:
Software
Bulletins:
CISEC:3636
CVE-2016-10165
Severity:
Medium
Description:
The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.
Applies to:
JRockit R28
Java Development Kit 1.7
Java Development Kit 1.8
Java Development Kit 1.9
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Java Runtime Environment 1.9
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3639
Title:
Stack overflow in V8
Type:
Web
Bulletins:
CISEC:3639
CVE-2017-15396
Severity:
Medium
Description:
Stack overflow in V8.
Applies to:
Google Chrome
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3669
Title:
Security bypass vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3669
CVE-2017-16369
Severity:
Medium
Description:
Security bypass vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3674
Title:
Security bypass vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3674
CVE-2017-16380
Severity:
High
Description:
Security bypass vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3684
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3684
CVE-2017-11858
Severity:
High
Description:
ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how Microsoft browsers handle objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3682
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3682
CVE-2017-11862
Severity:
High
Description:
ChakraCore and Microsoft Edge in Windows 10 1709 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
Applies to:
Microsoft Edge
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3683
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3683
CVE-2017-11861
Severity:
High
Description:
Microsoft Edge in Windows 10 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
Applies to:
Microsoft Edge
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3685
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3685
CVE-2017-11791
Severity:
Low
Description:
ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to obtain information to further compromise the user's system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11834.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3677
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3677
CVE-2017-11293
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3678
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3678
CVE-2017-16370
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3679
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3679
CVE-2017-16382
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3680
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3680
CVE-2017-16420
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3681
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3681
CVE-2017-16408
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3659
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3659
CVE-2017-16401
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3660
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3660
CVE-2017-16362
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3665
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3665
CVE-2017-16402
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3666
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3666
CVE-2017-16400
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3667
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3667
CVE-2017-16404
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3668
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3668
CVE-2017-16414
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3661
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3661
CVE-2017-16399
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3662
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3662
CVE-2017-16394
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3663
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3663
CVE-2017-16418
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3664
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3664
CVE-2017-16405
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3670
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3670
CVE-2017-16409
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3671
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3671
CVE-2017-16412
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3672
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3672
CVE-2017-16376
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3673
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3673
CVE-2017-16397
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3676
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3676
CVE-2017-16417
Severity:
High
Description:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3704
Title:
Microsoft Word Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3704
CVE-2017-11854
Severity:
High
Description:
Microsoft Word 2007 Service Pack 3, Microsoft Word 2010 Service Pack 2, Microsoft Office 2010 Service Pack 2, and Microsoft Office Compatibility Pack Service Pack 3 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Word Memory Corruption Vulnerability".
Applies to:
Microsoft Office 2010
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3650
Title:
Microsoft Project Server Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3650
CVE-2017-11876
Severity:
Medium
Description:
Microsoft Project Server and Microsoft SharePoint Enterprise Server 2016 allow an attacker to use cross-site forgery to read content that they are not authorized to read, use the victim's identity to take actions on the web application on behalf of the victim, such as change permissions and delete content, and inject malicious content in the browser of the victim, aka "Microsoft Project Server Elevation of Privilege Vulnerability".
Applies to:
Microsoft Project Server 2013
Microsoft SharePoint Enterprise Server 2016
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3651
Title:
Microsoft Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3651
CVE-2017-11850
Severity:
Low
Description:
Microsoft Graphics Component in Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to log on to an affected system and run a specially crafted application due to improper handling of objects in memory, aka "Microsoft Graphics Component Information Disclosure Vulnerability".
Applies to:
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3649
Title:
Microsoft Browser Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3649
CVE-2017-11827
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how Microsoft browsers handle objects in memory, aka "Microsoft Browser Memory Corruption Vulnerability".
Applies to:
Internet Explorer 10
Internet Explorer 11
Microsoft Edge
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3646
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3646
CVE-2017-11855
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how Internet Explorer handles objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11856.
Applies to:
Internet Explorer 10
Internet Explorer 11
Internet Explorer 9
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3647
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3647
CVE-2017-11856
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how Internet Explorer handles objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11855.
Applies to:
Internet Explorer 11
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3645
Title:
Internet Explorer Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3645
CVE-2017-11848
Severity:
Medium
Description:
Internet Explorer in Microsoft Microsoft Windows 7 SP1, Windows Server 2008 SP2, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to detect the navigation of the user leaving a maliciously crafted page, due to how page content is handled by Internet Explorer, aka "Internet Explorer Information Disclosure Vulnerability".
Applies to:
Internet Explorer 10
Internet Explorer 11
Internet Explorer 9
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3640
Title:
Device Guard Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3640
CVE-2017-11830
Severity:
Medium
Description:
Device Guard in Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to make an unsigned file appear to be signed, due to a security feature bypass, aka "Device Guard Security Feature Bypass Vulnerability".
Applies to:
Created:
2017-12-22
Updated:
2024-01-17

ID:
CISEC:3634
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Smart Card IO
Type:
Software
Bulletins:
CISEC:3634
CVE-2017-10274
Severity:
Medium
Description:
Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Development Kit 1.9
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Java Runtime Environment 1.9
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3613
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3613
CVE-2017-11846
Severity:
High
Description:
ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3614
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3614
CVE-2017-11866
Severity:
High
Description:
ChakraCore and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
Applies to:
Microsoft Edge
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3615
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3615
CVE-2017-11871
Severity:
High
Description:
ChakraCore and Microsoft Edge in Windows 10 1703, 1709, and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, and CVE-2017-11873.
Applies to:
Microsoft Edge
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3616
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3616
CVE-2017-11843
Severity:
High
Description:
ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3617
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3617
CVE-2017-11836
Severity:
High
Description:
ChakraCore, and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to take control of an affected system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
Applies to:
Microsoft Edge
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3618
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3618
CVE-2017-11841
Severity:
High
Description:
ChakraCore and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
Applies to:
Microsoft Edge
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3619
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3619
CVE-2017-11869
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how Microsoft browsers handle objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3620
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3620
CVE-2017-11838
Severity:
High
Description:
ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3621
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3621
CVE-2017-11839
Severity:
High
Description:
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to take control of an affected system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
Applies to:
Microsoft Edge
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3622
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3622
CVE-2017-11840
Severity:
High
Description:
ChakraCore and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
Applies to:
Microsoft Edge
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3623
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3623
CVE-2017-11870
Severity:
High
Description:
ChakraCore and Microsoft Edge in Windows 10 1703, 1709, and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11871, and CVE-2017-11873.
Applies to:
Microsoft Edge
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3624
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3624
CVE-2017-11873
Severity:
High
Description:
ChakraCore and Microsoft Edge in Windows 10 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, and CVE-2017-11871.
Applies to:
Microsoft Edge
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3626
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3626
CVE-2017-11837
Severity:
High
Description:
ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3625
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3625
CVE-2017-11834
Severity:
Low
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to obtain information to further compromise the user's system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11791.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3627
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3627
CVE-2017-11874
Severity:
Low
Description:
Microsoft Edge in Microsoft Windows 10 1703, 1709, Windows Server, version 1709, and ChakraCore allows an attacker to bypass Control Flow Guard (CFG) to run arbitrary code on a target system, due to how Microsoft Edge handles accessing memory in code compiled by the Edge Just-In-Time (JIT) compiler, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-11863 and CVE-2017-11872.
Applies to:
Microsoft Edge
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3630
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3630
CVE-2017-11872
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows an attacker to force the browser to send data that would otherwise be restricted to a destination website of the attacker's choice, due to how Microsoft Edge handles redirect requests, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-11863 and CVE-2017-11874.
Applies to:
Microsoft Edge
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3632
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3632
CVE-2017-11863
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to trick a user into loading a page containing malicious content, due to how the Edge Content Security Policy (CSP) validates documents, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-11872 and CVE-2017-11874.
Applies to:
Microsoft Edge
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3629
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3629
CVE-2017-11845
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how Microsoft Edge handles objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability".
Applies to:
Microsoft Edge
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3628
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3628
CVE-2017-11844
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 1703, 1709 and Windows Server, version 1709 allows an attacker to obtain information to further compromise the user's system, due to how Microsoft Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11803 and CVE-2017-11833.
Applies to:
Microsoft Edge
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3631
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3631
CVE-2017-11803
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 1703, 1709 and Windows Server, version 1709 allows an attacker to obtain information to further compromise the user's system, due to how Microsoft Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11833 and CVE-2017-11844.
Applies to:
Microsoft Edge
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3633
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3633
CVE-2017-11833
Severity:
Low
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to determine the origin of all webpages in the affected browser, due to how Microsoft Edge handles cross-origin requests, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11803 and CVE-2017-11844.
Applies to:
Microsoft Edge
Created:
2017-12-15
Updated:
2024-01-17

ID:
CISEC:3579
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication
Type:
Software
Bulletins:
CISEC:3579
CVE-2017-10165
Severity:
Medium
Description:
Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3577
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: FTS
Type:
Software
Bulletins:
CISEC:3577
CVE-2017-10320
Severity:
Medium
Description:
Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3576
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: FTS
Type:
Software
Bulletins:
CISEC:3576
CVE-2017-10311
Severity:
Medium
Description:
Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3578
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Group Replication GCS
Type:
Software
Bulletins:
CISEC:3578
CVE-2017-10313
Severity:
Medium
Description:
Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3553
Title:
Vulnerability in the MySQL Server component of Oracle MySQL
Type:
Software
Bulletins:
CISEC:3553
CVE-2017-10365
Severity:
Medium
Description:
Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3554
Title:
Vulnerability in the MySQL Server component of Oracle MySQL
Type:
Software
Bulletins:
CISEC:3554
CVE-2017-10284
Severity:
Medium
Description:
Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3555
Title:
Vulnerability in the MySQL Server component of Oracle MySQL
Type:
Software
Bulletins:
CISEC:3555
CVE-2017-10296
Severity:
Medium
Description:
Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3575
Title:
Vulnerability in the MySQL Server component of Oracle MySQL
Type:
Software
Bulletins:
CISEC:3575
CVE-2017-10167
Severity:
Medium
Description:
Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3573
Title:
Vulnerability in Java SE: 6u161, 7u151, 8u144; Java SE Embedded: 8u144
Type:
Software
Bulletins:
CISEC:3573
CVE-2016-9841
Severity:
High
Description:
inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
Applies to:
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3562
Title:
Vulnerability in Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144; JRockit: R28.3.15
Type:
Software
Bulletins:
CISEC:3562
CVE-2017-10345
Severity:
Low
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
Applies to:
JRockit R28
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3563
Title:
Vulnerability in Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144; JRockit: R28.3.15
Type:
Software
Bulletins:
CISEC:3563
CVE-2017-10356
Severity:
Low
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Applies to:
JRockit R28
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3565
Title:
Vulnerability in Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144; JRockit: R28.3.15
Type:
Software
Bulletins:
CISEC:3565
CVE-2017-10355
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Applies to:
JRockit R28
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3567
Title:
Vulnerability in Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144; JRockit: R28.3.15
Type:
Software
Bulletins:
CISEC:3567
CVE-2017-10281
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Applies to:
JRockit R28
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3574
Title:
Vulnerability in Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144; JRockit: R28.3.15
Type:
Software
Bulletins:
CISEC:3574
CVE-2017-10295
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.0 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N).
Applies to:
JRockit R28
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3564
Title:
Vulnerability in Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144
Type:
Software
Bulletins:
CISEC:3564
CVE-2017-10285
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
Applies to:
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3566
Title:
Vulnerability in Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144
Type:
Software
Bulletins:
CISEC:3566
CVE-2017-10346
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
Applies to:
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3568
Title:
Vulnerability in Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144
Type:
Software
Bulletins:
CISEC:3568
CVE-2017-10357
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Applies to:
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3569
Title:
Vulnerability in Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144
Type:
Software
Bulletins:
CISEC:3569
CVE-2017-10349
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Applies to:
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3570
Title:
Vulnerability in Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144
Type:
Software
Bulletins:
CISEC:3570
CVE-2017-10388
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: Applies to the Java SE Kerberos client. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
Applies to:
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3571
Title:
Vulnerability in Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144
Type:
Software
Bulletins:
CISEC:3571
CVE-2017-10348
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Applies to:
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3572
Title:
Vulnerability in Java SE: 6u161, 7u151, 8u144, 9; Java SE Embedded: 8u144
Type:
Software
Bulletins:
CISEC:3572
CVE-2017-10347
Severity:
Medium
Description:
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Applies to:
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3559
Title:
URL spoofing in OmniBox
Type:
Web
Bulletins:
CISEC:3559
CVE-2017-15390
Severity:
Medium
Description:
Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.
Applies to:
Google Chrome
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3558
Title:
URL spoofing in extensions UI
Type:
Web
Bulletins:
CISEC:3558
CVE-2017-15394
Severity:
Medium
Description:
Insufficient Policy Enforcement in Extensions in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform domain spoofing in permission dialogs via IDN homographs in a crafted Chrome Extension.
Applies to:
Google Chrome
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3560
Title:
Referrer leak in Devtools
Type:
Web
Bulletins:
CISEC:3560
CVE-2017-15393
Severity:
Medium
Description:
Insufficient Policy Enforcement in Devtools remote debugging in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to obtain access to remote debugging functionality via a crafted HTML page, aka a Referer leak.
Applies to:
Google Chrome
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3557
Title:
Null pointer dereference in ImageCapture
Type:
Web
Bulletins:
CISEC:3557
CVE-2017-15395
Severity:
Medium
Description:
A use after free in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka an ImageCapture NULL pointer dereference.
Applies to:
Google Chrome
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3561
Title:
Incorrect registry key handling in PlatformIntegration
Type:
Web
Bulletins:
CISEC:3561
CVE-2017-15392
Severity:
Medium
Description:
Insufficient data validation in V8 in Google Chrome prior to 62.0.3202.62 allowed an attacker who can write to the Windows Registry to potentially exploit heap corruption via a crafted Windows Registry entry, related to PlatformIntegration.
Applies to:
Google Chrome
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3544
Title:
Incorrect handling of picture ID in WebRTC
Type:
Web
Bulletins:
CISEC:3544
CVE-2017-5068
Severity:
Medium
Description:
Incorrect handling of picture ID in WebRTC in Google Chrome prior to 58.0.3029.96 for Mac, Windows, and Linux allowed a remote attacker to trigger a race condition via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3556
Title:
Extension limitation bypass in Extensions
Type:
Web
Bulletins:
CISEC:3556
CVE-2017-15391
Severity:
Medium
Description:
Insufficient Policy Enforcement in Extensions in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to access Extension pages without authorisation via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3550
Title:
Blink in Google Chrome
Type:
Web
Bulletins:
CISEC:3550
CVE-2017-5027
Severity:
Medium
Description:
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to properly enforce unsafe-inline content security policy, which allowed a remote attacker to bypass content security policy via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3545
Title:
An out-of-bounds read in V8
Type:
Web
Bulletins:
CISEC:3545
CVE-2017-5053
Severity:
Medium
Description:
An out-of-bounds read in V8 in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page, related to Array.prototype.indexOf.
Applies to:
Google Chrome
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3547
Title:
An out-of-bounds read in V8
Type:
Web
Bulletins:
CISEC:3547
CVE-2017-5054
Severity:
Medium
Description:
An out-of-bounds read in V8 in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to obtain heap memory contents via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3546
Title:
An incorrect assumption about block structure in Blink
Type:
Web
Bulletins:
CISEC:3546
CVE-2017-5052
Severity:
Medium
Description:
An incorrect assumption about block structure in Blink in Google Chrome prior to 57.0.2987.133 for Mac, Windows, and Linux, and 57.0.2987.132 for Android, allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page that triggers improper casting.
Applies to:
Google Chrome
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3543
Title:
Address spoofing in Omnibox
Type:
Web
Bulletins:
CISEC:3543
CVE-2017-5086
Severity:
Medium
Description:
Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.86 for Windows and Mac allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.
Applies to:
Google Chrome
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3548
Title:
A use after free in printing
Type:
Web
Bulletins:
CISEC:3548
CVE-2017-5055
Severity:
High
Description:
A use after free in printing in Google Chrome prior to 57.0.2987.133 for Linux and Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3549
Title:
A use after free in Blink
Type:
Web
Bulletins:
CISEC:3549
CVE-2017-5056
Severity:
Medium
Description:
A use after free in Blink in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-12-08
Updated:
2024-01-17

ID:
CISEC:3518
Title:
URL spoofing in OmniBox
Type:
Web
Bulletins:
CISEC:3518
CVE-2017-15389
Severity:
Medium
Description:
URL spoofing in OmniBox.
Applies to:
Google Chrome
Created:
2017-12-01
Updated:
2024-01-17

ID:
CISEC:3519
Title:
UI spoofing in Blink
Type:
Web
Bulletins:
CISEC:3519
CVE-2017-15386
Severity:
Medium
Description:
UI spoofing in Blink.
Applies to:
Google Chrome
Created:
2017-12-01
Updated:
2024-01-17

ID:
CISEC:3523
Title:
The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY...
Type:
Services
Bulletins:
CISEC:3523
CVE-2016-0703
Severity:
Medium
Description:
The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
Applies to:
OpenSSL
Created:
2017-12-01
Updated:
2024-01-17

ID:
CISEC:3525
Title:
The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange
Type:
Services
Bulletins:
CISEC:3525
CVE-2016-0701
Severity:
Low
Description:
The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.
Applies to:
OpenSSL
Created:
2017-12-01
Updated:
2024-01-17

ID:
CISEC:3520
Title:
Out of bounds write in Skia
Type:
Web
Bulletins:
CISEC:3520
CVE-2017-5133
Severity:
Medium
Description:
Out of bounds write in Skia.
Applies to:
Google Chrome
Created:
2017-12-01
Updated:
2024-01-17

ID:
CISEC:3522
Title:
Out of bounds write in Skia
Type:
Web
Bulletins:
CISEC:3522
CVE-2017-5131
Severity:
Medium
Description:
Out of bounds write in Skia.
Applies to:
Google Chrome
Created:
2017-12-01
Updated:
2024-01-17

ID:
CISEC:3521
Title:
Out of bounds read in Skia
Type:
Web
Bulletins:
CISEC:3521
CVE-2017-15388
Severity:
Medium
Description:
Out of bounds read in Skia.
Applies to:
Google Chrome
Created:
2017-12-01
Updated:
2024-01-17

ID:
CISEC:3516
Title:
Heap overflow in libxml2
Type:
Web
Bulletins:
CISEC:3516
CVE-2017-5130
Severity:
Medium
Description:
Heap overflow in libxml2.
Applies to:
Google Chrome
Created:
2017-12-01
Updated:
2024-01-17

ID:
CISEC:3517
Title:
Content security bypass
Type:
Web
Bulletins:
CISEC:3517
CVE-2017-15387
Severity:
Medium
Description:
Content security bypass.
Applies to:
Google Chrome
Created:
2017-12-01
Updated:
2024-01-17

ID:
CISEC:3524
Title:
An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites...
Type:
Services
Bulletins:
CISEC:3524
CVE-2016-0704
Severity:
Medium
Description:
An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
Applies to:
OpenSSL
Created:
2017-12-01
Updated:
2024-01-17

ID:
CISEC:3502
Title:
UXSS with MHTML
Type:
Web
Bulletins:
CISEC:3502
CVE-2017-5124
Severity:
Medium
Description:
UXSS with MHTML
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3498
Title:
Use after free in WebAudio
Type:
Web
Bulletins:
CISEC:3498
CVE-2017-5129
Severity:
Medium
Description:
Use after free in WebAudio
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3495
Title:
Use after free in PDFium
Type:
Web
Bulletins:
CISEC:3495
CVE-2017-5126
Severity:
Medium
Description:
Use after free in PDFium
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3503
Title:
Use after free in PDFium
Type:
Web
Bulletins:
CISEC:3503
CVE-2017-5127
Severity:
Medium
Description:
Use after free in PDFium
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3492
Title:
Use after free in Chrome Apps
Type:
Web
Bulletins:
CISEC:3492
CVE-2017-5100
Severity:
Medium
Description:
Use after free in Chrome Apps.
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3485
Title:
URL spoofing in OmniBox
Type:
Web
Bulletins:
CISEC:3485
CVE-2017-5101
Severity:
Medium
Description:
URL spoofing in OmniBox.
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3490
Title:
URL spoofing in OmniBox
Type:
Web
Bulletins:
CISEC:3490
CVE-2017-5105
Severity:
Medium
Description:
URL spoofing in OmniBox.
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3493
Title:
URL spoofing in OmniBox
Type:
Web
Bulletins:
CISEC:3493
CVE-2017-5106
Severity:
Medium
Description:
URL spoofing in OmniBox.
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3488
Title:
Uninitialized use in Skia
Type:
Web
Bulletins:
CISEC:3488
CVE-2017-5103
Severity:
Medium
Description:
Uninitialized use in Skia.
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3489
Title:
Uninitialized use in Skia
Type:
Web
Bulletins:
CISEC:3489
CVE-2017-5102
Severity:
Medium
Description:
Uninitialized use in Skia.
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3491
Title:
UI spoofing in payments dialog
Type:
Web
Bulletins:
CISEC:3491
CVE-2017-5110
Severity:
Medium
Description:
UI spoofing in browser.
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3494
Title:
UI spoofing in browser
Type:
Web
Bulletins:
CISEC:3494
CVE-2017-5109
Severity:
Medium
Description:
UI spoofing in browser.
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3486
Title:
Type confusion in PDFium
Type:
Web
Bulletins:
CISEC:3486
CVE-2017-5108
Severity:
Medium
Description:
Type confusion in PDFium.
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3512
Title:
The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message
Type:
Services
Bulletins:
CISEC:3512
CVE-2016-0800
Severity:
Medium
Description:
The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
Applies to:
OpenSSL
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3513
Title:
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times
Type:
Services
Bulletins:
CISEC:3513
CVE-2016-0702
Severity:
Low
Description:
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
Applies to:
OpenSSL
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3514
Title:
The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths
Type:
Services
Bulletins:
CISEC:3514
CVE-2016-0799
Severity:
High
Description:
The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.
Applies to:
OpenSSL
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3496
Title:
Out of bounds read in V8
Type:
Web
Bulletins:
CISEC:3496
CVE-2017-5088
Severity:
Medium
Description:
Insufficient validation of untrusted input in V8 in Google Chrome prior to 59.0.3071.104 for Mac, Windows, and Linux, and 59.0.3071.117 for Android, allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3515
Title:
Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service
Type:
Services
Bulletins:
CISEC:3515
CVE-2016-0797
Severity:
Medium
Description:
Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.
Applies to:
OpenSSL
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3511
Title:
Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service
Type:
Services
Bulletins:
CISEC:3511
CVE-2016-0798
Severity:
High
Description:
Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.
Applies to:
OpenSSL
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3497
Title:
Incorrect stack manipulation in WebAssembly
Type:
Web
Bulletins:
CISEC:3497
CVE-2017-5132
Severity:
Medium
Description:
Incorrect stack manipulation in WebAssembly
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3504
Title:
Heap overflow in WebGL
Type:
Web
Bulletins:
CISEC:3504
CVE-2017-5128
Severity:
Medium
Description:
Heap overflow in WebGL
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3501
Title:
Heap overflow in Skia
Type:
Web
Bulletins:
CISEC:3501
CVE-2017-5125
Severity:
Medium
Description:
Heap overflow in Skia
Applies to:
Google Chrome
Created:
2017-11-24
Updated:
2024-01-17

ID:
CISEC:3426
Title:
Windows Update Delivery Optimization Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3426
CVE-2017-11829
Severity:
Low
Description:
Microsoft Windows 10 allows an elevation of privilege vulnerability when the Windows Update Delivery Optimization does not properly enforce file share permissions.
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3421
Title:
Windows Subsystem for Linux Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:3421
CVE-2017-8703
Severity:
Medium
Description:
The Microsoft Windows Subsystem for Linux on Microsoft Windows 10 1703 allows a denial of service vulnerability when it improperly handles objects in memory, aka "Windows Subsystem for Linux Denial of Service Vulnerability".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3465
Title:
Windows Storage Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3465
CVE-2017-11818
Severity:
Medium
Description:
The Microsoft Windows Storage component on Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a security feature bypass vulnerability when it fails to validate an integrity-level check, aka "Windows Storage Security Feature Bypass Vulnerability".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3410
Title:
Windows SMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3410
CVE-2017-11780
Severity:
Medium
Description:
The Server Message Block 1.0 (SMBv1) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows a remote code execution vulnerability when it fails to properly handle certain requests, aka "Windows SMB Remote Code Execution Vulnerability".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3416
Title:
Windows SMB Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3416
CVE-2017-11815
Severity:
Low
Description:
The Microsoft Server Block Message (SMB) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability in the way that it handles certain requests, aka "Windows SMB Information Disclosure Vulnerability".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3466
Title:
Windows SMB Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3466
CVE-2017-11782
Severity:
Medium
Description:
The Microsoft Server Block Message (SMB) on Microsoft Windows 10 1607 and Windows Server 2016, allows an elevation of privilege vulnerability when an attacker sends specially crafted requests to the server, aka "Windows SMB Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3413
Title:
Windows SMB Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:3413
CVE-2017-11781
Severity:
High
Description:
The Microsoft Server Block Message (SMB) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows a denial of service vulnerability when an attacker sends specially crafted requests to the server, aka "Windows SMB Denial of Service Vulnerability".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3429
Title:
Windows Shell Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3429
CVE-2017-11819
Severity:
High
Description:
Microsoft Windows 7 SP1 allows an attacker to execute arbitrary code in the context of the current user, due to how Microsoft browsers handle objects in memory, aka "Windows Shell Remote Code Execution Vulnerability".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3427
Title:
Windows Shell Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3427
CVE-2017-8727
Severity:
High
Description:
Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user, due to how Microsoft Windows Text Services Framework handles objects in memory, aka "Windows Shell Memory Corruption Vulnerability".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3432
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3432
CVE-2017-8715
Severity:
Medium
Description:
The Microsoft Device Guard on Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a security feature bypass by the way it handles Windows PowerShell sessions, aka "Windows Security Feature Bypass".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3431
Title:
Windows Search Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3431
CVE-2017-11771
Severity:
High
Description:
The Microsoft Windows Search component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability when it fails to properly handle DNS responses, aka "Windows Search Remote Code Execution Vulnerability".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3411
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3411
CVE-2017-11784
Severity:
Low
Description:
The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11765, CVE-2017-11785, and CVE-2017-11814.
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3412
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3412
CVE-2017-11765
Severity:
Low
Description:
The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11784, CVE-2017-11785, and CVE-2017-11814.
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3414
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3414
CVE-2017-11814
Severity:
Low
Description:
The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11765, CVE-2017-11784, and CVE-2017-11785.
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3415
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3415
CVE-2017-11785
Severity:
Low
Description:
The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11765, CVE-2017-11784, and CVE-2017-11814.
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3422
Title:
Windows Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3422
CVE-2017-11817
Severity:
Low
Description:
The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability when it improperly validates objects in memory, aka "Windows Information Disclosure Vulnerability".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3474
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3474
CVE-2017-11816
Severity:
Low
Description:
The Microsoft Windows Graphics Device Interface (GDI) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability in the way it handles objects in memory, aka "Windows GDI Information Disclosure Vulnerability".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3424
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3424
CVE-2017-11783
Severity:
Medium
Description:
Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability in the way it handles calls to Advanced Local Procedure Call (ALPC), aka "Windows Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3428
Title:
Windows DNSAPI Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3428
CVE-2017-11779
Severity:
High
Description:
The Microsoft Windows Domain Name System (DNS) DNSAPI.dll on Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability when it fails to properly handle DNS responses, aka "Windows DNSAPI Remote Code Execution Vulnerability".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3484
Title:
User information leak via SVG
Type:
Web
Bulletins:
CISEC:3484
CVE-2017-5107
Severity:
Low
Description:
User information leak via SVG.
Applies to:
Google Chrome
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3470
Title:
Use after free in V8
Type:
Web
Bulletins:
CISEC:3470
CVE-2017-5098
Severity:
Medium
Description:
Use after free in V8.
Applies to:
Google Chrome
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3441
Title:
Use after free in print preview
Type:
Web
Bulletins:
CISEC:3441
CVE-2017-5073
Severity:
Medium
Description:
Use after free in print preview
Applies to:
Google Chrome
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3445
Title:
Use after free in credit card autofill
Type:
Web
Bulletins:
CISEC:3445
CVE-2017-5080
Severity:
Medium
Description:
Use after free in credit card autofill
Applies to:
Google Chrome
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3439
Title:
Use after free in Apps Bluetooth
Type:
Web
Bulletins:
CISEC:3439
CVE-2017-5074
Severity:
Medium
Description:
Use after free in Apps Bluetooth
Applies to:
Google Chrome
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3436
Title:
UI spoofing in Blink
Type:
Web
Bulletins:
CISEC:3436
CVE-2017-5079
Severity:
Medium
Description:
UI spoofing in Blink
Applies to:
Google Chrome
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3440
Title:
UI spoofing in Blink
Type:
Web
Bulletins:
CISEC:3440
CVE-2017-5083
Severity:
Medium
Description:
UI spoofing in Blink
Applies to:
Google Chrome
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3434
Title:
Type confusion in V8
Type:
Web
Bulletins:
CISEC:3434
CVE-2017-5070
Severity:
Medium
Description:
Type confusion in V8
Applies to:
Google Chrome
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3430
Title:
TRIE Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3430
CVE-2017-11769
Severity:
High
Description:
The Microsoft Windows TRIE component on Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability in the way it handles loading dll files, aka "TRIE Remote Code Execution Vulnerability".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3460
Title:
Skype for Business Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3460
CVE-2017-11786
Severity:
High
Description:
Skype for Business in Microsoft Lync 2013 SP1 and Skype for Business 2016 allows an attacker to steal an authentication hash that can be reused elsewhere, due to how Skype for Business handles authentication requests, aka "Skype for Business Elevation of Privilege Vulnerability."
Applies to:
Microsoft Lync 2013
Skype for Business 2016
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3447
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3447
CVE-2017-11804
Severity:
High
Description:
ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3448
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3448
CVE-2017-11807
Severity:
High
Description:
ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3449
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3449
CVE-2017-11808
Severity:
High
Description:
ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3450
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3450
CVE-2017-11806
Severity:
High
Description:
ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3451
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3451
CVE-2017-11809
Severity:
High
Description:
ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3452
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3452
CVE-2017-11821
Severity:
High
Description:
ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, and CVE-2017-11812.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3453
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3453
CVE-2017-11812
Severity:
High
Description:
ChakraCore and Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11812, and CVE-2017-11821.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3454
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3454
CVE-2017-11805
Severity:
High
Description:
ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3455
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3455
CVE-2017-11811
Severity:
High
Description:
ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11812, and CVE-2017-11821.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3456
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3456
CVE-2017-11796
Severity:
High
Description:
ChakraCore and Microsoft Edge in Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3457
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3457
CVE-2017-11802
Severity:
High
Description:
ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3417
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3417
CVE-2017-11800
Severity:
High
Description:
Scripting Engine Memory Corruption Vulnerability.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3418
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3418
CVE-2017-11798
Severity:
High
Description:
Scripting Engine Memory Corruption Vulnerability.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3419
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3419
CVE-2017-11799
Severity:
High
Description:
Scripting Engine Memory Corruption Vulnerability.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3420
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3420
CVE-2017-11792
Severity:
High
Description:
Scripting Engine Memory Corruption Vulnerability.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3438
Title:
Possible command injection in mailto handling
Type:
Web
Bulletins:
CISEC:3438
CVE-2017-5078
Severity:
Medium
Description:
Possible command injection in mailto handling
Applies to:
Google Chrome
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3444
Title:
Out of bounds read in V8
Type:
Web
Bulletins:
CISEC:3444
CVE-2017-5071
Severity:
Medium
Description:
Out of bounds read in V8
Applies to:
Google Chrome
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3425
Title:
Microsoft Windows Security Feature Bypass
Type:
Software
Bulletins:
CISEC:3425
CVE-2017-11823
Severity:
High
Description:
The Microsoft Device Guard on Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a security feature bypass by the way it handles Windows PowerShell sessions, aka "Microsoft Windows Security Feature Bypass".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3423
Title:
Microsoft Search Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3423
CVE-2017-11772
Severity:
Medium
Description:
The Microsoft Windows Search component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure when it fails to properly handle objects in memory, aka "Microsoft Search Information Disclosure Vulnerability".
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3464
Title:
Microsoft Outlook Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3464
CVE-2017-11774
Severity:
Medium
Description:
Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Security Feature Bypass Vulnerability."
Applies to:
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Outlook 2016
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3459
Title:
Microsoft Outlook Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3459
CVE-2017-11776
Severity:
Medium
Description:
Microsoft Outlook 2016 allows an attacker to obtain the email content of a user, due to how Outlook 2016 discloses user email content, aka "Microsoft Outlook Information Disclosure Vulnerability."
Applies to:
Microsoft Outlook 2016
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3461
Title:
Microsoft Office SharePoint XSS Vulnerability
Type:
Software
Bulletins:
CISEC:3461
CVE-2017-11775
Severity:
Low
Description:
Microsoft SharePoint Enterprise Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an attacker to exploit a cross-site scripting (XSS) vulnerability by sending a specially crafted request to an affected SharePoint server, due to how SharePoint Server sanitizes web requests, aka "Microsoft Office SharePoint XSS Vulnerability". This CVE ID is unique from CVE-2017-11777 and CVE-2017-11820.
Applies to:
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3462
Title:
Microsoft Office SharePoint XSS Vulnerability
Type:
Software
Bulletins:
CISEC:3462
CVE-2017-11820
Severity:
Low
Description:
Microsoft SharePoint Enterprise Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an attacker to exploit a cross-site scripting (XSS) vulnerability by sending a specially crafted request to an affected SharePoint server, due to how SharePoint Server sanitizes web requests, aka "Microsoft Office SharePoint XSS Vulnerability". This CVE ID is unique from CVE-2017-11775 and CVE-2017-11777.
Applies to:
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3463
Title:
Microsoft Office SharePoint XSS Vulnerability
Type:
Software
Bulletins:
CISEC:3463
CVE-2017-11777
Severity:
Low
Description:
Microsoft SharePoint Enterprise Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an attacker to exploit a cross-site scripting (XSS) vulnerability by sending a specially crafted request to an affected SharePoint server, due to how SharePoint Server sanitizes web requests, aka "Microsoft Office SharePoint XSS Vulnerability". This CVE ID is unique from CVE-2017-11775 and CVE-2017-11820.
Applies to:
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3467
Title:
Microsoft JET Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3467
CVE-2017-8718
Severity:
High
Description:
The Microsoft JET Database Engine in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to take control of an affected system, due to how it handles objects in memory, aka "Microsoft JET Database Engine Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8717.
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3468
Title:
Microsoft JET Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3468
CVE-2017-8717
Severity:
High
Description:
The Microsoft JET Database Engine in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to take control of an affected system, due to how it handles objects in memory, aka "Microsoft JET Database Engine Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8718.
Applies to:
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3472
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3472
CVE-2017-8726
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how affected Microsoft scripting engines handle objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11794 and CVE-2017-11803.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3473
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3473
CVE-2017-11794
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to obtain information to further compromise the user's system, due to how Microsoft Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8726 and CVE-2017-11803.
Applies to:
Microsoft Edge
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3446
Title:
Information leak in CSP reporting
Type:
Web
Bulletins:
CISEC:3446
CVE-2017-5075
Severity:
Medium
Description:
Information leak in CSP reporting
Applies to:
Google Chrome
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3442
Title:
Heap buffer overflow in Skia
Type:
Web
Bulletins:
CISEC:3442
CVE-2017-5077
Severity:
Medium
Description:
Heap buffer overflow in Skia
Applies to:
Google Chrome
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3435
Title:
Extension verification bypass
Type:
Web
Bulletins:
CISEC:3435
CVE-2017-5081
Severity:
Low
Description:
Extension verification bypass
Applies to:
Google Chrome
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3437
Title:
Address spoofing in Omnibox
Type:
Web
Bulletins:
CISEC:3437
CVE-2017-5076
Severity:
Medium
Description:
Address spoofing in Omnibox
Applies to:
Google Chrome
Created:
2017-11-17
Updated:
2024-01-17

ID:
CISEC:3397
Title:
Windows Graphics Component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3397
CVE-2017-11824
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
Applies to:
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3390
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3390
CVE-2017-8694
Severity:
Medium
Description:
The Microsoft Windows Kernel Mode Driver on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8689.
Applies to:
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3391
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3391
CVE-2017-8689
Severity:
Medium
Description:
The Microsoft Windows Kernel Mode Driver on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8694.
Applies to:
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3378
Title:
Use after free in PPAPI
Type:
Web
Bulletins:
CISEC:3378
CVE-2017-5092
Severity:
Medium
Description:
Use after free in PPAPI.
Applies to:
Google Chrome
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3379
Title:
Use after free in IndexedDB
Type:
Web
Bulletins:
CISEC:3379
CVE-2017-5091
Severity:
Medium
Description:
Use after free in IndexedDB.
Applies to:
Google Chrome
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3384
Title:
UI spoofing in Blink
Type:
Web
Bulletins:
CISEC:3384
CVE-2017-5093
Severity:
Medium
Description:
UI spoofing in Blink.
Applies to:
Google Chrome
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3386
Title:
Type confusion in extensions
Type:
Web
Bulletins:
CISEC:3386
CVE-2017-5094
Severity:
Medium
Description:
Type confusion in extensions.
Applies to:
Google Chrome
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3408
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3408
CVE-2017-11810
Severity:
High
Description:
Scripting Engine Memory Corruption Vulnerability.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3409
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3409
CVE-2017-11793
Severity:
High
Description:
Scripting Engine Memory Corruption Vulnerability.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3385
Title:
Out-of-bounds write in PDFium
Type:
Web
Bulletins:
CISEC:3385
CVE-2017-5095
Severity:
Medium
Description:
Out-of-bounds write in PDFium.
Applies to:
Google Chrome
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3377
Title:
OpenSSL Security Bypass Vulnerability
Type:
Services
Bulletins:
CISEC:3377
CVE-2017-3735
Severity:
Medium
Description:
While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL since then.
Applies to:
OpenSSL
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3394
Title:
Microsoft Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3394
CVE-2017-11825
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user.
Applies to:
Microsoft Office 2016
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3395
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Miscellaneous
Bulletins:
CISEC:3395
CVE-2017-11826
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Applies to:
Microsoft Office Compatibility Pack
Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Microsoft Word Viewer
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3392
Title:
Microsoft Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3392
CVE-2017-11763
Severity:
Medium
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Applies to:
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3396
Title:
Microsoft Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3396
CVE-2017-11762
Severity:
Medium
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Applies to:
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3393
Title:
Microsoft Graphics Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3393
CVE-2017-8693
Severity:
Low
Description:
An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
Applies to:
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3387
Title:
Internet Explorer Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3387
CVE-2017-11822
Severity:
High
Description:
Internet Explorer Information Disclosure Vulnerability.
Applies to:
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3388
Title:
Internet Explorer Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3388
CVE-2017-11790
Severity:
Medium
Description:
Internet Explorer Information Disclosure Vulnerability.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3389
Title:
Internet Explorer Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3389
CVE-2017-11813
Severity:
High
Description:
Internet Explorer Information Disclosure Vulnerability.
Applies to:
Microsoft Internet Explorer 11
Created:
2017-11-10
Updated:
2024-01-17

ID:
CISEC:3353
Title:
Remote Code Execution Vulnerability in Apache Tomcat 7.0.0 to 7.0.79
Type:
Software
Bulletins:
CISEC:3353
CVE-2017-12615
Severity:
Medium
Description:
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
Applies to:
Apache Tomcat
Created:
2017-11-03
Updated:
2018-05-25

ID:
CISEC:3358
Title:
RAR decompression memory corruption
Type:
Software
Bulletins:
CISEC:3358
CVE-2016-5310
Severity:
Medium
Description:
The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (memory corruption) via a crafted RAR file that is mishandled during decompression.
Applies to:
Symantec Endpoint Protection
Created:
2017-11-03
Updated:
2024-01-17

ID:
CISEC:3357
Title:
RAR Decompression Denial Of Service Vulnerability
Type:
Software
Bulletins:
CISEC:3357
CVE-2016-5309
Severity:
Medium
Description:
The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted RAR file that is mishandled during decompression.
Applies to:
Symantec Endpoint Protection
Created:
2017-11-03
Updated:
2024-01-17

ID:
CISEC:3355
Title:
Out-of-bounds access in V8
Type:
Web
Bulletins:
CISEC:3355
CVE-2017-5121
Severity:
Medium
Description:
Out-of-bounds access in V8.
Applies to:
Google Chrome
Created:
2017-11-03
Updated:
2024-01-17

ID:
CISEC:3356
Title:
Out-of-bounds access in V8
Type:
Web
Bulletins:
CISEC:3356
CVE-2017-5122
Severity:
Medium
Description:
Out-of-bounds access in V8
Applies to:
Google Chrome
Created:
2017-11-03
Updated:
2024-01-17

ID:
CISEC:3354
Title:
Information Disclosure Vulnerability in Apache Tomcat 7.0.0 to 7.0.80
Type:
Software
Bulletins:
CISEC:3354
CVE-2017-12616
Severity:
Medium
Description:
When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.
Applies to:
Apache Tomcat
Created:
2017-11-03
Updated:
2018-05-25

ID:
CISEC:3351
Title:
IBM WebSphere MQ and IBM MQ Appliance proliferation of channel agents causes denial of service
Type:
Software
Bulletins:
CISEC:3351
CVE-2017-1145
Severity:
High
Description:
IBM WebSphere MQ 8.0.0.6 does not properly terminate channel agents when they are no longer needed, which could allow a user to cause a denial of service through resource exhaustion. IBM Reference #: 1999672.
Applies to:
IBM WebSphere MQ
Created:
2017-11-03
Updated:
2024-01-17

ID:
CISEC:3352
Title:
IBM MQ Java clients might send a password in clear text
Type:
Software
Bulletins:
CISEC:3352
CVE-2016-3052
Severity:
Medium
Description:
Under non-standard configurations, IBM WebSphere MQ might send password data in clear text over the network. This data could be intercepted using man in the middle techniques.
Applies to:
IBM WebSphere MQ
Created:
2017-11-03
Updated:
2024-01-17

ID:
CISEC:3311
Title:
IBM MQ cluster channel definition causes denial of service to cluster
Type:
Software
Bulletins:
CISEC:3311
CVE-2016-9009
Severity:
Medium
Description:
IBM WebSphere MQ 8.0 could allow an authenticated user with authority to create a cluster object to cause a denial of service to MQ clustering. IBM Reference #: 1998647.
Applies to:
IBM WebSphere MQ
Created:
2017-11-03
Updated:
2024-01-17

ID:
CISEC:3350
Title:
IBM MQ and IBM WebSphere MQ Trace enablement could cause denial of service
Type:
Software
Bulletins:
CISEC:3350
CVE-2017-1117
Severity:
Low
Description:
IBM WebSphere MQ 8.0 and 9.0 could allow an authenticated user to cause a denial of service to the MQXR channel when trace is enabled. IBM X-Force ID: 121155.
Applies to:
IBM WebSphere MQ
Created:
2017-11-03
Updated:
2024-01-17

ID:
CISEC:3310
Title:
IBM MQ administration command could cause denial of service
Type:
Software
Bulletins:
CISEC:3310
CVE-2016-8971
Severity:
Medium
Description:
IBM WebSphere MQ 8.0 could allow an authenticated user with queue manager permissions to cause a segmentation fault which would result in the box having to be rebooted to resume normal operations. IBM Reference #: 1998663.
Applies to:
IBM WebSphere MQ
Created:
2017-11-03
Updated:
2024-01-17

ID:
CISEC:3264
Title:
Windows Shell Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3264
CVE-2017-8699
Severity:
High
Description:
Windows Shell in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to run arbitrary code in the context of the current user, due to the way that Windows Shell validates file copy destinations, aka "Windows Shell Remote Code Execution Vulnerability".
Applies to:
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3267
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3267
CVE-2017-8716
Severity:
Medium
Description:
Windows Control Flow Guard in Microsoft Windows 10 Version 1703 allows an attacker to run a specially crafted application to bypass Control Flow Guard, due to the way that Control Flow Guard handles objects in memory, aka "Windows Security Feature Bypass Vulnerability".
Applies to:
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3257
Title:
Windows Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3257
CVE-2017-8710
Severity:
Medium
Description:
The Microsoft Common Console Document (.msc) in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1 allows an attacker to read arbitrary files via an XML external entity (XXE) declaration, due to the way that the Microsoft Common Console Document (.msc) parses XML input containing a reference to an external entity, aka "Windows Information Disclosure Vulnerability".
Applies to:
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3256
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3256
CVE-2017-8702
Severity:
Medium
Description:
Windows Error Reporting (WER) in Microsoft Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows an attacker to gain greater access to sensitive information and system functionality, due to the way that WER handles and executes files, aka "Windows Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3270
Title:
Windows DHCP Server Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3270
CVE-2017-8686
Severity:
High
Description:
The Windows Server DHCP service in Windows Server 2012 Gold and R2, and Windows Server 2016 allows an attacker to either run arbitrary code on the DHCP failover server or cause the DHCP service to become nonresponsive, due to a memory corruption vulnerability in the Windows Server DHCP service, aka "Windows DHCP Server Remote Code Execution Vulnerability".
Applies to:
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3268
Title:
Uniscribe Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3268
CVE-2017-8692
Severity:
High
Description:
The Windows Uniscribe component on Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows remote code execution vulnerability when it fails to properly handle objects in memory, aka "Uniscribe Remote Code Execution Vulnerability".
Applies to:
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3259
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3259
CVE-2017-8740
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.
Applies to:
Microsoft Edge
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3260
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3260
CVE-2017-8755
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8756, and CVE-2017-11764.
Applies to:
Microsoft Edge
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3261
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3261
CVE-2017-8753
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.
Applies to:
Microsoft Edge
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3262
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3262
CVE-2017-8729
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.
Applies to:
Microsoft Edge
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3263
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3263
CVE-2017-8756
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, and CVE-2017-11764.
Applies to:
Microsoft Edge
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3269
Title:
Remote Desktop Virtual Host Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3269
CVE-2017-8714
Severity:
Medium
Description:
The Windows Hyper-V component on Microsoft Windows 8.1, Windows Server 2012 Gold and R2,, Windows 10 1607, and Windows Server 2016 allows a remote code execution vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka "Remote Desktop Virtual Host Remote Code Execution Vulnerability".
Applies to:
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3286
Title:
Plaintext Credentials Information Disclosure Vulnerability in IBM WebSphere MQ 9.0.1 and 9.0.2
Type:
Software
Bulletins:
CISEC:3286
CVE-2017-1337
Severity:
Medium
Description:
IBM WebSphere MQ 9.0.1 and 9.0.2 Java/JMS application can incorrectly transmit user credentials in plain text. IBM X-Force ID: 126245.
Applies to:
IBM WebSphere MQ
Created:
2017-10-27
Updated:
2018-05-25

ID:
CISEC:3251
Title:
Microsoft Office Publisher Remote Code Execution
Type:
Software
Bulletins:
CISEC:3251
CVE-2017-8725
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Publisher 2007 Service Pack 3 and Microsoft Publisher 2010 Service Pack 2 when they fail to properly handle objects in memory, aka "Microsoft Office Publisher Remote Code Execution".
Applies to:
Microsoft Publisher 2007
Microsoft Publisher 2010
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3252
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3252
CVE-2017-8744
Severity:
High
Description:
A remote code execution vulnerability exists in Excel Services, Microsoft Excel 2007 Service Pack 3, Microsoft Excel 2010 Service Pack 2, Microsoft Excel 2013 Service Pack 1, Microsoft Excel 2013 RT Service Pack 1, and Microsoft Excel 2016 when they fail to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8630, CVE-2017-8632, and CVE-2017-8731.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3258
Title:
Microsoft Bluetooth Driver Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:3258
CVE-2017-8628
Severity:
Medium
Description:
Microsoft Bluetooth Driver in Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703 allows a spoofing vulnerability due to Microsoft's implementation of the Bluetooth stack, aka "Microsoft Bluetooth Driver Spoofing Vulnerability".
Applies to:
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3280
Title:
Local Information Disclosure Vulnerability in IBM WebSphere MQ 9.0.1 and 9.0.2
Type:
Software
Bulletins:
CISEC:3280
CVE-2017-1284
Severity:
Low
Description:
IBM WebSphere MQ 9.0.1 and 9.0.2 could allow a local user with ability to run or enable trace, to obtain sensitive information from WebSphere Application Server traces including user credentials. IBM X-Force ID: 125145.
Applies to:
IBM WebSphere MQ
Created:
2017-10-27
Updated:
2018-05-25

ID:
CISEC:3254
Title:
Internet Explorer Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:3254
CVE-2017-8733
Severity:
Medium
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to trick a user into believing that the user was visiting a legitimate website, due to the way that Internet Explorer handles specific HTML content, aka "Internet Explorer Spoofing Vulnerability".
Applies to:
Internet Explorer 10
Internet Explorer 11
Internet Explorer 9
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3253
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3253
CVE-2017-8749
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Internet Explorer accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8747.
Applies to:
Internet Explorer 10
Internet Explorer 11
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3255
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3255
CVE-2017-8747
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Internet Explorer accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8749.
Applies to:
Internet Explorer 10
Internet Explorer 11
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3309
Title:
IBM MQ Invalid channel protocol flows cause denial of service on HP-UX
Type:
Software
Bulletins:
CISEC:3309
CVE-2016-8915
Severity:
Medium
Description:
IBM WebSphere MQ 8.0 could allow an authenticated user with access to the queue manager and queue, to deny service to other channels running under the same process. IBM Reference #: 1998649.
Applies to:
IBM WebSphere MQ
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3307
Title:
IBM MQ Channel data conversion denial of service
Type:
Software
Bulletins:
CISEC:3307
CVE-2016-3013
Severity:
Medium
Description:
IBM WebSphere MQ 8.0 could allow an authenticated user to crash the MQ channel due to improper data conversion handling. IBM Reference #: 1998661.
Applies to:
IBM WebSphere MQ
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3308
Title:
IBM MQ and IBM WebSphere MQ invalid requests could cause denial of service to MQXR listener
Type:
Software
Bulletins:
CISEC:3308
CVE-2016-8986
Severity:
Medium
Description:
IBM WebSphere MQ 8.0 could allow an authenticated user with access to the queue manager to bring down MQ channels using specially crafted HTTP requests. IBM Reference #: 1998648.
Applies to:
IBM WebSphere MQ
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3266
Title:
Device Guard Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3266
CVE-2017-8746
Severity:
Medium
Description:
Windows Device Guard in Windows 10 1607, 1703, and Windows Server 2016 allows A security feature bypass vulnerability due to how PowerShell exposes functions and processes user supplied code, aka "Device Guard Security Feature Bypass Vulnerability".
Applies to:
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3276
Title:
Denial of Service Vulnerability in IBM WebSphere MQ 9.0.1 and 9.0.2
Type:
Software
Bulletins:
CISEC:3276
CVE-2017-1285
Severity:
Medium
Description:
IBM WebSphere MQ 9.0.1 and 9.0.2 could allow an authenticated user with authority to send a specially crafted message that would cause a channel to remain in a running state but not process messages. IBM X-Force ID: 125146.
Applies to:
IBM WebSphere MQ
Created:
2017-10-27
Updated:
2018-05-25

ID:
CISEC:3281
Title:
Denial of Service Vulnerability in IBM WebSphere MQ 9.0.1 and 9.0.2
Type:
Software
Bulletins:
CISEC:3281
CVE-2017-1236
Severity:
Medium
Description:
IBM WebSphere MQ 9.0.2 could allow an authenticated user to potentially cause a denial of service by saving an incorrect channel status inquiry. IBM X-Force ID: 124354
Applies to:
IBM WebSphere MQ
Created:
2017-10-27
Updated:
2018-05-25

ID:
CISEC:3271
Title:
Cross Site Scripting (XSS) in IMG Tags in the ePO extension in McAfee Data Loss Prevention Endpoint (DLP Endpoint) 10.0.x
Type:
Software
Bulletins:
CISEC:3271
CVE-2017-3948
Severity:
Low
Description:
Access control vulnerability in Intel Security Data Loss Prevention Endpoint (DLPe) 9.4.200 and 9.3.600 allows authenticated users with Read-Write-Execute permissions to inject hook DLLs into other processes via pages in the target process memory get.
Applies to:
McAfee DLP Endpoint Agent
Created:
2017-10-27
Updated:
2018-05-25

ID:
CISEC:3278
Title:
Access control vulnerability in Intel Security Data Loss Prevention Endpoint (DLPe) 9.4.200 and 9.3.600
Type:
Software
Bulletins:
CISEC:3278
CVE-2016-8012
Severity:
Medium
Description:
Access control vulnerability in Intel Security Data Loss Prevention Endpoint (DLPe) 9.4.200 and 9.3.600 allows authenticated users with Read-Write-Execute permissions to inject hook DLLs into other processes via pages in the target process memory get.
Applies to:
McAfee DLP Endpoint Agent
Created:
2017-10-27
Updated:
2018-05-25

ID:
CISEC:3265
Title:
.NET Framework Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3265
CVE-2017-8759
Severity:
High
Description:
Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability."
Applies to:
Created:
2017-10-27
Updated:
2024-01-17

ID:
CISEC:3221
Title:
Windows GDI+ Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3221
CVE-2017-8676
Severity:
Low
Description:
The Windows Graphics Device Interface (GDI) in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, 1607, 1703, and Server 2016; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an authenticated attacker to retrieve information from a targeted system via a specially crafted application, aka "Windows GDI+ Information Disclosure Vulnerability."
Applies to:
Microsoft Live Meeting 2007
Microsoft Lync 2010
Microsoft Lync 2013
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office Word Viewer
Skype for Business 2016
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3236
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3236
CVE-2017-8741
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Internet Explorer and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3240
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3240
CVE-2017-8649
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.
Applies to:
Microsoft Edge
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3241
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3241
CVE-2017-11764
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, and CVE-2017-8756.
Applies to:
Microsoft Edge
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3242
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3242
CVE-2017-8748
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3245
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3245
CVE-2017-8738
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.
Applies to:
Microsoft Edge
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3247
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3247
CVE-2017-8752
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.
Applies to:
Microsoft Edge
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3248
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3248
CVE-2017-8660
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.
Applies to:
Microsoft Edge
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3246
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3246
CVE-2017-8739
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to obtain information to further compromise the user's system, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability".
Applies to:
Microsoft Edge
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3222
Title:
PowerPoint Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3222
CVE-2017-8743
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft PowerPoint 2016, Microsoft SharePoint Enterprise Server 2016, and Office Online Server when they fail to properly handle objects in memory, aka "PowerPoint Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8742.
Applies to:
Microsoft PowerPoint 2016
Microsoft SharePoint Server 2016
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3228
Title:
PowerPoint Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3228
CVE-2017-8742
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft PowerPoint 2007 Service Pack 3, Microsoft PowerPoint 2010 Service Pack 2, Microsoft PowerPoint 2013 Service Pack 1, Microsoft PowerPoint 2013 RT Service Pack 1, Microsoft PowerPoint 2016, Microsoft PowerPoint Viewer 2007, Microsoft SharePoint Server 2013 Service Pack 1, Microsoft SharePoint Enterprise Server 2016, Microsoft Office Web Apps 2010 Service Pack 2, and Microsoft Office Compatibility Pack Service Pack 3 when they fail to properly handle objects in memory, aka "PowerPoint Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8743.
Applies to:
Microsoft Office Compatibility Pack
Microsoft Office Web Apps 2010
Microsoft Office Web Apps Server 2013
Microsoft PowerPoint 2007
Microsoft PowerPoint 2010
Microsoft PowerPoint 2013
Microsoft PowerPoint 2016
PowerPoint Viewer 2010
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3237
Title:
NetBIOS Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3237
CVE-2017-0161
Severity:
Medium
Description:
The Windows NetBT Session Services component on Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability when it fails to maintain certain sequencing requirements, aka "NetBIOS Remote Code Execution Vulnerability".
Applies to:
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3226
Title:
Microsoft PDF Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3226
CVE-2017-8737
Severity:
High
Description:
Microsoft Windows PDF Library in Microsoft Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Windows PDF Library handles objects in memory, aka "Windows PDF Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8728.
Applies to:
Microsoft Edge
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3229
Title:
Microsoft PDF Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3229
CVE-2017-8728
Severity:
High
Description:
Microsoft Windows PDF Library in Microsoft Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Windows PDF Library handles objects in memory, aka "Windows PDF Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8737.
Applies to:
Microsoft Edge
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3233
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3233
CVE-2017-8632
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Excel 2010 Service Pack 2, Microsoft Excel 2013 Service Pack 1, Microsoft Excel 2013 RT Service Pack 1, Microsoft Excel 2016, Microsoft Office Web Apps 2013, Microsoft Excel for Mac 2011, Microsoft Excel 2016 for Mac, and Microsoft Office Compatibility Pack Service Pack 3, when they fail to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8630, CVE-2017-8631, and CVE-2017-8744.
Applies to:
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office Compatibility Pack
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3234
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3234
CVE-2017-8631
Severity:
High
Description:
A remote code execution vulnerability exists in Excel Services, Microsoft Excel 2007 Service Pack 3, Microsoft Excel 2010 Service Pack 2, Microsoft Excel 2013 Service Pack 1, Microsoft Excel 2013 RT Service Pack 1, Microsoft Excel 2016, Microsoft Office Web Apps 2013, Microsoft Office Compatibility Pack Service Pack 3, Microsoft Excel Web App 2013 Service Pack 1, Microsoft Excel Viewer 2007 Service Pack 3, and Office Online Server when they fail to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8630, CVE-2017-8632, and CVE-2017-8744.
Applies to:
Microsoft Excel 2007
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel Viewer
Microsoft Excel Web App
Microsoft Office Web Apps Server
Microsoft Sharepoint Server 2007
Microsoft Sharepoint Server 2010
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3235
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3235
CVE-2017-8630
Severity:
High
Description:
Microsoft Office 2016 allows a remote code execution vulnerability when it fails to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8631, CVE-2017-8632, and CVE-2017-8744.
Applies to:
Microsoft Office 2016
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3219
Title:
Microsoft Graphics Component Remote Code Execution
Type:
Software
Bulletins:
CISEC:3219
CVE-2017-8696
Severity:
High
Description:
Windows Uniscribe in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an attacker to execute code remotely via a specially crafted website or a specially crafted document or email attachment, aka "Microsoft Graphics Component Remote Code Execution."
Applies to:
Microsoft Live Meeting 2007
Microsoft Lync 2010
Microsoft Lync 2013
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office Word Viewer
Skype for Business 2016
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3216
Title:
Microsoft Edge Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:3216
CVE-2017-8724
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 Version 1703 allows an attacker to trick a user by redirecting the user to a specially crafted website, due to the way that Microsoft Edge parses HTTP content, aka "Microsoft Edge Spoofing Vulnerability". This CVE ID is unique from CVE-2017-8735.
Applies to:
Microsoft Edge
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3215
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3215
CVE-2017-8751
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 1703 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8731, CVE-2017-8734, and CVE-2017-11766.
Applies to:
Microsoft Edge
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3244
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3244
CVE-2017-8731
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1607 and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8734, CVE-2017-8751, and CVE-2017-11766.
Applies to:
Microsoft Edge
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3214
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3214
CVE-2017-8597
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 Version 1703 allows an attacker to obtain information to further compromise the user's system, due to the way that Microsoft Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8643 and CVE-2017-8648.
Applies to:
Microsoft Edge
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3243
Title:
Microsoft Browser Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3243
CVE-2017-8750
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browsers access objects in memory, aka "Microsoft Browser Memory Corruption Vulnerability".
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3213
Title:
Microsoft Browser Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3213
CVE-2017-8736
Severity:
Medium
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to obtain specific information used in the parent domain, due to Microsoft browser parent domain verification in certain functionality, aka "Microsoft Browser Information Disclosure Vulnerability".
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3223
Title:
Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3223
CVE-2017-8713
Severity:
Low
Description:
The Windows Hyper-V component on Microsoft Windows Windows 8.1, Windows Server 2012 Gold and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8707, CVE-2017-8711, CVE-2017-8712, and CVE-2017-8706.
Applies to:
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3224
Title:
Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3224
CVE-2017-8711
Severity:
Low
Description:
The Windows Hyper-V component on Microsoft Windows 10 1607 and Windows Server 2016 allows an information disclosure vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8707, CVE-2017-8706, CVE-2017-8712, and CVE-2017-8713.
Applies to:
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3230
Title:
Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3230
CVE-2017-8712
Severity:
Low
Description:
The Windows Hyper-V component on Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows an information disclosure vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8707, CVE-2017-8711, CVE-2017-8706, and CVE-2017-8713.
Applies to:
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3231
Title:
Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3231
CVE-2017-8706
Severity:
Low
Description:
The Windows Hyper-V component on Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8707, CVE-2017-8711, CVE-2017-8712, and CVE-2017-8713.
Applies to:
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3232
Title:
Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3232
CVE-2017-8707
Severity:
Low
Description:
The Windows Hyper-V component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka Hyper-V Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8706, CVE-2017-8711, CVE-2017-8712, and CVE-2017-8713.
Applies to:
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3227
Title:
Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:3227
CVE-2017-8704
Severity:
Medium
Description:
The Windows Hyper-V component on Microsoft Windows 10 1607 and Windows Server 2016 allows a denial of service vulnerability when it fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability".
Applies to:
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3220
Title:
Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3220
CVE-2017-8695
Severity:
Low
Description:
Windows Uniscribe in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, 1607, 1703, and Server 2016; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an attacker to obtain information to further compromise a user's system via a specially crafted document or an untrusted webpage, aka "Graphics Component Information Disclosure Vulnerability."
Applies to:
Microsoft Live Meeting 2007
Microsoft Lync 2010
Microsoft Lync 2013
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office Word Viewer
Skype for Business 2016
Created:
2017-10-20
Updated:
2024-01-17

ID:
CISEC:3238
Title:
Broadcom BCM43xx Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3238
CVE-2017-9417
Severity:
High
Description:
Broadcom BCM43xx Wi-Fi chips allow remote attackers to execute arbitrary code via unspecified vectors, aka the "Broadpwn" issue.
Applies to:
Created:
2017-10-20
Updated:
2024-01-17

ID:
CVE-2014-3164
Title:
cmds/servicemanager/service_manager.c in Android before commit 7d42a3c31ba78a418f9bdde0e0ab951469f321b5 allows attackers to cause a denial of service (NULL pointer dereference, or out-of-bounds write) via vectors related to binder...
Type:
Mobile Devices
Bulletins:
CVE-2014-3164
SFBID101506
Severity:
Medium
Description:
cmds/servicemanager/service_manager.c in Android before commit 7d42a3c31ba78a418f9bdde0e0ab951469f321b5 allows attackers to cause a denial of service (NULL pointer dereference, or out-of-bounds write) via vectors related to binder passed lengths.
Applies to:
Created:
2017-10-18
Updated:
2024-01-17

ID:
CISEC:3203
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3203
CVE-2017-8709
Severity:
Low
Description:
The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8708, CVE-2017-8679, and CVE-2017-8719.
Applies to:
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3205
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3205
CVE-2017-8719
Severity:
Low
Description:
The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8708, CVE-2017-8709, and CVE-2017-8679.
Applies to:
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3197
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3197
CVE-2017-8708
Severity:
Low
Description:
The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8679, CVE-2017-8709, and CVE-2017-8719.
Applies to:
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3200
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3200
CVE-2017-8679
Severity:
Low
Description:
The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8708, CVE-2017-8709, and CVE-2017-8719.
Applies to:
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3210
Title:
Windows GDI+ Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3210
CVE-2017-8685
Severity:
Low
Description:
Windows GDI+ on Microsoft Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows information disclosure by the way it discloses kernel memory addresses, aka "Windows GDI+ Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8684 and CVE-2017-8688.
Applies to:
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3211
Title:
Windows GDI+ Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3211
CVE-2017-8688
Severity:
Low
Description:
Windows GDI+ on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows information disclosure by the way it discloses kernel memory addresses, aka "Windows GDI+ Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8684 and CVE-2017-8685.
Applies to:
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3212
Title:
Windows GDI+ Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3212
CVE-2017-8684
Severity:
Low
Description:
Windows GDI+ on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT 8.1, allows information disclosure by the way it discloses kernel memory addresses, aka "Windows GDI+ Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8685 and CVE-2017-8688.
Applies to:
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3204
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3204
CVE-2017-8680
Severity:
Low
Description:
The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT 8.1 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8678, CVE-2017-8677, CVE-2017-8681, and CVE-2017-8687.
Applies to:
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3192
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3192
CVE-2017-8678
Severity:
Low
Description:
The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8677, CVE-2017-8680, CVE-2017-8681, and CVE-2017-8687.
Applies to:
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3196
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3196
CVE-2017-8681
Severity:
Low
Description:
The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8678, CVE-2017-8680, CVE-2017-8677, and CVE-2017-8687.
Applies to:
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3198
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3198
CVE-2017-8677
Severity:
Low
Description:
The Windows GDI+ component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly discloses kernel memory addresses, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8678, CVE-2017-8680, CVE-2017-8681, and CVE-2017-8687.
Applies to:
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3199
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3199
CVE-2017-8687
Severity:
Low
Description:
The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8678, CVE-2017-8680, CVE-2017-8677, and CVE-2017-8681.
Applies to:
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3191
Title:
Win32k Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3191
CVE-2017-8682
Severity:
High
Description:
Windows graphics on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, Windows Server 2016, Microsoft Office Word Viewer, Microsoft Office 2007 Service Pack 3 , and Microsoft Office 2010 Service Pack 2 allows an attacker to execute remote code by the way it handles embedded fonts, aka "Win32k Graphics Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8683.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office Word Viewer
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3194
Title:
Win32k Graphics Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3194
CVE-2017-8683
Severity:
Low
Description:
Windows graphics on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an attacker to execute remote code by the way it handles embedded fonts, aka "Win32k Graphics Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8682.
Applies to:
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3193
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3193
CVE-2017-8675
Severity:
Medium
Description:
The Windows Kernel-Mode Drivers component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability".. This CVE ID is unique from CVE-2017-8720.
Applies to:
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3201
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3201
CVE-2017-8720
Severity:
High
Description:
The Microsoft Windows graphics component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8675.
Applies to:
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3159
Title:
Vulnerability in ImageMagick 7.0.5-8
Type:
Software
Bulletins:
CISEC:3159
CVE-2017-9500
Severity:
Medium
Description:
In ImageMagick 7.0.5-8 Q16, an assertion failure was found in the function ResetImageProfileIterator, which allows attackers to cause a denial of service via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3169
Title:
Vulnerability in ImageMagick 7.0.5-7
Type:
Software
Bulletins:
CISEC:3169
CVE-2017-9499
Severity:
Medium
Description:
In ImageMagick 7.0.5-7 Q16, an assertion failure was found in the function SetPixelChannelAttributes, which allows attackers to cause a denial of service via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3175
Title:
Vulnerability in ImageMagick 7.0.5-7
Type:
Software
Bulletins:
CISEC:3175
CVE-2017-9501
Severity:
Medium
Description:
In ImageMagick 7.0.5-7 Q16, an assertion failure was found in the function LockSemaphoreInfo, which allows attackers to cause a denial of service via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3158
Title:
Vulnerability in ImageMagick 7.0.5-5
Type:
Software
Bulletins:
CISEC:3158
CVE-2017-9407
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadPALMImage function in palm.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3160
Title:
Vulnerability in ImageMagick 7.0.5-5
Type:
Software
Bulletins:
CISEC:3160
CVE-2017-9405
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadICONImage function in icon.c:452 allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3168
Title:
Vulnerability in ImageMagick 7.0.5-5
Type:
Software
Bulletins:
CISEC:3168
CVE-2017-9440
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, a memory leak was found in the function ReadPSDChannel in coders/psd.c, which allows attackers to cause a denial of service via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3172
Title:
Vulnerability in ImageMagick 7.0.5-5
Type:
Software
Bulletins:
CISEC:3172
CVE-2017-9409
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadMPCImage function in mpc.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3174
Title:
Vulnerability in ImageMagick 7.0.5-5
Type:
Software
Bulletins:
CISEC:3174
CVE-2017-9439
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, a memory leak was found in the function ReadPDBImage in coders/pdb.c, which allows attackers to cause a denial of service via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3163
Title:
Use of uninitialized value in Skia
Type:
Web
Bulletins:
CISEC:3163
CVE-2017-5117
Severity:
Medium
Description:
Use of uninitialized value in Skia
Applies to:
Google Chrome
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3171
Title:
Use of uninitialized value in Skia
Type:
Web
Bulletins:
CISEC:3171
CVE-2017-5119
Severity:
Medium
Description:
Use of uninitialized value in Skia
Applies to:
Google Chrome
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3162
Title:
Use after free in PDFium
Type:
Web
Bulletins:
CISEC:3162
CVE-2017-5111
Severity:
Medium
Description:
Use after free in PDFium
Applies to:
Google Chrome
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3166
Title:
Type confusion in V8
Type:
Web
Bulletins:
CISEC:3166
CVE-2017-5116
Severity:
Medium
Description:
Type confusion in V8
Applies to:
Google Chrome
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3167
Title:
Type confusion in V8
Type:
Web
Bulletins:
CISEC:3167
CVE-2017-5115
Severity:
Medium
Description:
Type confusion in V8
Applies to:
Google Chrome
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3181
Title:
The ReadSVGImage function in svg.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file
Type:
Software
Bulletins:
CISEC:3181
CVE-2017-7943
Severity:
Medium
Description:
The ReadSVGImage function in svg.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3186
Title:
The ReadAVSImage function in avs.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file
Type:
Software
Bulletins:
CISEC:3186
CVE-2017-7942
Severity:
Medium
Description:
The ReadAVSImage function in avs.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3161
Title:
Potential HTTPS downgrade during redirect navigation
Type:
Web
Bulletins:
CISEC:3161
CVE-2017-5120
Severity:
Medium
Description:
Potential HTTPS downgrade during redirect navigation
Applies to:
Google Chrome
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3202
Title:
Microsoft SharePoint XSS Vulnerability
Type:
Software
Bulletins:
CISEC:3202
CVE-2017-8629
Severity:
Low
Description:
Microsoft SharePoint Server 2013 Service Pack 1 allows an elevation of privilege vulnerability when it fails to properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint XSS Vulnerability".
Applies to:
Microsoft SharePoint Server 2013
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3195
Title:
Microsoft SharePoint Cross Site Scripting Vulnerability
Type:
Software
Bulletins:
CISEC:3195
CVE-2017-8745
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Microsoft SharePoint Foundation 2013 Service Pack 1 when it does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Cross Site Scripting Vulnerability".
Applies to:
Microsoft SharePoint Foundation 2013
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3189
Title:
Microsoft Exchange Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3189
CVE-2017-11761
Severity:
Medium
Description:
Microsoft Exchange Server 2013 and Microsoft Exchange Server 2016 allow an input sanitization issue with Microsoft Exchange that could potentially result in unintended Information Disclosure, aka "Microsoft Exchange Information Disclosure Vulnerability".
Applies to:
Microsoft Exchange 2013
Microsoft Exchange 2016
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3187
Title:
Microsoft Exchange Cross-Site Scripting Vulnerability
Type:
Software
Bulletins:
CISEC:3187
CVE-2017-8758
Severity:
Medium
Description:
Microsoft Exchange Server 2016 allows an elevation of privilege vulnerability when Microsoft Exchange Outlook Web Access (OWA) fails to properly handle web requests, aka "Microsoft Exchange Cross-Site Scripting Vulnerability."
Applies to:
Microsoft Exchange 2016
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3176
Title:
Microsoft Edge Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:3176
CVE-2017-8735
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to trick a user by redirecting the user to a specially crafted website, due to the way that Microsoft Edge parses HTTP content, aka "Microsoft Edge Spoofing Vulnerability". This CVE ID is unique from CVE-2017-8724.
Applies to:
Microsoft Edge
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3208
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3208
CVE-2017-8754
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to trick a user into loading a page containing malicious content, due to the way that the Edge Content Security Policy (CSP) validates certain specially crafted documents, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-8723.
Applies to:
Microsoft Edge
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3179
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3179
CVE-2017-8723
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to trick a user into loading a page containing malicious content, due to the way that the Edge Content Security Policy (CSP) validates certain specially crafted documents, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-8754.
Applies to:
Microsoft Edge
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3207
Title:
Microsoft Edge Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3207
CVE-2017-8757
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way Microsoft Edge handles objects in memory, aka "Microsoft Edge Remote Code Execution Vulnerability".
Applies to:
Microsoft Edge
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3206
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3206
CVE-2017-11766
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8731, CVE-2017-8734, and CVE-2017-8751.
Applies to:
Microsoft Edge
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3178
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3178
CVE-2017-8734
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8731, CVE-2017-8751, and CVE-2017-11766.
Applies to:
Microsoft Edge
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3209
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3209
CVE-2017-8648
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows Version 1703 allows an attacker to obtain information to further compromise the user's system, due to the way that Microsoft Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8597 and CVE-2017-8643.
Applies to:
Microsoft Edge
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3177
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3177
CVE-2017-8643
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to leave a malicious website open during user clipboard activities, due to the way that Microsoft Edge handles clipboard events, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8597 and CVE-2017-8648.
Applies to:
Microsoft Edge
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3173
Title:
Memory lifecycle issue in PDFium
Type:
Web
Bulletins:
CISEC:3173
CVE-2017-5114
Severity:
Medium
Description:
Memory lifecycle issue in PDFium
Applies to:
Google Chrome
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3131
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3131
CVE-2017-11239
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to text strings. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3132
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3132
CVE-2017-11238
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to curve drawing. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3133
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3133
CVE-2017-11237
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the font parsing module. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3156
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3156
CVE-2017-11243
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the XSLT engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3157
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3157
CVE-2017-11242
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to line segments. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3129
Title:
In ImageMagick 7.0.5-5, the ReadXWDImage function in xwd.c allows attackers to cause a denial of service (memory leak
Type:
Software
Bulletins:
CISEC:3129
CVE-2017-8352
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadXWDImage function in xwd.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3121
Title:
In ImageMagick 7.0.5-5, the ReadSUNImage function in sun.c allows attackers to cause a denial of service (memory leak
Type:
Software
Bulletins:
CISEC:3121
CVE-2017-8356
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadSUNImage function in sun.c allows attackers to cause a denial of service (memory leak) via a crafted file..
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3122
Title:
In ImageMagick 7.0.5-5, the ReadSFWImage function in sfw.c allows attackers to cause a denial of service (memory leak
Type:
Software
Bulletins:
CISEC:3122
CVE-2017-8349
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadSFWImage function in sfw.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3123
Title:
In ImageMagick 7.0.5-5, the ReadPICTImage function in pict.c allows attackers to cause a denial of service (memory leak
Type:
Software
Bulletins:
CISEC:3123
CVE-2017-8353
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadPICTImage function in pict.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3183
Title:
In ImageMagick 7.0.5-5, the ReadPCXImage function in pcx.c allows attackers to cause a denial of service (memory leak
Type:
Software
Bulletins:
CISEC:3183
CVE-2017-8344
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadPCXImage function in pcx.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3124
Title:
In ImageMagick 7.0.5-5, the ReadPCDImage function in pcd.c allows attackers to cause a denial of service (memory leak
Type:
Software
Bulletins:
CISEC:3124
CVE-2017-8351
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadPCDImage function in pcd.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3127
Title:
In ImageMagick 7.0.5-5, the ReadMTVImage function in mtv.c allows attackers to cause a denial of service (memory leak
Type:
Software
Bulletins:
CISEC:3127
CVE-2017-8355
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadMTVImage function in mtv.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3180
Title:
In ImageMagick 7.0.5-5, the ReadMNGImage function in png.c allows attackers to cause a denial of service (memory leak
Type:
Software
Bulletins:
CISEC:3180
CVE-2017-8345
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadMNGImage function in png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3125
Title:
In ImageMagick 7.0.5-5, the ReadMATImage function in mat.c allows attackers to cause a denial of service (memory leak
Type:
Software
Bulletins:
CISEC:3125
CVE-2017-8348
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadMATImage function in mat.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3128
Title:
In ImageMagick 7.0.5-5, the ReadJNGImage function in png.c allows attackers to cause a denial of service (memory leak
Type:
Software
Bulletins:
CISEC:3128
CVE-2017-8350
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadJNGImage function in png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3184
Title:
In ImageMagick 7.0.5-5, the ReadEXRImage function in exr.c allows attackers to cause a denial of service (memory leak
Type:
Software
Bulletins:
CISEC:3184
CVE-2017-8347
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadEXRImage function in exr.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3126
Title:
In ImageMagick 7.0.5-5, the ReadEPTImage function in ept.c allows attackers to cause a denial of service (memory leak
Type:
Software
Bulletins:
CISEC:3126
CVE-2017-8357
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadEPTImage function in ept.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3185
Title:
In ImageMagick 7.0.5-5, the ReadDCMImage function in dcm.c allows attackers to cause a denial of service (memory leak
Type:
Software
Bulletins:
CISEC:3185
CVE-2017-8346
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadDCMImage function in dcm.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3130
Title:
In ImageMagick 7.0.5-5, the ReadBMPImage function in bmp.c allows attackers to cause a denial of service (memory leak
Type:
Software
Bulletins:
CISEC:3130
CVE-2017-8354
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadBMPImage function in bmp.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3182
Title:
In ImageMagick 7.0.5-5, the ReadAAIImage function in aai.c allows attackers to cause a denial of service (memory leak
Type:
Software
Bulletins:
CISEC:3182
CVE-2017-8343
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadAAIImage function in aai.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3155
Title:
Heap buffer overflow vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3155
CVE-2017-11241
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable heap overflow vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to polygons. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3170
Title:
Heap buffer overflow in WebGL
Type:
Web
Bulletins:
CISEC:3170
CVE-2017-5112
Severity:
Medium
Description:
Heap buffer overflow in WebGL
Applies to:
Google Chrome
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3165
Title:
Heap buffer overflow in Skia
Type:
Web
Bulletins:
CISEC:3165
CVE-2017-5113
Severity:
Medium
Description:
Heap buffer overflow in Skia
Applies to:
Google Chrome
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3164
Title:
Bypass of Content Security Policy in Blink
Type:
Web
Bulletins:
CISEC:3164
CVE-2017-5118
Severity:
Medium
Description:
Bypass of Content Security Policy in Blink
Applies to:
Google Chrome
Created:
2017-10-13
Updated:
2024-01-17

ID:
CISEC:3105
Title:
Remote Code Execution vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3105
CVE-2017-11224
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability in the XFA layout engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-06
Updated:
2024-01-17

ID:
CISEC:3098
Title:
Remote Code Execution vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3098
CVE-2017-11223
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability in the core of the XFA engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-06
Updated:
2024-01-17

ID:
CISEC:3113
Title:
Remote code execution vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3113
CVE-2017-11231
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability in Acrobat/Reader rendering engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-06
Updated:
2024-01-17

ID:
CISEC:3109
Title:
Remote code execution vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3109
CVE-2017-11235
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability in the image conversion engine when decompressing JPEG data. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-06
Updated:
2024-01-17

ID:
CISEC:3107
Title:
Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3107
CVE-2017-8509
Severity:
High
Description:
A security feature bypass vulnerability exists in Microsoft Office software when it improperly handles the parsing of file formats, aka "Microsoft Office Security Feature Bypass Vulnerability".
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2017-10-06
Updated:
2024-01-17

ID:
CISEC:3099
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3099
CVE-2017-11222
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the Product Representation Compact (PRC) engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-06
Updated:
2024-01-17

ID:
CISEC:3106
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3106
CVE-2017-11226
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image processing engine when processing JPEG 2000 (JP2) code stream data. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-06
Updated:
2024-01-17

ID:
CISEC:3108
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3108
CVE-2017-11228
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing JPEG 2000 (JP2) code stream data. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-06
Updated:
2024-01-17

ID:
CISEC:3111
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3111
CVE-2017-11229
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has a security bypass vulnerability when manipulating Forms Data Format (FDF).
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-06
Updated:
2024-01-17

ID:
CISEC:3112
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3112
CVE-2017-11230
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the JPEG 2000 engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-06
Updated:
2024-01-17

ID:
CISEC:3114
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3114
CVE-2017-11227
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) private data. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-06
Updated:
2024-01-17

ID:
CISEC:3110
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3110
CVE-2017-11233
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to block transfer of pixels. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-06
Updated:
2024-01-17

ID:
CISEC:3117
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3117
CVE-2017-11236
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the internal handling of UTF-16 literal strings. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-06
Updated:
2024-01-17

ID:
CISEC:3116
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3116
CVE-2017-11234
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing TIFF data related to the way how the components of each pixel are stored. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-06
Updated:
2024-01-17

ID:
CISEC:3115
Title:
Information disclosure vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3115
CVE-2017-11232
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability when processing Enhanced Metafile Format (EMF) data related to brush manipulation. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-10-06
Updated:
2024-01-17

ID:
CISEC:3081
Title:
Vulnerability in Oracle Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14
Type:
Software
Bulletins:
CISEC:3081
CVE-2017-10176
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Applies to:
JRockit
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3079
Title:
Vulnerability in Oracle Java SE: 7u141 and 8u131
Type:
Software
Bulletins:
CISEC:3079
CVE-2017-10125
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows physical access to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to deployment of Java where the Java Auto Update is enabled. CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
Applies to:
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3080
Title:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14
Type:
Software
Bulletins:
CISEC:3080
CVE-2017-10135
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3083
Title:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14
Type:
Software
Bulletins:
CISEC:3083
CVE-2017-10198
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
Applies to:
JRockit
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3084
Title:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14
Type:
Software
Bulletins:
CISEC:3084
CVE-2017-10243
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).
Applies to:
JRockit
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3082
Title:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131
Type:
Software
Bulletins:
CISEC:3082
CVE-2017-10193
Severity:
Low
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
Applies to:
JRockit
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3054
Title:
RPCoRDMA dissector infinite loop
Type:
Software
Bulletins:
CISEC:3054
CVE-2017-7705
Severity:
High
Description:
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset.
Applies to:
Wireshark
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3075
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an information disclosure vulnerability
Type:
Software
Bulletins:
CISEC:3075
CVE-2017-3115
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an information disclosure vulnerability when handling links in a PDF document.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3055
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability
Type:
Software
Bulletins:
CISEC:3055
CVE-2017-11219
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability in the XFA rendering engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3058
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability
Type:
Software
Bulletins:
CISEC:3058
CVE-2017-3120
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability in the XFA parsing engine when handling certain types of internal instructions. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3068
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability
Type:
Software
Bulletins:
CISEC:3068
CVE-2017-11218
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability in XFA event management. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3077
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability
Type:
Software
Bulletins:
CISEC:3077
CVE-2017-3113
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability in JavaScript engine when creating large strings. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3057
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable type confusion vulnerability
Type:
Software
Bulletins:
CISEC:3057
CVE-2017-11221
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable type confusion vulnerability in the annotation functionality. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3069
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:3069
CVE-2017-3124
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the picture exchange (PCX) file format parsing module. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3070
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:3070
CVE-2017-3119
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in Acrobat/Reader 11.0.19 engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3071
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:3071
CVE-2017-11212
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to text output. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3073
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:3073
CVE-2017-3122
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to Bezier curves. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3074
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:3074
CVE-2017-11216
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to bitmap transformations. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3056
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:3056
CVE-2017-3016
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3059
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:3059
CVE-2017-3123
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data drawing position definition. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3061
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:3061
CVE-2017-11214
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to rendering a path. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3064
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:3064
CVE-2017-11217
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to drawing of Unicode text strings. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3065
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:3065
CVE-2017-11209
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability that occurs when reading a JPEG file embedded within XML Paper Specification (XPS) file. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3066
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:3066
CVE-2017-11210
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the font parsing, where the font is embedded in the XML Paper Specification (XPS) file. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3067
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:3067
CVE-2017-3116
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the MakeAccessible plugin when parsing TrueType font data. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3078
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:3078
CVE-2017-3121
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the Enhanced Metafile Format (EMF) parser. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3060
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable heap overflow vulnerability
Type:
Software
Bulletins:
CISEC:3060
CVE-2017-11220
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable heap overflow vulnerability in an internal data structure. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3062
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable heap overflow vulnerability
Type:
Software
Bulletins:
CISEC:3062
CVE-2017-11211
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable heap overflow vulnerability in the JPEG parser. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3063
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable heap overflow vulnerability
Type:
Software
Bulletins:
CISEC:3063
CVE-2017-3117
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable heap overflow vulnerability in the plugin that handles links within the PDF. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CISEC:3076
Title:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has a security bypass vulnerability
Type:
Software
Bulletins:
CISEC:3076
CVE-2017-3118
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has a security bypass vulnerability related to execution of malicious attachments.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-09-29
Updated:
2024-01-17

ID:
CVE-2015-1526
Title:
The media_server component in Android allows remote attackers to cause a denial of service via a crafted application.
Type:
Mobile Devices
Bulletins:
CVE-2015-1526
SFBID76666
Severity:
High
Description:
The media_server component in Android allows remote attackers to cause a denial of service via a crafted application.
Applies to:
Created:
2017-09-27
Updated:
2024-01-17

ID:
CVE-2015-1537
Title:
Integer overflow in IHDCP.cpp in the media_server component in Android allows remote attackers to execute arbitrary code via a crafted application.
Type:
Mobile Devices
Bulletins:
CVE-2015-1537
SFBID76670
Severity:
High
Description:
Integer overflow in IHDCP.cpp in the media_server component in Android allows remote attackers to execute arbitrary code via a crafted application.
Applies to:
Created:
2017-09-27
Updated:
2024-01-17

ID:
CVE-2014-0997
Title:
WiFiMonitor in Android 4.4.4 as used in the Nexus 5 and 4, Android 4.2.2 as used in the LG D806, Android 4.2.2 as used in the Samsung SM-T310, Android 4.1.2 as used in the Motorola RAZR HD, and potentially other unspecified Android...
Type:
Mobile Devices
Bulletins:
CVE-2014-0997
SFBID72311
Severity:
Medium
Description:
WiFiMonitor in Android 4.4.4 as used in the Nexus 5 and 4, Android 4.2.2 as used in the LG D806, Android 4.2.2 as used in the Samsung SM-T310, Android 4.1.2 as used in the Motorola RAZR HD, and potentially other unspecified Android releases before 5.0.1 and 5.0.2 does not properly handle exceptions, which allows remote attackers to cause a denial of service (reboot) via a crafted 802.11 probe response frame.
Applies to:
Created:
2017-09-25
Updated:
2024-01-17

ID:
CVE-2011-4667
Title:
The encryption library in Cisco IOS Software 15.2(1)T, 15.2(1)T1, and 15.2(2)T, Cisco NX-OS in Cisco MDS 9222i Multiservice Modular Switch, Cisco MDS 9000 18/4-Port Multiservice Module, and Cisco MDS 9000 Storage Services Node module before 5.2(6),...
Type:
Hardware
Bulletins:
CVE-2011-4667
Severity:
Medium
Description:
The encryption library in Cisco IOS Software 15.2(1)T, 15.2(1)T1, and 15.2(2)T, Cisco NX-OS in Cisco MDS 9222i Multiservice Modular Switch, Cisco MDS 9000 18/4-Port Multiservice Module, and Cisco MDS 9000 Storage Services Node module before 5.2(6), and Cisco IOS in Cisco VPN Services Port Adaptor for Catalyst 6500 12.2(33)SXI, and 12.2(33)SXJ when IP Security (aka IPSec) is used, allows remote attackers to obtain unencrypted packets from encrypted sessions.
Applies to:
Created:
2017-09-25
Updated:
2024-01-17

ID:
CVE-2010-3050
Title:
Cisco IOS before 12.2(33)SXI allows remote authenticated users to cause a denial of service (device reboot).
Type:
Hardware
Bulletins:
CVE-2010-3050
Severity:
Medium
Description:
Cisco IOS before 12.2(33)SXI allows remote authenticated users to cause a denial of service (device reboot).
Applies to:
Created:
2017-09-25
Updated:
2024-01-17

ID:
CVE-2010-3049
Title:
Cisco IOS before 12.2(33)SXI allows local users to cause a denial of service (device reboot).
Type:
Hardware
Bulletins:
CVE-2010-3049
Severity:
Medium
Description:
Cisco IOS before 12.2(33)SXI allows local users to cause a denial of service (device reboot).
Applies to:
Created:
2017-09-25
Updated:
2024-01-17

ID:
CISEC:3008
Title:
Windows NetBIOS Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:3008
CVE-2017-0174
Severity:
Medium
Description:
Windows NetBIOS in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a denial of service vulnerability when it improperly handles NetBIOS packets, aka "Windows NetBIOS Denial of Service Vulnerability".
Applies to:
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3010
Title:
Vulnerability in the MySQL Server
Type:
Software
Bulletins:
CISEC:3010
CVE-2017-3653
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).
Applies to:
MySQL Server
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3047
Title:
Vulnerability in Oracle Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14
Type:
Software
Bulletins:
CISEC:3047
CVE-2017-10118
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Applies to:
JRockit
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3025
Title:
Use After Free vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3025
CVE-2017-11256
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability when generating content using XFA layout engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3037
Title:
Use After Free vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3037
CVE-2017-11254
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability in the Acrobat/Reader's JavaScript engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3026
Title:
Type Confusion vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3026
CVE-2017-11257
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable type confusion vulnerability in the XFA layout engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3000
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3000
CVE-2017-8657
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Applies to:
Microsoft Edge
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3001
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3001
CVE-2017-8671
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8672, and CVE-2017-8674.
Applies to:
Microsoft Edge
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3002
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3002
CVE-2017-8656
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Applies to:
Microsoft Edge
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3009
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3009
CVE-2017-8635
Severity:
High
Description:
Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that JavaScript engines render when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3013
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3013
CVE-2017-8674
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, and CVE-2017-8672.
Applies to:
Microsoft Edge
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3019
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3019
CVE-2017-8641
Severity:
High
Description:
Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Window Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3046
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3046
CVE-2017-8670
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Applies to:
Microsoft Edge
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3048
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3048
CVE-2017-8647
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, and CVE-2017-8672.
Applies to:
Microsoft Edge
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3018
Title:
Microsoft SQL Server Analysis Services Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3018
CVE-2017-8516
Severity:
Medium
Description:
Microsoft SQL Server Analysis Services in Microsoft SQL Server 2012, Microsoft SQL Server 2014, and Microsoft SQL Server 2016 allows an information disclosure vulnerability when it improperly enforces permissions, aka "Microsoft SQL Server Analysis Services Information Disclosure Vulnerability".
Applies to:
Microsoft SQL Server 2012
Microsoft SQL Server 2014
Microsoft SQL Server 2016
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3007
Title:
Microsoft JET Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3007
CVE-2017-0250
Severity:
High
Description:
Microsoft JET Database Engine in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a remote code execution vulnerability due to buffer overflow, aka "Microsoft JET Database Engine Remote Code Execution Vulnerability".
Applies to:
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3016
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3016
CVE-2017-8650
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to exploit a security feature bypass due to Microsoft Edge not properly enforcing same-origin policies, aka "Microsoft Edge Security Feature Bypass Vulnerability".
Applies to:
Microsoft Edge
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3011
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3011
CVE-2017-8661
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user due to the way affected Microsoft scripting engines render when handling objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability".
Applies to:
Microsoft Edge
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3012
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3012
CVE-2017-8652
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to disclose information due to the way that Microsoft Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8644 and CVE-2017-8662.
Applies to:
Microsoft Edge
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3014
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3014
CVE-2017-8644
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to disclose information due to the way that Microsoft Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8652 and CVE-2017-8662.
Applies to:
Microsoft Edge
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3015
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3015
CVE-2017-8662
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to elevate privileges due to the way that Microsoft Edge validates JavaScript under specific conditions, aka "Microsoft Edge Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8503.
Applies to:
Microsoft Edge
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3003
Title:
Microsoft Browser Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3003
CVE-2017-8669
Severity:
High
Description:
Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to Microsoft browsers improperly handling objects in memory while rendering content, aka "Microsoft Browser Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8653.
Applies to:
Internet Explorer 11
Microsoft Edge
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3004
Title:
Microsoft Browser Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3004
CVE-2017-8653
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, and Windows Server 2012 and R2 allow an attacker to execute arbitrary code in the context of the current user when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8519.
Applies to:
Internet Explorer 10
Internet Explorer 11
Internet Explorer 9
Microsoft Edge
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3020
Title:
Memory Corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3020
CVE-2017-11258
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) private data and the embedded GIF image. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3021
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3021
CVE-2017-11246
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when parsing JPEG data. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3022
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3022
CVE-2017-11249
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when parsing an invalid Enhanced Metafile Format (EMF) record. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3023
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3023
CVE-2017-11251
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the JPEG 2000 parsing module. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3024
Title:
Memory Corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3024
CVE-2017-11270
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) private data representing icons. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3027
Title:
Memory Corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3027
CVE-2017-11263
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the internal data structure manipulation related to document encoding. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3028
Title:
Memory Corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3028
CVE-2017-11271
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to transfer of pixel blocks. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3029
Title:
Memory Corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3029
CVE-2017-11268
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) private JPEG data. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3030
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3030
CVE-2017-11252
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the Adobe Graphics Manager (AGM) module. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3032
Title:
Memory Corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3032
CVE-2017-11267
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) private data interpreted as JPEG data. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3033
Title:
Memory Corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3033
CVE-2017-11260
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) private data interpreted as a GIF image. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3034
Title:
Memory Corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3034
CVE-2017-11255
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing TIFF color map data. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3035
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3035
CVE-2017-11245
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) private data. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3036
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3036
CVE-2017-11248
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to pixel block transfer. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3038
Title:
Memory Corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3038
CVE-2017-11269
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) image stream data. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3039
Title:
Memory Corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3039
CVE-2017-11259
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) private data. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3040
Title:
Memory Corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3040
CVE-2017-11262
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to drawing ASCII text string. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3042
Title:
Memory Corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3042
CVE-2017-11265
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the Adobe Graphics Manager module. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3043
Title:
Memory Corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3043
CVE-2017-11261
Severity:
High
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) private data and the embedded TIF image. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3044
Title:
Memory corruption vulnerability in Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier
Type:
Software
Bulletins:
CISEC:3044
CVE-2017-11244
Severity:
Medium
Description:
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to transformation of blocks of pixels. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3005
Title:
Internet Explorer Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3005
CVE-2017-8625
Severity:
Medium
Description:
Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to bypass Device Guard User Mode Code Integrity (UMCI) policies due to Internet Explorer failing to validate UMCI policies, aka "Internet Explorer Security Feature Bypass Vulnerability".
Applies to:
Internet Explorer 11
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3006
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3006
CVE-2017-8651
Severity:
High
Description:
Internet Explorer in Microsoft Windows Server 2008 SP2 and Windows Server 2012 allows an attacker to execute arbitrary code in the context of the current user due to Internet Explorer improperly accessing objects in memory, aka "Internet Explorer Memory Corruption Vulnerability".
Applies to:
Internet Explorer 10
Internet Explorer 9
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3052
Title:
IMAP dissector crash
Type:
Software
Bulletins:
CISEC:3052
CVE-2017-7703
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly.
Applies to:
Wireshark
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:3053
Title:
DOF dissector infinite loop
Type:
Software
Bulletins:
CISEC:3053
CVE-2017-7704
Severity:
High
Description:
In Wireshark 2.2.0 to 2.2.5, the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value.
Applies to:
Wireshark
Created:
2017-09-22
Updated:
2024-01-17

ID:
CISEC:2987
Title:
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2987
CVE-2017-8622
Severity:
High
Description:
Windows Subsystem for Linux in Windows 10 1703 allows an elevation of privilege vulnerability when it fails to properly handle handles NT pipes, aka "Windows Subsystem for Linux Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2988
Title:
Windows Subsystem for Linux Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2988
CVE-2017-8627
Severity:
Medium
Description:
Windows Subsystem for Linux in Windows 10 1703, allows a denial of service vulnerability due to the way it handles objects in memory, aka "Windows Subsystem for Linux Denial of Service Vulnerability".
Applies to:
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2959
Title:
Windows Search Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2959
CVE-2017-8620
Severity:
High
Description:
Windows Search Remote Code Execution Vulnerability - CVE-2017-8620 Windows Search in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability when it improperly handles objects in memory, aka "Windows Search Remote Code Execution Vulnerability".
Applies to:
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2968
Title:
Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2968
CVE-2017-8673
Severity:
Medium
Description:
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows 10 1703 allows an attacker to connect to a target system using RDP and send specially crafted requests, aka "Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability."
Applies to:
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2980
Title:
Windows PDF Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2980
CVE-2017-0293
Severity:
High
Description:
Microsoft Windows PDF Library in Windows Server 2008 R2 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a remote code execution vulnerability when it improperly handles objects in memory, aka "Windows PDF Remote Code Execution Vulnerability".
Applies to:
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2985
Title:
Windows IME Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2985
CVE-2017-8591
Severity:
High
Description:
Windows Input Method Editor (IME) in Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an remote code execution vulnerability when it fails to properly handle objects in memory, aka "Windows IME Remote Code Execution Vulnerability".
Applies to:
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2958
Title:
Windows Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2958
CVE-2017-8664
Severity:
High
Description:
Windows Hyper-V in Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability when it fails to properly validate input from a privileged user on a guest operating system, aka "Windows Hyper-V Remote Code Execution Vulnerability".
Applies to:
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2956
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2956
CVE-2017-8623
Severity:
Medium
Description:
Windows Hyper-V in Windows 10 1607, 1703, and Windows Server 2016 allows a denial of service vulnerability when it fails to properly validate input from a privileged user on a guest operating system, aka "Windows Hyper-V Denial of Service Vulnerability".
Applies to:
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2974
Title:
Windows Error Reporting Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2974
CVE-2017-8633
Severity:
High
Description:
Windows Error Reporting (WER) in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an elevation of privilege vulnerability, aka "Windows Error Reporting Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2986
Title:
Windows CLFS Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2986
CVE-2017-8624
Severity:
High
Description:
CLFS in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an elevation of privilege vulnerability due to the way it handles objects in memory, aka "Windows CLFS Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2957
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2957
CVE-2017-8666
Severity:
Low
Description:
Microsoft Win32k in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it fails to properly handle objects in memory, aka "Win32k Information Disclosure Vulnerability".
Applies to:
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2955
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2955
CVE-2017-8593
Severity:
Medium
Description:
Microsoft Win32k in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2983
Title:
Vulnerability in the MySQL Server
Type:
Software
Bulletins:
CISEC:2983
CVE-2017-3652
Severity:
Medium
Description:
Vulnerability in the MySQL Server. Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier, 5.7.18 and earlier.
Applies to:
MySQL Server
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2972
Title:
Volume Manager Extension Driver Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2972
CVE-2017-8668
Severity:
Low
Description:
The Volume Manager Extension Driver in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2 allows an attacker to run a specially crafted application and obtain kernel information, aka "Volume Manager Extension Driver Information Disclosure Vulnerability".
Applies to:
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2984
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2984
CVE-2017-8645
Severity:
High
Description:
Microsoft Edge in Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Applies to:
Microsoft Edge
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2989
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2989
CVE-2017-8646
Severity:
High
Description:
Microsoft Edge in Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Applies to:
Microsoft Edge
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2982
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2982
CVE-2017-8672
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, and CVE-2017-8674.
Applies to:
Microsoft Edge
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2960
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2960
CVE-2017-8518
Severity:
High
Description:
Microsoft Edge allows a remote code execution vulnerability due to the way it accesses objects in memory, aka "Scripting Engine Memory Corruption Vulnerability".
Applies to:
Microsoft Edge
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2961
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2961
CVE-2017-8639
Severity:
High
Description:
Microsoft Edge in Windows 10 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Applies to:
Microsoft Edge
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2962
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2962
CVE-2017-8637
Severity:
Low
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to bypass Arbitrary Code Guard (ACG) due to how Microsoft Edge accesses memory in code compiled by the Edge Just-In-Time (JIT) compiler, aka "Scripting Engine Security Feature Bypass Vulnerability".
Applies to:
Microsoft Edge
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2963
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2963
CVE-2017-8640
Severity:
High
Description:
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Applies to:
Microsoft Edge
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2964
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2964
CVE-2017-8634
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Applies to:
Microsoft Edge
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2975
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2975
CVE-2017-8636
Severity:
High
Description:
Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2978
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2978
CVE-2017-8638
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Applies to:
Microsoft Edge
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2979
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2979
CVE-2017-8655
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Applies to:
Microsoft Edge
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2981
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2981
CVE-2017-8659
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to obtain information to further compromise the user's system due to the Chakra scripting engine not properly handling objects in memory, aka "Scripting Engine Information Disclosure Vulnerability".
Applies to:
Microsoft Edge
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2971
Title:
Microsoft Office SharePoint XSS Vulnerability
Type:
Software
Bulletins:
CISEC:2971
CVE-2017-8654
Severity:
Low
Description:
Microsoft SharePoint Server 2010 Service Pack 2 allows a cross-site scripting (XSS) vulnerability when it does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft Office SharePoint XSS Vulnerability".
Applies to:
Microsoft Office SharePoint Server 2010
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2969
Title:
Microsoft Office Outlook Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2969
CVE-2017-8571
Severity:
Medium
Description:
Microsoft Outlook 2007 SP3, Outlook 2010 SP2, Outlook 2013 SP1, Outlook 2013 RT SP1, and Outlook 2016 as packaged in Microsoft Office allows a security feature bypass vulnerability due to the way that it handles input, aka "Microsoft Office Outlook Security Feature Bypass Vulnerability".
Applies to:
Microsoft Outlook 2007
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Outlook 2016
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2967
Title:
Microsoft Office Outlook Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2967
CVE-2017-8663
Severity:
High
Description:
Microsoft Outlook 2007 SP3, Outlook 2010 SP2, Outlook 2013 SP1, Outlook 2013 RT SP1, and Outlook 2016 as packaged in Microsoft Office allows a remote code execution vulnerability due to the way Microsoft Outlook parses specially crafted email messages, aka "Microsoft Office Outlook Memory Corruption Vulnerability"
Applies to:
Microsoft Outlook 2007
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Outlook 2016
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2973
Title:
Microsoft Office Outlook Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2973
CVE-2017-8572
Severity:
Medium
Description:
Microsoft Outlook 2007 SP3, Outlook 2010 SP2, Outlook 2013 SP1, Outlook 2013 RT SP1, and Outlook 2016 as packaged in Microsoft Office allows an information disclosure vulnerability due to the way that it discloses the contents of its memory, aka "Microsoft Office Outlook Information Disclosure Vulnerability".
Applies to:
Microsoft Outlook 2007
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Outlook 2016
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2976
Title:
Microsoft Edge Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2976
CVE-2017-8642
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to elevate privileges due to the way that Microsoft Edge validates JavaScript under specific conditions, aka "Microsoft Edge Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8503.
Applies to:
Microsoft Edge
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2977
Title:
Microsoft Edge Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2977
CVE-2017-8503
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to escape from the AppContainer sandbox, aka "Microsoft Edge Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8642.
Applies to:
Microsoft Edge
Created:
2017-09-15
Updated:
2024-01-17

ID:
CVE-2015-1527
Title:
Integer overflow in IAudioPolicyService.cpp in Android allows local users to gain privileges via a crafted application, aka Android Bug ID 19261727.
Type:
Mobile Devices
Bulletins:
CVE-2015-1527
SFBID76665
Severity:
Medium
Description:
Integer overflow in IAudioPolicyService.cpp in Android allows local users to gain privileges via a crafted application, aka Android Bug ID 19261727.
Applies to:
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2970
Title:
Express Compressed Fonts Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2970
CVE-2017-8691
Severity:
High
Description:
Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow an attacker to execute code remotely on a target system when the Windows font library fails to properly handle specially crafted embedded fonts, aka "Express Compressed Fonts Remote Code Execution Vulnerability."
Applies to:
Created:
2017-09-15
Updated:
2024-01-17

ID:
CISEC:2923
Title:
Vulnerability in MySQL Server 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2923
CVE-2017-3638
Severity:
Medium
Description:
Vulnerability in MySQL Server 5.7.18 and earlier.
Applies to:
MySQL Server 5.7
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2924
Title:
Vulnerability in MySQL Server 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2924
CVE-2017-3637
Severity:
Low
Description:
Vulnerability in MySQL Server 5.7.18 and earlier.
Applies to:
MySQL Server 5.7
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2926
Title:
Vulnerability in MySQL Server 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2926
CVE-2017-3529
Severity:
Low
Description:
Vulnerability in MySQL Server 5.7.18 and earlier.
Applies to:
MySQL Server 5.7
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2927
Title:
Vulnerability in MySQL Server 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2927
CVE-2017-3640
Severity:
Medium
Description:
Vulnerability in MySQL Server 5.7.18 and earlier.
Applies to:
MySQL Server 5.7
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2932
Title:
Vulnerability in MySQL Server 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2932
CVE-2017-3639
Severity:
Medium
Description:
Vulnerability in MySQL Server 5.7.18 and earlier.
Applies to:
MySQL Server 5.7
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2925
Title:
Vulnerability in MySQL Server 5.6.36 and earlier, 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2925
CVE-2017-3633
Severity:
Medium
Description:
Vulnerability in MySQL Server 5.6.36 and earlier, 5.7.18 and earlier.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2928
Title:
Vulnerability in MySQL Server 5.6.36 and earlier, 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2928
CVE-2017-3634
Severity:
Medium
Description:
Vulnerability in MySQL Server 5.6.36 and earlier, 5.7.18 and earlier.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2929
Title:
Vulnerability in MySQL Server 5.5.56 and earlier, 5.6.36 and earlier, 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2929
CVE-2017-3635
Severity:
Low
Description:
Vulnerability in MySQL Server 5.5.56 and earlier, 5.6.36 and earlier, 5.7.18 and earlier.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2931
Title:
Vulnerability in MySQL Server 5.5.56 and earlier, 5.6.36 and earlier
Type:
Software
Bulletins:
CISEC:2931
CVE-2017-3636
Severity:
Medium
Description:
Vulnerability in MySQL Server 5.5.56 and earlier, 5.6.36 and earlier.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2930
Title:
Vulnerability in MySQL Cluster 7.3.5 and earlier
Type:
Software
Bulletins:
CISEC:2930
CVE-2014-1912
Severity:
High
Description:
Vulnerability in MySQL Cluster 7.3.5 and earlier.
Applies to:
MySQL Cluster 7.3
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2938
Title:
Vulnerability in Java SE: 8u131; Java SE Embedded: 8u131
Type:
Software
Bulletins:
CISEC:2938
CVE-2017-10111
Severity:
Medium
Description:
Vulnerability in Java SE: 8u131; Java SE Embedded: 8u131
Applies to:
Java Development Kit 1.8
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2935
Title:
Vulnerability in Java SE: 7u141, 8u131
Type:
Software
Bulletins:
CISEC:2935
CVE-2017-10114
Severity:
Medium
Description:
Vulnerability in Java SE: 7u141, 8u131
Applies to:
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2933
Title:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14
Type:
Software
Bulletins:
CISEC:2933
CVE-2017-10108
Severity:
Medium
Description:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14
Applies to:
JRockit R28
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2934
Title:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14
Type:
Software
Bulletins:
CISEC:2934
CVE-2017-10115
Severity:
Medium
Description:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14
Applies to:
JRockit R28
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2936
Title:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14
Type:
Software
Bulletins:
CISEC:2936
CVE-2017-10109
Severity:
Medium
Description:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14
Applies to:
JRockit R28
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2937
Title:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131
Type:
Software
Bulletins:
CISEC:2937
CVE-2017-10101
Severity:
Medium
Description:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2940
Title:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131
Type:
Software
Bulletins:
CISEC:2940
CVE-2017-10107
Severity:
Medium
Description:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2941
Title:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131
Type:
Software
Bulletins:
CISEC:2941
CVE-2017-10102
Severity:
Medium
Description:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2939
Title:
Vulnerability in Java SE: 6u151, 7u141, 8u131
Type:
Software
Bulletins:
CISEC:2939
CVE-2017-10110
Severity:
Medium
Description:
Vulnerability in Java SE: 6u151, 7u141, 8u131
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2942
Title:
Vulnerability in Java SE: 6u151, 7u141, 8u131
Type:
Software
Bulletins:
CISEC:2942
CVE-2017-10105
Severity:
Medium
Description:
Vulnerability in Java SE: 6u151, 7u141, 8u131
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2843
Title:
Unspecified vulnerability in Oracle Java SE 8u131
Type:
Software
Bulletins:
CISEC:2843
CVE-2017-10078
Severity:
Medium
Description:
Unspecified vulnerability in Oracle Java SE 8u131.
Applies to:
Java Development Kit 1.8
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2847
Title:
Unspecified vulnerability in Oracle Java SE 7u141, and 8u131; Java SE Embedded 8u131
Type:
Software
Bulletins:
CISEC:2847
CVE-2017-10090
Severity:
Medium
Description:
Unspecified vulnerability in Oracle Java SE 7u141, and 8u131; Java SE Embedded 8u131.
Applies to:
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2838
Title:
Unspecified vulnerability in Oracle Java SE 7u141, and 8u131
Type:
Software
Bulletins:
CISEC:2838
CVE-2017-10086
Severity:
Medium
Description:
Unspecified vulnerability in Oracle Java SE 7u141, and 8u131.
Applies to:
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2839
Title:
Unspecified vulnerability in Oracle Java SE 6u151, 7u141, and 8u131; Java SE Embedded 8u131; and JRockit R28.3.14
Type:
Software
Bulletins:
CISEC:2839
CVE-2017-10053
Severity:
Medium
Description:
Unspecified vulnerability in Oracle Java SE 6u151, 7u141, and 8u131; Java SE Embedded 8u131; and JRockit R28.3.14.
Applies to:
JRockit
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2841
Title:
Unspecified vulnerability in Oracle Java SE 6u151, 7u141, and 8u131; Java SE Embedded 8u131
Type:
Software
Bulletins:
CISEC:2841
CVE-2017-10096
Severity:
Medium
Description:
Unspecified vulnerability in Oracle Java SE 6u151, 7u141, and 8u131; Java SE Embedded 8u131.
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2842
Title:
Unspecified vulnerability in Oracle Java SE 6u151, 7u141, and 8u131; Java SE Embedded 8u131
Type:
Software
Bulletins:
CISEC:2842
CVE-2017-10081
Severity:
Medium
Description:
Unspecified vulnerability in Oracle Java SE 6u151, 7u141, and 8u131; Java SE Embedded 8u131.
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2845
Title:
Unspecified vulnerability in Oracle Java SE 6u151, 7u141, and 8u131; Java SE Embedded 8u131
Type:
Software
Bulletins:
CISEC:2845
CVE-2017-10087
Severity:
Medium
Description:
Unspecified vulnerability in Oracle Java SE 6u151, 7u141, and 8u131; Java SE Embedded 8u131.
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2846
Title:
Unspecified vulnerability in Oracle Java SE 6u151, 7u141, and 8u131; Java SE Embedded 8u131
Type:
Software
Bulletins:
CISEC:2846
CVE-2017-10074
Severity:
Medium
Description:
Unspecified vulnerability in Oracle Java SE 6u151, 7u141, and 8u131; Java SE Embedded 8u131.
Applies to:
JRockit
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2840
Title:
Unspecified vulnerability in Oracle Java SE 6u151, 7u141, and 8u131
Type:
Software
Bulletins:
CISEC:2840
CVE-2017-10089
Severity:
Medium
Description:
Unspecified vulnerability in Oracle Java SE 6u151, 7u141, and 8u131.
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2844
Title:
Unspecified vulnerability in Oracle Java SE 6u151, 7u141, and 8u131
Type:
Software
Bulletins:
CISEC:2844
CVE-2017-10067
Severity:
Medium
Description:
Unspecified vulnerability in Oracle Java SE 6u151, 7u141, and 8u131.
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-08
Updated:
2024-01-17

ID:
CISEC:2867
Title:
WBXML dissector infinite loop
Type:
Software
Bulletins:
CISEC:2867
CVE-2017-7702
Severity:
High
Description:
In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation.
Applies to:
Wireshark
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2850
Title:
Vulnerability in the MySQL Server
Type:
Software
Bulletins:
CISEC:2850
CVE-2017-3651
Severity:
Medium
Description:
Vulnerability in the MySQL Server. Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier, 5.7.18 and earlier.
Applies to:
MySQL Server
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2853
Title:
Vulnerability in Oracle MySQL 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2853
CVE-2017-3645
Severity:
Medium
Description:
Vulnerability in Oracle MySQL 5.7.18 and earlier
Applies to:
MySQL Server 5.7
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2857
Title:
Vulnerability in Oracle MySQL 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2857
CVE-2017-3650
Severity:
Medium
Description:
Vulnerability in Oracle MySQL 5.7.18 and earlier
Applies to:
MySQL Server 5.7
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2859
Title:
Vulnerability in Oracle MySQL 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2859
CVE-2017-3643
Severity:
Medium
Description:
Vulnerability in Oracle MySQL 5.7.18 and earlier
Applies to:
MySQL Server 5.7
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2861
Title:
Vulnerability in Oracle MySQL 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2861
CVE-2017-3642
Severity:
Medium
Description:
Vulnerability in Oracle MySQL 5.7.18 and earlier
Applies to:
MySQL Server 5.7
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2862
Title:
Vulnerability in Oracle MySQL 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2862
CVE-2017-3644
Severity:
Medium
Description:
Vulnerability in Oracle MySQL 5.7.18 and earlier
Applies to:
MySQL Server 5.7
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2858
Title:
Vulnerability in Oracle MySQL 5.7.16 and earlier
Type:
Software
Bulletins:
CISEC:2858
CVE-2017-3646
Severity:
Medium
Description:
Vulnerability in Oracle MySQL 5.7.16 and earlier
Applies to:
MySQL Server 5.7
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2854
Title:
Vulnerability in Oracle MySQL 5.6.36 and earlier, 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2854
CVE-2017-3647
Severity:
Medium
Description:
Vulnerability in Oracle MySQL 5.6.36 and earlier, 5.7.18 and earlier
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2860
Title:
Vulnerability in Oracle MySQL 5.6.36 and earlier, 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2860
CVE-2017-3649
Severity:
Medium
Description:
Vulnerability in Oracle MySQL 5.6.36 and earlier, 5.7.18 and earlier
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2855
Title:
Vulnerability in Oracle MySQL 5.5.56 and earlier, 5.6.36 and earlier, 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2855
CVE-2017-3648
Severity:
Medium
Description:
Vulnerability in Oracle MySQL 5.5.56 and earlier, 5.6.36 and earlier, 5.7.18 and earlier
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2856
Title:
Vulnerability in Oracle MySQL 5.5.56 and earlier, 5.6.36 and earlier, 5.7.18 and earlier
Type:
Software
Bulletins:
CISEC:2856
CVE-2017-3641
Severity:
Medium
Description:
Vulnerability in Oracle MySQL 5.5.56 and earlier, 5.6.36 and earlier, 5.7.18 and earlier
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2852
Title:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14
Type:
Software
Bulletins:
CISEC:2852
CVE-2017-10116
Severity:
Medium
Description:
Vulnerability in Java SE: 6u151, 7u141, 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14 - CVE-2017-10116
Applies to:
JRockit
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2848
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2848
CVE-2017-8618
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 Internet Explorer in the way affected Microsoft scripting engines render when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-8596, CVE-2017-8610, CVE-2017-8601, CVE-2017-8603, CVE-2017-8604, CVE-2017-8605, CVE-2017-8606, CVE-2017-8607, CVE-2017-8608, CVE-2017-8619, CVE-2017-9598 and CVE-2017-8609.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2849
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2849
CVE-2017-8619
Severity:
High
Description:
Microsoft Edge on Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability in the way affected Microsoft scripting engines render when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-8596, CVE-2017-8610, CVE-2017-8601, CVE-2017-8603, CVE-2017-8604, CVE-2017-8605, CVE-2017-8606, CVE-2017-8607, CVE-2017-8608, CVE-2017-8618, CVE-2017-9598 and CVE-2017-8609.
Applies to:
Microsoft Edge
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2864
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2864
CVE-2017-8608
Severity:
High
Description:
Microsoft browsers in Microsoft Windows Server 2008 and R2, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engines fail to render when handling objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8598, CVE-2017-8596, CVE-2017-8610, CVE-2017-8601, CVE-2017-8618, CVE-2017-8619, CVE-2017-8603, CVE-2017-8604, CVE-2017-8605, CVE-2017-8595, CVE-2017-8606, CVE-2017-8607, and CVE-2017-8609.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2865
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2865
CVE-2017-8609
Severity:
High
Description:
Microsoft Internet Explorer in Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engine fails to render when handling objects in memory in Microsoft Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8596, CVE-2017-8610, CVE-2017-8618, CVE-2017-8619, CVE-2017-8595, CVE-2017-8601, CVE-2017-8603, CVE-2017-8604, CVE-2017-8605, CVE-2017-8606, CVE-2017-8607, CVE-2017-8608, and CVE-2017-8609.
Applies to:
Microsoft Edge
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2866
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2866
CVE-2017-8610
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user when the JavaScript engine fails to render when handling objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8598, CVE-2017-8596, CVE-2017-8595, CVE-2017-8618, CVE-2017-8619, CVE-2017-8601, CVE-2017-8603, CVE-2017-8604, CVE-2017-8605, CVE-2017-8606, CVE-2017-8607, CVE-2017-8608, and CVE-2017-8609.
Applies to:
Microsoft Edge
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2863
Title:
NetScaler file parser infinite loop
Type:
Software
Bulletins:
CISEC:2863
CVE-2017-7700
Severity:
High
Description:
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size.
Applies to:
Wireshark
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2851
Title:
Microsoft Browser Security Feature Bypass
Type:
Software
Bulletins:
CISEC:2851
CVE-2017-8592
Severity:
Medium
Description:
Microsoft browsers on when Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1, Windows RT 8.1, and Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow a security feature bypass vulnerability when they improperly handle redirect requests, aka "Microsoft Browser Security Feature Bypass".
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-09-01
Updated:
2024-01-17

ID:
CISEC:2816
Title:
Windows PowerShell Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2816
CVE-2017-8565
Severity:
High
Description:
Windows PowerShell in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a remote code execution vulnerability when PSObject wraps a CIM Instance, aka "Windows PowerShell Remote Code Execution Vulnerability".
Applies to:
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2802
Title:
Windows IME Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2802
CVE-2017-8566
Severity:
Medium
Description:
Microsoft Windows 1607, 1703, and Windows Server 2016 allows an elevation of privilege vulnerability due to Windows Input Method Editor (IME) improperly handling parameters in a method of a DCOM class, aka "Windows IME Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2795
Title:
Windows Explorer Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2795
CVE-2017-8463
Severity:
High
Description:
Windows Shell in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a remote code execution vulnerability due to the way it improperly handles executable files and shares during rename operations, aka "Windows Explorer Remote Code Execution Vulnerability".
Applies to:
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2796
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2796
CVE-2017-8563
Severity:
Medium
Description:
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an elevation of privilege vulnerability due to Kerberos falling back to NT LAN Manager (NTLM) Authentication Protocol as the default authentication protocol, aka "Windows Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2803
Title:
Windows CLFS Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2803
CVE-2017-8590
Severity:
Medium
Description:
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an elevation of privilege vulnerability due to the way that the Windows Common Log File System (CLFS) driver handles objects in memory, aka "Windows CLFS Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2799
Title:
Windows ALPC Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2799
CVE-2017-8562
Severity:
Medium
Description:
Microsoft Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability due to Windows improperly handling calls to Advanced Local Procedure Call (ALPC), aka "Windows ALPC Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2827
Title:
Use after free in Blink
Type:
Web
Bulletins:
CISEC:2827
CVE-2017-5064
Severity:
Medium
Description:
Use after free in Blink.
Applies to:
Google Chrome
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2798
Title:
SharePoint Server XSS Vulnerability
Type:
Software
Bulletins:
CISEC:2798
CVE-2017-8569
Severity:
Medium
Description:
Microsoft SharePoint Server allows an elevation of privilege vulnerability due to the way that it sanitizes a specially crafted web request to an affected SharePoint server, aka "SharePoint Server XSS Vulnerability".
Applies to:
Microsoft Sharepoint Server 2016
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2837
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2837
CVE-2017-8607
Severity:
High
Description:
Microsoft browsers in Microsoft Windows 7, Windows Server 2008 and R2, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engines fail to render when handling objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8598, CVE-2017-8596, CVE-2017-8618, CVE-2017-8619, CVE-2017-8610, CVE-2017-8601, CVE-2017-8603, CVE-2017-8604, CVE-2017-8605, CVE-2017-8595, CVE-2017-8606, CVE-2017-8608, and CVE-2017-8609.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2805
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2805
CVE-2017-8598
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engine fails to render when handling objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8596, CVE-2017-8610, CVE-2017-8618, CVE-2017-8619, CVE-2017-8595, CVE-2017-8601, CVE-2017-8603, CVE-2017-8604, CVE-2017-8605, CVE-2017-8606, CVE-2017-8607, CVE-2017-8608, and CVE-2017-8609.
Applies to:
Microsoft Edge
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2806
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2806
CVE-2017-8606
Severity:
High
Description:
Microsoft browsers in Microsoft Windows 7, Windows Server 2008 and R2, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engines fail to render when handling objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8598, CVE-2017-8596, CVE-2017-8618, CVE-2017-8619, CVE-2017-8610, CVE-2017-8601, CVE-2017-8603, CVE-2017-8604, CVE-2017-8605, CVE-2017-8595, CVE-2017-8607, CVE-2017-8608, and CVE-2017-8609.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2817
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2817
CVE-2017-8601
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engine fails to render when handling objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8596, CVE-2017-8610, CVE-2017-8618, CVE-2017-8619, CVE-2017-8595, CVE-2017-8601, CVE-2017-8603, CVE-2017-8604, CVE-2017-8605, CVE-2017-8606, CVE-2017-8607, CVE-2017-8608, and CVE-2017-8609.
Applies to:
Microsoft Edge
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2818
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2818
CVE-2017-8604
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engine fails to render when handling objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8596, CVE-2017-8618, CVE-2017-8619, CVE-2017-8601, CVE-2017-8610, CVE-2017-8603, CVE-2017-8598, CVE-2017-8601, CVE-2017-8605, CVE-2017-8606, CVE-2017-8607, CVE-2017-8608, and CVE-2017-8609.
Applies to:
Microsoft Edge
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2819
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2819
CVE-2017-8603
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engine fails to render when handling objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8596, CVE-2017-8610, CVE-2017-8598, CVE-2017-8618, CVE-2017-8619, CVE-2017-8595, CVE-2017-8601, CVE-2017-8604, CVE-2017-8605, CVE-2017-8606, CVE-2017-8607, CVE-2017-8608, and CVE-2017-8609.
Applies to:
Microsoft Edge
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2820
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2820
CVE-2017-8605
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engine fails to render when handling objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8596, CVE-2017-8601, CVE-2017-8618, CVE-2017-8619, CVE-2017-8610, CVE-2017-8601, CVE-2017-8603, CVE-2017-8604, CVE-2017-8598, CVE-2017-8606, CVE-2017-8607, CVE-2017-8608, and CVE-2017-8609.
Applies to:
Microsoft Edge
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2801
Title:
Microsoft Malware Protection Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2801
CVE-2017-8558
Severity:
High
Description:
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on 32-bit versions of Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703 does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability".
Applies to:
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2813
Title:
Local Information Disclosure Vulnerability in ImageMagick before 7.0.5-2
Type:
Software
Bulletins:
CISEC:2813
CVE-2017-9098
Severity:
Medium
Description:
ImageMagick before 7.0.5-2 and GraphicsMagick before 1.3.24 use uninitialized memory in the RLE decoder, allowing an attacker to leak sensitive information from process memory space, as demonstrated by remote attacks against ImageMagick code in a long-running server process that converts image data on behalf of multiple users. This is caused by a missing initialization step in the ReadRLEImage function in coders/rle.c.
Applies to:
ImageMagick
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2809
Title:
Local Denial of Service Vulnerability in ImageMagick 7.0.5-7
Type:
Software
Bulletins:
CISEC:2809
CVE-2017-9142
Severity:
Medium
Description:
In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the WriteBlob function in MagickCore/blob.c because of missing checks in the ReadOneJNGImage function in coders/png.c.
Applies to:
ImageMagick
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2825
Title:
Incorrect UI in Blink
Type:
Web
Bulletins:
CISEC:2825
CVE-2017-5065
Severity:
Medium
Description:
Incorrect UI in Blink.
Applies to:
Google Chrome
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2824
Title:
Incorrect signature handing in Networking
Type:
Web
Bulletins:
CISEC:2824
CVE-2017-5066
Severity:
Medium
Description:
Incorrect signature handing in Networking.
Applies to:
Google Chrome
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2797
Title:
Https.sys Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2797
CVE-2017-8582
Severity:
Medium
Description:
HTTP.sys in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when the component improperly handles objects in memory, aka "Https.sys Information Disclosure Vulnerability".
Applies to:
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2804
Title:
HoloLens Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2804
CVE-2017-8584
Severity:
High
Description:
Windows 10 1607 and Windows Server 2016 allow an attacker to execute code remotely via a specially crafted WiFi packet aka "HoloLens Remote Code Execution Vulnerability."
Applies to:
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2828
Title:
Heap overflow in Skia
Type:
Web
Bulletins:
CISEC:2828
CVE-2017-5063
Severity:
Medium
Description:
Heap overflow in Skia.
Applies to:
Google Chrome
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2800
Title:
DirectX Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2800
CVE-2017-8579
Severity:
Medium
Description:
The DirectX component in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to run arbitrary code in kernel mode via a specially crafted application, aka "DirectX Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2812
Title:
Denial of Service Vulnerability in ImageMagick 7.0.5-7
Type:
Software
Bulletins:
CISEC:2812
CVE-2017-9141
Severity:
Medium
Description:
In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c.
Applies to:
ImageMagick
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2808
Title:
Denial of Service Vulnerability in ImageMagick 7.0.5-6
Type:
Software
Bulletins:
CISEC:2808
CVE-2017-9261
Severity:
Medium
Description:
In ImageMagick 7.0.5-6 Q16, the ReadMNGImage function in coders/png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2811
Title:
Denial of Service Vulnerability in ImageMagick 7.0.5-6
Type:
Software
Bulletins:
CISEC:2811
CVE-2017-9262
Severity:
Medium
Description:
In ImageMagick 7.0.5-6 Q16, the ReadJNGImage function in coders/png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2815
Title:
Denial of Service Vulnerability in ImageMagick 7.0.5-6
Type:
Software
Bulletins:
CISEC:2815
CVE-2017-8830
Severity:
Medium
Description:
In ImageMagick 7.0.5-6, the ReadBMPImage function in bmp.c:1379 allows attackers to cause a denial of service (memory leak) via a crafted file.
Applies to:
ImageMagick
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2807
Title:
Denial of Service Vulnerability in ImageMagick 7.0.5-5
Type:
Software
Bulletins:
CISEC:2807
CVE-2017-9143
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file.
Applies to:
ImageMagick
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2810
Title:
Denial of Service Vulnerability in ImageMagick 7.0.5-5
Type:
Software
Bulletins:
CISEC:2810
CVE-2017-8765
Severity:
High
Description:
The function named ReadICONImage in coders\icon.c in ImageMagick 7.0.5-5 has a memory leak vulnerability which can cause memory exhaustion via a crafted ICON file.
Applies to:
ImageMagick
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2814
Title:
Denial of Service Vulnerability in ImageMagick 7.0.5-5
Type:
Software
Bulletins:
CISEC:2814
CVE-2017-9144
Severity:
Medium
Description:
In ImageMagick 7.0.5-5, a crafted RLE image can trigger a crash because of incorrect EOF handling in coders/rle.c.
Applies to:
ImageMagick
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2826
Title:
Cross-origin bypass in Blink
Type:
Web
Bulletins:
CISEC:2826
CVE-2017-5069
Severity:
Medium
Description:
Cross-origin bypass in Blink.
Applies to:
Google Chrome
Created:
2017-08-25
Updated:
2024-01-17

ID:
CISEC:2781
Title:
WordPad Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2781
CVE-2017-8588
Severity:
High
Description:
Microsoft WordPad in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a remote code execution vulnerability due to the way it parses specially crafted files, aka "WordPad Remote Code Execution Vulnerability".
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2757
Title:
Windows System Information Console Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2757
CVE-2017-8557
Severity:
Low
Description:
Windows System Information Console in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a information disclosure vulnerability improperly parses XML input containing a reference to an external entity, aka "Windows System Information Console Information Disclosure Vulnerability".
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2782
Title:
Windows Search Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2782
CVE-2017-8589
Severity:
High
Description:
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a remote code execution vulnerability due to the way that Windows Search handles objects in memory, aka "Windows Search Remote Code Execution Vulnerability".
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2756
Title:
Windows Performance Monitor Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2756
CVE-2017-0170
Severity:
Medium
Description:
Windows Performance Monitor in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a information disclosure vulnerability due to the way it parses XML input, aka "Windows Performance Monitor Information Disclosure Vulnerability".
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2751
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2751
CVE-2017-8564
Severity:
Low
Description:
Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it fails to properly initialize a memory address, aka "Windows Kernel Information Disclosure Vulnerability".
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2749
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2749
CVE-2017-8561
Severity:
Medium
Description:
Windows kernel in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability due to the way it handles objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2742
Title:
Windows Explorer Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2742
CVE-2017-8587
Severity:
Medium
Description:
Windows Explorer in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511 allows a denial of service vulnerability when it attempts to open a non-existent file, aka "Windows Explorer Denial of Service Vulnerability".
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2745
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2745
CVE-2017-8486
Severity:
Low
Description:
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an information disclosure due to the way it handles objects in memory, aka "Win32k Information Disclosure Vulnerability".
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2747
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2747
CVE-2017-8554
Severity:
Low
Description:
The kernel in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an authenticated attacker to obtain memory contents via a specially crafted application.
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2743
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2743
CVE-2017-8581
Severity:
Low
Description:
Win32k in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8578, CVE-2017-8580, CVE-2017-8577, and CVE-2017-8467.
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2744
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2744
CVE-2017-8580
Severity:
Medium
Description:
Win32k in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8577, CVE-2017-8578, CVE-2017-8581, and CVE-2017-8467.
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2746
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2746
CVE-2017-8577
Severity:
Medium
Description:
Win32k in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8578, CVE-2017-8580, CVE-2017-8581, and CVE-2017-8467.
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2748
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2748
CVE-2017-8578
Severity:
High
Description:
Win32k in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8577, CVE-2017-8580, CVE-2017-8581, and CVE-2017-8467.
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2750
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2750
CVE-2017-8467
Severity:
Medium
Description:
Graphics in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an elevation of privilege vulnerability due to the way it handles objects in memory, aka "Win32k Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2775
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2775
CVE-2017-8595
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engine fails to render when handling objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8596, CVE-2017-8601,CVE-2017-8618, CVE-2017-8619, CVE-2017-8610, CVE-2017-8601, CVE-2017-8603, CVE-2017-8604, CVE-2017-8605, CVE-2017-8606, CVE-2017-8607, CVE-2017-8608, and CVE-2017-8609.
Applies to:
Microsoft Edge
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2779
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2779
CVE-2017-8596
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1607, and 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engine fails to render when handling objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8598, CVE-2017-8610, CVE-2017-8595, CVE-2017-8601, CVE-2017-8603, CVE-2017-8604, CVE-2017-8605, CVE-2017-8606, CVE-2017-8607, CVE-2017-8608, and CVE-2017-8609.
Applies to:
Microsoft Edge
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2729
Title:
Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2729
CVE-2017-8510
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Office when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8509, CVE-2017-8511, CVE-2017-8512, CVE-2017-0260, and CVE-2017-8506.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2730
Title:
Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2730
CVE-2017-8506
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Office when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8509, CVE-2017-8510, CVE-2017-8511, CVE-2017-8512, and CVE-2017-0260.
Applies to:
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2731
Title:
Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2731
CVE-2017-8507
Severity:
High
Description:
A remote code execution vulnerability exists in the way Microsoft Office software parses specially crafted email messages, aka "Microsoft Office Memory Corruption Vulnerability".
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2732
Title:
Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2732
CVE-2017-8508
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Microsoft Office software when it improperly handles the parsing of file formats, aka "Microsoft Office Security Feature Bypass Vulnerability".
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2738
Title:
Microsoft Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2738
CVE-2017-8570
Severity:
High
Description:
Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0243.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2739
Title:
Microsoft Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2739
CVE-2017-0243
Severity:
High
Description:
Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8570.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2740
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2740
CVE-2017-8501
Severity:
High
Description:
Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8502.
Applies to:
Microsoft Excel 2007
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel Viewer
Microsoft Office Compatibility Pack
Microsoft Office Online Server 2016
Microsoft SharePoint Server 2010
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2741
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2741
CVE-2017-8502
Severity:
High
Description:
Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8501.
Applies to:
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2761
Title:
Microsoft Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2761
CVE-2017-8575
Severity:
Low
Description:
The kernel in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application, aka "Microsoft Graphics Component Information Disclosure Vulnerability."
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2758
Title:
Microsoft Graphics Component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2758
CVE-2017-8574
Severity:
Medium
Description:
Graphics in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Microsoft Graphics Component Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8573 and CVE-2017-8556.
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2759
Title:
Microsoft Graphics Component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2759
CVE-2017-8573
Severity:
Medium
Description:
Graphics in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Microsoft Graphics Component Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8574 and CVE-2017-8556.
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2760
Title:
Microsoft Graphics Component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2760
CVE-2017-8556
Severity:
Medium
Description:
Graphics in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Microsoft Graphics Component Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8573 and CVE-2017-8574.
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2762
Title:
Microsoft Graphics Component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2762
CVE-2017-8576
Severity:
Medium
Description:
The graphics component in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to run arbitrary code in kernel mode via a specially crafted application, aka "Microsoft Graphics Component Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2733
Title:
Microsoft Exchange Open Redirect Vulnerability
Type:
Software
Bulletins:
CISEC:2733
CVE-2017-8621
Severity:
Medium
Description:
Microsoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5 allows an open redirect vulnerability that could lead to spoofing, aka "Microsoft Exchange Open Redirect Vulnerability".
Applies to:
Microsoft Exchange 2010
Microsoft Exchange 2013
Microsoft Exchange 2016
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2734
Title:
Microsoft Exchange Cross-Site Scripting Vulnerability
Type:
Software
Bulletins:
CISEC:2734
CVE-2017-8559
Severity:
Medium
Description:
Microsoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5 allows an elevation of privilege vulnerability due to the way that Exchange Outlook Web Access (OWA) handles web requests, aka "Microsoft Exchange Cross-Site Scripting Vulnerability". This CVE ID is unique from CVE-2017-8560.
Applies to:
Microsoft Exchange 2013
Microsoft Exchange 2016
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2736
Title:
Microsoft Exchange Cross-Site Scripting Vulnerability
Type:
Software
Bulletins:
CISEC:2736
CVE-2017-8560
Severity:
Medium
Description:
Microsoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5 allows an elevation of privilege vulnerability due to the way that Exchange Outlook Web Access (OWA) handles web requests, aka "Microsoft Exchange Cross-Site Scripting Vulnerability". This CVE ID is unique from CVE-2017-8559.
Applies to:
Microsoft Exchange 2013
Microsoft Exchange 2016
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2776
Title:
Microsoft Edge Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:2776
CVE-2017-8611
Severity:
Medium
Description:
Microsoft Edge on Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows remote attackers to spoof web content via a crafted web site, aka "Microsoft Edge Spoofing Vulnerability."
Applies to:
Microsoft Edge
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2777
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2777
CVE-2017-8599
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to trick a user into loading a page with malicious content when the Edge Content Security Policy (CSP) fails to properly validate certain specially crafted documents, aka "Microsoft Edge Security Feature Bypass Vulnerability".
Applies to:
Microsoft Edge
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2778
Title:
Microsoft Edge Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2778
CVE-2017-8617
Severity:
High
Description:
Microsoft Edge in Windows 10 1703 Microsoft Edge allows a remote code execution vulnerability in the way affected Microsoft scripting engines render when handling objects in memory, aka "Microsoft Edge Remote Code Execution Vulnerability."
Applies to:
Microsoft Edge
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2752
Title:
Microsoft Browser Security Feature Bypass
Type:
Software
Bulletins:
CISEC:2752
CVE-2017-8602
Severity:
Medium
Description:
Microsoft browsers on Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow a spoofing vulnerability in the way they parse HTTP content, aka "Microsoft Browser Spoofing Vulnerability."
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2755
Title:
Kerberos SNAME Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2755
CVE-2017-8495
Severity:
Medium
Description:
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to bypass Extended Protection for Authentication when Kerberos fails to prevent tampering with the SNAME field during ticket exchange, aka "Kerberos SNAME Security Feature Bypass Vulnerability" or Orpheus' Lyre.
Applies to:
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2780
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2780
CVE-2017-8594
Severity:
High
Description:
Internet Explorer on Microsoft Windows 8.1 and Windows RT 8.1, and Windows Server 2012 R2 allows an attacker to execute arbitrary code in the context of the current user when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability".
Applies to:
Microsoft Internet Explorer 11
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2763
Title:
In Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference
Type:
Software
Bulletins:
CISEC:2763
CVE-2017-9347
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID.
Applies to:
Wireshark
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2772
Title:
In Wireshark 2.2.0 to 2.2.6, the IPv6 dissector could crash
Type:
Software
Bulletins:
CISEC:2772
CVE-2017-9353
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.6, the IPv6 dissector could crash. This was addressed in epan/dissectors/packet-ipv6.c by validating an IPv6 address.
Applies to:
Wireshark
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2768
Title:
In Wireshark 2.2.0 to 2.2.6, the DOF dissector could read past the end of a buffer
Type:
Software
Bulletins:
CISEC:2768
CVE-2017-9348
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.6, the DOF dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-dof.c by validating a size value.
Applies to:
Wireshark
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2769
Title:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the SoulSeek dissector could go into an infinite loop
Type:
Software
Bulletins:
CISEC:2769
CVE-2017-9346
Severity:
High
Description:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the SoulSeek dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-slsk.c by making loop bounds more explicit.
Applies to:
Wireshark
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2773
Title:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the RGMP dissector could crash
Type:
Software
Bulletins:
CISEC:2773
CVE-2017-9354
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the RGMP dissector could crash. This was addressed in epan/dissectors/packet-rgmp.c by validating an IPv4 address.
Applies to:
Wireshark
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2764
Title:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the openSAFETY dissector could crash or exhaust system memory
Type:
Software
Bulletins:
CISEC:2764
CVE-2017-9350
Severity:
High
Description:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by checking for a negative length.
Applies to:
Wireshark
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2765
Title:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the MSNIP dissector misuses a NULL pointer
Type:
Software
Bulletins:
CISEC:2765
CVE-2017-9343
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the MSNIP dissector misuses a NULL pointer. This was addressed in epan/dissectors/packet-msnip.c by validating an IPv4 address.
Applies to:
Wireshark
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2774
Title:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go into an infinite loop
Type:
Software
Bulletins:
CISEC:2774
CVE-2017-9345
Severity:
High
Description:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dns.c by trying to detect self-referencing pointers.
Applies to:
Wireshark
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2767
Title:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop
Type:
Software
Bulletins:
CISEC:2767
CVE-2017-9349
Severity:
High
Description:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop. This was addressed in epan/dissectors/packet-dcm.c by validating a length value.
Applies to:
Wireshark
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2766
Title:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer
Type:
Software
Bulletins:
CISEC:2766
CVE-2017-9351
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-bootp.c by extracting the Vendor Class Identifier more carefully.
Applies to:
Wireshark
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2771
Title:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bluetooth L2CAP dissector could divide by zero
Type:
Software
Bulletins:
CISEC:2771
CVE-2017-9344
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bluetooth L2CAP dissector could divide by zero. This was addressed in epan/dissectors/packet-btl2cap.c by validating an interval value.
Applies to:
Wireshark
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2770
Title:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar dissector could go into an infinite loop
Type:
Software
Bulletins:
CISEC:2770
CVE-2017-9352
Severity:
High
Description:
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by ensuring that backwards parsing cannot occur.
Applies to:
Wireshark
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2754
Title:
.NET Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2754
CVE-2017-8585
Severity:
Medium
Description:
Microsoft .NET Framework 4.6, 4.6.1, 4.6.2, and 4.7 allow an attacker to send specially crafted requests to a .NET web application, resulting in denial of service, aka .NET Denial of Service Vulnerability.
Applies to:
Microsoft .NET Framework 4.6
Microsoft .NET Framework 4.6.1
Microsoft .NET Framework 4.6.2
Microsoft .NET Framework 4.7
Created:
2017-08-18
Updated:
2024-01-17

ID:
CISEC:2719
Title:
WSP infinite loop in Wireshark
Type:
Software
Bulletins:
CISEC:2719
CVE-2017-6471
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a WSP infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by validating the capability length.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2718
Title:
RTMPT dissector infinite loop in Wireshark
Type:
Software
Bulletins:
CISEC:2718
CVE-2017-6472
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an RTMPT dissector infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rtmpt.c by properly incrementing a certain sequence value.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2722
Title:
NetScaler file parser infinite loop in Wireshark
Type:
Software
Bulletins:
CISEC:2722
CVE-2017-6474
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating record sizes.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2727
Title:
Netscaler file parser infinite loop in Wireshark
Type:
Software
Bulletins:
CISEC:2727
CVE-2017-6467
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a Netscaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by changing the restrictions on file size.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2723
Title:
NetScaler file parser crash in Wireshark
Type:
Software
Bulletins:
CISEC:2723
CVE-2017-6468
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser crash, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating the relationship between pages and records.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2713
Title:
NCP dissector crash in Wireshark
Type:
Software
Bulletins:
CISEC:2713
CVE-2016-7958
Severity:
Medium
Description:
In Wireshark 2.2.0, the NCP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/CMakeLists.txt by registering this dissector.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2725
Title:
LDSS dissector crash in Wireshark
Type:
Software
Bulletins:
CISEC:2725
CVE-2017-6469
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an LDSS dissector crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-ldss.c by ensuring that memory is allocated for a certain data structure.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2716
Title:
K12 file parser crash in Wireshark
Type:
Software
Bulletins:
CISEC:2716
CVE-2017-6473
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a K12 file parser crash, triggered by a malformed capture file. This was addressed in wiretap/k12.c by validating the relationships between lengths and offsets.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2720
Title:
IAX2 infinite loop in Wireshark
Type:
Software
Bulletins:
CISEC:2720
CVE-2017-6470
Severity:
High
Description:
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an IAX2 infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-iax2.c by constraining packet lateness.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2726
Title:
DHCPv6 large loop in Wireshark
Type:
Software
Bulletins:
CISEC:2726
CVE-2017-5597
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2715
Title:
Denial of Service Vulnerability in Wireshark 2.2.7
Type:
Software
Bulletins:
CISEC:2715
CVE-2017-9766
Severity:
Medium
Description:
In Wireshark 2.2.7, PROFINET IO data with a high recursion depth allows remote attackers to cause a denial of service (stack exhaustion) in the dissect_IODWriteReq function in plugins/profinet/packet-dcerpc-pn-io.c.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2721
Title:
Denial of Service Vulnerability in Wireshark 2.2.7
Type:
Software
Bulletins:
CISEC:2721
CVE-2017-9617
Severity:
Medium
Description:
In Wireshark 2.2.7, deeply nested DAAP data may cause stack exhaustion (uncontrolled recursion) in the dissect_daap_one_tag function in epan/dissectors/packet-daap.c in the DAAP dissector.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2724
Title:
Denial of Service Vulnerability in Wireshark 2.2.7
Type:
Software
Bulletins:
CISEC:2724
CVE-2017-9616
Severity:
Medium
Description:
In Wireshark 2.2.7, overly deep mp4 chunks may cause stack exhaustion (uncontrolled recursion) in the dissect_mp4_box function in epan/dissectors/file-mp4.c.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2714
Title:
Denial of Service Vulnerability in Wireshark
Type:
Software
Bulletins:
CISEC:2714
CVE-2017-6014
Severity:
High
Description:
In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2728
Title:
Bluetooth L2CAP dissector crash in Wireshark
Type:
Software
Bulletins:
CISEC:2728
CVE-2016-7957
Severity:
Medium
Description:
In Wireshark 2.2.0, the Bluetooth L2CAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-btl2cap.c by avoiding use of a seven-byte memcmp for potentially shorter strings.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2717
Title:
ASTERIX infinite loop in Wireshark
Type:
Software
Bulletins:
CISEC:2717
CVE-2017-5596
Severity:
Medium
Description:
In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow.
Applies to:
Wireshark
Created:
2017-08-11
Updated:
2018-05-25

ID:
CISEC:2697
Title:
Windows VAD Cloning Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2697
CVE-2017-8515
Severity:
Medium
Description:
Microsoft Windows 10 1511, 1607, and 1703, and Windows Server 2016 allow an unauthenticated attacker to send a specially crafted kernel mode request to cause a denial of service on the target system, aka "Windows VAD Cloning Denial of Service Vulnerability".
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2687
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2687
CVE-2017-8493
Severity:
Low
Description:
Microsoft Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to set variables that are either read-only or require authentication when Windows fails to enforce case sensitivity for certain variable checks, aka "Windows Security Feature Bypass Vulnerability".
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2677
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2677
CVE-2017-8488
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8492, CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8480, CVE-2017-8479, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2678
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2678
CVE-2017-8483
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8492, CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8482, CVE-2017-8480, CVE-2017-8479, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2684
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2684
CVE-2017-8469
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8481, CVE-2017-8480, CVE-2017-8478, CVE-2017-8479, CVE-2017-8476, CVE-2017-8474, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2690
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2690
CVE-2017-8494
Severity:
Medium
Description:
Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow a locally-authenticated attacker to run a specially crafted application on a targeted system when Windows Secure Kernel Mode fails to properly handle objects in memory, aka "Windows Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2694
Title:
Windows Default Folder Tampering Vulnerability
Type:
Software
Bulletins:
CISEC:2694
CVE-2017-0295
Severity:
Low
Description:
Microsoft Windows 10 1607 and 1703, and Windows Server 2016 allow an authenticated attacker to modify the C:\Users\DEFAULT folder structure, aka "Windows Default Folder Tampering Vulnerability".
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2691
Title:
Windows Cursor Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2691
CVE-2017-8466
Severity:
High
Description:
Microsoft Windows 10 1511, 1607, and 1703, and Windows Server 2016 allow an unauthenticated attacker to send a specially crafted kernel mode request to cause a denial of service on the target system, aka "Windows VAD Cloning Denial of Service Vulnerability".
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2692
Title:
Windows COM Session Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2692
CVE-2017-0298
Severity:
Medium
Description:
A DCOM object in Helppane.exe in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016, when configured to run as the interactive user, allows an authenticated attacker to run arbitrary code in another user's session, aka "Windows COM Session Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CVE-2015-3839
Title:
The updateMessageStatus function in Android 5.1.1 and earlier allows local users to cause a denial of service (NULL pointer exception and process crash).
Type:
Mobile Devices
Bulletins:
CVE-2015-3839
SFBID100158
Severity:
Low
Description:
The updateMessageStatus function in Android 5.1.1 and earlier allows local users to cause a denial of service (NULL pointer exception and process crash).
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2686
Title:
Sandbox Escape in IndexedDB vulnerability in Google Chrome versions
Type:
Web
Bulletins:
CISEC:2686
CVE-2017-5087
Severity:
Medium
Description:
Sandbox Escape in IndexedDB vulnerability in Google Chrome versions prior to 59.0.3071.104 could allow an unauthenticated, remote attacker to execute arbitrary code, bypass security restrictions, access sensitive information, or conduct domain spoofing attacks on a targeted system
Applies to:
Google Chrome
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2698
Title:
Microsoft SharePoint Reflective XSS Vulnerability
Type:
Software
Bulletins:
CISEC:2698
CVE-2017-8514
Severity:
Low
Description:
An information disclosure vulnerability exists when Microsoft SharePoint software fails to properly sanitize a specially crafted requests, aka "Microsoft SharePoint Reflective XSS Vulnerability".
Applies to:
Microsoft SharePoint Server 2016
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2683
Title:
Hypervisor Code Integrity Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2683
CVE-2017-0193
Severity:
Medium
Description:
Windows Hyper-V in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to gain elevated privileges on a target guest operating system when Windows Hyper-V instruction emulation fails to properly enforce privilege levels, aka "Hypervisor Code Integrity Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2685
Title:
GDI Information Disclosure Vulnerablity
Type:
Software
Bulletins:
CISEC:2685
CVE-2017-8553
Severity:
Low
Description:
An information disclosure vulnerability exists in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows Server 2016 when the Windows kernel improperly handles objects in memory, aka "GDI Information Disclosure Vulnerability".
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2688
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2688
CVE-2017-0218
Severity:
Medium
Description:
Microsoft Windows 10 Gold, Windows 10 1511, Windows 10 1607, and Windows Server 2016 allow an attacker to exploit a security feature bypass vulnerability in Device Guard that could allow the attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This CVE ID is unique from CVE-2017-0173, CVE-2017-0215, CVE-2017-0216, and CVE-2017-0219.
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2689
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2689
CVE-2017-0173
Severity:
Medium
Description:
Microsoft Windows 10 1607 and Windows Server 2016 allow an attacker to exploit a security feature bypass vulnerability in Device Guard that could allow the attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This CVE ID is unique from CVE-2017-0215, CVE-2017-0216, CVE-2017-0218, and CVE-2017-0219.
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2693
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2693
CVE-2017-0219
Severity:
Medium
Description:
Microsoft Windows 10 Gold, Windows 10 1511, Windows 10 1607, and Windows Server 2016 allow an attacker to exploit a security feature bypass vulnerability in Device Guard that could allow the attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This CVE ID is unique from CVE-2017-0173, CVE-2017-0215, CVE-2017-0216, and CVE-2017-0218.
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2695
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2695
CVE-2017-0215
Severity:
Medium
Description:
Microsoft Windows 10 1607 and Windows Server 2016 allow an attacker to exploit a security feature bypass vulnerability in Device Guard that could allow the attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This CVE ID is unique from CVE-2017-0173, CVE-2017-0216, CVE-2017-0218, and CVE-2017-0219.
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CISEC:2696
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2696
CVE-2017-0216
Severity:
Medium
Description:
Microsoft Windows 10 1511, Windows 10 1607, and Windows Server 2016 allow an attacker to exploit a security feature bypass vulnerability in Device Guard that could allow the attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This CVE ID is unique from CVE-2017-0173, CVE-2017-0215, CVE-2017-0218, and CVE-2017-0219.
Applies to:
Created:
2017-08-07
Updated:
2024-01-17

ID:
CVE-2012-5030
Title:
Cisco IOS before 15.2(4)S6 does not initialize an unspecified variable, which might allow remote authenticated users to cause a denial of service (CPU consumption, watchdog timeout, crash) by walking specific SNMP objects.
Type:
Hardware
Bulletins:
CVE-2012-5030
Severity:
Medium
Description:
Cisco IOS before 15.2(4)S6 does not initialize an unspecified variable, which might allow remote authenticated users to cause a denial of service (CPU consumption, watchdog timeout, crash) by walking specific SNMP objects.
Applies to:
Created:
2017-08-02
Updated:
2024-01-17

ID:
CISEC:2665
Title:
Windows Uniscribe Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2665
CVE-2017-0283
Severity:
High
Description:
Uniscribe in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, Windows Server 2016, Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office Word Viewer, Microsoft Lync 2013 SP1, Skype for Business 2016, Microsoft Silverlight 5 Developer Runtime when installed on Microsoft Windows, and Microsoft Silverlight 5 when installed on Microsoft Windows allows a remote code execution vulnerability due to the way it handles objects in memory, aka "Windows Uniscribe Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8528.
Applies to:
Microsoft Live Meeting 2007
Microsoft Lync 2010
Microsoft Lync 2013
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office Word Viewer
Microsoft Silverlight 5
Skype for Business 2016
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2667
Title:
Windows Uniscribe Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2667
CVE-2017-8528
Severity:
High
Description:
Uniscribe in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Microsoft Office 2007 SP3, and Microsoft Office 2010 SP2 allows a remote code execution vulnerability due to the way it handles objects in memory, aka "Windows Uniscribe Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0283.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2662
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2662
CVE-2017-0282
Severity:
Low
Description:
Uniscribe in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, Windows Server 2016, Microsoft Office 2007 SP3, and Microsoft Office 2010 SP2 allows improper disclosure of memory contents, aka "Windows Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0284, CVE-2017-0285, and CVE-2017-8534.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2666
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2666
CVE-2017-8534
Severity:
Medium
Description:
Uniscribe in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Microsoft Office 2007 SP3, and Microsoft Office 2010 SP2 allows improper disclosure of memory contents, aka "Windows Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0282, CVE-2017-0284, and CVE-2017-0285.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2668
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2668
CVE-2017-0284
Severity:
Low
Description:
Uniscribe in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, Windows Server 2016, Microsoft Office 2007 SP3, and Microsoft Office 2010 SP2 allows improper disclosure of memory contents, aka "Windows Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0282, CVE-2017-0285, and CVE-2017-8534.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2670
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2670
CVE-2017-0285
Severity:
Low
Description:
Uniscribe in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, Windows Server 2016, Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, and Microsoft Office Word Viewer allows improper disclosure of memory contents, aka "Windows Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0282, CVE-2017-0284, and CVE-2017-8534.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office Word Viewer
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2671
Title:
Windows TDX Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2671
CVE-2017-0296
Severity:
High
Description:
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to elevate privilege when tdx.sys fails to check the length of a buffer prior to copying memory to it, aka "Windows TDX Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2674
Title:
Windows Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2674
CVE-2017-0294
Severity:
High
Description:
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to execute remote code when Windows fails to properly handle cabinet files, aka "Windows Remote Code Execution Vulnerability".
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2669
Title:
Windows PDF Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2669
CVE-2017-0291
Severity:
High
Description:
Windows PDF in Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows remote code execution if a user opens a specially crafted PDF file, aka "Windows PDF Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0292.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2672
Title:
Windows PDF Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2672
CVE-2017-0292
Severity:
High
Description:
Windows PDF in Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows remote code execution if a user opens a specially crafted PDF file, aka "Windows PDF Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0291.
Applies to:
Microsoft Word 2013
Microsoft Word 2016
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2664
Title:
Windows PDF Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2664
CVE-2017-8460
Severity:
Medium
Description:
Windows PDF in Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows information disclosure when a user opens a specially crafted PDF file, aka "Windows PDF Information Disclosure Vulnerability".
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2629
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2629
CVE-2017-8491
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8492, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8480, CVE-2017-8479, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2631
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2631
CVE-2017-8476
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8481, CVE-2017-8480, CVE-2017-8478, CVE-2017-8479, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2632
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2632
CVE-2017-8482
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8492, CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8480, CVE-2017-8479, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2633
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2633
CVE-2017-8481
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8480, CVE-2017-8479, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2634
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2634
CVE-2017-8492
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8480, CVE-2017-8479, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2635
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2635
CVE-2017-8489
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8492, CVE-2017-8491, CVE-2017-8490, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8480, CVE-2017-8479, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2636
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2636
CVE-2017-8490
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8492, CVE-2017-8491, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8480, CVE-2017-8479, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2637
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2637
CVE-2017-8480
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8492, CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8479, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2638
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2638
CVE-2017-8478
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8481, CVE-2017-8480, CVE-2017-8479, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2639
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2639
CVE-2017-8479
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8492, CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8481, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2640
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2640
CVE-2017-8462
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8481, CVE-2017-8480, CVE-2017-8478, CVE-2017-8479, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2641
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2641
CVE-2017-8485
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8492, CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8483, CVE-2017-8482, CVE-2017-8480, CVE-2017-8479, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2642
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2642
CVE-2017-0300
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8481, CVE-2017-8480, CVE-2017-8478, CVE-2017-8479, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2643
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2643
CVE-2017-0299
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8481, CVE-2017-8480, CVE-2017-8478, CVE-2017-8479, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, and CVE-2017-0297.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2644
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2644
CVE-2017-8474
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8481, CVE-2017-8480, CVE-2017-8478, CVE-2017-8479, CVE-2017-8476, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2630
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2630
CVE-2017-0297
Severity:
Low
Description:
The kernel in Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8491, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8481, CVE-2017-8480, CVE-2017-8478, CVE-2017-8479, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0299, CVE-2017-0300.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2604
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2604
CVE-2017-8475
Severity:
Low
Description:
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an authenticated attacker to run a specially crafted application when the Windows kernel improperly initializes objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8470, CVE-2017-8471, CVE-2017-8472, CVE-2017-8473, CVE-2017-8477, and CVE-2017-8484.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2605
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2605
CVE-2017-8473
Severity:
Low
Description:
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and Windows Server 2016 allow an authenticated attacker to run a specially crafted application when the Windows kernel improperly initializes objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8470, CVE-2017-8471, CVE-2017-8472, CVE-2017-8475, CVE-2017-8477, and CVE-2017-8484.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2606
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2606
CVE-2017-8470
Severity:
Low
Description:
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an authenticated attacker to run a specially crafted application when the Windows kernel improperly initializes objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8471, CVE-2017-8472, CVE-2017-8473, CVE-2017-8475, CVE-2017-8477, and CVE-2017-8484.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2608
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2608
CVE-2017-8484
Severity:
Low
Description:
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an authenticated attacker to run a specially crafted application when the Windows kernel improperly initializes objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8470, CVE-2017-8471, CVE-2017-8472, CVE-2017-8473, CVE-2017-8475, and CVE-2017-8477.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2609
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2609
CVE-2017-8471
Severity:
Low
Description:
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an authenticated attacker to run a specially crafted application when the Windows kernel improperly initializes objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8470, CVE-2017-8472, CVE-2017-8473, CVE-2017-8475, CVE-2017-8477, and CVE-2017-8484.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2610
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2610
CVE-2017-8472
Severity:
Low
Description:
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 allow an authenticated attacker to run a specially crafted application when the Windows kernel improperly initializes objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8470, CVE-2017-8471, CVE-2017-8473, CVE-2017-8475, CVE-2017-8477, and CVE-2017-8484.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2611
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2611
CVE-2017-8477
Severity:
Low
Description:
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an authenticated attacker to run a specially crafted application when the Windows kernel improperly initializes objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8470, CVE-2017-8471, CVE-2017-8472, CVE-2017-8473, CVE-2017-8475, and CVE-2017-8484.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2603
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2603
CVE-2017-8468
Severity:
High
Description:
Microsoft Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to run processes in an elevated context when the Windows kernel improperly handles objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This CVE ID is unique from CVE-2017-8465.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2607
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2607
CVE-2017-8465
Severity:
High
Description:
Microsoft Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to run processes in an elevated context when the Windows kernel improperly handles objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This CVE ID is unique from CVE-2017-8468.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2628
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2628
CVE-2017-8552
Severity:
High
Description:
A kernel-mode driver in Microsoft Windows XP SP3, Windows XP x64 XP2, Windows Server 2003 SP2, Windows Vista, Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, and Windows 8 allows an elevation of privilege when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE is unique from CVE-2017-0263.
Applies to:
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2663
Title:
Skype for Business Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2663
CVE-2017-8550
Severity:
Medium
Description:
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a remote code execution vulnerability due to the way it handles objects in memory, aka "Windows Graphics Remote Code Execution Vulnerability".
Applies to:
Skype for Business 2016
Created:
2017-07-28
Updated:
2018-05-25

ID:
CISEC:2675
Title:
Microsoft SharePoint XSS vulnerability
Type:
Software
Bulletins:
CISEC:2675
CVE-2017-8551
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint software fails to properly sanitize a specially crafted requests, aka "Microsoft SharePoint XSS vulnerability".
Applies to:
Microsoft Project Server 2013
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2673
Title:
Microsoft PowerPoint Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2673
CVE-2017-8513
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft PowerPoint when the software fails to properly handle objects in memory, aka "Microsoft PowerPoint Remote Code Execution Vulnerability".
Applies to:
Microsoft Office Sharepoint Server 2007
Microsoft Powerpoint 2007
Created:
2017-07-28
Updated:
2024-01-17

ID:
CISEC:2538
Title:
Windows Search Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2538
CVE-2017-8543
Severity:
High
Description:
Microsoft Windows XP SP3, Windows XP x64 XP2, Windows Server 2003 SP2, Windows Vista, Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to take control of the affected system when Windows Search fails to handle objects in memory, aka "Windows Search Remote Code Execution Vulnerability".
Applies to:
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2543
Title:
Windows Search Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2543
CVE-2017-8464
Severity:
High
Description:
Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows local users or remote attackers to execute arbitrary code via a crafted .LNK file, which is not properly handled during icon display in Windows Explorer or any other application that parses the icon of the shortcut. aka "LNK Remote Code Execution Vulnerability."
Applies to:
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2542
Title:
Windows Search Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2542
CVE-2017-8544
Severity:
Low
Description:
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to obtain information to further compromise the user's system when Windows Search fails to handle objects in memory, aka "Windows Search Information Disclosure Vulnerability".
Applies to:
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2573
Title:
Windows Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2573
CVE-2017-8527
Severity:
High
Description:
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a remote code execution vulnerability due to the way it handles objects in memory, aka "Windows Graphics Remote Code Execution Vulnerability".
Applies to:
Microsoft Lync 2013
Microsoft Office 2007
Microsoft Office 2010
Microsoft Silverlight 5
Skype for Business 2016
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2571
Title:
Windows Graphics Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2571
CVE-2017-8532
Severity:
Medium
Description:
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows improper disclosure of memory contents, aka "Graphics Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0286, CVE-2017-0287, CVE-2017-0288, CVE-2017-0289, CVE-2017-8531, and CVE-2017-8533.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2572
Title:
Windows Graphics Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2572
CVE-2017-8533
Severity:
Medium
Description:
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows improper disclosure of memory contents, aka "Graphics Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0286, CVE-2017-0287, CVE-2017-0288, CVE-2017-0289, CVE-2017-8531, and CVE-2017-8532.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2574
Title:
Windows Graphics Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2574
CVE-2017-0287
Severity:
Low
Description:
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows improper disclosure of memory contents, aka "Graphics Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0286, CVE-2017-0288, CVE-2017-0289, CVE-2017-8531, CVE-2017-8532, and CVE-2017-8533.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2575
Title:
Windows Graphics Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2575
CVE-2017-0289
Severity:
Low
Description:
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows improper disclosure of memory contents, aka "Windows Graphics Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0286, CVE-2017-0287, CVE-2017-0288, CVE-2017-8531, CVE-2017-8532, and CVE-2017-8533.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2576
Title:
Windows Graphics Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2576
CVE-2017-0286
Severity:
Low
Description:
Graphics in Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows improper disclosure of memory contents, aka "Windows Graphics Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0287, CVE-2017-0288, CVE-2017-0289, CVE-2017-8531, CVE-2017-8532, and CVE-2017-8533.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2577
Title:
Windows Graphics Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2577
CVE-2017-8531
Severity:
Medium
Description:
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, Windows Server 2016, Microsoft Office 2007 Service Pack 3, and Microsoft Office 2010 Service Pack 2 allows improper disclosure of memory contents, aka "Graphics Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0286, CVE-2017-0287, CVE-2017-0288, CVE-2017-0289, CVE-2017-8532, and CVE-2017-8533.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2578
Title:
Windows Graphics Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2578
CVE-2017-0288
Severity:
Low
Description:
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows improper disclosure of memory contents, aka "Windows Graphics Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0286, CVE-2017-0287, CVE-2017-0289, CVE-2017-8531, CVE-2017-8532, and CVE-2017-8533.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2541
Title:
Use after free in Chrome Apps
Type:
Web
Bulletins:
CISEC:2541
CVE-2017-5062
Severity:
Medium
Description:
Use after free in Chrome Apps.
Applies to:
Google Chrome
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2535
Title:
URL spoofing in Omnibox
Type:
Web
Bulletins:
CISEC:2535
CVE-2017-5067
Severity:
Medium
Description:
An insufficient watchdog timer in navigation in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2536
Title:
URL spoofing in Omnibox
Type:
Web
Bulletins:
CISEC:2536
CVE-2017-5060
Severity:
Medium
Description:
URL spoofing in Omnibox.
Applies to:
Google Chrome
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2544
Title:
URL spoofing in Omnibox
Type:
Web
Bulletins:
CISEC:2544
CVE-2017-5061
Severity:
Low
Description:
URL spoofing in Omnibox.
Applies to:
Google Chrome
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2540
Title:
Type confusion in PDFium
Type:
Web
Bulletins:
CISEC:2540
CVE-2017-5057
Severity:
Medium
Description:
Type confusion in PDFium
Applies to:
Google Chrome
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2537
Title:
Type confusion in Blink
Type:
Web
Bulletins:
CISEC:2537
CVE-2017-5059
Severity:
Medium
Description:
Type confusion in Blink.
Applies to:
Google Chrome
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2525
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2525
CVE-2017-8523
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to trick a user into loading a page with malicious content when Microsoft Edge fails to correctly apply Same Origin Policy for HTML elements present in other browser windows, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-8530 and CVE-2017-8555.
Applies to:
Microsoft Edge
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2528
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2528
CVE-2017-8555
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to trick a user into loading a page with malicious content when the Edge Content Security Policy (CSP) fails to properly validate certain specially crafted documents, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-8523 and CVE-2017-8530.
Applies to:
Microsoft Edge
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2530
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2530
CVE-2017-8530
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to trick a user into loading a page with malicious content when Microsoft Edge does not properly enforce same-origin policies, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-8523 and CVE-2017-8555.
Applies to:
Microsoft Edge
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2531
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2531
CVE-2017-8497
Severity:
High
Description:
Microsoft Edge in Windows 10 1607 and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8496.
Applies to:
Microsoft Edge
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2532
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2532
CVE-2017-8496
Severity:
High
Description:
Microsoft Edge in Windows 10 1607 and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8497.
Applies to:
Microsoft Edge
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2526
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2526
CVE-2017-8498
Severity:
Medium
Description:
Microsoft Edge in Windows 10 1607 and 1703, and Windows Server 2016 allows an attacker to read data not intended to be disclosed when Edge allows JavaScript XML DOM objects to detect installed browser extensions, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8504.
Applies to:
Microsoft Edge
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2527
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2527
CVE-2017-8504
Severity:
Medium
Description:
Microsoft Edge in Windows 10 1607 and 1703, and Windows Server 2016 allows an attacker to read the URL of a cross-origin request when the Microsoft Edge Fetch API incorrectly handles a filtered response type, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8498.
Applies to:
Microsoft Edge
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2529
Title:
Microsoft Browser Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2529
CVE-2017-8529
Severity:
Medium
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, and Windows Server 2012 and R2 allow an attacker to detect specific files on the user's computer when affected Microsoft scripting engines do not properly handle objects in memory, aka "Microsoft Browser Information Disclosure Vulnerability".
Applies to:
Internet Explorer 10
Internet Explorer 11
Internet Explorer 9
Microsoft Edge
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2533
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2533
CVE-2017-8547
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, and Windows Server 2012 and R2 allow an attacker to execute arbitrary code in the context of the current user when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8519.
Applies to:
Internet Explorer 10
Internet Explorer 11
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2534
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2534
CVE-2017-8519
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, and Windows Server 2012 and R2 allow an attacker to execute arbitrary code in the context of the current user when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8547.
Applies to:
Internet Explorer 10
Internet Explorer 11
Internet Explorer 9
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2539
Title:
Heap use after free in Print Preview
Type:
Web
Bulletins:
CISEC:2539
CVE-2017-5058
Severity:
Medium
Description:
Heap use after free in Print Preview.
Applies to:
Google Chrome
Created:
2017-07-21
Updated:
2024-01-17

ID:
CISEC:2753
Title:
RHSA-2016:2098 -- kernel security update
Type:
Software
Bulletins:
CISEC:2753
Severity:
Low
Description:
A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.
Applies to:
kernel
Created:
2017-07-18
Updated:
2017-08-18

ID:
CISEC:2508
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2508
CVE-2017-8517
Severity:
High
Description:
Microsoft browsers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engines fail to render when handling objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8522 and CVE-2017-8524.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-07-14
Updated:
2024-01-17

ID:
CISEC:2509
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2509
CVE-2017-8549
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to obtain information to further compromise the user's system when Microsoft Edge improperly improperly handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8499, CVE-2017-8520, CVE-2017-8521, and CVE-2017-8548.
Applies to:
Microsoft Edge
Created:
2017-07-14
Updated:
2024-01-17

ID:
CISEC:2510
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2510
CVE-2017-8521
Severity:
High
Description:
Microsoft Edge in Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user when the Edge JavaScript scripting engine fails to handle objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8499, CVE-2017-8520, CVE-2017-8548, and CVE-2017-8549.
Applies to:
Microsoft Edge
Created:
2017-07-14
Updated:
2024-01-17

ID:
CISEC:2511
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2511
CVE-2017-8499
Severity:
High
Description:
Microsoft Edge in Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user when the Edge JavaScript scripting engine fails to handle objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8520, CVE-2017-8521, CVE-2017-8548, and CVE-2017-8549.
Applies to:
Microsoft Edge
Created:
2017-07-14
Updated:
2024-01-17

ID:
CISEC:2512
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2512
CVE-2017-8524
Severity:
High
Description:
Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engines fail to render when handling objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8517 and CVE-2017-8522.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2017-07-14
Updated:
2024-01-17

ID:
CISEC:2513
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2513
CVE-2017-8522
Severity:
High
Description:
Microsoft browsers in Microsoft Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engines fail to render when handling objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8517 and CVE-2017-8524.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2017-07-14
Updated:
2024-01-17

ID:
CISEC:2506
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2506
CVE-2017-8548
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to obtain information to further compromise the user's system when Microsoft Edge improperly improperly handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8499, CVE-2017-8520, CVE-2017-8521, and CVE-2017-8549.
Applies to:
Microsoft Edge
Created:
2017-07-14
Updated:
2024-01-17

ID:
CISEC:2507
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2507
CVE-2017-8520
Severity:
High
Description:
Microsoft Edge in Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user when the Edge JavaScript scripting engine fails to handle objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8499, CVE-2017-8521, CVE-2017-8548, and CVE-2017-8549.
Applies to:
Microsoft Edge
Created:
2017-07-14
Updated:
2024-01-17

ID:
CISEC:2425
Title:
XSS Auditor in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux
Type:
Web
Bulletins:
CISEC:2425
CVE-2017-5045
Severity:
Medium
Description:
XSS Auditor in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed detection of a blocked iframe load, which allowed a remote attacker to brute force JavaScript variables via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2429
Title:
V8 in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux
Type:
Web
Bulletins:
CISEC:2429
CVE-2017-5046
Severity:
Medium
Description:
V8 in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android had insufficient policy enforcement, which allowed a remote attacker to spoof the location object via a crafted HTML page, related to Blink information disclosure.
Applies to:
Google Chrome
Created:
2017-07-07
Updated:
2024-01-17

ID:
CVE-2014-7953
Title:
Race condition in the bindBackupAgent method in the ActivityManagerService in Android 4.4.4 allows local users with adb shell access to execute arbitrary code or any valid package as system by running "pm install" with the target...
Type:
Mobile Devices
Bulletins:
CVE-2014-7953
SFBID74213
Severity:
Medium
Description:
Race condition in the bindBackupAgent method in the ActivityManagerService in Android 4.4.4 allows local users with adb shell access to execute arbitrary code or any valid package as system by running "pm install" with the target apk, and simultaneously running a crafted script to process logcat's output looking for a dexopt line, which once found should execute bindBackupAgent with the uid member of the ApplicationInfo parameter set to 1000.
Applies to:
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2432
Title:
Microsoft Malware Protection Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2432
CVE-2017-8540
Severity:
High
Description:
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability", a different vulnerability than CVE-2017-8538 and CVE-2017-8541.
Applies to:
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2417
Title:
Microsoft Malware Protection Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2417
CVE-2017-8538
Severity:
High
Description:
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability", a different vulnerability than CVE-2017-8540 and CVE-2017-8541.
Applies to:
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2431
Title:
Microsoft Malware Protection Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2431
CVE-2017-8541
Severity:
High
Description:
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability", a different vulnerability than CVE-2017-8538 and CVE-2017-8540.
Applies to:
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2416
Title:
Microsoft Malware Protection Engine Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2416
CVE-2017-8536
Severity:
Medium
Description:
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8535, CVE-2017-8537, CVE-2017-8539, and CVE-2017-8542.
Applies to:
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2418
Title:
Microsoft Malware Protection Engine Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2418
CVE-2017-8537
Severity:
Medium
Description:
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8535, CVE-2017-8536, CVE-2017-8539, and CVE-2017-8542.
Applies to:
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2419
Title:
Microsoft Malware Protection Engine Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2419
CVE-2017-8535
Severity:
Medium
Description:
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8536, CVE-2017-8537, CVE-2017-8539, and CVE-2017-8542.
Applies to:
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2424
Title:
Heap buffer overflow in filter processing in Skia in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux
Type:
Web
Bulletins:
CISEC:2424
CVE-2017-5044
Severity:
Medium
Description:
Heap buffer overflow in filter processing in Skia in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2427
Title:
Google Chrome prior to 57.0.2987.100 incorrectly handled back-forward navigation
Type:
Web
Bulletins:
CISEC:2427
CVE-2017-5041
Severity:
Medium
Description:
Google Chrome prior to 57.0.2987.100 incorrectly handled back-forward navigation, which allowed a remote attacker to display incorrect information for a site via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-07-07
Updated:
2024-01-17

ID:
CVE-2014-7954
Title:
Directory traversal vulnerability in the doSendObjectInfo method in frameworks/av/media/mtp/MtpServer.cpp in Android 4.4.4 allows physically proximate attackers with a direct connection to the target Android device to upload files...
Type:
Mobile Devices
Bulletins:
CVE-2014-7954
SFBID74210
Severity:
Low
Description:
Directory traversal vulnerability in the doSendObjectInfo method in frameworks/av/media/mtp/MtpServer.cpp in Android 4.4.4 allows physically proximate attackers with a direct connection to the target Android device to upload files outside of the sdcard via a .. (dot dot) in a name parameter of an MTP request.
Applies to:
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2423
Title:
Chrome Apps in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac had a use after free bug in GuestView
Type:
Web
Bulletins:
CISEC:2423
CVE-2017-5043
Severity:
Medium
Description:
Chrome Apps in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac had a use after free bug in GuestView, which allowed a remote attacker to perform an out of bounds memory read via a crafted Chrome extension.
Applies to:
Google Chrome
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2428
Title:
Cast in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux
Type:
Web
Bulletins:
CISEC:2428
CVE-2017-5042
Severity:
Low
Description:
Cast in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android sent cookies to sites discovered via SSDP, which allowed an attacker on the local network segment to initiate connections to arbitrary URLs and observe any plaintext cookies sent.
Applies to:
Google Chrome
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2420
Title:
An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux
Type:
Web
Bulletins:
CISEC:2420
CVE-2017-5047
Severity:
Medium
Description:
An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory write via a crafted video file, related to ChunkDemuxer.
Applies to:
Google Chrome
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2421
Title:
An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux
Type:
Web
Bulletins:
CISEC:2421
CVE-2017-5051
Severity:
Medium
Description:
An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory write via a crafted video file, related to ChunkDemuxer.
Applies to:
Google Chrome
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2422
Title:
An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux
Type:
Web
Bulletins:
CISEC:2422
CVE-2017-5048
Severity:
Medium
Description:
An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory write via a crafted video file, related to ChunkDemuxer.
Applies to:
Google Chrome
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2426
Title:
An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux
Type:
Web
Bulletins:
CISEC:2426
CVE-2017-5050
Severity:
Medium
Description:
An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory write via a crafted video file, related to ChunkDemuxer.
Applies to:
Google Chrome
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2430
Title:
An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux
Type:
Web
Bulletins:
CISEC:2430
CVE-2017-5049
Severity:
Medium
Description:
An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory write via a crafted video file, related to ChunkDemuxer.
Applies to:
Google Chrome
Created:
2017-07-07
Updated:
2024-01-17

ID:
CISEC:2406
Title:
Use after free in PDFium
Type:
Web
Bulletins:
CISEC:2406
CVE-2017-5034
Severity:
Medium
Description:
A use after free in PDFium in Google Chrome prior to 57.0.2987.98 for Linux and Windows allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.
Applies to:
Google Chrome
Created:
2017-06-30
Updated:
2024-01-17

ID:
CISEC:2408
Title:
Use after free in PDFium
Type:
Web
Bulletins:
CISEC:2408
CVE-2017-5039
Severity:
Medium
Description:
A use after free in PDFium in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
Applies to:
Google Chrome
Created:
2017-06-30
Updated:
2024-01-17

ID:
CISEC:2409
Title:
Use after free in PDFium
Type:
Web
Bulletins:
CISEC:2409
CVE-2017-5036
Severity:
Medium
Description:
A use after free in PDFium in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to have an unspecified impact via a crafted PDF file.
Applies to:
Google Chrome
Created:
2017-06-30
Updated:
2024-01-17

ID:
CISEC:2414
Title:
Use after free in GuestView
Type:
Web
Bulletins:
CISEC:2414
CVE-2017-5038
Severity:
Medium
Description:
Chrome Apps in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac had a use after free bug in GuestView, which allowed a remote attacker to perform an out of bounds memory read via a crafted Chrome extension.
Applies to:
Google Chrome
Created:
2017-06-30
Updated:
2024-01-17

ID:
CISEC:2404
Title:
Use after free in ANGLE
Type:
Web
Bulletins:
CISEC:2404
CVE-2017-5031
Severity:
Medium
Description:
A use after free in ANGLE in Google Chrome prior to 57.0.2987.98 for Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-06-30
Updated:
2024-01-17

ID:
CISEC:2411
Title:
Out of bounds write in PDFium
Type:
Web
Bulletins:
CISEC:2411
CVE-2017-5032
Severity:
Medium
Description:
PDFium in Google Chrome prior to 57.0.2987.98 for Windows could be made to increment off the end of a buffer, which allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
Applies to:
Google Chrome
Created:
2017-06-30
Updated:
2024-01-17

ID:
CISEC:2413
Title:
Multiple out of bounds writes in ChunkDemuxer
Type:
Web
Bulletins:
CISEC:2413
CVE-2017-5037
Severity:
Medium
Description:
An integer overflow in FFmpeg in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to perform an out of bounds memory write via a crafted video file, related to ChunkDemuxer.
Applies to:
Google Chrome
Created:
2017-06-30
Updated:
2024-01-17

ID:
CISEC:2401
Title:
Microsoft Malware Protection Engine Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2401
CVE-2017-8542
Severity:
Medium
Description:
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8535, CVE-2017-8536, CVE-2017-8537, and CVE-2017-8539.
Applies to:
Created:
2017-06-30
Updated:
2024-01-17

ID:
CISEC:2402
Title:
Microsoft Malware Protection Engine Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2402
CVE-2017-8539
Severity:
Medium
Description:
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8535, CVE-2017-8536, CVE-2017-8537, and CVE-2017-8542.
Applies to:
Created:
2017-06-30
Updated:
2024-01-17

ID:
CISEC:2399
Title:
Microsoft Edge Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2399
CVE-2017-0241
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Microsoft Edge renders a domain-less page in the URL, which could allow Microsoft Edge to perform actions in the context of the Intranet Zone and access functionality that is not typically available to the browser when browsing in the context of the Internet Zone, aka "Microsoft Edge Elevation of Privilege Vulnerability." This CVE ID is unique from CVE-2017-0233.
Applies to:
Microsoft Edge
Created:
2017-06-30
Updated:
2024-01-17

ID:
CISEC:2407
Title:
Memory corruption in V8
Type:
Web
Bulletins:
CISEC:2407
CVE-2017-5030
Severity:
Medium
Description:
Incorrect handling of complex species in V8 in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac and 57.0.2987.108 for Android allowed a remote attacker to execute arbitrary code via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-06-30
Updated:
2024-01-17

ID:
CISEC:2412
Title:
Integer overflow in libxslt
Type:
Web
Bulletins:
CISEC:2412
CVE-2017-5029
Severity:
Medium
Description:
The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-06-30
Updated:
2024-01-17

ID:
CISEC:2405
Title:
Information disclosure in V8
Type:
Web
Bulletins:
CISEC:2405
CVE-2017-5040
Severity:
Medium
Description:
V8 in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android was missing a neutering check, which allowed a remote attacker to read values in memory via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-06-30
Updated:
2024-01-17

ID:
CISEC:2410
Title:
Incorrect security UI in Omnibox
Type:
Web
Bulletins:
CISEC:2410
CVE-2017-5035
Severity:
Medium
Description:
Google Chrome prior to 57.0.2987.98 for Windows and Mac had a race condition, which could cause Chrome to display incorrect certificate information for a site.
Applies to:
Google Chrome
Created:
2017-06-30
Updated:
2024-01-17

ID:
CISEC:2403
Title:
Bypass of Content Security Policy in Blink
Type:
Web
Bulletins:
CISEC:2403
CVE-2017-5033
Severity:
Medium
Description:
Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android failed to correctly propagate CSP restrictions to local scheme pages, which allowed a remote attacker to bypass content security policy via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-06-30
Updated:
2024-01-17

ID:
CISEC:2627
Title:
Security Update for Windows Vista, Windows Server 2008
Type:
Software
Bulletins:
CISEC:2627
Severity:
Low
Description:
A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft.
Applies to:
Created:
2017-06-28
Updated:
2017-07-28

ID:
CISEC:2621
Title:
Security Update for Windows Server 2008, Windows Vista for x64-based Systems
Type:
Software
Bulletins:
CISEC:2621
Severity:
Low
Description:
A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft.
Applies to:
Created:
2017-06-28
Updated:
2017-07-28

ID:
CISEC:2612
Title:
Security Update for Microsoft Office 2007
Type:
Software
Bulletins:
CISEC:2612
Severity:
Low
Description:
A security vulnerability exists in Microsoft Office 2007 that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability.
Applies to:
Microsoft Office 2007
Created:
2017-06-28
Updated:
2017-07-28

ID:
CISEC:2616
Title:
April, 2017 Security Only Quality Update for Windows Server 2012
Type:
Software
Bulletins:
CISEC:2616
Severity:
Low
Description:
April, 2017 Security Only Quality Update for Windows Server 2012 (KB4015548)
Applies to:
Created:
2017-06-28
Updated:
2017-07-28

ID:
CISEC:2620
Title:
April, 2017 Security Only Quality Update for Windows 7 for x64-based Systems
Type:
Software
Bulletins:
CISEC:2620
Severity:
Low
Description:
April, 2017 Security Only Quality Update for Windows 7 for x64-based Systems (KB4015546)
Applies to:
Created:
2017-06-28
Updated:
2017-07-28

ID:
CISEC:2625
Title:
April, 2017 Security Only Quality Update for Windows 7
Type:
Software
Bulletins:
CISEC:2625
Severity:
Low
Description:
April, 2017 Security Only Quality Update for Windows 7 (KB4015546)
Applies to:
Created:
2017-06-28
Updated:
2017-07-28

ID:
CISEC:2622
Title:
April, 2017 Security Monthly Quality Rollup for Windows Server 2012
Type:
Software
Bulletins:
CISEC:2622
Severity:
Low
Description:
April, 2017 Security Monthly Quality Rollup for Windows Server 2012 (KB4015551)
Applies to:
Created:
2017-06-28
Updated:
2017-07-28

ID:
CISEC:2615
Title:
April, 2017 Security Monthly Quality Rollup for Windows 7 for x64-based Systems
Type:
Software
Bulletins:
CISEC:2615
Severity:
Low
Description:
April, 2017 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4015549)
Applies to:
Created:
2017-06-28
Updated:
2017-07-28

ID:
CISEC:2617
Title:
April, 2017 Security Monthly Quality Rollup for Windows 7
Type:
Software
Bulletins:
CISEC:2617
Severity:
Low
Description:
April, 2017 Security Monthly Quality Rollup for Windows 7 (KB4015549)
Applies to:
Created:
2017-06-28
Updated:
2017-07-28

ID:
CVE-2015-3840
Title:
The MessageStatusReceiver service in the AndroidManifest.XML in Android 5.1.1 and earlier allows local users to alter sent/received statuses of SMS and MMS messages without the associated "WRITE_SMS" permission.
Type:
Mobile Devices
Bulletins:
CVE-2015-3840
Severity:
Low
Description:
The MessageStatusReceiver service in the AndroidManifest.XML in Android 5.1.1 and earlier allows local users to alter sent/received statuses of SMS and MMS messages without the associated "WRITE_SMS" permission.
Applies to:
Created:
2017-06-27
Updated:
2024-01-17

ID:
CISEC:2377
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2377
CVE-2017-0258
Severity:
Low
Description:
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows authenticated attackers to obtain sensitive information via a specially crafted document, aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-0175, CVE-2017-0220, and CVE-2017-0259.
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2378
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2378
CVE-2017-0175
Severity:
Low
Description:
The Windows kernel in Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows authenticated attackers to obtain sensitive information via a specially crafted document, aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-0220, CVE-2017-0258, and CVE-2017-0259.
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2379
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2379
CVE-2017-0259
Severity:
Low
Description:
The Windows kernel in Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows authenticated attackers to obtain sensitive information via a specially crafted document, aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-0175, CVE-2017-0220, and CVE-2017-0258.
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2384
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2384
CVE-2017-0220
Severity:
Low
Description:
The Windows kernel in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows Server 2012 Gold allows authenticated attackers to obtain sensitive information via a specially crafted document, aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-0175, CVE-2017-0258, and CVE-2017-0259.
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2380
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2380
CVE-2017-0244
Severity:
Medium
Description:
The kernel in Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows locally authenticated attackers to gain privileges via a crafted application, or in Windows 7 for x64-based systems, cause denial of service, aka "Windows Kernel Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2373
Title:
Windows Hyper-V vSMB Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2373
CVE-2017-0212
Severity:
Medium
Description:
Windows Hyper-V allows an elevation of privilege vulnerability when Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 fail to properly validate vSMB packet data, aka "Windows Hyper-V vSMB Elevation of Privilege Vulnerability".
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2385
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2385
CVE-2017-0190
Severity:
Low
Description:
The GDI component in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "GDI Information Disclosure Vulnerability."
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2390
Title:
Windows DNS Server Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2390
CVE-2017-0171
Severity:
Medium
Description:
Windows DNS Server allows a denial of service vulnerability when Microsoft Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 Gold and R2, and Windows Server 2016 are configured to answer version queries, aka "Windows DNS Server Denial of Service Vulnerability".
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2375
Title:
Windows COM Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2375
CVE-2017-0214
Severity:
Medium
Description:
Windows COM in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation privilege vulnerability when Windows fails to properly validate input before loading type libraries, aka "Windows COM Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-0213.
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2376
Title:
Windows COM Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2376
CVE-2017-0213
Severity:
Low
Description:
Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation privilege vulnerability when an attacker runs a specially crafted application, aka "Windows COM Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-0214.
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2383
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2383
CVE-2017-0245
Severity:
Low
Description:
The kernel-mode drivers in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1 and Windows Server 2012 Gold allow a local authenticated attacker to execute a specially crafted application to obtain kernel information, aka "Win32k Information Disclosure Vulnerability."
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2381
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2381
CVE-2017-0246
Severity:
Medium
Description:
The Graphics Component in the kernel-mode drivers in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to gain privileges via a crafted application or in Windows 7 for x64-based Systems and later, cause denial of service, aka "Win32k Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2382
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2382
CVE-2017-0263
Severity:
High
Description:
The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2389
Title:
Microsoft SharePoint XSS Vulnerability
Type:
Software
Bulletins:
CISEC:2389
CVE-2017-0255
Severity:
Low
Description:
Microsoft SharePoint Foundation 2013 SP1 allows an elevation of privilege vulnerability when it does not properly sanitize a specially crafted web request, aka "Microsoft SharePoint XSS Vulnerability".
Applies to:
Microsoft SharePoint Foundation 2013
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2394
Title:
Microsoft Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2394
CVE-2017-0281
Severity:
High
Description:
Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2016, Office Online Server 2016, Office Web Apps 2010 SP2,Office Web Apps 2013 SP1, Project Server 2013 SP1, SharePoint Enterprise Server 2013 SP1, SharePoint Enterprise Server 2016, SharePoint Foundation 2013 SP1, Sharepoint Server 2010 SP2, Word 2016, and Skype for Business 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0261 and CVE-2017-0262.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Online Server 2016
Microsoft Office Web Apps 2010
Microsoft Office Web Apps 2013
Microsoft Project Server 2013
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2392
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2392
CVE-2017-0254
Severity:
High
Description:
Microsoft Word 2007, Office 2010 SP2, Word 2010 SP2, Office Compatibility Pack SP3, Office for Mac 2011, Office for Mac 2016, Microsoft Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, Word 2013 RT SP1, Word 2013 SP1, Word Automation Services on Microsoft SharePoint Server 2013 SP1, Office Word Viewer, SharePoint Enterprise Server 2016, and Word 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-0264 and CVE-2017-0265.
Applies to:
Microsoft Office 2010
Microsoft Office Compatibility Pack
Microsoft Office Web Apps 2010
Microsoft Office Web Apps 2013
Microsoft SharePoint Enterprise Server 2016
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word Viewer
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2372
Title:
Microsoft Malware Protection Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2372
CVE-2017-0290
Severity:
High
Description:
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 does not properly scan a specially crafted file leading to memory corruption, aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability."
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2391
Title:
Microsoft ActiveX Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2391
CVE-2017-0242
Severity:
Medium
Description:
An information disclosure vulnerability exists in the way some ActiveX objects are instantiated, aka "Microsoft ActiveX Information Disclosure Vulnerability."
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2374
Title:
Dxgkrnl.sys Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2374
CVE-2017-0077
Severity:
High
Description:
The kernel-mode drivers in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow a local authenticated attacker to execute a specially crafted application to obtain information, or in Windows 7 and later, cause denial of service, aka "Win32k Information Disclosure Vulnerability."
Applies to:
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2393
Title:
.Net Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2393
CVE-2017-0248
Severity:
Medium
Description:
Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka ".NET Security Feature Bypass Vulnerability."
Applies to:
Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.5.2
Microsoft .NET Framework 4.6
Microsoft .NET Framework 4.6.1
Microsoft .NET Framework 4.6.2
Microsoft .NET Framework 4.7
Created:
2017-06-23
Updated:
2024-01-17

ID:
CISEC:2338
Title:
Windows SMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2338
CVE-2017-0272
Severity:
High
Description:
The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka "Windows SMB Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0277, CVE-2017-0278, and CVE-2017-0279.
Applies to:
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2342
Title:
Windows SMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2342
CVE-2017-0278
Severity:
Medium
Description:
The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka "Windows SMB Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0272, CVE-2017-0277, and CVE-2017-0279.
Applies to:
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2344
Title:
Windows SMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2344
CVE-2017-0277
Severity:
Medium
Description:
The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka "Windows SMB Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0272, CVE-2017-0278, and CVE-2017-0279.
Applies to:
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2347
Title:
Windows SMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2347
CVE-2017-0279
Severity:
Medium
Description:
The Microsoft Server Message Block 1.0 (SMBv1) server on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to execute remote code by the way it handles certain requests, aka "Windows SMB Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0272, CVE-2017-0277, and CVE-2017-0278.
Applies to:
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2337
Title:
Windows SMB Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2337
CVE-2017-0275
Severity:
Medium
Description:
Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka "Windows SMB Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, and CVE-2017-0276.
Applies to:
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2339
Title:
Windows SMB Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2339
CVE-2017-0274
Severity:
Medium
Description:
Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka "Windows SMB Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0275, and CVE-2017-0276.
Applies to:
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2340
Title:
Windows SMB Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2340
CVE-2017-0270
Severity:
Medium
Description:
Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka "Windows SMB Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.
Applies to:
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2343
Title:
Windows SMB Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2343
CVE-2017-0276
Severity:
Medium
Description:
Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka "Windows SMB Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, and CVE-2017-0275.
Applies to:
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2334
Title:
Windows SMB Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2334
CVE-2017-0271
Severity:
Medium
Description:
Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka "Windows SMB Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0267, CVE-2017-0268, CVE-2017-0270, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.
Applies to:
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2336
Title:
Windows SMB Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2336
CVE-2017-0268
Severity:
Medium
Description:
Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka "Windows SMB Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0267, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.
Applies to:
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2346
Title:
Windows SMB Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2346
CVE-2017-0267
Severity:
Medium
Description:
Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka "Windows SMB Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.
Applies to:
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2341
Title:
Windows SMB Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2341
CVE-2017-0280
Severity:
High
Description:
The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka "Windows SMB Denial of Service Vulnerability". This CVE ID is unique from CVE-2017-0269 and CVE-2017-0273.
Applies to:
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2345
Title:
Windows SMB Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2345
CVE-2017-0269
Severity:
Medium
Description:
The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka "Windows SMB Denial of Service Vulnerability". This CVE ID is unique from CVE-2017-0273 and CVE-2017-0280.
Applies to:
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2335
Title:
Windows SMB Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2335
CVE-2017-0273
Severity:
Medium
Description:
The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka "Windows SMB Denial of Service Vulnerability". This CVE ID is unique from CVE-2017-0269 and CVE-2017-0280.
Applies to:
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2352
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2352
CVE-2017-0236
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Edge in the way that the Chakra JavaScript engine renders when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0224, CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0234, CVE-2017-0235, and CVE-2017-0238.
Applies to:
Microsoft Edge
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2353
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2353
CVE-2017-0228
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft browsers in the way JavaScript engines render when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0224, CVE-2017-0229, CVE-2017-0230, CVE-2017-0234, CVE-2017-0235, CVE-2017-0236, and CVE-2017-0238.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2354
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2354
CVE-2017-0230
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Edge in the way JavaScript engines render when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0224, CVE-2017-0228, CVE-2017-0229, CVE-2017-0234, CVE-2017-0235, CVE-2017-0236, and CVE-2017-0238.
Applies to:
Microsoft Edge
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2355
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2355
CVE-2017-0224
Severity:
High
Description:
A remote code execution vulnerability exists in the way JavaScript engines render when handling objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0234, CVE-2017-0235, CVE-2017-0236, and CVE-2017-0238.
Applies to:
Microsoft Edge
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2357
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2357
CVE-2017-0240
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Edge in the way affected Microsoft scripting engines render when handling objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0221 and CVE-2017-0227.
Applies to:
Microsoft Edge
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2359
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2359
CVE-2017-0234
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Edge in the way that the Chakra JavaScript engine renders when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0224, CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0235, CVE-2017-0236, and CVE-2017-0238.
Applies to:
Microsoft Edge
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2360
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2360
CVE-2017-0238
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft browsers in the way JavaScript scripting engines handle objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0224, CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0234, CVE-2017-0235, and CVE-2017-0236.
Applies to:
Microsoft Internet Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2361
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2361
CVE-2017-0229
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Edge in the way JavaScript engines render when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0224, CVE-2017-0228, CVE-2017-0230, CVE-2017-0234, CVE-2017-0235, CVE-2017-0236, and CVE-2017-0238.
Applies to:
Microsoft Edge
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2365
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2365
CVE-2017-0235
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Edge in the way that the Chakra JavaScript engine renders when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0224, CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0234, CVE-2017-0236, and CVE-2017-0238.
Applies to:
Microsoft Edge
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2332
Title:
Microsoft Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2332
CVE-2017-0262
Severity:
High
Description:
Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0261 and CVE-2017-0281.
Applies to:
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2333
Title:
Microsoft Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2333
CVE-2017-0261
Severity:
High
Description:
Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0262 and CVE-2017-0281.
Applies to:
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2362
Title:
Microsoft Edge Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2362
CVE-2017-0266
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Edge in the way affected Microsoft scripting engines render when handling objects in memory, aka "Microsoft Edge Remote Code Execution Vulnerability."
Applies to:
Microsoft Edge
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2351
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2351
CVE-2017-0227
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Edge in the way affected Microsoft scripting engines render when handling objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0221 and CVE-2017-0240.
Applies to:
Microsoft Edge
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2363
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2363
CVE-2017-0221
Severity:
High
Description:
A vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0227 and CVE-2017-0240.
Applies to:
Microsoft Edge
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2364
Title:
Microsoft Edge Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2364
CVE-2017-0233
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Microsoft Edge that could allow an attacker to escape from the AppContainer sandbox in the browser, aka "Microsoft Edge Elevation of Privilege Vulnerability." This CVE ID is unique from CVE-2017-0241.
Applies to:
Microsoft Edge
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2350
Title:
Microsoft Browser Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:2350
CVE-2017-0231
Severity:
Medium
Description:
A spoofing vulnerability exists when Microsoft browsers render SmartScreen Filter, aka "Microsoft Browser Spoofing Vulnerability."
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2366
Title:
Internet Explorer Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2366
CVE-2017-0064
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Internet Explorer that allows for bypassing Mixed Content warnings, aka "Internet Explorer Security Feature Bypass Vulnerability."
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2356
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2356
CVE-2017-0222
Severity:
High
Description:
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0226.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2358
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2358
CVE-2017-0226
Severity:
High
Description:
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0222.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2349
Title:
Intel Active Management Technology, Intel Small Business Technology, and Intel Standard Manageability Escalation of Privilege
Type:
Software
Bulletins:
CISEC:2349
CVE-2017-5689
Severity:
High
Description:
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
Applies to:
Intel Active Management Technology
Created:
2017-06-16
Updated:
2024-01-17

ID:
CISEC:2505
Title:
Vulnerable version of JetBrains TeamCity
Type:
Software
Bulletins:
CISEC:2505
Severity:
Low
Description:
Vulnerable version of JetBrains TeamCity.
Applies to:
JetBrains TeamCity
Created:
2017-06-14
Updated:
2017-07-14

ID:
CISEC:2269
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2269
CVE-2017-3015
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the JBIG2 parsing functionality. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2270
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2270
CVE-2017-3026
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable use after free vulnerability when manipulating an internal data structure. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2271
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2271
CVE-2017-3020
Severity:
Medium
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability in the weblink module.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2272
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2272
CVE-2017-3028
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the image conversion module, related to processing of TIFF files. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2273
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2273
CVE-2017-3021
Severity:
Medium
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability in the JPEG 2000 parser engine.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2274
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2274
CVE-2017-3024
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability when manipulating PDF annotations. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2275
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2275
CVE-2017-3027
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable use after free vulnerability in the XFA module, related to the choiceList element. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2276
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2276
CVE-2017-3012
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an insecure library loading (DLL hijacking) vulnerability in the OCR plugin.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2277
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2277
CVE-2017-3029
Severity:
Medium
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability when handling a JPEG 2000 code-stream.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2278
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2278
CVE-2017-3013
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an insecure library loading (DLL hijacking) vulnerability in a DLL related to remote logging.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2279
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2279
CVE-2017-3019
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the Product Representation Compact (PRC) format parser. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2280
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2280
CVE-2017-3031
Severity:
Medium
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability in the XSLT engine.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2281
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2281
CVE-2017-3018
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the renderer functionality. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2282
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2282
CVE-2017-3011
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable integer overflow vulnerability in the CCITT fax PDF filter. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2283
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2283
CVE-2017-3017
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability when handling a malformed PDF file. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2284
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2284
CVE-2017-3022
Severity:
Medium
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability when parsing the header of a JPEG 2000 file.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2285
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2285
CVE-2017-3014
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable use after free vulnerability in XML Forms Architecture (XFA) related to reset form functionality. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2286
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2286
CVE-2017-3030
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the AES module. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2287
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2287
CVE-2017-3025
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability related to internal object representation manipulation. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CISEC:2288
Title:
Vulnerability Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier
Type:
Software
Bulletins:
CISEC:2288
CVE-2017-3023
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the JPEG 2000 code-stream tile functionality. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-09
Updated:
2024-01-17

ID:
CVE-2014-7919
Title:
b/libs/gui/ISurfaceComposer.cpp in Android allows attackers to trigger a denial of service (null pointer dereference and process crash).
Type:
Mobile Devices
Bulletins:
CVE-2014-7919
SFBID99014
Severity:
Medium
Description:
b/libs/gui/ISurfaceComposer.cpp in Android allows attackers to trigger a denial of service (null pointer dereference and process crash).
Applies to:
Created:
2017-06-08
Updated:
2024-01-17

ID:
CVE-2015-3830
Title:
The stock Android browser address bar in all Android operating systems suffers from Address Bar Spoofing, which allows remote attackers to trick a victim by displaying a malicious page for legitimate domain names.
Type:
Mobile Devices
Bulletins:
CVE-2015-3830
Severity:
Medium
Description:
The stock Android browser address bar in all Android operating systems suffers from Address Bar Spoofing, which allows remote attackers to trick a victim by displaying a malicious page for legitimate domain names.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9929
Title:
In WCDMA in all Android releases from CAF using the Linux kernel, a Use of Out-of-range Pointer Offset vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9929
SFBID98235
Severity:
High
Description:
In WCDMA in all Android releases from CAF using the Linux kernel, a Use of Out-of-range Pointer Offset vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9930
Title:
In WCDMA in all Android releases from CAF using the Linux kernel, a Use After Free vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9930
SFBID98323
Severity:
High
Description:
In WCDMA in all Android releases from CAF using the Linux kernel, a Use After Free vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9927
Title:
In UIM in all Android releases from CAF using the Linux kernel, a Buffer Copy without Checking Size of Input vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9927
Severity:
High
Description:
In UIM in all Android releases from CAF using the Linux kernel, a Buffer Copy without Checking Size of Input vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9949
Title:
In TrustZone in all Android releases from CAF using the Linux kernel, an Untrusted Pointer Dereference vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9949
SFBID98250
Severity:
High
Description:
In TrustZone in all Android releases from CAF using the Linux kernel, an Untrusted Pointer Dereference vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2015-9005
Title:
In TrustZone in all Android releases from CAF using the Linux kernel, an Integer Overflow to Buffer Overflow vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2015-9005
SFBID98322
Severity:
High
Description:
In TrustZone in all Android releases from CAF using the Linux kernel, an Integer Overflow to Buffer Overflow vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9947
Title:
In TrustZone in all Android releases from CAF using the Linux kernel, an Information Exposure vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9947
SFBID98248
Severity:
Medium
Description:
In TrustZone in all Android releases from CAF using the Linux kernel, an Information Exposure vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9951
Title:
In TrustZone in all Android releases from CAF using the Linux kernel, an Information Exposure Through Timing Discrepancy vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9951
SFBID98252
Severity:
Medium
Description:
In TrustZone in all Android releases from CAF using the Linux kernel, an Information Exposure Through Timing Discrepancy vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9948
Title:
In TrustZone in all Android releases from CAF using the Linux kernel, an Improper Validation of Array Index vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9948
SFBID98249
Severity:
High
Description:
In TrustZone in all Android releases from CAF using the Linux kernel, an Improper Validation of Array Index vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9945
Title:
In TrustZone in all Android releases from CAF using the Linux kernel, an Improper Authorization vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9945
SFBID98246
Severity:
High
Description:
In TrustZone in all Android releases from CAF using the Linux kernel, an Improper Authorization vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2015-9007
Title:
In TrustZone in all Android releases from CAF using the Linux kernel, a Double Free vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2015-9007
SFBID98324
Severity:
High
Description:
In TrustZone in all Android releases from CAF using the Linux kernel, a Double Free vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9944
Title:
In the Secure File System in all Android releases from CAF using the Linux kernel, an Integer Overflow to Buffer Overflow vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9944
SFBID98245
Severity:
High
Description:
In the Secure File System in all Android releases from CAF using the Linux kernel, an Integer Overflow to Buffer Overflow vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9952
Title:
In the Secure File System in all Android releases from CAF using the Linux kernel, a capture-replay vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9952
SFBID98253
Severity:
High
Description:
In the Secure File System in all Android releases from CAF using the Linux kernel, a capture-replay vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9941
Title:
In the Embedded File System in all Android releases from CAF using the Linux kernel, a Time-of-Check Time-of-Use Race Condition vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9941
SFBID98242
Severity:
High
Description:
In the Embedded File System in all Android releases from CAF using the Linux kernel, a Time-of-Check Time-of-Use Race Condition vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2015-9006
Title:
In Resource Power Manager (RPM) in all Android releases from CAF using the Linux kernel, an Improper Access Control vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2015-9006
SFBID98321
Severity:
High
Description:
In Resource Power Manager (RPM) in all Android releases from CAF using the Linux kernel, an Improper Access Control vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9923
Title:
In NAS in all Android releases from CAF using the Linux kernel, a Buffer Copy without Checking Size of Input vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9923
SFBID98225
Severity:
High
Description:
In NAS in all Android releases from CAF using the Linux kernel, a Buffer Copy without Checking Size of Input vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9925
Title:
In HDR in all Android releases from CAF using the Linux kernel, a Buffer Copy without Checking Size of Input vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9925
SFBID98227
Severity:
High
Description:
In HDR in all Android releases from CAF using the Linux kernel, a Buffer Copy without Checking Size of Input vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9926
Title:
In GNSS in all Android releases from CAF using the Linux kernel, a Use After Free vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9926
SFBID98228
Severity:
High
Description:
In GNSS in all Android releases from CAF using the Linux kernel, a Use After Free vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9928
Title:
In GERAN in all Android releases from CAF using the Linux kernel, a Buffer Copy without Checking Size of Input vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9928
SFBID98233
Severity:
High
Description:
In GERAN in all Android releases from CAF using the Linux kernel, a Buffer Copy without Checking Size of Input vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9950
Title:
In Core Kernel in all Android releases from CAF using the Linux kernel, an Improper Authorization vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9950
SFBID98251
Severity:
High
Description:
In Core Kernel in all Android releases from CAF using the Linux kernel, an Improper Authorization vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9946
Title:
In Core Kernel in all Android releases from CAF using the Linux kernel, a Use After Free vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9946
SFBID98247
Severity:
High
Description:
In Core Kernel in all Android releases from CAF using the Linux kernel, a Use After Free vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9943
Title:
In Core Kernel in all Android releases from CAF using the Linux kernel, a Null Pointer Dereference vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9943
SFBID98244
Severity:
High
Description:
In Core Kernel in all Android releases from CAF using the Linux kernel, a Null Pointer Dereference vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9942
Title:
In Boot in all Android releases from CAF using the Linux kernel, a Use of Uninitialized Variable vulnerability could potentially exist.
Type:
Mobile Devices
Bulletins:
CVE-2014-9942
SFBID98243
Severity:
High
Description:
In Boot in all Android releases from CAF using the Linux kernel, a Use of Uninitialized Variable vulnerability could potentially exist.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CVE-2014-9924
Title:
In 1x in all Android releases from CAF using the Linux kernel, a Signed to Unsigned Conversion Error could potentially occur.
Type:
Mobile Devices
Bulletins:
CVE-2014-9924
SFBID98226
Severity:
High
Description:
In 1x in all Android releases from CAF using the Linux kernel, a Signed to Unsigned Conversion Error could potentially occur.
Applies to:
Created:
2017-06-06
Updated:
2024-01-17

ID:
CISEC:2235
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2235
CVE-2017-0158
Severity:
High
Description:
An elevation of privilege vulnerability exists when Microsoft Windows running on Windows 10, Windows 10 1511, Windows 8.1 Windows RT 8.1, and Windows Server 2012 R2 fails to properly sanitize handles in memory, aka "Scripting Engine Memory Corruption Vulnerability."
Applies to:
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2222
Title:
libjpeg Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2222
CVE-2013-6629
Severity:
Medium
Description:
An information disclosure vulnerability exists within the open-source libjpeg image-processing library where it fails to properly handle objects in memory, allowing an attacker to retrieve information that could lead to an Address Space Layout Randomization (ASLR) bypass.
Applies to:
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2232
Title:
LDAP Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2232
CVE-2017-0166
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when LDAP request buffer lengths are improperly calculated. In a remote attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to send malicious traffic to a Domain Controller, aka "LDAP Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2224
Title:
Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2224
CVE-2017-0163
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Remote Code Execution Vulnerability." This CVE ID is unique from CVE-2017-0162, CVE-2017-0180, and CVE-2017-0181.
Applies to:
Microsoft Windows Hyper-V
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2226
Title:
Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2226
CVE-2017-0162
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a Windows 10, Windows 8.1, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Remote Code Execution Vulnerability." This CVE ID is unique from CVE-2017-0163, CVE-2017-0180, and CVE-2017-0181.
Applies to:
Microsoft Windows Hyper-V
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2229
Title:
Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2229
CVE-2017-0180
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Remote Code Execution Vulnerability." This CVE ID is unique from CVE-2017-0162, CVE-2017-0163, and CVE-2017-0181.
Applies to:
Microsoft Windows Hyper-V
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2239
Title:
Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2239
CVE-2017-0181
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a Windows 10 or Windows Server 2016 host server fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Remote Code Execution Vulnerability." This CVE ID is unique from CVE-2017-0162, CVE-2017-0163, and CVE-2017-0180.
Applies to:
Microsoft Windows Hyper-V
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2225
Title:
Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2225
CVE-2017-0169
Severity:
Medium
Description:
An information disclosure vulnerability exists when Windows Hyper-V running on a Windows 8.1, Windows Server 2012. or Windows Server 2012 R2 host operating system fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Information Disclosure Vulnerability." This CVE ID is unique from CVE-2017-0168.
Applies to:
Microsoft Windows Hyper-V
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2231
Title:
Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2231
CVE-2017-0168
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows Hyper-V Network Switch running on a Windows 8.1, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012 R2 host operating system fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Information Disclosure Vulnerability." This CVE ID is unique from CVE-2017-0169.
Applies to:
Microsoft Windows Hyper-V
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2227
Title:
Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2227
CVE-2017-0182
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch running on a Windows 10, Windows Server 2008 R2, Windows 8.1, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0178, CVE-2017-0179, CVE-2017-0183, CVE-2017-0184, CVE-2017-0185, and CVE-2017-0186.
Applies to:
Microsoft Windows Hyper-V
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2228
Title:
Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2228
CVE-2017-0178
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V running on Windows 10, Windows 10 1511, Windows 10 1607, Windows 8.1, Windows Server 2012 R2, and Windows Server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0179, CVE-2017-0182, CVE-2017-0183, CVE-2017-0184, CVE-2017-0185, and CVE-2017-0186.
Applies to:
Microsoft Windows Hyper-V
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2230
Title:
Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2230
CVE-2017-0183
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch running on a Windows 10, Windows Server 2008 R2, Windows 8.1, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0178, CVE-2017-0179, CVE-2017-0182, CVE-2017-0184, CVE-2017-0185, and CVE-2017-0186.
Applies to:
Microsoft Windows Hyper-V
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2233
Title:
Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2233
CVE-2017-0179
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V running on a Windows 10, Windows 8.1, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0178, CVE-2017-0182, CVE-2017-0183, CVE-2017-0184, CVE-2017-0185, and CVE-2017-0186.
Applies to:
Microsoft Windows Hyper-V
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2234
Title:
Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2234
CVE-2017-0185
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch running on a Windows 10, Windows 8.1, Windows Server 2012, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0178, CVE-2017-0179, CVE-2017-0182, CVE-2017-0183, CVE-2017-0184, and CVE-2017-0186.
Applies to:
Microsoft Windows Hyper-V
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2236
Title:
Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2236
CVE-2017-0184
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V running on a host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0178, CVE-2017-0179, CVE-2017-0182, CVE-2017-0183, CVE-2017-0185, and CVE-2017-0186.
Applies to:
Microsoft Windows Hyper-V
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2237
Title:
Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2237
CVE-2017-0186
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch running on a Windows 10, Windows 8.1, Windows Server 2012, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0178, CVE-2017-0179, CVE-2017-0182, CVE-2017-0183, CVE-2017-0184, and CVE-2017-0185.
Applies to:
Microsoft Windows Hyper-V
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2250
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable use after free vulnerability
Type:
Software
Bulletins:
CISEC:2250
CVE-2017-3047
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable use after free vulnerability in the JavaScript engine's annotation-related API. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2256
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable use after free vulnerability
Type:
Software
Bulletins:
CISEC:2256
CVE-2017-3035
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable use after free vulnerability in the XML Forms Architecture (XFA) engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2242
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable use after free vulnerability
Type:
Software
Bulletins:
CISEC:2242
CVE-2017-3057
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable use after free vulnerability in the JavaScript API related to the collaboration functionality. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2251
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:2251
CVE-2017-3040
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the JBIG2 image compression module. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2252
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:2252
CVE-2017-3050
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to parsing of GIF files. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2255
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:2255
CVE-2017-3037
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the JavaScript engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2264
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:2264
CVE-2017-3065
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the font manipulation functionality. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2266
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:2266
CVE-2017-3038
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability when parsing TTF (TrueType font format) stream data. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2257
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:2257
CVE-2017-3056
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the JavaScript engine, related to string manipulation. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2260
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:2260
CVE-2017-3039
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the PPKLite security handler. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2261
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:2261
CVE-2017-3041
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability when parsing font data in the MakeAccessible plugin. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2267
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:2267
CVE-2017-3054
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to manipulation of EMF files. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2240
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:2240
CVE-2017-3044
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the JPEG 2000 engine, related to image scaling. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2243
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:2243
CVE-2017-3036
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in image conversion related to processing of the PCX (picture exchange) file format. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2244
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:2244
CVE-2017-3051
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to parsing of JPEG files. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2258
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable integer overflow vulnerability
Type:
Software
Bulletins:
CISEC:2258
CVE-2017-3034
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable integer overflow vulnerability in the XML Forms Architecture (XFA) engine, related to layout functionality. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2246
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable heap overflow vulnerability
Type:
Software
Bulletins:
CISEC:2246
CVE-2017-3048
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable heap overflow vulnerability in the image conversion engine, related to internal scan line representation in TIFF files. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2248
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable heap overflow vulnerability
Type:
Software
Bulletins:
CISEC:2248
CVE-2017-3049
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable heap overflow vulnerability in the image conversion engine, related to internal tile manipulation in TIFF files. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2265
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable heap overflow vulnerability
Type:
Software
Bulletins:
CISEC:2265
CVE-2017-3042
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable heap overflow vulnerability in image conversion, related to parsing offsets in TIFF files. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2245
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable heap overflow vulnerability
Type:
Software
Bulletins:
CISEC:2245
CVE-2017-3055
Severity:
High
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable heap overflow vulnerability in JPEG 2000 parsing of the fragment list tag. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2247
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability
Type:
Software
Bulletins:
CISEC:2247
CVE-2017-3032
Severity:
Medium
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability in the JPEG 2000 code-stream parser.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2249
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability
Type:
Software
Bulletins:
CISEC:2249
CVE-2017-3033
Severity:
Medium
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability when handling JPEG 2000 code-stream tile data.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2253
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability
Type:
Software
Bulletins:
CISEC:2253
CVE-2017-3046
Severity:
Medium
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability in the JPEG 2000 parser, related to contiguous code-stream parsing.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2254
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability
Type:
Software
Bulletins:
CISEC:2254
CVE-2017-3052
Severity:
Medium
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability in the image conversion engine, related to parsing of EMF - enhanced meta file format.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2262
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability
Type:
Software
Bulletins:
CISEC:2262
CVE-2017-3045
Severity:
Medium
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability in the JPEG 2000 code-stream parser.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2263
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability
Type:
Software
Bulletins:
CISEC:2263
CVE-2017-3053
Severity:
Medium
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability in the image conversion engine, related to parsing of the APP13 segment in JPEG files.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2241
Title:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability
Type:
Software
Bulletins:
CISEC:2241
CVE-2017-3043
Severity:
Medium
Description:
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have a memory address leak vulnerability in the collaboration functionality.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2223
Title:
ADFS Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2223
CVE-2017-0159
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Windows 10 1607, Windows Server 2012 R2, and Windows 2016 when ADFS incorrectly treats requests coming from Extranet clients as Intranet requests, aka "ADFS Security Feature Bypass Vulnerability."
Applies to:
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2238
Title:
Active Directory Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2238
CVE-2017-0164
Severity:
Low
Description:
A denial of service vulnerability exists in Windows 10 1607 and Windows Server 2016 Active Directory when an authenticated attacker sends malicious search queries, aka "Active Directory Denial of Service Vulnerability."
Applies to:
Created:
2017-06-02
Updated:
2024-01-17

ID:
CISEC:2195
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2195
CVE-2017-0165
Severity:
High
Description:
An elevation of privilege vulnerability exists when Microsoft Windows running on Windows 10, Windows 10 1511, Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 fails to properly sanitize handles in memory, aka "Windows Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2194
Title:
Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2194
CVE-2017-0191
Severity:
Low
Description:
A denial of service vulnerability exists in the way that Windows 7, Windows 8.1, Windows 10, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding, aka "Windows Denial of Service Vulnerability."
Applies to:
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2215
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges
Type:
Software
Bulletins:
CISEC:2215
CVE-2017-3462
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2216
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges
Type:
Software
Bulletins:
CISEC:2216
CVE-2017-3463
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2217
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges
Type:
Software
Bulletins:
CISEC:2217
CVE-2017-3465
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.7.17 and earlier.
Applies to:
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2211
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption
Type:
Software
Bulletins:
CISEC:2211
CVE-2017-3468
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.7.17 and earlier.
Applies to:
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2209
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth
Type:
Software
Bulletins:
CISEC:2209
CVE-2017-3599
Severity:
High
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2212
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL
Type:
Software
Bulletins:
CISEC:2212
CVE-2017-3464
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2210
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: C API
Type:
Software
Bulletins:
CISEC:2210
CVE-2017-3467
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: C API). Supported versions that are affected are 5.7.17 and earlier.
Applies to:
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2218
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump
Type:
Software
Bulletins:
CISEC:2218
CVE-2017-3600
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2179
Title:
Vulnerability in the MySQL Cluster 7.2.27 and earlier, 7.3.16 and earlier, 7.4.14 and earlier and 7.5.5 and earlier – CVE-2016-3304
Type:
Software
Bulletins:
CISEC:2179
CVE-2017-3304
Severity:
Medium
Description:
Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: DD). Supported versions that are affected are 7.2.27 and earlier, 7.3.16 and earlier, 7.4.14 and earlier and 7.5.5 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.0 Base Score 5.4 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).
Applies to:
MySQL Cluster
Created:
2017-05-26
Updated:
2018-05-25

ID:
CISEC:2176
Title:
Vulnerability in Oracle MySQL 5.7.17 and earlier
Type:
Software
Bulletins:
CISEC:2176
CVE-2017-3459
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Applies to:
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2177
Title:
Vulnerability in Oracle MySQL 5.7.17 and earlier
Type:
Software
Bulletins:
CISEC:2177
CVE-2017-3454
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
Applies to:
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2182
Title:
Vulnerability in Oracle MySQL 5.7.17 and earlier
Type:
Software
Bulletins:
CISEC:2182
CVE-2017-3460
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Audit Plug-in). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Applies to:
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2189
Title:
Vulnerability in Oracle MySQL 5.7.17 and earlier
Type:
Software
Bulletins:
CISEC:2189
CVE-2017-3458
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Applies to:
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2191
Title:
Vulnerability in Oracle MySQL 5.7.17 and earlier
Type:
Software
Bulletins:
CISEC:2191
CVE-2017-3457
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Applies to:
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2193
Title:
Vulnerability in Oracle MySQL 5.7.17 and earlier
Type:
Software
Bulletins:
CISEC:2193
CVE-2017-3455
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
Applies to:
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2190
Title:
Vulnerability in Oracle MySQL 5.7.11 to 5.7.17
Type:
Software
Bulletins:
CISEC:2190
CVE-2017-3331
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). The supported version that is affected is 5.7.11 to 5.7.17. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Applies to:
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2183
Title:
Vulnerability in Oracle MySQL 5.6.35 and earlier and 5.7.17 and earlier
Type:
Software
Bulletins:
CISEC:2183
CVE-2017-3452
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.35 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Applies to:
MySQL Server 5.6
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2192
Title:
Vulnerability in Oracle MySQL 5.6.35 and earlier and 5.7.17 and earlier
Type:
Software
Bulletins:
CISEC:2192
CVE-2017-3450
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2184
Title:
Vulnerability in Oracle MySQL 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier and MariaDB before 5.5.55
Type:
Software
Bulletins:
CISEC:2184
CVE-2017-3453
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2185
Title:
Vulnerability in Oracle MySQL 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier and MariaDB before 5.5.55
Type:
Software
Bulletins:
CISEC:2185
CVE-2017-3456
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2186
Title:
Vulnerability in Oracle MySQL 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier and MariaDB before 5.5.55
Type:
Software
Bulletins:
CISEC:2186
CVE-2017-3308
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2187
Title:
Vulnerability in Oracle MySQL 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier and MariaDB before 5.5.55
Type:
Software
Bulletins:
CISEC:2187
CVE-2017-3309
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2178
Title:
Vulnerability in Oracle MySQL 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier
Type:
Software
Bulletins:
CISEC:2178
CVE-2017-3329
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Thread Pooling). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2188
Title:
Vulnerability in Oracle MySQL 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier
Type:
Software
Bulletins:
CISEC:2188
CVE-2017-3461
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2180
Title:
Vulnerability in Oracle MySQL 5.5.54 and earlier, 5.6.35 and earlier
Type:
Software
Bulletins:
CISEC:2180
CVE-2017-3305
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: C API). Supported versions that are affected are 5.5.54 and earlier and 5.6.35 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).
Applies to:
MySQL Server 5.5
MySQL Server 5.6
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2181
Title:
Vulnerability in Oracle MySQL 5.5.54 and earlier, 5.6.20 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15
Type:
Software
Bulletins:
CISEC:2181
CVE-2017-3302
Severity:
Medium
Description:
Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2206
Title:
Vulnerability in Java SE: 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13 of Oracle Java SE (subcomponent: JCE
Type:
Software
Bulletins:
CISEC:2206
CVE-2017-3511
Severity:
Low
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit.
Applies to:
JRockit
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2221
Title:
Vulnerability in Java SE: 7u131 and 8u121 of Oracle Java SE (subcomponent: AWT
Type:
Software
Bulletins:
CISEC:2221
CVE-2017-3512
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE.
Applies to:
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2214
Title:
Vulnerability in Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13 of Oracle Java SE (subcomponent: Networking
Type:
Software
Bulletins:
CISEC:2214
CVE-2017-3544
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SMTP to compromise Java SE, Java SE Embedded, JRockit.
Applies to:
JRockit
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2220
Title:
Vulnerability in Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13 of Oracle Java SE (subcomponent: Networking
Type:
Software
Bulletins:
CISEC:2220
CVE-2017-3533
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via FTP to compromise Java SE, Java SE Embedded, JRockit.
Applies to:
JRockit
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2219
Title:
Vulnerability in Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13 of Oracle Java SE (subcomponent: JAXP
Type:
Software
Bulletins:
CISEC:2219
CVE-2017-3526
Severity:
High
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit.
Applies to:
JRockit
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2208
Title:
Vulnerability in Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121 of Oracle Java SE (subcomponent: Security
Type:
Software
Bulletins:
CISEC:2208
CVE-2017-3539
Severity:
Low
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2207
Title:
Vulnerability in Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121 of Oracle Java SE (subcomponent: Networking
Type:
Software
Bulletins:
CISEC:2207
CVE-2017-3509
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded.
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2213
Title:
Vulnerability in Java SE: 6u141, 7u131 and 8u121 of Oracle Java SE (subcomponent: AWT
Type:
Software
Bulletins:
CISEC:2213
CVE-2017-3514
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE.
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2174
Title:
Microsoft Office XSS Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2174
CVE-2017-0195
Severity:
Low
Description:
Microsoft Excel Services on Microsoft SharePoint Server 2010 SP1 and SP2, Microsoft Excel Web Apps 2010 SP2, Microsoft Office Web Apps 2010 SP2, Microsoft Office Web Apps Server 2013 SP1 and Office Online Server allows remote attackers to perform cross-site scripting and run script with local user privileges via a crafted request, aka "Microsoft Office XSS Elevation of Privilege Vulnerability."
Applies to:
Microsoft Office Web Apps 2010
Microsoft Office Web Apps 2013
Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2013
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2175
Title:
Microsoft Office XSS Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2175
CVE-2017-0197
Severity:
High
Description:
Microsoft OneNote 2007 SP3 and Microsoft OneNote 2010 SP2 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office DLL Loading Vulnerability."
Applies to:
Microsoft OneNote 2007
Microsoft OneNote 2010
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2204
Title:
ATMFD.dll Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2204
CVE-2017-0192
Severity:
Medium
Description:
The Adobe Type Manager Font Driver (ATMFD.dll) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold , 1511, 1607, and 1703 allows an attacker to gain sensitive information via a specially crafted document or an untrusted website, aka "ATMFD.dll Information Disclosure Vulnerability."
Applies to:
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2205
Title:
.NET Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2205
CVE-2017-0160
Severity:
High
Description:
Microsoft .NET Framework 2.0, 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allows an attacker with access to the local system to execute malicious code, aka ".NET Remote Code Execution Vulnerability."
Applies to:
Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.5.2
Microsoft .NET Framework 4.6
Microsoft .NET Framework 4.6.1
Microsoft .NET Framework 4.6.2
Microsoft .NET Framework 4.7
Created:
2017-05-26
Updated:
2024-01-17

ID:
CISEC:2171
Title:
Windows OLE Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2171
CVE-2017-0211
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Windows 10, Windows 8.1, Windows RT 8.1, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 versions of Microsoft Windows OLE when it fails an integrity-level check, aka "Windows OLE Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2161
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2161
CVE-2017-0167
Severity:
Low
Description:
An information disclosure vulnerability exists in Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows 10, and Windows Server 2016 when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system, a.k.a. "Windows Kernel Information Disclosure Vulnerability."
Applies to:
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2130
Title:
Windows HelpPane Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2130
CVE-2017-0100
Severity:
Medium
Description:
A DCOM object in Helppane.exe in Microsoft Windows 7 SP1; Windows Server 2008 R2; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows local users to gain privileges via a crafted application, aka "Windows HelpPane Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2163
Title:
Windows Graphics Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2163
CVE-2017-0155
Severity:
Medium
Description:
The Graphics component in the kernel in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "Windows Graphics Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2165
Title:
Windows Graphics Component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2165
CVE-2017-0156
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Windows 7, Windows 8.1, Windows RT 8.1, Windows 10, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 when the Microsoft Graphics Component fails to properly handle objects in memory, aka "Windows Graphics Component Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2126
Title:
Windows DNS Query Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2126
CVE-2017-0057
Severity:
Medium
Description:
DNS client in Microsoft Windows 8.1; Windows Server 2012 R2, Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 fails to properly process DNS queries, which allows remote attackers to obtain sensitive information via (1) convincing a workstation user to visit an untrusted webpage or (2) tricking a server into sending a DNS query to a malicious DNS server, aka "Windows DNS Query Information Disclosure Vulnerability."
Applies to:
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2128
Title:
Windows DLL Loading Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2128
CVE-2017-0039
Severity:
High
Description:
Microsoft Windows Vista SP2 and Server 2008 SP2 mishandle dynamic link library (DLL) loading, which allows local users to gain privileges via a crafted application, aka "Library Loading Input Validation Remote Code Execution Vulnerability."
Applies to:
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2170
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2170
CVE-2017-0058
Severity:
Low
Description:
A Win32k information disclosure vulnerability exists in Microsoft Windows when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system, aka "Win32k Information Disclosure Vulnerability."
Applies to:
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2162
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2162
CVE-2017-0188
Severity:
Low
Description:
A Win32k information disclosure vulnerability exists in Windows 8.1, Windows RT 8.1, Windows Server 2012, Windows Server 2012 R2, Windows 10, and Windows Server 2016 when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system, aka "Win32k Information Disclosure Vulnerability." This CVE ID is unique from CVE-2017-0189.
Applies to:
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2169
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2169
CVE-2017-0189
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows 10 when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode, aka "Win32k Elevation of Privilege Vulnerability." This CVE ID is unique from CVE-2017-0188.
Applies to:
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2127
Title:
SMBv2/SMBv3 Null Dereference Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2127
CVE-2017-0016
Severity:
High
Description:
Microsoft Windows 10 Gold, 1511, and 1607; Windows 8.1; Windows RT 8.1; Windows Server 2012 R2, and Windows Server 2016 do not properly handle certain requests in SMBv2 and SMBv3 packets, which allows remote attackers to execute arbitrary code via a crafted SMBv2 or SMBv3 packet to the Server service, aka "SMBv2/SMBv3 Null Dereference Denial of Service Vulnerability."
Applies to:
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2155
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2155
CVE-2017-0093
Severity:
High
Description:
A remote code execution vulnerability in Microsoft Edge exists in the way that the Scripting Engine renders when handling objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0201.
Applies to:
Microsoft Edge
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2156
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2156
CVE-2017-0201
Severity:
High
Description:
A remote code execution vulnerability exists in Internet Explorer in the way that the JScript and VBScript engines render when handling objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0093.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2158
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2158
CVE-2017-0208
Severity:
Medium
Description:
An information disclosure vulnerability exists in Microsoft Edge when the Chakra scripting engine does not properly handle objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system, a.k.a. "Scripting Engine Information Disclosure Vulnerability."
Applies to:
Microsoft Edge
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2164
Title:
Microsoft Outlook Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2164
CVE-2017-0106
Severity:
High
Description:
Microsoft Excel 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1, and Microsoft Outlook 2016 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."
Applies to:
Microsoft Outlook 2007
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Outlook 2016
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2160
Title:
Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API
Type:
Software
Bulletins:
CISEC:2160
CVE-2017-0199
Severity:
High
Description:
Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2168
Title:
Microsoft Office Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2168
CVE-2017-0204
Severity:
Medium
Description:
Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1, and Microsoft Outlook 2016 allow remote attackers to bypass the Office Protected View via a specially crafted document, aka "Microsoft Office Security Feature Bypass Vulnerability."
Applies to:
Microsoft Outlook 2007
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Outlook 2016
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2173
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2173
CVE-2017-0194
Severity:
Medium
Description:
Microsoft Excel 2007 SP3, Microsoft Excel 2010 SP2, and Office Compatibility Pack SP2 allow remote attackers to obtain sensitive information from process memory via a crafted Office document, aka "Microsoft Office Information Disclosure Vulnerability."
Applies to:
Microsoft Excel 2007
Microsoft Excel 2010
Microsoft Office Compatibility Pack
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2135
Title:
Microsoft Exchange Server Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2135
CVE-2017-0110
Severity:
Medium
Description:
Cross-site scripting (XSS) vulnerability in Microsoft Exchange Outlook Web Access (OWA) allows remote attackers to inject arbitrary web script or HTML via a crafted email or chat client, aka "Microsoft Exchange Server Elevation of Privilege Vulnerability."
Applies to:
Microsoft Exchange Server 2013
Microsoft Exchange Server 2016
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2159
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2159
CVE-2017-0203
Severity:
Medium
Description:
A vulnerability exists in Microsoft Edge when the Edge Content Security Policy (CSP) fails to properly validate certain specially crafted documents. An attacker could trick a user into loading a web page with malicious content, aka "Microsoft Edge Security Feature Bypass Vulnerability."
Applies to:
Microsoft Edge
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2152
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2152
CVE-2017-0200
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user, aka "Microsoft Edge Memory Corruption Vulnerability."
Applies to:
Microsoft Edge
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2154
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2154
CVE-2017-0205
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user, aka "Microsoft Edge Memory Corruption Vulnerability."
Applies to:
Microsoft Edge
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2131
Title:
iSNS Server Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2131
CVE-2017-0104
Severity:
High
Description:
The iSNS Server service in Microsoft Windows Server 2008 SP2 and R2, Windows Server 2012 Gold and R2, and Windows Server 2016 allows remote attackers to issue malicious requests via an integer overflow, aka "iSNS Server Memory Corruption Vulnerability."
Applies to:
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2153
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2153
CVE-2017-0202
Severity:
High
Description:
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user, a.k.a. "Internet Explorer Memory Corruption Vulnerability."
Applies to:
Microsoft Internet Explorer 11
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2157
Title:
Internet Explorer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2157
CVE-2017-0210
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Internet Explorer does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain, aka "Internet Explorer Elevation of Privilege Vulnerability."
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2017-05-19
Updated:
2024-01-17

ID:
CISEC:2129
Title:
Device Guard Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2129
CVE-2017-0007
Severity:
Low
Description:
Device Guard in Microsoft Windows 10 Gold, 1511, 1607, and Windows Server 2016 allows remote attackers to modify PowerShell script without invalidating associated signatures, aka "PowerShell Security Feature Bypass Vulnerability."
Applies to:
Created:
2017-05-19
Updated:
2024-01-17

ID:
CVE-2014-9932
Title:
In TrustZone, an integer overflow vulnerability can potentially occur in all Android releases from CAF using the Linux kernel due to an improper address range computation.
Type:
Mobile Devices
Bulletins:
CVE-2014-9932
SFBID97329
Severity:
High
Description:
In TrustZone, an integer overflow vulnerability can potentially occur in all Android releases from CAF using the Linux kernel due to an improper address range computation.
Applies to:
Created:
2017-05-16
Updated:
2024-01-17

ID:
CVE-2014-9933
Title:
Due to missing input validation in all Android releases from CAF using the Linux kernel, HLOS can write to fuses for which it should not have access.
Type:
Mobile Devices
Bulletins:
CVE-2014-9933
SFBID97329
Severity:
High
Description:
Due to missing input validation in all Android releases from CAF using the Linux kernel, HLOS can write to fuses for which it should not have access.
Applies to:
Created:
2017-05-16
Updated:
2024-01-17

ID:
CVE-2014-9934
Title:
A PKCS#1 v1.5 signature verification routine in all Android releases from CAF using the Linux kernel may not check padding.
Type:
Mobile Devices
Bulletins:
CVE-2014-9934
SFBID97329
Severity:
High
Description:
A PKCS#1 v1.5 signature verification routine in all Android releases from CAF using the Linux kernel may not check padding.
Applies to:
Created:
2017-05-16
Updated:
2024-01-17

ID:
CVE-2014-9931
Title:
A buffer overflow vulnerability in all Android releases from CAF using the Linux kernel can potentially occur if an OEM performs an app region size customization due to a hard-coded value.
Type:
Mobile Devices
Bulletins:
CVE-2014-9931
SFBID97329
Severity:
High
Description:
A buffer overflow vulnerability in all Android releases from CAF using the Linux kernel can potentially occur if an OEM performs an app region size customization due to a hard-coded value.
Applies to:
Created:
2017-05-16
Updated:
2024-01-17

ID:
CISEC:2367
Title:
Security Update for Windows XP
Type:
Software
Bulletins:
CISEC:2367
Severity:
Low
Description:
A security issue has been identified in a Microsoft software product that could affect your system.
Applies to:
Created:
2017-05-14
Updated:
2017-06-16

ID:
CISEC:2369
Title:
Security Update for Windows Server 2003 for x64-based Systems
Type:
Software
Bulletins:
CISEC:2369
Severity:
Low
Description:
A security issue has been identified in a Microsoft software product that could affect your system.
Applies to:
Created:
2017-05-14
Updated:
2017-06-16

ID:
CISEC:2370
Title:
Security Update for Windows Server 2003
Type:
Software
Bulletins:
CISEC:2370
Severity:
Low
Description:
A security issue has been identified in a Microsoft software product that could affect your system.
Applies to:
Created:
2017-05-14
Updated:
2017-06-16

ID:
CISEC:2371
Title:
Security Update for Windows 8 for x64-based Systems
Type:
Software
Bulletins:
CISEC:2371
Severity:
Low
Description:
A security issue has been identified in a Microsoft software product that could affect your system.
Applies to:
Created:
2017-05-14
Updated:
2017-06-16

ID:
CISEC:2368
Title:
Security Update for Windows 8
Type:
Software
Bulletins:
CISEC:2368
Severity:
Low
Description:
A security issue has been identified in a Microsoft software product that could affect your system.
Applies to:
Created:
2017-05-14
Updated:
2017-06-16

ID:
CISEC:2089
Title:
Windows SMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2089
CVE-2017-0145
Severity:
High
Description:
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0146, and CVE-2017-0148.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2094
Title:
Windows SMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2094
CVE-2017-0147
Severity:
Medium
Description:
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted packets, aka "Windows SMB Information Disclosure Vulnerability."
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2095
Title:
Windows SMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2095
CVE-2017-0144
Severity:
High
Description:
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2096
Title:
Windows SMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2096
CVE-2017-0148
Severity:
High
Description:
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted packets, aka "Windows SMB Information Disclosure Vulnerability."
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2099
Title:
Windows SMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2099
CVE-2017-0143
Severity:
High
Description:
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2101
Title:
Windows SMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2101
CVE-2017-0146
Severity:
High
Description:
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, and CVE-2017-0148.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2090
Title:
Windows Graphics Component Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2090
CVE-2017-0014
Severity:
High
Description:
The Windows Graphics Component in Microsoft Office 2010 SP2; Windows Server 2008 R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Graphics Component Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0108.
Applies to:
Microsoft Office 2010
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2106
Title:
Windows Graphics Component Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2106
CVE-2017-0108
Severity:
High
Description:
The Windows Graphics Component in Microsoft Office 2007 SP3; 2010 SP2; and Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Live Meeting 2007; Silverlight 5; Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Graphics Component Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0014.
Applies to:
Microsoft Live Meeting 2007 Add-in
Microsoft Live Meeting 2007 Console
Microsoft Lync 2010
Microsoft Lync 2013
Microsoft Office 2007
Microsoft Office 2010
Microsoft Word Viewer
Skype for Business 2016
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2100
Title:
Windows Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2100
CVE-2017-0038
Severity:
Medium
Description:
gdi32.dll in Graphics Device Interface (GDI) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process heap memory via a crafted EMF file, as demonstrated by an EMR_SETDIBITSTODEVICE record with modified Device Independent Bitmap (DIB) dimensions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-3216, CVE-2016-3219, and/or CVE-2016-3220.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2098
Title:
Windows GDI+ Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2098
CVE-2017-0060
Severity:
Low
Description:
The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "GDI+ Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0060 and CVE-2017-0062.
Applies to:
Microsoft Live Meeting 2007 Add-in
Microsoft Live Meeting 2007 Console
Microsoft Lync 2010
Microsoft Lync 2013
Microsoft Office 2007
Microsoft Office 2010
Microsoft Word Viewer
Skype for Business 2016
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2103
Title:
Windows GDI+ Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2103
CVE-2017-0062
Severity:
Low
Description:
The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "GDI+ Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0060 and CVE-2017-0073.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2105
Title:
Windows GDI+ Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2105
CVE-2017-0073
Severity:
Medium
Description:
The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Windows GDI+ Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0060 and CVE-2017-0062.
Applies to:
Microsoft Live Meeting 2007 Add-in
Microsoft Live Meeting 2007 Console
Microsoft Lync 2010
Microsoft Lync 2013
Microsoft Office 2007
Microsoft Office 2010
Microsoft Word Viewer
Skype for Business 2016
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2093
Title:
Windows GDI Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2093
CVE-2017-0025
Severity:
High
Description:
The kernel-mode drivers in Microsoft Windows Vista; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0001, CVE-2017-0005, and CVE-2017-0047.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2097
Title:
Windows GDI Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2097
CVE-2017-0047
Severity:
High
Description:
The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka "Windows GDI Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0001, CVE-2017-0005 and CVE-2017-0025.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2104
Title:
Windows GDI Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2104
CVE-2017-0001
Severity:
High
Description:
The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka "Windows GDI Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0005, CVE-2017-0025, and CVE-2017-0047.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2107
Title:
Windows DVD Maker Cross-Site Request Forgery Vulnerability
Type:
Software
Bulletins:
CISEC:2107
CVE-2017-0045
Severity:
Medium
Description:
Windows DVD Maker in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, and Windows Vista SP2 does not properly parse crafted .msdvd files, which allows attackers to obtain information to compromise a target system, aka "Windows DVD Maker Cross-Site Request Forgery Vulnerability."
Applies to:
Windows DVD Maker
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2081
Title:
Windows DirectShow Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2081
CVE-2017-0042
Severity:
Low
Description:
Windows Media Player in Microsoft Windows 8.1; Windows Server 2012 R2; Windows RT 8.1; Windows 7 SP1; Windows 2008 SP2 and R2 SP1, Windows Server 2016; Windows Vista SP2; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information via a crafted web site, aka "Windows Media Player Information Disclosure Vulnerability."
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2125
Title:
Microsoft SharePoint XSS Vulnerability
Type:
Software
Bulletins:
CISEC:2125
CVE-2017-0107
Severity:
Medium
Description:
Microsoft SharePoint Server fails to sanitize crafted web requests, allowing remote attackers to run cross-script in local security context, aka "Microsoft SharePoint XSS Vulnerability."
Applies to:
Microsoft SharePoint Foundation 2013
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2115
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2115
CVE-2017-0020
Severity:
High
Description:
Microsoft Excel 2016, Excel 2010 SP2, Excel 2013 RT SP1, and Office Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0030, CVE-2017-0031, CVE-2017-0052, and CVE-2017-0053.
Applies to:
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office Web Apps 2013
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2116
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2116
CVE-2017-0019
Severity:
High
Description:
Microsoft Word 2016 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0020, CVE-2017-0030, CVE-2017-0031, CVE-2017-0052, and CVE-2017-0053.
Applies to:
Microsoft Word 2016
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2117
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2117
CVE-2017-0052
Severity:
High
Description:
Microsoft Office Compatibility Pack SP3, Excel 2007 SP3, Excel Viewer, and Excel Services on SharePoint Server 2007 SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0020, CVE-2017-0030, CVE-2017-0031, and CVE-2017-0053.
Applies to:
Microsoft Excel 2007
Microsoft Excel Viewer
Microsoft Office Compatibility Pack
Microsoft SharePoint Server 2007
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2118
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2118
CVE-2017-0031
Severity:
High
Description:
Microsoft Office 2010 SP2, Office Compatibility Pack SP3, Word 2007 SP3, and Word 2010 SP2 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0020, CVE-2017-0030, CVE-2017-0052, and CVE-2017-0053.
Applies to:
Microsoft Office 2010
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2120
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2120
CVE-2017-0053
Severity:
High
Description:
Microsoft Office 2010 SP2, Office Compatibility Pack SP3, Word 2007 SP3, Word 2010 SP2, Word 2013 SP1, Word 2013 R2 SP1, Word 2016, and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0020, CVE-2017-0030, CVE-2017-0031, and CVE-2017-0052.
Applies to:
Microsoft Office 2010
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Microsoft Word Viewer
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2123
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2123
CVE-2017-0030
Severity:
High
Description:
Microsoft Office 2010 SP2, Office Compatibility Pack SP3, Office Web Apps Server 2010 SP2, Word 2007 SP3, Word 2010 SP2, and Word Automation Services on SharePoint Server 2010 SP2 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0020, CVE-2017-0031, CVE-2017-0052, and CVE-2017-0053.
Applies to:
Microsoft Office 2010
Microsoft Office Compatibility Pack
Microsoft Office Web Apps 2010
Microsoft SharePoint Server 2010
Microsoft Word 2007
Microsoft Word 2010
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2124
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2124
CVE-2017-0006
Severity:
High
Description:
Microsoft Excel 2007 SP3, Office Compatibility Pack SP3, Excel Viewer, and Excel Services on SharePoint Server 2007 SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0019, CVE-2017-0020, CVE-2017-0030, CVE-2017-0031, CVE-2017-0052, and CVE-2017-0053.
Applies to:
Microsoft Excel 2007
Microsoft Excel Viewer
Microsoft Office Compatibility Pack
Microsoft SharePoint Server 2007
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2119
Title:
Microsoft Office Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2119
CVE-2017-0105
Severity:
Medium
Description:
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from out-of-bound memory via a crafted Office document, aka "Microsoft Office Information Disclosure Vulnerability."
Applies to:
Microsoft Office 2010
Microsoft Office Compatibility Pack
Microsoft Office Web Apps 2010
Microsoft SharePoint Server 2010
Microsoft Word 2007
Microsoft Word 2010
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2121
Title:
Microsoft Office Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2121
CVE-2017-0027
Severity:
Low
Description:
Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, and Excel Services on SharePoint Server 2013 SP1 allow remote attackers to obtain sensitive information from process memory via a crafted Office document, aka "Microsoft Office Information Disclosure Vulnerability."
Applies to:
Microsoft Excel 2007
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office Compatibility Pack
Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2013
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2122
Title:
Microsoft Office Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2122
CVE-2017-0029
Severity:
Medium
Description:
Microsoft Office 2010 SP2, Word 2010 SP2, Word 2013 RT SP1, and Word 2016 allow remote attackers to cause a denial of service (application hang) via a crafted Office document, aka "Microsoft Office Denial of Service Vulnerability."
Applies to:
Microsoft Office 2010
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2114
Title:
Microsoft IIS Server XSS Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2114
CVE-2017-0055
Severity:
Medium
Description:
Microsoft Internet Information Server (IIS) in Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to perform cross-site scripting and run script with local user privileges via a crafted request, aka "Microsoft IIS Server XSS Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2074
Title:
Microsoft Hyper-V Network Switch Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2074
CVE-2017-0051
Severity:
Low
Description:
Microsoft Windows 10 1607 and Windows Server 2016 allow remote attackers to cause a denial of service (application hang) via a crafted Office document, aka "Microsoft Hyper-V Network Switch Denial of Service Vulnerability." This vulnerability is different from those described in CVE-2017-0074, CVE-2017-0076, CVE-2017-0097, CVE-2017-0098, and CVE-2017-0099.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2091
Title:
Microsoft Color Management Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2091
CVE-2017-0063
Severity:
Medium
Description:
The Color Management Module (ICM32.dll) memory handling functionality in Windows Vista SP2; Windows Server 2008 SP2 and R2; and Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to bypass ASLR and execute code in combination with another vulnerability through a crafted website, aka "Microsoft Color Management Information Disclosure Vulnerability." This vulnerability is different from that described in CVE-2017-0061.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2092
Title:
Microsoft Color Management Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2092
CVE-2017-0061
Severity:
Low
Description:
The Color Management Module (ICM32.dll) memory handling functionality in Windows Vista SP2, Windows Server 2008 SP2 and R2, and Windows 7 SP1 allows remote attackers to bypass ASLR and execute code in combination with another vulnerability through a crafted website, aka "Microsoft Color Management Information Disclosure Vulnerability." This vulnerability is different from that described in CVE-2017-0063.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2080
Title:
Microsoft Active Directory Federation Services Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2080
CVE-2017-0043
Severity:
Low
Description:
Active Directory Federation Services in Microsoft Windows 10 1607, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 Gold and R2, and Windows Server 2016 allows local users to obtain sensitive information via a crafted application, aka "Microsoft Active Directory Federation Services Information Disclosure Vulnerability."
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2075
Title:
Hyper-V vSMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2075
CVE-2017-0021
Severity:
High
Description:
Hyper-V in Microsoft Windows 10 1607 and Windows Server 2016 does not properly validate vSMB packet data, which allows attackers to execute arbitrary code on a target OS, aka "Hyper-V System Data Structure Vulnerability." This vulnerability is different from that described in CVE-2017-0095.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2078
Title:
Hyper-V vSMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2078
CVE-2017-0095
Severity:
High
Description:
Hyper-V in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 does not properly validate vSMB packet data, which allows attackers to execute arbitrary code on a target OS, aka "Hyper-V vSMB Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0021.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2069
Title:
Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2069
CVE-2017-0109
Severity:
High
Description:
Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka "Hyper-V Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0075.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2076
Title:
Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:2076
CVE-2017-0075
Severity:
High
Description:
Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka "Hyper-V Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0109.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2071
Title:
Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2071
CVE-2017-0096
Severity:
Low
Description:
Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1, Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to obtain sensitive information from host OS memory via a crafted application, aka "Hyper-V Information Disclosure Vulnerability."
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2070
Title:
Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2070
CVE-2017-0098
Severity:
Low
Description:
Hyper-V in Microsoft Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka "Hyper-V Denial of Service Vulnerability." This vulnerability is different from those described in CVE-2017-0074, CVE-2017-0076, CVE-2017-0097, and CVE-2017-0099.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2072
Title:
Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2072
CVE-2017-0076
Severity:
Low
Description:
Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and 2008 R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 and R2; Windows 10, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka "Hyper-V Denial of Service Vulnerability." This vulnerability is different from those described in CVE-2017-0098, CVE-2017-0074, CVE-2017-0097, and CVE-2017-0099.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2073
Title:
Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2073
CVE-2017-0097
Severity:
Low
Description:
Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and 2008 R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 and R2; Windows 10, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka "Hyper-V Denial of Service Vulnerability." This vulnerability is different from those described in CVE-2017-0098, CVE-2017-0074, CVE-2017-0076, and CVE-2017-0099.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2077
Title:
Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2077
CVE-2017-0099
Severity:
Low
Description:
Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and 2008 R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka "Hyper-V Denial of Service Vulnerability." This vulnerability is different from those described in CVE-2017-0098, CVE-2017-0074, CVE-2017-0076, and CVE-2017-0097.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2079
Title:
Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:2079
CVE-2017-0074
Severity:
Low
Description:
Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and 2008 R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 and R2; Windows 10, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka "Hyper-V Denial of Service Vulnerability." This vulnerability is different from those described in CVE-2017-0098, CVE-2017-0076, CVE-2017-0097, and CVE-2017-0099.
Applies to:
Created:
2017-05-12
Updated:
2024-01-17

ID:
CISEC:2061
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2061
CVE-2017-0080
Severity:
High
Description:
The kernel-mode drivers in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0026, CVE-2017-0056, CVE-2017-0078, CVE-2017-0079, CVE-2017-0081, and CVE-2017-0082.
Applies to:
Created:
2017-05-05
Updated:
2024-01-17

ID:
CISEC:2062
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2062
CVE-2017-0082
Severity:
High
Description:
The kernel-mode drivers in Microsoft Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0026, CVE-2017-0056, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, and CVE-2017-0081.
Applies to:
Created:
2017-05-05
Updated:
2024-01-17

ID:
CISEC:2063
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2063
CVE-2017-0081
Severity:
High
Description:
The kernel-mode drivers in Microsoft Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0026, CVE-2017-0056, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, CVE-2017-0082.
Applies to:
Created:
2017-05-05
Updated:
2024-01-17

ID:
CISEC:2064
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2064
CVE-2017-0079
Severity:
High
Description:
The kernel-mode drivers in Windows 8.1; Windows Server 2012 R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0026, CVE-2017-0056, CVE-2017-0078, CVE-2017-0080, CVE-2017-0081, and CVE-2017-0082.
Applies to:
Created:
2017-05-05
Updated:
2024-01-17

ID:
CISEC:2065
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2065
CVE-2017-0026
Severity:
High
Description:
The kernel-mode drivers in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0056, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, CVE-2017-0081, and CVE-2017-0082.
Applies to:
Created:
2017-05-05
Updated:
2024-01-17

ID:
CISEC:2066
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2066
CVE-2017-0078
Severity:
High
Description:
The kernel-mode drivers in Microsoft Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0026, CVE-2017-0056, CVE-2017-0079, CVE-2017-0080, CVE-2017-0081, CVE-2017-0082.
Applies to:
Created:
2017-05-05
Updated:
2024-01-17

ID:
CISEC:2067
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2067
CVE-2017-0024
Severity:
High
Description:
The kernel-mode drivers in Microsoft Windows 10 1607 and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0026, CVE-2017-0056, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, CVE-2017-0081, and CVE-2017-0082.
Applies to:
Created:
2017-05-05
Updated:
2024-01-17

ID:
CISEC:2068
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2068
CVE-2017-0056
Severity:
High
Description:
The kernel-mode drivers in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0026, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, CVE-2017-0081, CVE-2017-0082.
Applies to:
Created:
2017-05-05
Updated:
2024-01-17

ID:
CVE-2014-9940
Title:
The regulator_ena_gpio_free function in drivers/regulator/core.c in the Linux kernel before 3.19 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application.
Type:
Mobile Devices
Bulletins:
CVE-2014-9940
SFBID98195
Severity:
High
Description:
The regulator_ena_gpio_free function in drivers/regulator/core.c in the Linux kernel before 3.19 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application.
Applies to:
Created:
2017-05-02
Updated:
2024-01-17

ID:
CVE-2015-9004
Title:
kernel/events/core.c in the Linux kernel before 3.19 mishandles counter grouping, which allows local users to gain privileges via a crafted application, related to the perf_pmu_register and perf_event_open functions.
Type:
Mobile Devices
Bulletins:
CVE-2015-9004
SFBID98166
Severity:
High
Description:
kernel/events/core.c in the Linux kernel before 3.19 mishandles counter grouping, which allows local users to gain privileges via a crafted application, related to the perf_pmu_register and perf_event_open functions.
Applies to:
Created:
2017-05-02
Updated:
2024-01-17

ID:
CISEC:2059
Title:
Windows Registry Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2059
CVE-2017-0103
Severity:
Medium
Description:
The kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows Server 2012 mishandles registry objects in memory, which allows local users to gain privileges via a crafted application, aka "Windows Registry Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-04-28
Updated:
2024-01-17

ID:
CISEC:2057
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2057
CVE-2017-0050
Severity:
High
Description:
The kernel API in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7; Windows 8; Windows 10 Gold, 1511, and 1607; Windows RT 8.1; Windows Server 2012 Gold and R2; and Windows Server 2016 does not properly enforce permissions, which allows local users to spoof processes, spoof inter-process communication, or cause a denial of service via a crafted application, aka "Windows Kernel Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-04-28
Updated:
2024-01-17

ID:
CISEC:2060
Title:
Windows GDI Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2060
CVE-2017-0005
Severity:
Medium
Description:
The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka "Windows GDI Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0001, CVE-2017-0025, and CVE-2017-0047.
Applies to:
Created:
2017-04-28
Updated:
2024-01-17

ID:
CISEC:2056
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2056
CVE-2017-0102
Severity:
Medium
Description:
Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 let attackers with access to targets systems gain privileges when Windows fails to properly validate buffer lengths, aka "Windows Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-04-28
Updated:
2024-01-17

ID:
CISEC:2058
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2058
CVE-2017-0101
Severity:
Medium
Description:
The kernel-mode drivers in Transaction Manager in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Windows Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-04-28
Updated:
2024-01-17

ID:
CVE-2010-1776
Title:
Find My iPhone on iOS 2.0 through 3.1.3 for iPhone 3G and later and iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later, when Find My iPhone is disabled, allows remote authenticated users with an associated MobileMe...
Type:
Mobile Devices
Bulletins:
CVE-2010-1776
Severity:
Medium
Description:
Find My iPhone on iOS 2.0 through 3.1.3 for iPhone 3G and later and iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later, when Find My iPhone is disabled, allows remote authenticated users with an associated MobileMe account to wipe the device.
Applies to:
Created:
2017-04-24
Updated:
2024-01-17

ID:
CISEC:1970
Title:
Windows Uniscribe Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:1970
CVE-2017-0086
Severity:
High
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Uniscribe Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0084, CVE-2017-0087, CVE-2017-0088, CVE-2017-0089, and CVE-2017-0090.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1972
Title:
Windows Uniscribe Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:1972
CVE-2017-0084
Severity:
High
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Uniscribe Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, CVE-2017-0089, and CVE-2017-0090.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1976
Title:
Windows Uniscribe Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:1976
CVE-2017-0087
Severity:
High
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Uniscribe Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0084, CVE-2017-0086, CVE-2017-0088, CVE-2017-0089, and CVE-2017-0090.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1977
Title:
Windows Uniscribe Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:1977
CVE-2017-0072
Severity:
High
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Uniscribe Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0083, CVE-2017-0084, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, CVE-2017-0089, and CVE-2017-0090.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1980
Title:
Windows Uniscribe Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:1980
CVE-2017-0089
Severity:
High
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Uniscribe Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0084, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, and CVE-2017-0090.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1988
Title:
Windows Uniscribe Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:1988
CVE-2017-0088
Severity:
High
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Uniscribe Remote Code Execution Vulnerability."
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1989
Title:
Windows Uniscribe Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:1989
CVE-2017-0090
Severity:
High
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Uniscribe Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0084, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, and CVE-2017-0089.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1991
Title:
Windows Uniscribe Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:1991
CVE-2017-0083
Severity:
High
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Uniscribe Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0084, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, CVE-2017-0089, and CVE-2017-0090.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1969
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1969
CVE-2017-0123
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1971
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1971
CVE-2017-0128
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, and CVE-2017-0127.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1973
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1973
CVE-2017-0115
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1974
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1974
CVE-2017-0092
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1975
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1975
CVE-2017-0085
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1978
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1978
CVE-2017-0112
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1979
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1979
CVE-2017-0125
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1981
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1981
CVE-2017-0119
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1982
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1982
CVE-2017-0114
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1983
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1983
CVE-2017-0127
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1984
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1984
CVE-2017-0121
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1985
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1985
CVE-2017-0116
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1986
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1986
CVE-2017-0113
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1987
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1987
CVE-2017-0126
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1990
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1990
CVE-2017-0122
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1992
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1992
CVE-2017-0117
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1993
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1993
CVE-2017-0124
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1994
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1994
CVE-2017-0111
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1995
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1995
CVE-2017-0120
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Windows Uniscribe Information Disclosure Vulnerability."
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1996
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1996
CVE-2017-0118
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1997
Title:
Windows Uniscribe Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1997
CVE-2017-0091
Severity:
Medium
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2006
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2006
CVE-2017-0136
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2011
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2011
CVE-2017-0150
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2012
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2012
CVE-2017-0049
Severity:
Medium
Description:
The VBScript engine in Microsoft Internet Explorer 11 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Scripting Engine Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0018, and CVE-2017-0037.
Applies to:
Microsoft Internet Explorer 11
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2013
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2013
CVE-2017-0131
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2014
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2014
CVE-2017-0015
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2016
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2016
CVE-2017-0070
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2017
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2017
CVE-2017-0067
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2018
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2018
CVE-2017-0132
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2020
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2020
CVE-2017-0035
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2021
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2021
CVE-2017-0133
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2023
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2023
CVE-2017-0071
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2024
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2024
CVE-2017-0040
Severity:
High
Description:
The scripting engine in Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability." This vulnerability is different from that described in CVE-2017-0130.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2027
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2027
CVE-2017-0094
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2031
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2031
CVE-2017-0134
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2033
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2033
CVE-2017-0137
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2036
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2036
CVE-2017-0032
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2038
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2038
CVE-2017-0151
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, and CVE-2017-0150.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2001
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2001
CVE-2017-0130
Severity:
High
Description:
Microsoft Internet Explorer 9 through 11 allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0009 and CVE-2017-0059.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2004
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2004
CVE-2017-0138
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2005
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2005
CVE-2017-0010
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1998
Title:
Microsoft XML Core Services Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1998
CVE-2017-0022
Severity:
Medium
Description:
Microsoft XML Core Services (MSXML) in Windows 10 Gold, 1511, and 1607; Windows 7 SP1; Windows 8.1; Windows RT 8.1; Windows Server 2008 SP2 and R2 SP1; Windows Server 2012 Gold and R2; Windows Server 2016; and Windows Vista SP2 improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site, aka "Microsoft XML Information Disclosure Vulnerability."
Applies to:
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2010
Title:
Microsoft PDF Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2010
CVE-2017-0023
Severity:
High
Description:
The PDF library in Microsoft Edge; Windows 8.1; Windows Server 2012 and R2; Windows RT 8.1; and Windows 10, 1511, and 1607 allows remote attackers to execute arbitrary code via a crafted PDF file, aka "Microsoft PDF Remote Code Execution Vulnerability."
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2015
Title:
Microsoft Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2015
CVE-2017-0149
Severity:
High
Description:
Microsoft Internet Explorer 9 through 11 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0018 and CVE-2017-0037.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2022
Title:
Microsoft Edge Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:2022
CVE-2017-0069
Severity:
Medium
Description:
Microsoft Edge allows remote attackers to spoof web content via a crafted web site, aka "Microsoft Edge Spoofing Vulnerability." This vulnerability is different from those described in CVE-2017-0012 and CVE-2017-0033.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2025
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:2025
CVE-2017-0066
Severity:
Medium
Description:
Microsoft Edge allows remote attackers to bypass the Same Origin Policy for HTML elements in other browser windows, aka "Microsoft Edge Security Feature Bypass Vulnerability." This vulnerability is different from those described in CVE-2017-0135 and CVE-2017-0140.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2029
Title:
Microsoft Edge Security Feature Bypass
Type:
Software
Bulletins:
CISEC:2029
CVE-2017-0141
Severity:
High
Description:
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0150, and CVE-2017-0151.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2030
Title:
Microsoft Edge Security Feature Bypass
Type:
Software
Bulletins:
CISEC:2030
CVE-2017-0140
Severity:
Medium
Description:
Microsoft Edge allows remote attackers to bypass the Same Origin Policy for HTML elements in other browser windows, aka "Microsoft Edge Security Feature Bypass Vulnerability." This vulnerability is different from those described in CVE-2017-0066 and CVE-2017-0135.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2039
Title:
Microsoft Edge Security Feature Bypass
Type:
Software
Bulletins:
CISEC:2039
CVE-2017-0135
Severity:
Medium
Description:
Microsoft Edge allows remote attackers to bypass the Same Origin Policy for HTML elements in other browser windows, aka "Microsoft Edge Security Feature Bypass Vulnerability." This vulnerability is different from those described in CVE-2017-0066 and CVE-2017-0140.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2028
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2028
CVE-2017-0034
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2008
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2008
CVE-2017-0017
Severity:
Medium
Description:
The RegEx class in the XSS filter in Microsoft Edge allows remote attackers to conduct cross-site scripting (XSS) attacks and obtain sensitive information via unspecified vectors, aka "Microsoft Edge Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0009, CVE-2017-0011, CVE-2017-0065, and CVE-2017-0068.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2009
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2009
CVE-2017-0011
Severity:
Medium
Description:
Microsoft Edge allows remote attackers to obtain sensitive information via a crafted web site, aka "Microsoft Edge Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0009, CVE-2017-0017, CVE-2017-0065, and CVE-2017-0068.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2037
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2037
CVE-2017-0068
Severity:
Medium
Description:
Browsers in Microsoft Edge allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Microsoft Edge Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0009, CVE-2017-0011, CVE-2017-0017, and CVE-2017-0065.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2035
Title:
Microsoft Browser Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:2035
CVE-2017-0033
Severity:
Medium
Description:
Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to spoof web content via a crafted web site, aka "Microsoft Browser Spoofing Vulnerability." This vulnerability is different from those described in CVE-2017-0012 and CVE-2017-0069.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2000
Title:
Microsoft Browser Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:2000
CVE-2017-0012
Severity:
Medium
Description:
Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to spoof web content via a crafted web site, aka "Microsoft Browser Spoofing Vulnerability." This vulnerability is different from those described in CVE-2017-0033 and CVE-2017-0069.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2026
Title:
Microsoft Browser Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2026
CVE-2017-0037
Severity:
High
Description:
Microsoft Internet Explorer 10 and 11 and Microsoft Edge have a type confusion issue in the Layout::MultiColumnBoxBuilder::HandleColumnBreakOnColumnSpanningElement function in mshtml.dll, which allows remote attackers to execute arbitrary code via vectors involving a crafted Cascading Style Sheets (CSS) token sequence and crafted JavaScript code that operates on a TH element.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2019
Title:
Microsoft Browser Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2019
CVE-2017-0009
Severity:
Medium
Description:
Microsoft Internet Explorer 9 through 11 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0018 and CVE-2017-0037.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2034
Title:
Microsoft Browser Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2034
CVE-2017-0065
Severity:
Medium
Description:
Microsoft Edge allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Microsoft Browser Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0009, CVE-2017-0011, CVE-2017-0017, and CVE-2017-0068.
Applies to:
Microsoft Edge
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2032
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:2032
CVE-2017-0018
Severity:
High
Description:
Microsoft Internet Explorer 10 and 11 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0037 and CVE-2017-0149.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:1999
Title:
Internet Explorer Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1999
CVE-2015-6086
Severity:
Medium
Description:
Microsoft Internet Explorer 9 through 11 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability."
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2002
Title:
Internet Explorer Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2002
CVE-2017-0059
Severity:
Medium
Description:
Microsoft Internet Explorer 9 through 11 allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0008 and CVE-2017-0009.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2003
Title:
Internet Explorer Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:2003
CVE-2017-0008
Severity:
Medium
Description:
Microsoft Internet Explorer 9 through 11 allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0009 and CVE-2017-0059.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-04-21
Updated:
2024-01-17

ID:
CISEC:2007
Title:
Internet Explorer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:2007
CVE-2017-0154
Severity:
Medium
Description:
Microsoft Internet Explorer 11 on Windows 10, 1511, and 1606 and Windows Server 2016 does not enforce cross-domain policies, allowing attackers to access information from one domain and inject it into another via a crafted application, aka, "Internet Explorer Elevation of Privilege Vulnerability."
Applies to:
Microsoft Internet Explorer 11
Created:
2017-04-21
Updated:
2024-01-17

ID:
CVE-2014-7921
Title:
mediaserver in Android 4.0.3 through 5.x before 5.1 allows attackers to gain privileges. NOTE: This is a different vulnerability than CVE-2014-7920.
Type:
Mobile Devices
Bulletins:
CVE-2014-7921
Severity:
High
Description:
mediaserver in Android 4.0.3 through 5.x before 5.1 allows attackers to gain privileges. NOTE: This is a different vulnerability than CVE-2014-7920.
Applies to:
Created:
2017-04-13
Updated:
2024-01-17

ID:
CVE-2014-7920
Title:
mediaserver in Android 2.2 through 5.x before 5.1 allows attackers to gain privileges. NOTE: This is a different vulnerability than CVE-2014-7921.
Type:
Mobile Devices
Bulletins:
CVE-2014-7920
Severity:
High
Description:
mediaserver in Android 2.2 through 5.x before 5.1 allows attackers to gain privileges. NOTE: This is a different vulnerability than CVE-2014-7921.
Applies to:
Created:
2017-04-13
Updated:
2024-01-17

ID:
CISEC:1950
Title:
Vulnerability in OpenSSL 1.1.0 before 1.1.0d and OpenSSL 1.0.2 before 1.0.2k
Type:
Services
Bulletins:
CISEC:1950
CVE-2017-3732
Severity:
Medium
Description:
Vulnerability in OpenSSL 1.1.0 before 1.1.0d and OpenSSL 1.0.2 before 1.0.2k.
Applies to:
OpenSSL
Created:
2017-04-07
Updated:
2024-01-17

ID:
CISEC:1949
Title:
Vulnerability in OpenSSL 1.1.0 before 1.1.0d
Type:
Services
Bulletins:
CISEC:1949
CVE-2017-3730
Severity:
Medium
Description:
Vulnerability in OpenSSL 1.1.0 before 1.1.0d.
Applies to:
OpenSSL
Created:
2017-04-07
Updated:
2024-01-17

ID:
CISEC:1942
Title:
UI spoofing
Type:
Web
Bulletins:
CISEC:1942
CVE-2016-5188
Severity:
Medium
Description:
Multiple issues in Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux allow a remote attacker to spoof various parts of browser UI via crafted HTML pages.
Applies to:
Google Chrome
Created:
2017-04-07
Updated:
2024-01-17

ID:
CISEC:1943
Title:
Truncated packet could crash via OOB read in OpenSSL 1.0.2 before 1.0.2k, and 1.1.0 before 1.1.0d
Type:
Services
Bulletins:
CISEC:1943
CVE-2017-3731
Severity:
Medium
Description:
If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
Applies to:
OpenSSL
Created:
2017-04-07
Updated:
2024-01-17

ID:
CISEC:1948
Title:
statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length
Type:
Services
Bulletins:
CISEC:1948
CVE-2016-6308
Severity:
High
Description:
statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.
Applies to:
OpenSSL
Created:
2017-04-07
Updated:
2024-01-17

ID:
CISEC:1952
Title:
PDFium in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux
Type:
Web
Bulletins:
CISEC:1952
CVE-2016-5184
Severity:
Medium
Description:
PDFium in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled object lifecycles in CFFL_FormFillter::KillFocusForAnnot, which allowed a remote attacker to potentially exploit heap corruption via crafted PDF files.
Applies to:
Google Chrome
Created:
2017-04-07
Updated:
2024-01-17

ID:
CISEC:1944
Title:
Montgomery multiplication may produce incorrect results in OpenSSL 1.0.2 before 1.0.2k, and 1.1.0 before 1.1.0c
Type:
Services
Bulletins:
CISEC:1944
CVE-2016-7055
Severity:
Low
Description:
TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.
Applies to:
OpenSSL
Created:
2017-04-07
Updated:
2024-01-17

ID:
CISEC:1947
Title:
Encrypt-Then-Mac renegotiation crash in OpenSSL 1.1.0 before 1.1.0e
Type:
Services
Bulletins:
CISEC:1947
CVE-2017-3733
Severity:
Medium
Description:
During a renegotiation handshake if the Encrypt-Then-Mac extension is negotiated where it was not in the original handshake (or vice-versa) then this can cause OpenSSL to crash (dependent on ciphersuite). Both clients and servers are affected.
Applies to:
OpenSSL
Created:
2017-04-07
Updated:
2024-01-17

ID:
CISEC:1945
Title:
CMS Null dereference vulnerability in OpenSSL 1.1.0 before 1.1.0c
Type:
Services
Bulletins:
CISEC:1945
CVE-2016-7053
Severity:
Medium
Description:
Applications parsing invalid CMS structures can crash with a NULL pointer dereference. This is caused by a bug in the handling of the ASN.1 CHOICE type in OpenSSL 1.1.0 which can result in a NULL value being passed to the structure callback if an attempt is made to free certain invalid encodings. Only CHOICE structures using a callback which do not handle NULL value are affected.
Applies to:
OpenSSL
Created:
2017-04-07
Updated:
2024-01-17

ID:
CISEC:1946
Title:
ChaCha20/Poly1305 heap-buffer-overflow in OpenSSL 1.1.0 before 1.1.0c
Type:
Services
Bulletins:
CISEC:1946
CVE-2016-7054
Severity:
Medium
Description:
TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.
Applies to:
OpenSSL
Created:
2017-04-07
Updated:
2024-01-17

ID:
CISEC:1951
Title:
Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux
Type:
Web
Bulletins:
CISEC:1951
CVE-2016-5182
Severity:
Medium
Description:
Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation in bitmap handling, which allowed a remote attacker to potentially exploit heap corruption via crafted HTML pages.
Applies to:
Google Chrome
Created:
2017-04-07
Updated:
2024-01-17

ID:
CISEC:1953
Title:
Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux
Type:
Web
Bulletins:
CISEC:1953
CVE-2016-5181
Severity:
Medium
Description:
Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android permitted execution of v8 microtasks while the DOM was in an inconsistent state, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages.
Applies to:
Google Chrome
Created:
2017-04-07
Updated:
2024-01-17

ID:
CISEC:1954
Title:
A heap use after free in PDFium in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux
Type:
Web
Bulletins:
CISEC:1954
CVE-2016-5183
Severity:
Medium
Description:
A heap use after free in PDFium in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android allows a remote attacker to potentially exploit heap corruption via crafted PDF files.
Applies to:
Google Chrome
Created:
2017-04-07
Updated:
2024-01-17

ID:
CVE-2014-9922
Title:
The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
Type:
Mobile Devices
Bulletins:
CVE-2014-9922
SFBID97354
Severity:
High
Description:
The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
Applies to:
Created:
2017-04-04
Updated:
2024-01-17

ID:
CISEC:1927
Title:
Vulnerability in the state-machine implementation in OpenSSL 1.1.0 before 1.1.0a
Type:
Services
Bulletins:
CISEC:1927
CVE-2016-6307
Severity:
Medium
Description:
The state-machine implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted TLS messages, related to statem/statem.c and statem/statem_lib.c.
Applies to:
OpenSSL
Created:
2017-03-31
Updated:
2024-01-17

ID:
CISEC:1926
Title:
Vulnerability in the ssl3_read_bytes function in record/rec_layer_s3.c in OpenSSL 1.1.0 before 1.1.0a
Type:
Services
Bulletins:
CISEC:1926
CVE-2016-6305
Severity:
Medium
Description:
The ssl3_read_bytes function in record/rec_layer_s3.c in OpenSSL 1.1.0 before 1.1.0a allows remote attackers to cause a denial of service (infinite loop) by triggering a zero-length record in an SSL_peek call.
Applies to:
OpenSSL
Created:
2017-03-31
Updated:
2024-01-17

ID:
CISEC:1930
Title:
Vulnerability in statem/statem.c in OpenSSL 1.1.0a
Type:
Services
Bulletins:
CISEC:1930
CVE-2016-6309
Severity:
High
Description:
statem/statem.c in OpenSSL 1.1.0a does not consider memory-block movement after a realloc call, which allows remote attackers to cause a denial of service (use-after-free) or possibly execute arbitrary code via a crafted TLS session.
Applies to:
OpenSSL
Created:
2017-03-31
Updated:
2024-01-17

ID:
CISEC:1931
Title:
Vulnerability in crypto/x509/x509_vfy.c in OpenSSL 1.0.2i
Type:
Services
Bulletins:
CISEC:1931
CVE-2016-7052
Severity:
Medium
Description:
crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
Applies to:
OpenSSL
Created:
2017-03-31
Updated:
2024-01-17

ID:
CISEC:1928
Title:
Vulnerability in certificate parser in OpenSSL 1.0.1 before 1.0.1u, and 1.0.2 before 1.0.2i
Type:
Services
Bulletins:
CISEC:1928
CVE-2016-6306
Severity:
Medium
Description:
The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.
Applies to:
OpenSSL
Created:
2017-03-31
Updated:
2024-01-17

ID:
CISEC:1905
Title:
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service -...
Type:
Services
Bulletins:
CISEC:1905
CVE-2016-2180
Severity:
Medium
Description:
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
Applies to:
OpenSSL
Created:
2017-03-31
Updated:
2024-01-17

ID:
CISEC:1903
Title:
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length
Type:
Services
Bulletins:
CISEC:1903
CVE-2016-6302
Severity:
Medium
Description:
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
Applies to:
OpenSSL
Created:
2017-03-31
Updated:
2024-01-17

ID:
CISEC:1900
Title:
The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages
Type:
Services
Bulletins:
CISEC:1900
CVE-2016-2179
Severity:
Medium
Description:
The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
Applies to:
OpenSSL
Created:
2017-03-31
Updated:
2024-01-17

ID:
CISEC:1902
Title:
The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations
Type:
Services
Bulletins:
CISEC:1902
CVE-2016-2178
Severity:
Low
Description:
The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
Applies to:
OpenSSL
Created:
2017-03-31
Updated:
2024-01-17

ID:
CISEC:1901
Title:
The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results
Type:
Services
Bulletins:
CISEC:1901
CVE-2016-2182
Severity:
High
Description:
The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
Applies to:
OpenSSL
Created:
2017-03-31
Updated:
2024-01-17

ID:
CISEC:1906
Title:
The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number
Type:
Services
Bulletins:
CISEC:1906
CVE-2016-2181
Severity:
Medium
Description:
The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.
Applies to:
OpenSSL
Created:
2017-03-31
Updated:
2024-01-17

ID:
CISEC:1907
Title:
OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks
Type:
Services
Bulletins:
CISEC:1907
CVE-2016-2177
Severity:
High
Description:
OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
Applies to:
OpenSSL
Created:
2017-03-31
Updated:
2024-01-17

ID:
CISEC:1929
Title:
Multiple memory leaks in OpenSSL 1.0.1 before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a
Type:
Services
Bulletins:
CISEC:1929
CVE-2016-6304
Severity:
High
Description:
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
Applies to:
OpenSSL
Created:
2017-03-31
Updated:
2024-01-17

ID:
CISEC:1904
Title:
Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service
Type:
Services
Bulletins:
CISEC:1904
CVE-2016-6303
Severity:
High
Description:
Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
Applies to:
OpenSSL
Created:
2017-03-31
Updated:
2024-01-17

ID:
CISEC:1884
Title:
UI spoofing
Type:
Web
Bulletins:
CISEC:1884
CVE-2017-5026
Severity:
Medium
Description:
Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to prevent alerts from being displayed by swapped out frames, which allowed a remote attacker to show alerts on a page they don't control via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-24
Updated:
2024-01-17

ID:
CISEC:1885
Title:
Heap overflow in FFmpeg
Type:
Web
Bulletins:
CISEC:1885
CVE-2017-5025
Severity:
Medium
Description:
FFmpeg in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted video file.
Applies to:
Google Chrome
Created:
2017-03-24
Updated:
2024-01-17

ID:
CISEC:1865
Title:
Heap buffer overflow during image processing in Skia in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android
Type:
Web
Bulletins:
CISEC:1865
CVE-2017-5014
Severity:
Medium
Description:
Heap buffer overflow during image processing in Skia in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-24
Updated:
2024-01-17

ID:
CISEC:1867
Title:
Google Chrome prior to 56.0.2924.76 for Windows insufficiently sanitized DevTools URLs
Type:
Web
Bulletins:
CISEC:1867
CVE-2017-5011
Severity:
Medium
Description:
Google Chrome prior to 56.0.2924.76 for Windows insufficiently sanitized DevTools URLs, which allowed a remote attacker who convinced a user to install a malicious extension to read filesystem contents via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-24
Updated:
2024-01-17

ID:
CISEC:1866
Title:
Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android
Type:
Web
Bulletins:
CISEC:1866
CVE-2017-5015
Severity:
Medium
Description:
Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled Unicode glyphs, which allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.
Applies to:
Google Chrome
Created:
2017-03-24
Updated:
2024-01-17

ID:
CISEC:1863
Title:
Google Chrome prior to 56.0.2924.76 for Linux incorrectly handled new tab page navigations in non-selected tabs
Type:
Web
Bulletins:
CISEC:1863
CVE-2017-5013
Severity:
Medium
Description:
Google Chrome prior to 56.0.2924.76 for Linux incorrectly handled new tab page navigations in non-selected tabs, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-24
Updated:
2024-01-17

ID:
CISEC:1868
Title:
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android
Type:
Web
Bulletins:
CISEC:1868
CVE-2017-5016
Severity:
Medium
Description:
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to prevent certain UI elements from being displayed by non-visible pages, which allowed a remote attacker to show certain UI elements on a page they don't control via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-24
Updated:
2024-01-17

ID:
CISEC:1864
Title:
A heap buffer overflow in V8 in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android
Type:
Web
Bulletins:
CISEC:1864
CVE-2017-5012
Severity:
Medium
Description:
A heap buffer overflow in V8 in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-24
Updated:
2024-01-17

ID:
CISEC:1852
Title:
WebRTC in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to perform proper bounds checking
Type:
Web
Bulletins:
CISEC:1852
CVE-2017-5009
Severity:
Medium
Description:
WebRTC in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1833
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication
Type:
Software
Bulletins:
CISEC:1833
CVE-2017-3256
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.7.16 and earlier.
Applies to:
MySQL Server
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1830
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging
Type:
Software
Bulletins:
CISEC:1830
CVE-2017-3265
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier.
Applies to:
MySQL Server
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1831
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging
Type:
Software
Bulletins:
CISEC:1831
CVE-2017-3291
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier.
Applies to:
MySQL Server
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1829
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:1829
CVE-2017-3238
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier.
Applies to:
MySQL Server
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1832
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:1832
CVE-2017-3251
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.16 and earlier.
Applies to:
MySQL Server
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1846
Title:
Vulnerability in the MySQL Cluster 7.2.26 and earlier, 7.3.14 and earlier and 7.4.12 and earlier
Type:
Software
Bulletins:
CISEC:1846
CVE-2016-5541
Severity:
Medium
Description:
Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: NDBAPI). Supported versions that are affected are 7.2.26 and earlier, 7.3.14 and earlier and 7.4.12 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS v3.0 Base Score 4.8 (Integrity and Availability impacts).
Applies to:
MySQL Cluster
Created:
2017-03-17
Updated:
2018-05-25

ID:
CISEC:1850
Title:
Vulnerability in the MySQL Cluster 7.2.25 and earlier, 7.3.14 and earlier and 7.4.12 and earlier – CVE-2016-3323
Type:
Software
Bulletins:
CISEC:1850
CVE-2017-3323
Severity:
Medium
Description:
Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: General). Supported versions that are affected are 7.2.25 and earlier, 7.3.14 and earlier and 7.4.12 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS v3.0 Base Score 3.7 (Availability impacts).
Applies to:
MySQL Cluster
Created:
2017-03-17
Updated:
2018-05-25

ID:
CISEC:1844
Title:
Vulnerability in the MySQL Cluster 7.2.25 and earlier, 7.3.14 and earlier and 7.4.12 and earlier – CVE-2016-3322
Type:
Software
Bulletins:
CISEC:1844
CVE-2017-3322
Severity:
Medium
Description:
Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: NDBAPI). Supported versions that are affected are 7.2.25 and earlier, 7.3.14 and earlier, 7.4.12 and earlier and . Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS v3.0 Base Score 3.7 (Availability impacts).
Applies to:
MySQL Cluster
Created:
2017-03-17
Updated:
2018-05-25

ID:
CISEC:1847
Title:
Vulnerability in the MySQL Cluster 7.2.19 and earlier, 7.3.8 and earlier and 7.4.5 and earlier – CVE-2016-3321
Type:
Software
Bulletins:
CISEC:1847
CVE-2017-3321
Severity:
Medium
Description:
Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: General). Supported versions that are affected are 7.2.19 and earlier, 7.3.8 and earlier and 7.4.5 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS v3.0 Base Score 3.7 (Availability impacts).
Applies to:
MySQL Cluster
Created:
2017-03-17
Updated:
2018-05-25

ID:
CISEC:1827
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java Mission Control
Type:
Software
Bulletins:
CISEC:1827
CVE-2016-8328
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java Mission Control). The supported version that is affected is Java SE: 8u112.
Applies to:
Java Development Kit 1.8
Java Runtime Environment 1.8
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1826
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment
Type:
Software
Bulletins:
CISEC:1826
CVE-2017-3259
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112.
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1851
Title:
Vulnerability in Java SE 6u131, 7u121 and 8u112; and Java SE Embedded 8u111
Type:
Software
Bulletins:
CISEC:1851
CVE-2016-2183
Severity:
Medium
Description:
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1835
Title:
Vulnerability in IBM WebSphere MQ 7.0.1 before 7.0.1.13
Type:
Software
Bulletins:
CISEC:1835
CVE-2015-2013
Severity:
Medium
Description:
IBM WebSphere MQ 7.0.1 before 7.0.1.13 allows remote attackers to cause a denial of service (channel-agent abend and process outage) via a crafted selection string in an MQI call.
Applies to:
IBM WebSphere MQ
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1856
Title:
Use after free in Renderer
Type:
Web
Bulletins:
CISEC:1856
CVE-2017-5019
Severity:
Medium
Description:
A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1860
Title:
Use after free in Extensions
Type:
Web
Bulletins:
CISEC:1860
CVE-2017-5021
Severity:
Medium
Description:
A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1855
Title:
Universal XSS in chrome://downloads
Type:
Web
Bulletins:
CISEC:1855
CVE-2017-5020
Severity:
Medium
Description:
Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to require a user gesture for powerful download operations, which allowed a remote attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1862
Title:
Universal XSS in chrome://apps
Type:
Web
Bulletins:
CISEC:1862
CVE-2017-5018
Severity:
Medium
Description:
Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, had an insufficiently strict content security policy on the Chrome app launcher page, which allowed a remote attacker to inject scripts or HTML into a privileged page via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1859
Title:
Type confusion in metrics
Type:
Web
Bulletins:
CISEC:1859
CVE-2017-5023
Severity:
Medium
Description:
Type confusion in Histogram in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit a near null dereference via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1858
Title:
Heap overflow in FFmpeg
Type:
Web
Bulletins:
CISEC:1858
CVE-2017-5024
Severity:
Medium
Description:
FFmpeg in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted video file.
Applies to:
Google Chrome
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1840
Title:
Directory traversal vulnerability in Atlassian JIRA before 6.0.5
Type:
Software
Bulletins:
CISEC:1840
CVE-2014-2313
Severity:
Medium
Description:
Directory traversal vulnerability in the Importers plugin in Atlassian JIRA before 6.0.5 allows remote attackers to create arbitrary files via unspecified vectors.
Applies to:
JIRA
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1842
Title:
Directory traversal vulnerability in Atlassian JIRA before 6.0.4
Type:
Software
Bulletins:
CISEC:1842
CVE-2014-2314
Severity:
Medium
Description:
Directory traversal vulnerability in the Issue Collector plugin in Atlassian JIRA before 6.0.4 allows remote attackers to create arbitrary files via unspecified vectors.
Applies to:
JIRA
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1839
Title:
Cross-site scripting
Type:
Software
Bulletins:
CISEC:1839
CVE-2016-6285
Severity:
Medium
Description:
Cross-site scripting (XSS) vulnerability in includes/decorators/global-translations.jsp in Atlassian JIRA before 7.2.2 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header.
Applies to:
JIRA
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1841
Title:
Cross-site scripting
Type:
Software
Bulletins:
CISEC:1841
CVE-2013-5319
Severity:
Medium
Description:
Cross-site scripting (XSS) vulnerability in secure/admin/user/views/deleteuserconfirm.jsp in the Admin Panel in Atlassian JIRA before 6.0.5 allows remote attackers to inject arbitrary web script or HTML via the name parameter to secure/admin/user/DeleteUser!default.jspa.
Applies to:
JIRA
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1857
Title:
Bypass of Content Security Policy in Blink
Type:
Web
Bulletins:
CISEC:1857
CVE-2017-5022
Severity:
Medium
Description:
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to properly enforce unsafe-inline content security policy, which allowed a remote attacker to bypass content security policy via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1853
Title:
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, resolved promises in an inappropriate context
Type:
Web
Bulletins:
CISEC:1853
CVE-2017-5010
Severity:
Medium
Description:
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, resolved promises in an inappropriate context, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1836
Title:
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled the sequence of events when closing a page
Type:
Web
Bulletins:
CISEC:1836
CVE-2017-5007
Severity:
Medium
Description:
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled the sequence of events when closing a page, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1837
Title:
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled object owner relationships
Type:
Web
Bulletins:
CISEC:1837
CVE-2017-5006
Severity:
Medium
Description:
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, incorrectly handled object owner relationships, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1854
Title:
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed attacker controlled JavaScript to be run during the invocation of a private script method
Type:
Web
Bulletins:
CISEC:1854
CVE-2017-5008
Severity:
Medium
Description:
Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed attacker controlled JavaScript to be run during the invocation of a private script method, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-03-17
Updated:
2024-01-17

ID:
CISEC:1813
Title:
Vulnerability in MySQL Server 5.6.34 and earlier. and 5.7.16 and earlier
Type:
Software
Bulletins:
CISEC:1813
CVE-2016-8327
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).
Applies to:
MySQL Server
Created:
2017-03-10
Updated:
2024-01-17

ID:
CISEC:1815
Title:
Vulnerability in MySQL Server 5.5.53 and earlier, 5.6.34 and earlier, and 5.7.16 and earlier
Type:
Software
Bulletins:
CISEC:1815
CVE-2017-3318
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.0 (Confidentiality impacts).
Applies to:
MySQL Server
Created:
2017-03-10
Updated:
2024-01-17

ID:
CISEC:1818
Title:
Vulnerability in MySQL Server 5.5.53 and earlier, 5.6.34 and earlier, and 5.7.16 and earlier
Type:
Software
Bulletins:
CISEC:1818
CVE-2017-3313
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.7 (Confidentiality impacts).
Applies to:
MySQL Server
Created:
2017-03-10
Updated:
2024-01-17

ID:
CISEC:1819
Title:
Vulnerability in MySQL Server 5.5.53 and earlier, 5.6.34 and earlier, and 5.7.16 and earlier
Type:
Software
Bulletins:
CISEC:1819
CVE-2017-3317
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Logging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.0 (Availability impacts).
Applies to:
MySQL Server
Created:
2017-03-10
Updated:
2024-01-17

ID:
CISEC:1814
Title:
Vulnerability in MySQL Server 5.5.53 and earlier
Type:
Software
Bulletins:
CISEC:1814
CVE-2017-3243
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.53 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).
Applies to:
MySQL Server
Created:
2017-03-10
Updated:
2024-01-17

ID:
CISEC:1816
Title:
Vulnerability in MySQL Server 5.5.53 and earlier
Type:
Software
Bulletins:
CISEC:1816
CVE-2017-3320
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.7.16 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS v3.0 Base Score 2.4 (Confidentiality impacts).
Applies to:
MySQL Server
Created:
2017-03-10
Updated:
2024-01-17

ID:
CISEC:1817
Title:
Vulnerability in MySQL Server 5.5.53 and earlier
Type:
Software
Bulletins:
CISEC:1817
CVE-2017-3319
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: X Plugin). Supported versions that are affected are 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS v3.0 Base Score 3.1 (Confidentiality impacts).
Applies to:
MySQL Server
Created:
2017-03-10
Updated:
2024-01-17

ID:
CISEC:1825
Title:
Vulnerability in MQXR service in WMQ Telemetry in IBM WebSphere MQ 7.1 before 7.1.0.7, 7.5 through 7.5.0.5, and 8.0 before 8.0.0.4
Type:
Software
Bulletins:
CISEC:1825
CVE-2015-2012
Severity:
Low
Description:
The MQXR service in WMQ Telemetry in IBM WebSphere MQ 7.1 before 7.1.0.7, 7.5 through 7.5.0.5, and 8.0 before 8.0.0.4 uses world-readable permissions for a cleartext file containing the SSL keystore password, which allows local users to obtain sensitive information by reading this file.
Applies to:
IBM WebSphere MQ
Created:
2017-03-10
Updated:
2018-05-25

ID:
CISEC:1822
Title:
Vulnerability in MQ Explorer in IBM WebSphere MQ before 8.0.0.3
Type:
Software
Bulletins:
CISEC:1822
CVE-2015-1967
Severity:
Medium
Description:
MQ Explorer in IBM WebSphere MQ before 8.0.0.3 does not recognize the absence of the compatibility-mode option, which allows remote attackers to obtain sensitive information by sniffing the network for a session in which TLS is not used.
Applies to:
IBM WebSphere MQ
Created:
2017-03-10
Updated:
2018-05-25

ID:
CISEC:1823
Title:
Vulnerability in cluster repository manager in IBM WebSphere MQ 7.5 before 7.5.0.5, and 8.0 before 8.0.0.2
Type:
Software
Bulletins:
CISEC:1823
CVE-2015-0189
Severity:
Medium
Description:
The cluster repository manager in IBM WebSphere MQ 7.5 before 7.5.0.5 and 8.0 before 8.0.0.2 allows remote authenticated administrators to cause a denial of service (memory overwrite and daemon outage) by triggering multiple transmit-queue records.
Applies to:
IBM WebSphere MQ
Created:
2017-03-10
Updated:
2018-05-25

ID:
CISEC:1824
Title:
Cross-site scripting (XSS) vulnerability in MQ XR WebSockets Listener in WMQ Telemetry in IBM WebSphere MQ 7.5 before 7.5.0.5, and 8.0 before 8.0.0.2
Type:
Software
Bulletins:
CISEC:1824
CVE-2015-0176
Severity:
Medium
Description:
IBM WebSphere MQ is vulnerable to reflected cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Applies to:
IBM WebSphere MQ
Created:
2017-03-10
Updated:
2018-05-25

ID:
CISEC:1796
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB
Type:
Software
Bulletins:
CISEC:1796
CVE-2017-3257
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.34 and earlier5.7.16 and earlier.
Applies to:
MySQL Server
Created:
2017-03-03
Updated:
2024-01-17

ID:
CISEC:1795
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML
Type:
Software
Bulletins:
CISEC:1795
CVE-2017-3244
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier.
Applies to:
MySQL Server
Created:
2017-03-03
Updated:
2024-01-17

ID:
CISEC:1797
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL
Type:
Software
Bulletins:
CISEC:1797
CVE-2017-3273
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier.
Applies to:
MySQL Server
Created:
2017-03-03
Updated:
2024-01-17

ID:
CISEC:1789
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking
Type:
Software
Bulletins:
CISEC:1789
CVE-2016-5552
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12.
Applies to:
JRockit
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-03-03
Updated:
2024-01-17

ID:
CISEC:1790
Title:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking
Type:
Software
Bulletins:
CISEC:1790
CVE-2017-3261
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111.
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-03-03
Updated:
2024-01-17

ID:
CISEC:1791
Title:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking
Type:
Software
Bulletins:
CISEC:1791
CVE-2017-3231
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111.
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-03-03
Updated:
2024-01-17

ID:
CISEC:1777
Title:
Vulnerability in Oracle Java SE 7u121, and 8u112; Java SE Embedded 8u111
Type:
Software
Bulletins:
CISEC:1777
CVE-2016-5549
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).
Applies to:
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-03-03
Updated:
2024-01-17

ID:
CISEC:1802
Title:
Vulnerability in Oracle Java SE 7u121, and 8u112; Java SE Embedded 8u111
Type:
Software
Bulletins:
CISEC:1802
CVE-2017-3260
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u121 and 8u112. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts).
Applies to:
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-03-03
Updated:
2024-01-17

ID:
CISEC:1778
Title:
Vulnerability in Oracle Java SE 6u131, 7u121, and 8u112; Java SE Embedded 8u111; and JRockit R28 3.12
Type:
Software
Bulletins:
CISEC:1778
CVE-2017-3241
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).
Applies to:
JRockit R28
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-03-03
Updated:
2024-01-17

ID:
CISEC:1779
Title:
Vulnerability in Oracle Java SE 6u131, 7u121, and 8u112; Java SE Embedded 8u111; and JRockit R28 3.12
Type:
Software
Bulletins:
CISEC:1779
CVE-2016-5546
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Integrity impacts).
Applies to:
JRockit R28
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-03-03
Updated:
2024-01-17

ID:
CISEC:1800
Title:
Vulnerability in Oracle Java SE 6u131, 7u121, and 8u112; Java SE Embedded 8u111; and JRockit R28 3.12
Type:
Software
Bulletins:
CISEC:1800
CVE-2017-3253
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Availability impacts).
Applies to:
JRockit R28
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-03-03
Updated:
2024-01-17

ID:
CISEC:1801
Title:
Vulnerability in Oracle Java SE 6u131, 7u121, and 8u112; and Java SE Embedded 8u111
Type:
Software
Bulletins:
CISEC:1801
CVE-2016-5548
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-03-03
Updated:
2024-01-17

ID:
CISEC:1798
Title:
Vulnerability in IBM WebSphere MQ 8.0 before 8.0.0.5
Type:
Software
Bulletins:
CISEC:1798
CVE-2015-7473
Severity:
Low
Description:
runmqsc in IBM WebSphere MQ 8.x before 8.0.0.5 allows local users to bypass intended queue-manager command access restrictions by leveraging authority for +connect and +dsp.
Applies to:
IBM WebSphere MQ
Created:
2017-03-03
Updated:
2024-01-17

ID:
CISEC:1799
Title:
Vulnerability in IBM WebSphere MQ 8.0 before 8.0.0.5
Type:
Software
Bulletins:
CISEC:1799
CVE-2016-0259
Severity:
Low
Description:
runmqsc in IBM WebSphere MQ 8.x before 8.0.0.5 allows local users to bypass an intended +dsp authority requirement and obtain sensitive information via unspecified display commands.
Applies to:
IBM WebSphere MQ
Created:
2017-03-03
Updated:
2024-01-17

ID:
CISEC:1780
Title:
Vulnerability in IBM WebSphere MQ 7.5 before 7.5.0.7 and 8.0 before 8.0.0.5
Type:
Software
Bulletins:
CISEC:1780
CVE-2016-0379
Severity:
Low
Description:
IBM WebSphere MQ 7.5 before 7.5.0.7 and 8.0 before 8.0.0.5 mishandles protocol flows, which allows remote authenticated users to cause a denial of service (channel outage) by leveraging queue-manager rights.
Applies to:
IBM WebSphere MQ
Created:
2017-03-03
Updated:
2024-01-17

ID:
CISEC:1774
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption
Type:
Software
Bulletins:
CISEC:1774
CVE-2016-8318
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier.
Applies to:
MySQL Server
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1772
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging
Type:
Software
Bulletins:
CISEC:1772
CVE-2017-3312
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier.
Applies to:
MySQL Server
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1773
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL
Type:
Software
Bulletins:
CISEC:1773
CVE-2017-3258
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier.
Applies to:
MySQL Server
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1770
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries
Type:
Software
Bulletins:
CISEC:1770
CVE-2016-5547
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12.
Applies to:
JRockit
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1769
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAAS
Type:
Software
Bulletins:
CISEC:1769
CVE-2017-3252
Severity:
Low
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAAS). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12.
Applies to:
JRockit
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1771
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java Mission Control
Type:
Software
Bulletins:
CISEC:1771
CVE-2017-3262
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java Mission Control). The supported version that is affected is Java SE: 8u112.
Applies to:
Java Development Kit 1.8
Java Runtime Environment 1.8
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1765
Title:
Vulnerability in SSL 3.0 as used in OpenSSL through 1.0.1i
Type:
Services
Bulletins:
CISEC:1765
CVE-2014-3566
Severity:
Medium
Description:
The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
Applies to:
OpenSSL
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1776
Title:
Vulnerability in Oracle Java SE 7u121, and 8u112; Java SE Embedded 8u111
Type:
Software
Bulletins:
CISEC:1776
CVE-2017-3289
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).
Applies to:
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1775
Title:
Vulnerability in Oracle Java SE 6u131, 7u121, and 8u112; Java SE Embedded 8u111
Type:
Software
Bulletins:
CISEC:1775
CVE-2017-3272
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1749
Title:
Vulnerability in Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier
Type:
Software
Bulletins:
CISEC:1749
CVE-2017-2964
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to the parsing of JPEG EXIF metadata. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1750
Title:
Vulnerability in Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier
Type:
Software
Bulletins:
CISEC:1750
CVE-2017-2961
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the XFA engine, related to validation functionality. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1751
Title:
Vulnerability in Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier
Type:
Software
Bulletins:
CISEC:1751
CVE-2017-2965
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to TIFF file parsing. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1744
Title:
Vulnerability in Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier
Type:
Software
Bulletins:
CISEC:1744
CVE-2017-2966
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability in the image conversion engine related to parsing malformed TIFF segments. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1745
Title:
Vulnerability in Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier
Type:
Software
Bulletins:
CISEC:1745
CVE-2017-2963
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to handling of the color profile in a TIFF file. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1746
Title:
Vulnerability in Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier
Type:
Software
Bulletins:
CISEC:1746
CVE-2017-2967
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the XFA engine related to a form's structure and organization. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1747
Title:
Vulnerability in Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier
Type:
Software
Bulletins:
CISEC:1747
CVE-2017-2960
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to parsing of EXIF metadata. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1748
Title:
Vulnerability in Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier
Type:
Software
Bulletins:
CISEC:1748
CVE-2017-2962
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable type confusion vulnerability in the XSLT engine related to localization functionality. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1739
Title:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability
Type:
Software
Bulletins:
CISEC:1739
CVE-2017-2951
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the XFA engine, related to sub-form functionality. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1740
Title:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability
Type:
Software
Bulletins:
CISEC:1740
CVE-2017-2950
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the XFA engine, related to layout functionality. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1734
Title:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:1734
CVE-2017-2953
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion module when processing a TIFF image. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1738
Title:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:1738
CVE-2017-2944
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability when parsing crafted TIFF image files. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1742
Title:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:1742
CVE-2017-2943
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability when processing tags in TIFF images. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1735
Title:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability
Type:
Software
Bulletins:
CISEC:1735
CVE-2017-2945
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability when parsing TIFF image files. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1741
Title:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability
Type:
Software
Bulletins:
CISEC:1741
CVE-2017-2946
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability when parsing the segment for storing non-graphic information. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1743
Title:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability
Type:
Software
Bulletins:
CISEC:1743
CVE-2017-2949
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability in the XSLT engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1733
Title:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable buffer overflow / underflow vulnerability
Type:
Software
Bulletins:
CISEC:1733
CVE-2017-2948
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable buffer overflow / underflow vulnerability in the XFA engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1736
Title:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable buffer overflow / underflow vulnerability
Type:
Software
Bulletins:
CISEC:1736
CVE-2017-2952
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable buffer overflow / underflow vulnerability in the image conversion module related to parsing tags in TIFF files. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1737
Title:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have a security bypass vulnerability
Type:
Software
Bulletins:
CISEC:1737
CVE-2017-2947
Severity:
Medium
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have a security bypass vulnerability when manipulating Form Data Format (FDF).
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-24
Updated:
2024-01-17

ID:
CISEC:1727
Title:
Vulnerability in Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier
Type:
Software
Bulletins:
CISEC:1727
CVE-2017-2955
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the JavaScript engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-17
Updated:
2024-01-17

ID:
CISEC:1728
Title:
Vulnerability in Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier
Type:
Software
Bulletins:
CISEC:1728
CVE-2017-2957
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the JavaScript engine, related to collaboration functionality. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-17
Updated:
2024-01-17

ID:
CISEC:1729
Title:
Vulnerability in Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier
Type:
Software
Bulletins:
CISEC:1729
CVE-2017-2954
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion module when handling malformed TIFF images. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-17
Updated:
2024-01-17

ID:
CISEC:1730
Title:
Vulnerability in Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier
Type:
Software
Bulletins:
CISEC:1730
CVE-2017-2958
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the JavaScript engine. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-17
Updated:
2024-01-17

ID:
CISEC:1731
Title:
Vulnerability in Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier
Type:
Software
Bulletins:
CISEC:1731
CVE-2017-2959
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability in the image conversion engine, related to parsing of color profile metadata. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-17
Updated:
2024-01-17

ID:
CISEC:1732
Title:
Vulnerability in Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier
Type:
Software
Bulletins:
CISEC:1732
CVE-2017-2956
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the JavaScript engine, related to manipulation of the navigation pane. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-17
Updated:
2024-01-17

ID:
CISEC:1719
Title:
EPHEMERAL, HTTPS, MVG, MSL, TEXT, SHOW, WIN, and PLT coder vulnerability in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1
Type:
Software
Bulletins:
CISEC:1719
CVE-2016-3714
Severity:
High
Description:
The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."
Applies to:
ImageMagick
Created:
2017-02-17
Updated:
2024-01-17

ID:
CISEC:1720
Title:
EPHEMERAL coder vulnerability in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1
Type:
Software
Bulletins:
CISEC:1720
CVE-2016-3715
Severity:
Medium
Description:
The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.
Applies to:
ImageMagick
Created:
2017-02-17
Updated:
2024-01-17

ID:
CISEC:1717
Title:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:1717
CVE-2017-2940
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability when processing JPEG 2000 files. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-17
Updated:
2024-01-17

ID:
CISEC:1718
Title:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:1718
CVE-2017-2941
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability when processing Compact Font Format data. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-17
Updated:
2024-01-17

ID:
CISEC:1716
Title:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability
Type:
Software
Bulletins:
CISEC:1716
CVE-2017-2942
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability when processing TIFF image data. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-17
Updated:
2024-01-17

ID:
CISEC:1703
Title:
Vulnerability in Samsung Security Manager
Type:
Software
Bulletins:
CISEC:1703
CVE-2015-3435
Severity:
High
Description:
Samsung Security Manager (SSM) before 1.31 allows remote attackers to execute arbitrary code by uploading a file with an HTTP (1) PUT or (2) MOVE request.
Applies to:
Samsung Security Manager
Created:
2017-02-10
Updated:
2024-01-17

ID:
CISEC:1707
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:1707
CVE-2017-0003
Severity:
High
Description:
Microsoft Word 2016 and SharePoint Enterprise Server 2016 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."
Applies to:
Microsoft SharePoint Server 2016
Microsoft Word 2016
Created:
2017-02-10
Updated:
2024-01-17

ID:
CISEC:1706
Title:
Microsoft Edge Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:1706
CVE-2017-0002
Severity:
Medium
Description:
Microsoft Edge allows remote attackers to bypass the Same Origin Policy via vectors involving the about:blank URL and data: URLs, aka "Microsoft Edge Elevation of Privilege Vulnerability."
Applies to:
Microsoft Edge
Created:
2017-02-10
Updated:
2024-01-17

ID:
CISEC:1705
Title:
Local Security Authority Subsystem Service Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:1705
CVE-2017-0004
Severity:
High
Description:
The Local Security Authority Subsystem Service (LSASS) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to cause a denial of service (reboot) via a crafted authentication request, aka "Local Security Authority Subsystem Service Denial of Service Vulnerability."
Applies to:
Created:
2017-02-10
Updated:
2024-01-17

ID:
CISEC:1715
Title:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability
Type:
Software
Bulletins:
CISEC:1715
CVE-2017-2939
Severity:
High
Description:
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability when processing a malformed cross-reference table. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2017-02-10
Updated:
2024-01-17

ID:
CVE-2014-9914
Title:
Race condition in the ip4_datagram_release_cb function in net/ipv4/datagram.c in the Linux kernel before 3.15.2 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect expectations...
Type:
Mobile Devices
Bulletins:
CVE-2014-9914
SFBID96100
Severity:
High
Description:
Race condition in the ip4_datagram_release_cb function in net/ipv4/datagram.c in the Linux kernel before 3.15.2 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect expectations about locking during multithreaded access to internal data structures for IPv4 UDP sockets.
Applies to:
Created:
2017-02-07
Updated:
2024-01-17

ID:
CISEC:1681
Title:
Windows Kernel Memory Address Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1681
CVE-2016-7258
Severity:
Low
Description:
The kernel in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 mishandles page-fault system calls, which allows local users to obtain sensitive information from arbitrary processes via a crafted application, aka "Windows Kernel Memory Address Information Disclosure Vulnerability."
Applies to:
Created:
2017-02-03
Updated:
2024-01-17

ID:
CISEC:1680
Title:
Windows Common Log File System Driver Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1680
CVE-2016-7295
Severity:
Low
Description:
The Common Log File System (CLFS) driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to obtain sensitive information from process memory via a crafted application, aka "Windows Common Log File System Driver Information Disclosure Vulnerability."
Applies to:
Created:
2017-02-03
Updated:
2024-01-17

ID:
CISEC:1691
Title:
Vulnerability in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18
Type:
Software
Bulletins:
CISEC:1691
CVE-2016-6663
Severity:
Medium
Description:
Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17 allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table.
Applies to:
MariaDB
MySQL Server
Created:
2017-02-03
Updated:
2024-01-17

ID:
CISEC:1688
Title:
Microsoft Office Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:1688
CVE-2016-7262
Severity:
Medium
Description:
Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, and Excel Viewer allow user-assisted remote attackers to execute arbitrary commands via a crafted cell that is mishandled upon a click, aka "Microsoft Office Security Feature Bypass Vulnerability."
Applies to:
Microsoft Excel 2007
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel Viewer
Microsoft Office Compatibility Pack
Created:
2017-02-03
Updated:
2024-01-17

ID:
CISEC:1684
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:1684
CVE-2016-7277
Severity:
High
Description:
Microsoft Office 2016 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."
Applies to:
Microsoft Office 2016
Created:
2017-02-03
Updated:
2024-01-17

ID:
CISEC:1687
Title:
Microsoft Office Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1687
CVE-2016-7265
Severity:
Medium
Description:
Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer, Excel Services on SharePoint Server 2007 SP3, and Excel Services on SharePoint Server 2010 SP2 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via a crafted document, aka "Microsoft Office Information Disclosure Vulnerability."
Applies to:
Microsoft Excel 2007
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel Viewer
Microsoft Office Compatibility Pack
Microsoft SharePoint Server 2007
Microsoft SharePoint Server 2010
Created:
2017-02-03
Updated:
2024-01-17

ID:
CISEC:1689
Title:
Microsoft Office Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1689
CVE-2016-7264
Severity:
Medium
Description:
Microsoft Excel 2007 SP3, Office Compatibility Pack SP3, Excel Viewer, Excel for Mac 2011, and Excel 2016 for Mac allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via a crafted document, aka "Microsoft Office Information Disclosure Vulnerability."
Applies to:
Microsoft Excel 2007
Microsoft Excel Viewer
Microsoft Office Compatibility Pack
Created:
2017-02-03
Updated:
2024-01-17

ID:
CISEC:1651
Title:
Windows Uniscribe Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:1651
CVE-2016-7274
Severity:
High
Description:
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Uniscribe Remote Code Execution Vulnerability."
Applies to:
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1645
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:1645
CVE-2016-7260
Severity:
High
Description:
The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1646
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:1646
CVE-2016-7259
Severity:
High
Description:
The Graphics Component in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1676
Title:
Vulnerability in NVIDIA Graphics Driver
Type:
Software
Bulletins:
CISEC:1676
CVE-2015-7865
Severity:
High
Description:
nvSCPAPISvr.exe in the Stereoscopic 3D Driver Service in the NVIDIA GPU graphics driver R340 before 341.92, R352 before 354.35, and R358 before 358.87 on Windows does not properly restrict access to the stereosvrpipe named pipe, which allows local users to gain privileges via a commandline in a number 2 command, which is stored in the HKEY_LOCAL_MACHINE explorer Run registry key, a different vulnerability than CVE-2011-4784.
Applies to:
NVIDIA Graphics Driver
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1653
Title:
Secure Kernel Mode Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:1653
CVE-2016-7271
Severity:
Medium
Description:
The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1648
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:1648
CVE-2016-7287
Severity:
High
Description:
The scripting engines in Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability."
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1643
Title:
Microsoft Office Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:1643
CVE-2016-7267
Severity:
Medium
Description:
Microsoft Excel 2010 SP2, 2013 SP1, 2013 RT SP1, and 2016 misparses file formats, which makes it easier for remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Security Feature Bypass Vulnerability."
Applies to:
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1644
Title:
Microsoft Office Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:1644
CVE-2016-7266
Severity:
Medium
Description:
Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer, and Excel 2016 for Mac mishandle a registry check, which allows user-assisted remote attackers to execute arbitrary commands via crafted embedded content in a document, aka "Microsoft Office Security Feature Bypass Vulnerability."
Applies to:
Microsoft Excel 2007
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel Viewer
Microsoft Office Compatibility Pack
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1639
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:1639
CVE-2016-7289
Severity:
High
Description:
Microsoft Publisher 2010 SP2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."
Applies to:
Microsoft Publisher 2010
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1640
Title:
Microsoft Office Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1640
CVE-2016-7268
Severity:
Medium
Description:
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Office Compatibility Pack SP3, Word Viewer, Word for Mac 2011, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via a crafted document, aka "Microsoft Office Information Disclosure Vulnerability."
Applies to:
Microsoft Office 2010
Microsoft Office Compatibility Pack
Microsoft Office Web Apps 2010
Microsoft SharePoint Server 2010
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word Viewer
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1641
Title:
Microsoft Office Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1641
CVE-2016-7291
Severity:
Medium
Description:
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Office Compatibility Pack SP3, Word for Mac 2011, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via a crafted document, aka "Microsoft Office Information Disclosure Vulnerability," a different vulnerability than CVE-2016-7290.
Applies to:
Microsoft Office 2010
Microsoft Office Compatibility Pack
Microsoft Office Web Apps 2010
Microsoft SharePoint Server 2010
Microsoft Word 2007
Microsoft Word 2010
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1642
Title:
Microsoft Office Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1642
CVE-2016-7290
Severity:
Medium
Description:
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Office Compatibility Pack SP3, Word for Mac 2011, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via a crafted document, aka "Microsoft Office Information Disclosure Vulnerability," a different vulnerability than CVE-2016-7291.
Applies to:
Microsoft Office 2010
Microsoft Office Compatibility Pack
Microsoft Office Web Apps 2010
Microsoft SharePoint Server 2010
Microsoft Word 2007
Microsoft Word 2010
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1647
Title:
Microsoft Browser – Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:1647
CVE-2016-7279
Severity:
High
Description:
Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability."
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1650
Title:
Microsoft Browser Security Feature Bypass
Type:
Software
Bulletins:
CISEC:1650
CVE-2016-7281
Severity:
Low
Description:
The Web Workers implementation in Microsoft Internet Explorer 10 and 11 and Microsoft Edge allows remote attackers to bypass the Same Origin Policy via unspecified vectors, aka "Microsoft Browser Security Feature Bypass Vulnerability."
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1649
Title:
Microsoft Browser Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1649
CVE-2016-7282
Severity:
Medium
Description:
Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 9 through 11 and Microsoft Edge allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Microsoft Browser Information Disclosure Vulnerability."
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1652
Title:
.NET Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1652
CVE-2016-7270
Severity:
Medium
Description:
The Data Provider for SQL Server in Microsoft .NET Framework 4.6.2 mishandles a developer-supplied key, which allows remote attackers to bypass the Always Encrypted protection mechanism and obtain sensitive cleartext information by leveraging key guessability, aka ".NET Information Disclosure Vulnerability."
Applies to:
Created:
2017-01-27
Updated:
2024-01-17

ID:
CISEC:1627
Title:
Windows Hyperlink Object Library Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1627
CVE-2016-7278
Severity:
Low
Description:
Microsoft Internet Explorer 9 through 11 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Windows Hyperlink Object Library Information Disclosure Vulnerability."
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-01-20
Updated:
2024-01-17

ID:
CISEC:1626
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:1626
CVE-2016-7288
Severity:
High
Description:
The scripting engines in Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7286, CVE-2016-7296, and CVE-2016-7297.
Applies to:
Microsoft Edge
Created:
2017-01-20
Updated:
2024-01-17

ID:
CISEC:1628
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:1628
CVE-2016-7296
Severity:
High
Description:
The scripting engines in Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7286, CVE-2016-7288, and CVE-2016-7297.
Applies to:
Microsoft Edge
Created:
2017-01-20
Updated:
2024-01-17

ID:
CISEC:1629
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:1629
CVE-2016-7202
Severity:
High
Description:
The scripting engines in Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," as demonstrated by the Chakra JavaScript engine, a different vulnerability than CVE-2016-7200, CVE-2016-7201, CVE-2016-7203, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-01-20
Updated:
2024-01-17

ID:
CISEC:1631
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:1631
CVE-2016-7286
Severity:
High
Description:
The scripting engines in Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7288, CVE-2016-7296, and CVE-2016-7297.
Applies to:
Microsoft Edge
Created:
2017-01-20
Updated:
2024-01-17

ID:
CISEC:1633
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:1633
CVE-2016-7297
Severity:
High
Description:
The scripting engines in Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7286, CVE-2016-7288, and CVE-2016-7296.
Applies to:
Microsoft Edge
Created:
2017-01-20
Updated:
2024-01-17

ID:
CISEC:1638
Title:
Microsoft Office OLE DLL Side Loading Vulnerability
Type:
Software
Bulletins:
CISEC:1638
CVE-2016-7275
Severity:
High
Description:
Microsoft Office 2010 SP2, 2013 SP1, 2013 RT SP1, and 2016 mishandles library loading, which allows local users to gain privileges via a crafted application, aka "Microsoft Office OLE DLL Side Loading Vulnerability."
Applies to:
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2017-01-20
Updated:
2024-01-17

ID:
CISEC:1636
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:1636
CVE-2016-7298
Severity:
High
Description:
Microsoft Office 2007 SP3, Office 2010 SP2, Word Viewer, Office for Mac 2011, and Office 2016 for Mac allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Word Viewer
Created:
2017-01-20
Updated:
2024-01-17

ID:
CISEC:1637
Title:
Microsoft Office Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1637
CVE-2016-7276
Severity:
Medium
Description:
Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office for Mac 2011, and Office 2016 for Mac allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via a crafted document, aka "Microsoft Office Information Disclosure Vulnerability."
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Word Viewer
Created:
2017-01-20
Updated:
2024-01-17

ID:
CISEC:1630
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:1630
CVE-2016-7181
Severity:
High
Description:
Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Edge Memory Corruption Vulnerability."
Applies to:
Microsoft Edge
Created:
2017-01-20
Updated:
2024-01-17

ID:
CISEC:1625
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1625
CVE-2016-7280
Severity:
Medium
Description:
Cross-site scripting (XSS) vulnerability in Microsoft Edge allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Microsoft Edge Information Disclosure Vulnerability," a different vulnerability than CVE-2016-7206.
Applies to:
Microsoft Edge
Created:
2017-01-20
Updated:
2024-01-17

ID:
CISEC:1635
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1635
CVE-2016-7206
Severity:
Medium
Description:
Cross-site scripting (XSS) vulnerability in Microsoft Edge allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Microsoft Edge Information Disclosure Vulnerability," a different vulnerability than CVE-2016-7280.
Applies to:
Microsoft Edge
Created:
2017-01-20
Updated:
2024-01-17

ID:
CISEC:1634
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:1634
CVE-2016-7283
Severity:
High
Description:
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2017-01-20
Updated:
2024-01-17

ID:
CISEC:1632
Title:
Internet Explorer Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1632
CVE-2016-7284
Severity:
Medium
Description:
Microsoft Internet Explorer 10 and 11 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability."
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2017-01-20
Updated:
2024-01-17

ID:
CVE-2014-9909
Title:
An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires...
Type:
Mobile Devices
Bulletins:
CVE-2014-9909
SFBID94685
Severity:
High
Description:
An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31676542. References: B-RB#26684.
Applies to:
Created:
2017-01-18
Updated:
2024-01-17

ID:
CVE-2014-9910
Title:
An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires...
Type:
Mobile Devices
Bulletins:
CVE-2014-9910
SFBID94685
Severity:
High
Description:
An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31746399. References: B-RB#26710.
Applies to:
Created:
2017-01-18
Updated:
2024-01-17

ID:
CISEC:1614
Title:
Windows Installer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:1614
CVE-2016-7292
Severity:
High
Description:
The Installer in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 mishandles library loading, which allows local users to gain privileges via a crafted application, aka "Windows Installer Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-01-13
Updated:
2024-01-17

ID:
CISEC:1603
Title:
Windows Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:1603
CVE-2016-7272
Severity:
High
Description:
The Graphics component in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Graphics Remote Code Execution Vulnerability."
Applies to:
Created:
2017-01-13
Updated:
2024-01-17

ID:
CISEC:1604
Title:
Windows Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:1604
CVE-2016-7273
Severity:
High
Description:
The Graphics component in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Graphics Remote Code Execution Vulnerability."
Applies to:
Created:
2017-01-13
Updated:
2024-01-17

ID:
CISEC:1613
Title:
Windows Crypto Driver Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1613
CVE-2016-7219
Severity:
Low
Description:
The Crypto driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to obtain sensitive information via a crafted application, aka "Windows Crypto Driver Information Disclosure Vulnerability."
Applies to:
Created:
2017-01-13
Updated:
2024-01-17

ID:
CISEC:1602
Title:
GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:1602
CVE-2016-7257
Severity:
Medium
Description:
The GDI component in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Office for Mac 2011, and Office 2016 for Mac allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "GDI Information Disclosure Vulnerability."
Applies to:
Created:
2017-01-13
Updated:
2024-01-17

ID:
CISEC:1704
Title:
Remove OneDrive option located in the navigation panel of File Explorer on Windows 10.
Type:
Miscellaneous
Bulletins:
CISEC:1704
Severity:
Low
Description:
This method is ideal for users of Windows 10 Home, but also for Professional, Enterprise or Education, who want to get rid of OneDrive. It’s completely reversible if you ever want to use OneDrive again.
Applies to:
OneDrive
Created:
2017-01-08
Updated:
2017-02-10

ID:
CISEC:1516
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:1516
CVE-2016-7216
Severity:
Low
Description:
The kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 mishandles permissions, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1558
Title:
Vulnerability in Google Chrome before 55.0.2883.75
Type:
Web
Bulletins:
CISEC:1558
CVE-2016-9652
Severity:
High
Description:
Various fixes from internal audits, fuzzing and other initiatives.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1498
Title:
VHD Driver Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:1498
CVE-2016-7224
Severity:
Low
Description:
Virtual Hard Disk Driver in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 does not properly restrict access to files, which allows local users to gain privileges via a crafted application, aka "VHD Driver Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1499
Title:
VHD Driver Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:1499
CVE-2016-7223
Severity:
Low
Description:
Virtual Hard Disk Driver in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 does not properly restrict access to files, which allows local users to gain privileges via a crafted application, aka "VHD Driver Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1500
Title:
VHD Driver Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:1500
CVE-2016-7225
Severity:
Low
Description:
Virtual Hard Disk Driver in Windows 10 Gold, 1511, and 1607 and Windows Server 2016 does not properly restrict access to files, which allows local users to gain privileges via a crafted application, aka "VHD Driver Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1501
Title:
VHD Driver Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:1501
CVE-2016-7226
Severity:
Low
Description:
Virtual Hard Disk Driver in Windows 10 Gold, 1511, and 1607 and Windows Server 2016 does not properly restrict access to files, which allows local users to gain privileges via a crafted application, aka "VHD Driver Elevation of Privilege Vulnerability."
Applies to:
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1564
Title:
Use after free in V8
Type:
Web
Bulletins:
CISEC:1564
CVE-2016-5213
Severity:
Medium
Description:
A use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1555
Title:
Use after free in PDFium
Type:
Web
Bulletins:
CISEC:1555
CVE-2016-5203
Severity:
Medium
Description:
A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1566
Title:
Use after free in PDFium
Type:
Web
Bulletins:
CISEC:1566
CVE-2016-5211
Severity:
Medium
Description:
A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1554
Title:
Universal XSS in Blink
Type:
Web
Bulletins:
CISEC:1554
CVE-2016-5208
Severity:
Medium
Description:
Blink in Google Chrome prior to 55.0.2883.75 for Linux and Windows, and 55.0.2883.84 for Android allowed possible corruption of the DOM tree during synchronous event handling, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1557
Title:
Universal XSS in Blink
Type:
Web
Bulletins:
CISEC:1557
CVE-2016-5205
Severity:
Medium
Description:
Blink in Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac, incorrectly handles deferred page loads, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1561
Title:
Universal XSS in Blink
Type:
Web
Bulletins:
CISEC:1561
CVE-2016-5204
Severity:
Medium
Description:
Leaking of an SVG shadow tree leading to corruption of the DOM tree in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1563
Title:
Universal XSS in Blink
Type:
Web
Bulletins:
CISEC:1563
CVE-2016-5207
Severity:
Medium
Description:
In Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android, corruption of the DOM tree could occur during the removal of a full screen element, which allowed a remote attacker to achieve arbitrary code execution via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1580
Title:
Type confusion in libGLESv2 in ANGLE in Google Chrome prior to 55.0.2883.75 for Mac, Windows
Type:
Web
Bulletins:
CISEC:1580
CVE-2016-5221
Severity:
Medium
Description:
Type confusion in libGLESv2 in ANGLE in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android possibly allowed a remote attacker to bypass buffer validation via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1570
Title:
The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows
Type:
Web
Bulletins:
CISEC:1570
CVE-2016-5217
Severity:
Medium
Description:
The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly permitted access to privileged plugins, which allowed a remote attacker to bypass site isolation via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1574
Title:
The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows
Type:
Web
Bulletins:
CISEC:1574
CVE-2016-5218
Severity:
Medium
Description:
The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to temporarily spoof the contents of the Omnibox (URL bar) via a crafted HTML page containing PDF data.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1514
Title:
SQL Server Agent Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:1514
CVE-2016-7253
Severity:
Medium
Description:
The agent in Microsoft SQL Server 2012 SP2, 2012 SP3, 2014 SP1, 2014 SP2, and 2016 does not properly check the atxcore.dll ACL, which allows remote authenticated users to gain privileges via unspecified vectors, aka "SQL Server Agent Elevation of Privilege Vulnerability."
Applies to:
Microsoft SQL Server 2012
Microsoft SQL Server 2014
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1513
Title:
SQL RDBMS Engine EoP vulnerability
Type:
Software
Bulletins:
CISEC:1513
CVE-2016-7254
Severity:
Medium
Description:
Microsoft SQL Server 2012 SP2 and 2012 SP3 does not properly perform a cast of an unspecified pointer, which allows remote authenticated users to gain privileges via unknown vectors, aka "SQL RDBMS Engine Elevation of Privilege Vulnerability."
Applies to:
Microsoft SQL Server 2012
Microsoft SQL Server 2014
Microsoft SQL Server 2016
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1517
Title:
Secure Boot Component Vulnerability
Type:
Software
Bulletins:
CISEC:1517
CVE-2016-7247
Severity:
Medium
Description:
Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow physically proximate attackers to bypass the Secure Boot protection mechanism via a crafted boot policy, aka "Secure Boot Component Vulnerability."
Applies to:
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1560
Title:
Same-origin bypass in PDFium
Type:
Web
Bulletins:
CISEC:1560
CVE-2016-5206
Severity:
Medium
Description:
The PDF plugin in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly followed redirects, which allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1562
Title:
Private property access in V8
Type:
Web
Bulletins:
CISEC:1562
CVE-2016-9651
Severity:
Medium
Description:
Private property access in V8.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1575
Title:
PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows
Type:
Web
Bulletins:
CISEC:1575
CVE-2016-5220
Severity:
Medium
Description:
PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to read local files via a crafted PDF file.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1565
Title:
Out of bounds write in PDFium
Type:
Web
Bulletins:
CISEC:1565
CVE-2016-5210
Severity:
Medium
Description:
Heap buffer overflow during TIFF image parsing in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1567
Title:
Out of bounds write in Blink
Type:
Web
Bulletins:
CISEC:1567
CVE-2016-5209
Severity:
Medium
Description:
Bad casting in bitmap manipulation in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1551
Title:
MSL coder vulnerability in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1
Type:
Software
Bulletins:
CISEC:1551
CVE-2016-3716
Severity:
Medium
Description:
The MSL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to move arbitrary files via a crafted image.
Applies to:
ImageMagick
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1556
Title:
Local file disclosure in DevTools
Type:
Web
Bulletins:
CISEC:1556
CVE-2016-5212
Severity:
Medium
Description:
Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android insufficiently sanitized DevTools URLs, which allowed a remote attacker to read local files via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1552
Title:
LABEL coder vulnerability in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1
Type:
Software
Bulletins:
CISEC:1552
CVE-2016-3717
Severity:
High
Description:
The LABEL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to read arbitrary files via a crafted image.
Applies to:
ImageMagick
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1568
Title:
Integer overflow in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows
Type:
Web
Bulletins:
CISEC:1568
CVE-2016-5223
Severity:
Medium
Description:
Integer overflow in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption or DoS via a crafted PDF file.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1577
Title:
Incorrect handling of invalid URLs in Google Chrome prior to 55.0.2883.75 for Mac, Windows
Type:
Web
Bulletins:
CISEC:1577
CVE-2016-5222
Severity:
Medium
Description:
Incorrect handling of invalid URLs in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1573
Title:
Google Chrome prior to 55.0.2883.75 for Windows mishandled downloaded files
Type:
Web
Bulletins:
CISEC:1573
CVE-2016-5214
Severity:
Medium
Description:
Google Chrome prior to 55.0.2883.75 for Windows mishandled downloaded files, which allowed a remote attacker to prevent the downloaded file from receiving the Mark of the Web via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1559
Title:
CSP Referrer disclosure
Type:
Web
Bulletins:
CISEC:1559
CVE-2016-9650
Severity:
Medium
Description:
Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled iframes, which allowed a remote attacker to bypass a no-referrer policy via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1553
Title:
Cisco IP Communicator 8.6(4) allows remote attackers to cause a denial of service
Type:
Software
Bulletins:
CISEC:1553
CVE-2015-4240
Severity:
Medium
Description:
Cisco IP Communicator 8.6(4) allows remote attackers to cause a denial of service (service outage) via an unspecified URL in a GET request, aka Bug ID CSCuu37656.
Applies to:
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1569
Title:
Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows
Type:
Web
Bulletins:
CISEC:1569
CVE-2016-5225
Severity:
Medium
Description:
Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled form actions, which allowed a remote attacker to bypass Content Security Policy via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1571
Title:
Blink in Google Chrome prior to 55.0.2883.75 for Linux, Windows
Type:
Web
Bulletins:
CISEC:1571
CVE-2016-5226
Severity:
Medium
Description:
Blink in Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac executed javascript: URLs entered in the URL bar in the context of the current tab, which allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1579
Title:
A use after free in webaudio in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux
Type:
Web
Bulletins:
CISEC:1579
CVE-2016-5215
Severity:
Medium
Description:
A use after free in webaudio in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1578
Title:
A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows
Type:
Web
Bulletins:
CISEC:1578
CVE-2016-5216
Severity:
Medium
Description:
A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1576
Title:
A timing attack on denormalized floating point arithmetic in SVG filters in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows
Type:
Web
Bulletins:
CISEC:1576
CVE-2016-5224
Severity:
Medium
Description:
A timing attack on denormalized floating point arithmetic in SVG filters in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17

ID:
CISEC:1572
Title:
A heap use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows
Type:
Web
Bulletins:
CISEC:1572
CVE-2016-5219
Severity:
Medium
Description:
A heap use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Applies to:
Google Chrome
Created:
2017-01-06
Updated:
2024-01-17