# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
101 |
CVE-2017-9153 |
119 |
|
Overflow |
2017-05-23 |
2019-03-19 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
libautotrace.a in AutoTrace 0.31.1 has a heap-based buffer overflow in the pnm_load_rawpbm function in input-pnm.c:391:13. |
102 |
CVE-2017-9152 |
125 |
|
|
2017-05-23 |
2019-10-03 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
libautotrace.a in AutoTrace 0.31.1 has a heap-based buffer over-read in the pnm_load_raw function in input-pnm.c:346:41. |
103 |
CVE-2017-9151 |
119 |
|
Overflow |
2017-05-23 |
2017-05-28 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
libautotrace.a in AutoTrace 0.31.1 has a heap-based buffer overflow in the pnm_load_ascii function in input-pnm.c:303:12. |
104 |
CVE-2017-9150 |
200 |
|
+Info |
2017-05-22 |
2017-09-09 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
The do_check function in kernel/bpf/verifier.c in the Linux kernel before 4.11.1 does not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allows local users to obtain sensitive address information via crafted bpf system calls. |
105 |
CVE-2017-9149 |
200 |
|
+Info |
2017-05-22 |
2017-06-08 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Metadata Anonymisation Toolkit (MAT) 0.6 and 0.6.1 silently fails to perform "Clean metadata" actions upon invocation from the Nautilus contextual menu, which allows context-dependent attackers to obtain sensitive information by reading a file for which cleaning had been attempted. |
106 |
CVE-2017-9148 |
287 |
|
Bypass |
2017-05-29 |
2018-01-05 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS. |
107 |
CVE-2017-9147 |
125 |
|
DoS |
2017-05-22 |
2018-03-28 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
LibTIFF 4.0.7 has an invalid read in the _TIFFVGetField function in tif_dir.c, which might allow remote attackers to cause a denial of service (crash) via a crafted TIFF file. |
108 |
CVE-2017-9146 |
119 |
|
DoS Overflow |
2017-05-22 |
2019-05-18 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
The TNEFFillMapi function in lib/ytnef.c in libytnef in ytnef through 1.9.2 does not ensure a nonzero count value before a certain memory allocation, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted tnef file. |
109 |
CVE-2017-9144 |
20 |
|
|
2017-05-22 |
2020-10-15 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
In ImageMagick 7.0.5-5, a crafted RLE image can trigger a crash because of incorrect EOF handling in coders/rle.c. |
110 |
CVE-2017-9143 |
772 |
|
DoS |
2017-05-22 |
2020-10-15 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file. |
111 |
CVE-2017-9142 |
20 |
|
|
2017-05-22 |
2020-10-15 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the WriteBlob function in MagickCore/blob.c because of missing checks in the ReadOneJNGImage function in coders/png.c. |
112 |
CVE-2017-9141 |
20 |
|
|
2017-05-22 |
2020-10-15 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c. |
113 |
CVE-2017-9140 |
79 |
|
XSS |
2017-05-22 |
2019-03-14 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Cross-site scripting (XSS) vulnerability in Telerik.ReportViewer.WebForms.dll in Telerik Reporting for ASP.NET WebForms Report Viewer control before R1 2017 SP2 (11.0.17.406) allows remote attackers to inject arbitrary web script or HTML via the bgColor parameter to Telerik.ReportViewer.axd. |
114 |
CVE-2017-9139 |
119 |
|
Overflow |
2017-05-21 |
2017-06-02 |
2.7 |
None |
Local Network |
Low |
??? |
None |
None |
Partial |
There is a stack-based buffer overflow on some Tenda routers (FH1202/F1202/F1200: versions before 1.2.0.20). Crafted POST requests to an unspecified URL result in DoS, interrupting the HTTP service (used to login to the web UI of a router) for 1 to 2 seconds. |
115 |
CVE-2017-9138 |
119 |
|
Overflow Bypass |
2017-05-21 |
2017-06-02 |
7.7 |
None |
Local Network |
Low |
??? |
Complete |
Complete |
Complete |
There is a debug-interface vulnerability on some Tenda routers (FH1202/F1202/F1200: versions before 1.2.0.20). After connecting locally to a router in a wired or wireless manner, one can bypass intended access restrictions by sending shell commands directly and reading their results, or by entering shell commands that change this router's username and password. |
116 |
CVE-2017-9137 |
1188 |
|
|
2017-05-21 |
2019-10-03 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Ceragon FibeAir IP-10 wireless radios through 7.2.0 have a default password of mateidu for the mateidu account (a hidden user account established by the vendor). This account can be accessed via both the web interface and SSH. In the web interface, this simply grants an attacker read-only access to the device's settings. However, when using SSH, this gives an attacker access to a Linux shell. NOTE: the vendor has commented "The mateidu user is a known user, which is mentioned in the FibeAir IP-10 User Guide. Customers are instructed to change the mateidu user password. Changing the user password fully solves the vulnerability." |
117 |
CVE-2017-9136 |
327 |
|
|
2017-05-21 |
2019-10-03 |
7.8 |
None |
Remote |
Low |
Not required |
Complete |
None |
None |
An issue was discovered on Mimosa Client Radios before 2.2.3. In the device's web interface, there is a page that allows an attacker to use an unsanitized GET parameter to download files from the device as the root user. The attacker can download any file from the device's filesystem. This can be used to view unsalted, MD5-hashed administrator passwords, which can then be cracked, giving the attacker full admin access to the device's web interface. This vulnerability can also be used to view the plaintext pre-shared key (PSK) for encrypted wireless connections, or to view the device's serial number (which allows an attacker to factory reset the device). |
118 |
CVE-2017-9135 |
74 |
|
Exec Code |
2017-05-21 |
2017-05-26 |
9.0 |
None |
Remote |
Low |
??? |
Complete |
Complete |
Complete |
An issue was discovered on Mimosa Client Radios before 2.2.4 and Mimosa Backhaul Radios before 2.2.4. On the backend of the device's web interface, there are some diagnostic tests available that are not displayed on the webpage; these are only accessible by crafting a POST request with a program like cURL. There is one test accessible via cURL that does not properly sanitize user input, allowing an attacker to execute shell commands as the root user. |
119 |
CVE-2017-9134 |
200 |
|
+Info |
2017-05-21 |
2017-05-26 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An information-leakage issue was discovered on Mimosa Client Radios before 2.2.3 and Mimosa Backhaul Radios before 2.2.3. There is a page in the web interface that will show you the device's serial number, regardless of whether or not you have logged in. This information-leakage issue is relevant because there is another page (accessible without any authentication) that allows you to remotely factory reset the device simply by entering the serial number. |
120 |
CVE-2017-9133 |
74 |
|
Exec Code |
2017-05-21 |
2017-05-26 |
9.0 |
None |
Remote |
Low |
??? |
Complete |
Complete |
Complete |
An issue was discovered on Mimosa Client Radios before 2.2.3 and Mimosa Backhaul Radios before 2.2.3. In the device's web interface, after logging in, there is a page that allows you to ping other hosts from the device and view the results. The user is allowed to specify which host to ping, but this variable is not sanitized server-side, which allows an attacker to pass a specially crafted string to execute shell commands as the root user. |
121 |
CVE-2017-9132 |
798 |
|
+Info |
2017-05-21 |
2017-05-26 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
A hard-coded credentials issue was discovered on Mimosa Client Radios before 2.2.3, Mimosa Backhaul Radios before 2.2.3, and Mimosa Access Points before 2.2.3. These devices run Mosquitto, a lightweight message broker, to send information between devices. By using the vendor's hard-coded credentials to connect to the broker on any device (whether it be an AP, Client, or Backhaul model), an attacker can view all the messages being sent between the devices. If an attacker connects to an AP, the AP will leak information about any clients connected to it, including the serial numbers, which can be used to remotely factory reset the clients via a page in their web interface. |
122 |
CVE-2017-9131 |
20 |
|
Exec Code |
2017-05-21 |
2017-05-26 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An issue was discovered on Mimosa Client Radios before 2.2.3 and Mimosa Backhaul Radios before 2.2.3. By connecting to the Mosquitto broker on an access point and one of its clients, an attacker can gather enough information to craft a command that reboots the client remotely when sent to the client's Mosquitto broker, aka "unauthenticated remote command execution." This command can be re-sent endlessly to act as a DoS attack on the client. |
123 |
CVE-2017-9119 |
400 |
|
DoS |
2017-05-21 |
2019-03-19 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
The i_zval_ptr_dtor function in Zend/zend_variables.h in PHP 7.1.5 allows attackers to cause a denial of service (memory consumption and application crash) or possibly have unspecified other impact by triggering crafted operations on array data structures. |
124 |
CVE-2017-9117 |
125 |
|
|
2017-05-21 |
2019-10-03 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
In LibTIFF 4.0.7, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual input, leading to a heap-based buffer over-read in bmp2tiff. |
125 |
CVE-2017-9116 |
|
|
|
2017-05-21 |
2020-08-30 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
In OpenEXR 2.2.0, an invalid read of size 1 in the uncompress function in ImfZip.cpp could cause the application to crash. |
126 |
CVE-2017-9115 |
|
|
Exec Code |
2017-05-21 |
2020-08-30 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
In OpenEXR 2.2.0, an invalid write of size 2 in the = operator function in half.h could cause the application to crash or execute arbitrary code. |
127 |
CVE-2017-9114 |
|
|
|
2017-05-21 |
2020-08-30 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
In OpenEXR 2.2.0, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash. |
128 |
CVE-2017-9113 |
|
|
Exec Code |
2017-05-21 |
2020-08-30 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
In OpenEXR 2.2.0, an invalid write of size 1 in the bufferedReadPixels function in ImfInputFile.cpp could cause the application to crash or execute arbitrary code. |
129 |
CVE-2017-9112 |
|
|
|
2017-05-21 |
2020-08-30 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
In OpenEXR 2.2.0, an invalid read of size 1 in the getBits function in ImfHuf.cpp could cause the application to crash. |
130 |
CVE-2017-9111 |
|
|
Exec Code |
2017-05-21 |
2020-08-30 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
In OpenEXR 2.2.0, an invalid write of size 8 in the storeSSE function in ImfOptimizedPixelReading.h could cause the application to crash or execute arbitrary code. |
131 |
CVE-2017-9110 |
|
|
|
2017-05-21 |
2020-08-30 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
In OpenEXR 2.2.0, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash. |
132 |
CVE-2017-9101 |
434 |
|
Exec Code |
2017-05-21 |
2018-05-11 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
import.php (aka the Phonebook import feature) in PlaySMS 1.4 allows remote code execution via vectors involving the User-Agent HTTP header and PHP code in the name of a file. |
133 |
CVE-2017-9100 |
287 |
|
Bypass |
2017-05-21 |
2021-04-23 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
login.cgi on D-Link DIR-600M devices with firmware 3.04 allows remote attackers to bypass authentication by entering more than 20 blank spaces in the password field during an admin login attempt. |
134 |
CVE-2017-9098 |
908 |
|
+Info |
2017-05-19 |
2021-04-28 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
ImageMagick before 7.0.5-2 and GraphicsMagick before 1.3.24 use uninitialized memory in the RLE decoder, allowing an attacker to leak sensitive information from process memory space, as demonstrated by remote attacks against ImageMagick code in a long-running server process that converts image data on behalf of multiple users. This is caused by a missing initialization step in the ReadRLEImage function in coders/rle.c. |
135 |
CVE-2017-9094 |
835 |
|
DoS |
2017-05-19 |
2019-10-03 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
The lzw_add_to_dict function in imagew-gif.c in libimageworsener.a in ImageWorsener 1.3.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted image. |
136 |
CVE-2017-9093 |
835 |
|
DoS |
2017-05-19 |
2019-10-03 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
The my_skip_input_data_fn function in imagew-jpeg.c in libimageworsener.a in ImageWorsener 1.3.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted image. |
137 |
CVE-2017-9091 |
20 |
|
Bypass |
2017-05-19 |
2020-03-02 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
/admin/loginc.php in Allen Disk 1.6 doesn't check if isset($_SESSION['captcha']['code']) == 1, which leads to CAPTCHA bypass by emptying $_POST['captcha']. |
138 |
CVE-2017-9090 |
20 |
|
Bypass |
2017-05-19 |
2020-03-02 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
reg.php in Allen Disk 1.6 doesn't check if isset($_SESSION['captcha']['code'])==1, which makes it possible to bypass the CAPTCHA via an empty $_POST['captcha']. |
139 |
CVE-2017-9083 |
476 |
|
|
2017-05-19 |
2019-03-14 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file. |
140 |
CVE-2017-9080 |
434 |
|
Exec Code |
2017-05-19 |
2019-03-15 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
PlaySMS 1.4 allows remote code execution because PHP code in the name of an uploaded .php file is executed. sendfromfile.php has a combination of Unrestricted File Upload and Code Injection. |
141 |
CVE-2017-9079 |
732 |
|
|
2017-05-19 |
2019-10-04 |
4.7 |
None |
Local |
Medium |
Not required |
Complete |
None |
None |
Dropbear before 2017.75 might allow local users to read certain files as root, if the file has the authorized_keys file format with a command= option. This occurs because ~/.ssh/authorized_keys is read with root privileges and symlinks are followed. |
142 |
CVE-2017-9078 |
415 |
|
Exec Code |
2017-05-19 |
2019-10-04 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
The server in Dropbear before 2017.75 might allow post-authentication root remote code execution because of a double free in cleanup of TCP listeners when the -a option is enabled. |
143 |
CVE-2017-9077 |
|
|
DoS |
2017-05-19 |
2019-10-03 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. |
144 |
CVE-2017-9076 |
|
|
DoS |
2017-05-19 |
2019-10-03 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. |
145 |
CVE-2017-9075 |
|
|
DoS |
2017-05-19 |
2019-10-03 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. |
146 |
CVE-2017-9074 |
125 |
|
DoS |
2017-05-19 |
2018-11-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls. |
147 |
CVE-2017-9073 |
119 |
|
Exec Code Overflow |
2017-05-18 |
2017-05-31 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
A buffer overflow in Smart Card authentication code in gpkcsp.dll in Microsoft Windows XP through SP3 and Server 2003 through SP2 allows a remote attacker to execute arbitrary code on the target computer, provided that the computer is joined in a Windows domain and has Remote Desktop Protocol connectivity (or Terminal Services) enabled. |
148 |
CVE-2017-9072 |
79 |
|
XSS |
2017-05-18 |
2018-01-18 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Two CalendarXP products have XSS in common parts of HTML files. CalendarXP FlatCalendarXP through 9.9.290 has XSS in iflateng.htm and nflateng.htm. CalendarXP PopCalendarXP through 9.8.308 has XSS in ipopeng.htm and npopeng.htm. |
149 |
CVE-2017-9071 |
79 |
|
XSS |
2017-05-18 |
2017-05-30 |
2.6 |
None |
Remote |
High |
Not required |
None |
Partial |
None |
In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning. |
150 |
CVE-2017-9070 |
79 |
|
XSS |
2017-05-18 |
2017-05-30 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
In MODX Revolution before 2.5.7, a user with resource edit permissions can inject an XSS payload into the title of any post via the pagetitle parameter to connectors/index.php. |