NVD List
Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
---|---|---|---|---|---|---|---|---|---|
84616 | CVE-2017-3608 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2 | 3.7 | Low | 2017-05-07 | 2017-05-01 | View | |
84872 | CVE-2017-7581 | SQL injection vulnerability in NewsController.php in the News module 5.3.2 and earlier for TYPO3 allows unauthenticated users to execute arbitrary SQL commands via vectors involving overwriteDemand for order and OrderByAllowed. | 2 | 7.5 | High | 2017-04-27 | 2017-04-13 | View | |
85384 | CVE-2017-2102 | Cross-site request forgery (CSRF) vulnerability in Hands-on Vulnerability Learning Tool AppGoat for Web Application V3.0.0 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. | 2 | 6.8 | Medium | 2017-05-07 | 2017-05-05 | View | |
85640 | CVE-2016-6877 | ** DISPUTED ** Citrix XenMobile Server before 10.5.0.24 allows man-in-the-middle attackers to trigger HTTP 302 redirections via vectors involving the HTTP Host header and a cached page. NOTE: the vendor reports "our internal analysis of this issue concluded that this was not a valid vulnerability" because an exploitation scenario would involve a man-in-the-middle attack against a TLS session. | 2 | 2.6 | Low | 2017-06-28 | 2017-06-26 | View | |
85896 | CVE-2017-3071 | Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free vulnerability when masking display objects. Successful exploitation could lead to arbitrary code execution. | 2 | 10 | High | 2017-07-18 | 2017-07-07 | View |
Page 1273 of 17672, showing 5 records out of 88360 total, starting on record 6361, ending on 6365