NVD List
| Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
|---|---|---|---|---|---|---|---|---|---|
| 83208 | CVE-2017-5504 | The jpc_undo_roi function in libjasper/jpc/jpc_dec.c in JasPer 1.900.27 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted image. | 2 | 4.3 | Medium | 2017-03-18 | 2017-03-02 | View | |
| 83464 | CVE-2017-6827 | Heap-based buffer overflow in the MSADPCM::initializeCoefficients function in MSADPCM.cpp in audiofile (aka libaudiofile and Audio File Library) 0.3.6 allows remote attackers to have unspecified impact via a crafted audio file. | 2 | 6.8 | Medium | 2017-03-18 | 2017-03-17 | View | |
| 83720 | CVE-2017-5237 | Due to a lack of authentication, an unauthenticated user who knows the Eview EV-07S GPS Tracker's phone number can revert the device to a factory default configuration with an SMS command, RESET! | 2 | 7.8 | High | 2017-04-27 | 2017-03-30 | View | |
| 83976 | CVE-2016-7468 | An unauthenticated remote attacker may be able to disrupt services on F5 BIG-IP 11.4.1 - 11.5.4 devices with maliciously crafted network traffic. This vulnerability affects virtual servers associated with TCP profiles when the BIG-IP system's tm.tcpprogressive db variable value is set to non-default setting enabled. The default value for the tm.tcpprogressive db variable is negotiate. An attacker may be able to disrupt traffic or cause the BIG-IP system to fail over to another device in the device group. | 2 | 4.3 | Medium | 2017-07-18 | 2017-07-11 | View | |
| 84232 | CVE-2017-2315 | On Juniper Networks EX Series Ethernet Switches running affected Junos OS versions, a vulnerability in IPv6 processing has been discovered that may allow a specially crafted IPv6 Neighbor Discovery (ND) packet destined to an EX Series Ethernet Switch to cause a slow memory leak. A malicious network-based packet flood of these crafted IPv6 NDP packets may eventually lead to resource exhaustion and a denial of service. The affected Junos OS versions are: 12.3 prior to 12.3R12-S4, 12.3R13; 13.3 prior to 13.3R10; 14.1 prior to 14.1R8-S3, 14.1R9; 14.1X53 prior ro 14.1X53-D12, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R6-S4, 14.2R7-S6, 14.2R8; 15.1 prior to 15.1R5; 16.1 before 16.1R3; 16.2 before 16.2R1-S3, 16.2R2. 17.1R1 and all subsequent releases have a resolution for this vulnerability. | 2 | 7.8 | High | 2017-07-18 | 2017-07-10 | View |
Page 15543 of 17672, showing 5 records out of 88360 total, starting on record 77711, ending on 77715