NVD List
Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
---|---|---|---|---|---|---|---|---|---|
86202 | CVE-2017-9078 | The server in Dropbear before 2017.75 might allow post-authentication root remote code execution because of a double free in cleanup of TCP listeners when the -a option is enabled. | 2 | 9.3 | High | 2017-05-27 | 2017-05-24 | View | |
86458 | CVE-2017-2306 | On Juniper Networks Junos Space versions prior to 16.1R1, due to an insufficient authorization check, readonly users on the Junos Space administrative web interface can execute code on the device. | 2 | 6.5 | Medium | 2017-06-12 | 2017-06-08 | View | |
86714 | CVE-2017-9525 | In the cron package through 3.0pl1-128 on Debian, and through 3.0pl1-128ubuntu2 on Ubuntu, the postinst maintainer script allows for group-crontab-to-root privilege escalation via symlink attacks against unsafe usage of the chown and chmod programs. | 2 | 10 | High | 2017-07-18 | 2017-07-07 | View | |
86970 | CVE-2017-6693 | A vulnerability in the ConfD server component of Cisco Elastic Services Controllers could allow an authenticated, local attacker to access information stored in the file system of an affected system, aka Unauthorized Directory Access. More Information: CSCvd76286. Known Affected Releases: 2.2(9.76) 2.3(1). | 2 | 2.1 | Low | 2017-06-23 | 2017-06-20 | View | |
87226 | CVE-2017-9736 | SPIP 3.1.x before 3.1.6 and 3.2.x before Beta 3 does not remove shell metacharacters from the host field, allowing a remote attacker to cause remote code execution. | 2 | 7.5 | High | 2017-07-18 | 2017-06-29 | View |
Page 1664 of 17672, showing 5 records out of 88360 total, starting on record 8316, ending on 8320