NVD List
Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
---|---|---|---|---|---|---|---|---|---|
84366 | CVE-2017-2490 | An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves the Kernel component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | 2 | 9.3 | High | 2017-04-27 | 2017-04-05 | View | |
84367 | CVE-2017-2647 | The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c. | 2 | 7.2 | High | 2017-04-27 | 2017-04-04 | View | |
84368 | CVE-2017-2671 | The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call. | 2 | 4.9 | Medium | 2017-04-27 | 2017-04-11 | View | |
84369 | CVE-2017-2675 | Little Snitch version 3.0 through 3.7.3 suffer from a local privilege escalation vulnerability in the installer part. The vulnerability is related to the installation of the configuration file at.obdev.littlesnitchd.plist which gets installed to /Library/LaunchDaemons. | 2 | 4.6 | Medium | 2017-04-27 | 2017-04-12 | View | |
84370 | CVE-2017-2775 | An exploitable memory corruption vulnerability exists in the LvVariantUnflatten functionality in 64-bit versions of LabVIEW before 2015 SP1 f7 Patch and 2016 before f2 Patch. A specially crafted VI file can cause a user controlled value to be used as a loop terminator resulting in internal heap corruption. An attacker controlled VI file can be used to trigger this vulnerability, exploitation could lead to remote code execution. | 2 | 6.8 | Medium | 2017-05-27 | 2017-05-23 | View |
Page 16874 of 17672, showing 5 records out of 88360 total, starting on record 84366, ending on 84370