NVD List
Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
---|---|---|---|---|---|---|---|---|---|
82160 | CVE-2017-0440 | An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-33252788. References: QC-CR#1095770. | 2 | 7.6 | High | 2017-02-15 | 2017-02-10 | View | |
82928 | CVE-2017-0007 | Device Guard in Microsoft Windows 10 Gold, 1511, 1607, and Windows Server 2016 allows remote attackers to modify PowerShell script without invalidating associated signatures, aka PowerShell Security Feature Bypass Vulnerability. | 2 | 2.1 | Low | 2017-07-18 | 2017-07-11 | View | |
83184 | CVE-2017-5178 | An issue was discovered in Schneider Electric Tableau Server/Desktop Versions 7.0 to 10.1.3 in Wonderware Intelligence Versions 2014R3 and prior. These versions contain a system account that is installed by default. The default system account is difficult to configure with non-default credentials after installation, and changing the default credentials in the embedded Tableau Server is not documented. If Tableau Server is used with Windows integrated security (Active Directory), the software is not vulnerable. However, when Tableau Server is used with local authentication mode, the software is vulnerable. The default system account could be used to gain unauthorized access. | 2 | 10 | High | 2017-03-18 | 2017-03-16 | View | |
83440 | CVE-2017-6590 | An issue was discovered in network-manager-applet (aka network-manager-gnome) in Ubuntu 12.04 LTS, 14.04 LTS, 16.04 LTS, and 16.10. A local attacker could use this issue at the default Ubuntu login screen to access local files and execute arbitrary commands as the lightdm user. The exploitation requires physical access to the locked computer and the Wi-Fi must be turned on. An access point that lets you use a certificate to login is required as well, but it's easy to create one. Then, it's possible to open a nautilus window and browse directories. One also can open some applications such as Firefox, which is useful for downloading malicious binaries. | 2 | 6.9 | Medium | 2017-07-18 | 2017-07-17 | View | |
83696 | CVE-2017-2641 | In Moodle 2.x and 3.x, SQL injection can occur via user preferences. | 2 | 7.5 | High | 2017-07-18 | 2017-07-11 | View |
Page 17326 of 17672, showing 5 records out of 88360 total, starting on record 86626, ending on 86630