NVD List
Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
---|---|---|---|---|---|---|---|---|---|
86555 | CVE-2016-10377 | In Open vSwitch (OvS) 2.5.0, a malformed IP packet can cause the switch to read past the end of the packet buffer due to an unsigned integer underflow in `lib/flow.c` in the function `miniflow_extract`, permitting remote bypass of the access control list enforced by the switch. | 2 | 5.8 | Medium | 2017-06-12 | 2017-06-07 | View | |
86554 | CVE-2016-10376 | Gajim through 0.16.7 unconditionally implements the XEP-0146: Remote Controlling Clients extension. This can be abused by malicious XMPP servers to, for example, extract plaintext from OTR encrypted sessions. | 2 | 3.5 | Low | 2017-07-18 | 2017-07-10 | View | |
86553 | CVE-2016-10374 | perltidy through 20160302, as used by perlcritic, check-all-the-things, and other software, relies on the current working directory for certain output files and does not have a symlink-attack protection mechanism, which allows local users to overwrite arbitrary files by creating a symlink, as demonstrated by creating a perltidy.ERR symlink that the victim cannot delete. | 2 | 2.1 | Low | 2017-06-04 | 2017-05-31 | View | |
86552 | CVE-2016-10373 | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-10214. Reason: This candidate is a reservation duplicate of CVE-2016-10214. Notes: All CVE users should reference CVE-2016-10214 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. | 1 | 2017-06-04 | 2017-05-31 | View | |||
86551 | CVE-2015-9059 | picocom before 2.0 has a command injection vulnerability in the 'send and receive file' command because the command line is executed by /bin/sh unsafely. | 2 | 10 | High | 2017-06-12 | 2017-06-07 | View |
Page 362 of 17672, showing 5 records out of 88360 total, starting on record 1806, ending on 1810