Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
canonical ubuntu linux 17.04 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2016-9775
The postrm script in the tomcat6 package prior to 6.0.45+dfsg-1~deb7u3 on Debian wheezy, prior to 6.0.45+dfsg-1~deb8u1 on Debian jessie, prior to 6.0.35-1ubuntu3.9 on Ubuntu 12.04 LTS and on Ubuntu 14.04 LTS; the tomcat7 package prior to 7.0.28-4+deb7u7 on Debian wheezy, prior to...
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 16.10
Apache Tomcat 8.0
Apache Tomcat 6.0
Apache Tomcat 7.0
7.8
CVSSv3
CVE-2017-5669
The do_shmat function in ipc/shm.c in the Linux kernel up to and including 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system ca...
Linux Linux Kernel
Debian Debian Linux 8.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
1 Github repository
7.5
CVSSv3
CVE-2018-5205
When using incomplete escape codes, Irssi prior to 1.0.6 may access data beyond the end of the string.
Irssi Irssi
Debian Debian Linux 9.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 17.04
Canonical Ubuntu Linux 17.10
Canonical Ubuntu Linux 14.04
7.5
CVSSv3
CVE-2017-16612
libXcursor prior to 1.1.15 has various integer overflows that could lead to heap buffer overflows when processing malicious cursors, e.g., with programs like GIMP. It is also possible that an attack vector exists against the related code in cursor/xcursor.c in Wayland up to and i...
Debian Debian Linux 9.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 17.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.10
X Libxcursor
7.5
CVSSv3
CVE-2017-14495
Memory leak in dnsmasq prior to 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote malicious users to cause a denial of service (memory consumption) via vectors involving DNS response creation.
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Debian Debian Linux 7.1
Debian Debian Linux 7.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
Debian Debian Linux 9.0
Thekelleys Dnsmasq
1 EDB exploit
7.5
CVSSv3
CVE-2017-14496
Integer underflow in the add_pseudoheader function in dnsmasq prior to 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote malicious users to cause a denial of service via a crafted DNS request.
Redhat Enterprise Linux Desktop 7.0
Google Android 7.1.2
Redhat Enterprise Linux Workstation 7.0
Google Android 5.0.2
Redhat Enterprise Linux Server 7.0
Google Android 6.0.1
Google Android 6.0
Debian Debian Linux 7.1
Novell Leap 42.2
Google Android 4.4.4
Debian Debian Linux 7.0
Google Android 7.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Google Android 8.0
Google Android 5.1.1
Canonical Ubuntu Linux 17.04
Debian Debian Linux 9.0
Google Android 7.1.1
Novell Leap 42.3
Thekelleys Dnsmasq
1 EDB exploit
3 Github repositories
1 Article
7.5
CVSSv3
CVE-2017-13704
In dnsmasq prior to 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platforms), making dnsmasq c...
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Debian Debian Linux 7.1
Novell Leap 42.2
Debian Debian Linux 7.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
Debian Debian Linux 9.0
Fedoraproject Fedora 27
Novell Leap 42.3
Thekelleys Dnsmasq
7.5
CVSSv3
CVE-2017-12836
CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote malicious users to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."
Gnu Cvs 1.12.12
Gnu Cvs 1.12.6
Gnu Cvs 1.12.3
Gnu Cvs 1.12.11
Gnu Cvs 1.12.10
Gnu Cvs 1.12.9
Gnu Cvs 1.12.7
Gnu Cvs 1.12.13
Gnu Cvs 1.12.5
Gnu Cvs 1.12.1
Canonical Ubuntu Linux 17.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Debian Debian Linux 9.0
Debian Debian Linux 8.0
7.5
CVSSv3
CVE-2017-9022
The gmp plugin in strongSwan prior to 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.
Strongswan Strongswan
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 16.10
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
6.8
CVSSv3
CVE-2017-13084
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Freebsd Freebsd 11
Freebsd Freebsd 11.1
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd
Canonical Ubuntu Linux 17.04
Canonical Ubuntu Linux 16.04
Freebsd Freebsd 10
Freebsd Freebsd 10.4
Opensuse Leap 42.3
Opensuse Leap 42.2
Debian Debian Linux 9.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 14.04
Redhat Enterprise Linux Server 7
W1.fi Hostapd 2.3
W1.fi Hostapd 2.2
W1.fi Hostapd 0.6.9
W1.fi Hostapd 0.6.8
W1.fi Hostapd 0.4.10
W1.fi Hostapd 0.4.9
W1.fi Hostapd 0.4.8
W1.fi Hostapd 0.2.6
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »