CVSSv3 September 2017info

PublishedBaseVDBNVDVendResVulnerabilityCTICVE
09/30/20175.36.34.3
 
 
Apache Geode Command Line Utility Query information disclosure0.05CVE-2017-9794
09/30/20176.55.37.8
 
 
Artifex GSView xps File memory corruption0.08CVE-2017-14947
09/30/20176.55.37.8
 
 
Artifex GSView PDF File memory corruption0.06CVE-2017-14946
09/30/20176.55.37.8
 
 
Artifex GSView PDF File memory corruption0.00CVE-2017-14945
09/30/20177.57.57.5
 
 
Inedo ProGet Package ID input validation0.02CVE-2017-14944
09/30/20177.55.39.8
 
 
Intelbras WRN 150 Configuration File RouterCfm.cfg access control0.07CVE-2017-14942
09/30/20174.43.35.5
 
 
GNU binutils dwarf2.c scan_unit_for_symbols null pointer dereference0.03CVE-2017-14940
09/30/20175.45.35.5
 
 
GNU binutils libbfd dwarf2.c decode_line_info memory corruption0.00CVE-2017-14939
09/30/20174.43.35.5
 
 
GNU binutils libbfd elf.c _bfd_elf_slurp_version_tables resource management0.00CVE-2017-14938
09/30/20176.45.37.5
 
 
Pulse Secure Pulse One On-Premise input validation0.00CVE-2017-14935
09/30/20174.43.35.5
 
 
GNU binutils libbfd dwarf.c process_debug_info numeric error0.00CVE-2017-14934
09/30/20174.43.35.5
 
 
GNU binutils libbfd dwarf2.c read_formatted_entries input validation0.03CVE-2017-14933
09/30/20174.43.35.5
 
 
GNU binutils libbfd dwarf2.c decode_line_info input validation0.00CVE-2017-14932
09/30/20175.45.35.5
 
 
OpenExif JPEG File ExifImageFileRead.cpp readDQT memory corruption0.00CVE-2017-14931
09/30/20174.43.35.5
 
 
GNU binutils libbfd dwarf2.c resource management0.00CVE-2017-14930
09/30/20177.47.37.5
 
 
Poppler Object.h dictLookup memory corruption0.00CVE-2017-14929
09/30/20174.43.35.5
 
 
Poppler Annot.cc Configuration null pointer dereference0.00CVE-2017-14928
09/30/20174.43.35.5
 
 
Poppler SplashOutputDev.cc type3D0 null pointer dereference0.04CVE-2017-14927
09/30/20174.43.35.5
 
 
Poppler Annot.cc Content null pointer dereference0.00CVE-2017-14926
09/30/20175.73.58.0
 
 
Tiki tiki-objectpermissions.php cross-site request forgery0.03CVE-2017-14925

Interested in the pricing of exploits?

See the underground prices here!