<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="https://web.nvd.nist.gov/view/vuln/search">
    <title>National Vulnerability Database</title>
    <link>https://web.nvd.nist.gov/view/vuln/search</link>
    <description>This feed contains the most recent CVE cyber vulnerabilities published within the National Vulnerability Database.</description>
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4337" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4338" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17558" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17562" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14589" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11305" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17759" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15048" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15049" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16786" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17719" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17744" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17780" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-4940" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17752" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17746" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2576" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5254" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5255" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5256" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5257" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5258" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5259" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5260" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5261" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14387" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17805" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17806" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17807" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17809" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17821" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17831" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17408" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17409" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17410" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17411" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4100" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7224" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0301" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0304" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6129" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6133" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6139" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6140" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6151" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6164" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6167" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17692" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16727" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10907" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10909" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16766" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15307" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15311" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15322" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14022" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1698" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16995" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16996" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17010" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17843" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17844" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17845" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17846" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17847" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17848" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17850" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17852" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17853" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17854" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17855" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17856" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17857" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17862" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17863" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17864" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17868" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17869" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17873" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17876" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17891" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17892" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17893" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17894" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17895" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17896" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17897" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17898" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17899" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17900" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17903" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17904" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17905" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17906" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17907" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17908" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17909" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17911" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17924" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17925" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17926" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17927" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17928" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17929" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17930" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17931" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17935" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6914" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-13056" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16768" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7668" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11695" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11696" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11697" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11698" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10910" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17932" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17936" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17937" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17938" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17939" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17940" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17941" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17942" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-7400" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3695" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16876" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17916" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17917" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17919" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17920" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17760" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17973" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0120" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0121" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3630" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4978" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8119" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9515" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3302" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17975" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17981" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17982" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17983" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17984" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17985" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17986" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17987" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17988" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17989" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17990" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17991" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17992" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17993" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17994" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17995" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5753" />
      </rdf:Seq>
    </items>
    <dc:date>2018-01-11T15:00:18Z</dc:date>
    <dc:language>en-us</dc:language>
    <dc:rights>This material is not copywritten and may be freely used, however, attribution is requested.</dc:rights>
  </channel>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4337">
    <title>CVE-2014-4337 (cups-filters)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4337</link>
    <description>The process_browse_data function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted packet data.</description>
    <dc:date>2014-06-22T21:55:03Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4338">
    <title>CVE-2014-4338 (cups-filters)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4338</link>
    <description>cups-browsed in cups-filters before 1.0.53 allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a malformed cups-browsed.conf BrowseAllow directive that is interpreted as granting browse access to all IP addresses.</description>
    <dc:date>2014-06-22T21:55:03Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17558">
    <title>CVE-2017-17558 (linux_enterprise_server, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17558</link>
    <description>The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.</description>
    <dc:date>2017-12-12T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17562">
    <title>CVE-2017-17562 (goahead)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17562</link>
    <description>Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0.</description>
    <dc:date>2017-12-12T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14589">
    <title>CVE-2017-14589 (bamboo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14589</link>
    <description>It was possible for double OGNL evaluation in FreeMarker templates through Struts FreeMarker tags to occur. An attacker who has restricted administration rights to Bamboo or who hosts a website that a Bamboo administrator visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Bamboo. All versions of Bamboo before 6.1.6 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.5 (the fixed version for 6.2.x) are affected by this vulnerability.</description>
    <dc:date>2017-12-13T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11305">
    <title>CVE-2017-11305 (flash_player)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11305</link>
    <description>A regression affecting Adobe Flash Player version 27.0.0.187 (and earlier versions) causes the unintended reset of the global settings preference file when a user clears browser data.</description>
    <dc:date>2017-12-13T21:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17759">
    <title>CVE-2017-17759 (ichannel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17759</link>
    <description>Conarc iChannel allows remote attackers to obtain sensitive information, modify the configuration, or cause a denial of service (by deleting the configuration) via a wc.dll?wwMaint~EditConfig request (which reaches an older version of a West Wind Web Connection HTTP service).</description>
    <dc:date>2017-12-19T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15048">
    <title>CVE-2017-15048 (zoom_client)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15048</link>
    <description>Stack-based buffer overflow in the ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.</description>
    <dc:date>2017-12-19T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15049">
    <title>CVE-2017-15049 (zoom_client)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15049</link>
    <description>The ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 does not properly sanitize user input when constructing a shell command, which allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.</description>
    <dc:date>2017-12-19T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16786">
    <title>CVE-2017-16786 (lantime_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16786</link>
    <description>The Web Configuration Utility in Meinberg LANTIME devices with firmware before 6.24.004 allows remote authenticated users with certain privileges to read arbitrary files via (1) the ntpclientcounterlogfile parameter to cgi-bin/mainv2 or (2) vectors involving curl support of the &amp;quot;file&amp;quot; schema in the firmware update functionality.</description>
    <dc:date>2017-12-19T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17719">
    <title>CVE-2017-17719 (wp-concours)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17719</link>
    <description>A cross-site scripting (XSS) vulnerability in the wp-concours plugin through 1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the result_message parameter to includes/concours_page.php.</description>
    <dc:date>2017-12-19T20:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17744">
    <title>CVE-2017-17744 (custom_map)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17744</link>
    <description>A cross-site scripting (XSS) vulnerability in the custom-map plugin through 1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the map_id parameter to view/advancedsettings.php.</description>
    <dc:date>2017-12-19T20:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17780">
    <title>CVE-2017-17780 (booking_calendar, clockwork_sms_notfications, contact_form_7, fast_secure_contact_form, formidable, gravity_forms, two-factor_authentication, wp_e-commerce)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17780</link>
    <description>The Clockwork SMS clockwork-test-message.php component has XSS via a crafted &amp;quot;to&amp;quot; parameter in a clockwork-test-message request to wp-admin/admin.php. This component code is found in the following WordPress plugins: Clockwork Free and Paid SMS Notifications 2.0.3, Two-Factor Authentication - Clockwork SMS 1.0.2, Booking Calendar - Clockwork SMS 1.0.5, Contact Form 7 - Clockwork SMS 2.3.0, Fast Secure Contact Form - Clockwork SMS 2.1.2, Formidable - Clockwork SMS 1.0.2, Gravity Forms - Clockwork SMS 2.2, and WP e-Commerce - Clockwork SMS 2.0.5.</description>
    <dc:date>2017-12-20T03:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-4940">
    <title>CVE-2017-4940 (esxi)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-4940</link>
    <description>The ESXi Host Client in VMware ESXi (6.5 before ESXi650-201712103-SG, 5.5 before ESXi600-201711103-SG and 5.5 before ESXi550-201709102-SG) contains a vulnerability that may allow for stored cross-site scripting (XSS). An attacker can exploit this vulnerability by injecting Javascript, which might get executed when other users access the Host Client.</description>
    <dc:date>2017-12-20T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17752">
    <title>CVE-2017-17752 (ability_mail_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17752</link>
    <description>Ability Mail Server 3.3.2 has Cross Site Scripting (XSS) via the body of an e-mail message, with JavaScript code executed on the Read Mail screen (aka the /_readmail URI). This is fixed in version 4.2.4.</description>
    <dc:date>2017-12-20T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17746">
    <title>CVE-2017-17746 (tl-sg108e_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17746</link>
    <description>Weak access control methods on the TP-Link TL-SG108E 1.0.0 allow any user on a NAT network with an authenticated administrator to access the device without entering user credentials. The authentication record is stored on the device; thus if an administrator authenticates from a NAT network, the authentication applies to the IP address of the NAT gateway, and any user behind that NAT gateway is also treated as authenticated.</description>
    <dc:date>2017-12-20T20:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2576">
    <title>CVE-2012-2576 (backup_profiler, storage_manager, storage_profiler)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2576</link>
    <description>SQL injection vulnerability in the LoginServlet page in SolarWinds Storage Manager before 5.1.2, SolarWinds Storage Profiler before 5.1.2, and SolarWinds Backup Profiler before 5.1.2 allows remote attackers to execute arbitrary SQL commands via the loginName field.</description>
    <dc:date>2017-12-20T21:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5254">
    <title>CVE-2017-5254 (epmp_1000_firmware, epmp_2000_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5254</link>
    <description>In version 3.5 and prior of Cambium Networks ePMP firmware, the non-administrative users 'installer' and 'home' have the capability of changing passwords for other accounts, including admin, after disabling a client-side protection mechanism.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5255">
    <title>CVE-2017-5255 (epmp_1000_firmware, epmp_2000_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5255</link>
    <description>In version 3.5 and prior of Cambium Networks ePMP firmware, a lack of input sanitation for certain parameters on the web management console allows any authenticated user (including the otherwise low-privilege readonly user) to inject shell meta-characters as part of a specially-crafted POST request to the get_chart function and run OS-level commands, effectively as root.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5256">
    <title>CVE-2017-5256 (epmp_1000_firmware, epmp_2000_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5256</link>
    <description>In version 3.5 and prior of Cambium Networks ePMP firmware, all authenticated users have the ability to update the Device Name and System Description fields in the web administration console, and those fields are vulnerable to persistent cross-site scripting (XSS) injection.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5257">
    <title>CVE-2017-5257 (epmp_1000_firmware, epmp_2000_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5257</link>
    <description>In version 3.5 and prior of Cambium Networks ePMP firmware, an attacker who knows (or guesses) the SNMP read/write (RW) community string can insert XSS strings in certain SNMP OIDs which will execute in the context of the currently-logged on user.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5258">
    <title>CVE-2017-5258 (epmp_1000_firmware, epmp_2000_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5258</link>
    <description>In version 3.5 and prior of Cambium Networks ePMP firmware, an attacker who knows or can guess the RW community string can provide a URL for a configuration file over SNMP with XSS strings in certain SNMP OIDs, serve it via HTTP, and the affected device will perform a configuration restore using the attacker's supplied config file, including the inserted XSS strings.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5259">
    <title>CVE-2017-5259 (cnpilot_e400_firmware, cnpilot_e410_firmware, cnpilot_e600_firmware, cnpilot_r190n_firmware, cnpilot_r190v_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5259</link>
    <description>In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, an undocumented, root-privilege administration web shell is available using the HTTP path https://&amp;lt;device-ip-or-hostname&amp;gt;/adm/syscmd.asp.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5260">
    <title>CVE-2017-5260 (cnpilot_e400_firmware, cnpilot_e410_firmware, cnpilot_e600_firmware, cnpilot_r190n_firmware, cnpilot_r190v_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5260</link>
    <description>In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, although the option to access the configuration file is not available in the normal web administrative console for the 'user' account, the configuration file is accessible via direct object reference (DRO) at http://&amp;lt;device-ip-or-hostname&amp;gt;/goform/down_cfg_file by this otherwise low privilege 'user' account.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5261">
    <title>CVE-2017-5261 (cnpilot_e400_firmware, cnpilot_e410_firmware, cnpilot_e600_firmware, cnpilot_r190n_firmware, cnpilot_r190v_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5261</link>
    <description>In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, the 'ping' and 'traceroute' functions of the web administrative console expose a file path traversal vulnerability, accessible to all authenticated users.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14387">
    <title>CVE-2017-14387 (isilon_onefs)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14387</link>
    <description>The NFS service in EMC Isilon OneFS 8.1.0.0, 8.0.1.0 - 8.0.1.1, and 8.0.0.0 - 8.0.0.4 maintains default NFS export settings (including the NFS export security flavor for authentication) that can be leveraged by current and future NFS exports. This NFS service contained a flaw that did not properly propagate changes made to the default security flavor to all new and existing NFS exports that are configured to use default NFS export settings and that are mounted after those changes are made. This flaw may potentially allow NFS clients to access affected NFS exports using the default and potentially weaker security flavor even if a more secure one was selected to be used by the OneFS administrator, aka an &amp;quot;NFS Export Security Setting Fallback Vulnerability.&amp;quot;</description>
    <dc:date>2017-12-20T23:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17805">
    <title>CVE-2017-17805 (debian_linux, leap, linux_enterprise_desktop, linux_enterprise_server, linux_enterprise_server_for_raspberry_pi, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17805</link>
    <description>The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.</description>
    <dc:date>2017-12-20T23:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17806">
    <title>CVE-2017-17806 (debian_linux, leap, linux_enterprise_desktop, linux_enterprise_server, linux_enterprise_server_for_raspberry_pi, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17806</link>
    <description>The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.</description>
    <dc:date>2017-12-20T23:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17807">
    <title>CVE-2017-17807 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17807</link>
    <description>The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's &amp;quot;default request-key keyring&amp;quot; via the request_key() system call, allowing a local user to use a sequence of crafted system calls to add keys to a keyring with only Search permission (not Write permission) to that keyring, related to construct_get_dest_keyring() in security/keys/request_key.c.</description>
    <dc:date>2017-12-20T23:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17809">
    <title>CVE-2017-17809 (vyprvpn)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17809</link>
    <description>In Golden Frog VyprVPN before 2.15.0.5828 for macOS, the vyprvpnservice launch daemon has an unprotected XPC service that allows attackers to update the underlying OpenVPN configuration and the arguments passed to the OpenVPN binary when executed. An attacker can abuse this vulnerability by forcing the VyprVPN application to load a malicious dynamic library every time a new connection is made.</description>
    <dc:date>2017-12-20T23:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17821">
    <title>CVE-2017-17821 (safari)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17821</link>
    <description>WTF/wtf/FastBitVector.h in WebKit, as distributed in Safari Technology Preview Release 46, allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact because it calls the FastBitVectorWordOwner::resizeSlow function (in WTF/wtf/FastBitVector.cpp) for a purpose other than initializing a bitvector size, and resizeSlow mishandles cases where the old array length is greater than the new array length.</description>
    <dc:date>2017-12-21T03:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17831">
    <title>CVE-2017-17831 (git-lfs)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17831</link>
    <description>GitHub Git LFS before 2.1.1 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, located on a &amp;quot;url =&amp;quot; line in a .lfsconfig file within a repository.</description>
    <dc:date>2017-12-21T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17408">
    <title>CVE-2017-17408 (internet_security_2018)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17408</link>
    <description>This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security 2018. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within cevakrnl.xmd. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code under the context of SYSTEM. Was ZDI-CAN-5101.</description>
    <dc:date>2017-12-21T14:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17409">
    <title>CVE-2017-17409 (internet_security_2018)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17409</link>
    <description>This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security 2018. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within emulator 0x10A in cevakrnl.xmd. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code under the context of SYSTEM. Was ZDI-CAN-5102.</description>
    <dc:date>2017-12-21T14:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17410">
    <title>CVE-2017-17410 (internet_security_2018)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17410</link>
    <description>This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security 2018. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within emulator 0x102 in cevakrnl.xmd. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code under the context of SYSTEM. Was ZDI-CAN-5116.</description>
    <dc:date>2017-12-21T14:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17411">
    <title>CVE-2017-17411 (wvbr0_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17411</link>
    <description>This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0 WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.</description>
    <dc:date>2017-12-21T14:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4100">
    <title>CVE-2015-4100 (puppet)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4100</link>
    <description>Puppet Enterprise 3.7.x and 3.8.0 might allow remote authenticated users to manage certificates for arbitrary nodes by leveraging a client certificate trusted by the master, aka a &amp;quot;Certificate Authority Reverse Proxy Vulnerability.&amp;quot;</description>
    <dc:date>2017-12-21T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7224">
    <title>CVE-2015-7224 (puppetlabs-mysql)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7224</link>
    <description>puppetlabs-mysql 3.1.0 through 3.6.0 allow remote attackers to bypass authentication by leveraging creation of a database account without a password when a 'mysql_user' user parameter contains a host with a netmask.</description>
    <dc:date>2017-12-21T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0301">
    <title>CVE-2017-0301 (big-ip_access_policy_manager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0301</link>
    <description>In F5 BIG-IP APM software versions 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 and 12.1.2 BIG-IP APM portal access requests do not return the intended resources in some cases. This may allow access to internal BIG-IP APM resources, however the application resources and backend servers are unaffected.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0304">
    <title>CVE-2017-0304 (big-ip_advanced_firewall_manager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0304</link>
    <description>A SQL injection vulnerability exists in the BIG-IP AFM management UI on versions 12.0.0, 12.1.0, 12.1.1, 12.1.2 and 13.0.0 that may allow a copy of the firewall rules to be tampered with and impact the Configuration Utility until there is a resync of the rules. Traffic processing and the live firewall rules in use are not affected.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6129">
    <title>CVE-2017-6129 (big-ip_access_policy_manager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6129</link>
    <description>In F5 BIG-IP APM software version 13.0.0 and 12.1.2, in some circumstances, APM tunneled VPN flows can cause a VPN/PPP connflow to be prematurely freed or cause TMM to stop responding with a &amp;quot;flow not in use&amp;quot; assertion. An attacker may be able to disrupt traffic or cause the BIG-IP system to fail over to another device in the device group.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6133">
    <title>CVE-2017-6133 (big-ip_access_policy_manager, big-ip_advanced_firewall_manager, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_security_manager, big-ip_dns, big-ip_link_controller, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager, big-ip_websafe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6133</link>
    <description>In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM and WebSafe software version 13.0.0 and 12.1.0 - 12.1.2, undisclosed HTTP requests may cause a denial of service.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6139">
    <title>CVE-2017-6139 (big-ip_access_policy_manager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6139</link>
    <description>In F5 BIG-IP APM software version 13.0.0 and 12.1.2, under rare conditions, the BIG-IP APM system appends log details when responding to client requests. Details in the log file can vary; customers running debug mode logging with BIG-IP APM are at highest risk.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6140">
    <title>CVE-2017-6140 (big-ip_advanced_firewall_manager, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_security_manager, big-ip_dns, big-ip_global_traffic_manager, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6140</link>
    <description>On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6151">
    <title>CVE-2017-6151 (big-ip_access_policy_manager, big-ip_advanced_firewall_manager, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_security_manager, big-ip_dns, big-ip_edge_gateway, big-ip_global_traffic_manager, big-ip_link_controller, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager, big-ip_webaccelerator, big-ip_websafe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6151</link>
    <description>In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator and WebSafe software version 13.0.0, undisclosed requests made to BIG-IP virtual servers which make use of the &amp;quot;HTTP/2 profile&amp;quot; may result in a disruption of service to TMM.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6164">
    <title>CVE-2017-6164 (big-ip_access_policy_manager, big-ip_advanced_firewall_manager, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_security_manager, big-ip_dns, big-ip_edge_gateway, big-ip_global_traffic_manager, big-ip_link_controller, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager, big-ip_webaccelerator, big-ip_websafe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6164</link>
    <description>In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator and WebSafe software version 13.0.0, 12.0.0 - 12.1.2, 11.6.0 - 11.6.1 and 11.5.0 - 11.5.4, in some circumstances, Traffic Management Microkernel (TMM) does not properly handle certain malformed TLS1.2 records, which allows remote attackers to cause a denial-of-service (DoS) or possible remote command execution on the BIG-IP system.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6167">
    <title>CVE-2017-6167 (big-ip_access_policy_manager, big-ip_advanced_firewall_manager, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_security_manager, big-ip_dns, big-ip_link_controller, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager, big-ip_websafe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6167</link>
    <description>In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM and WebSafe software version 13.0.0 and 12.1.0 - 12.1.2, race conditions in iControl REST may lead to commands being executed with different privilege levels than expected.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17692">
    <title>CVE-2017-17692 (internet_browser)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17692</link>
    <description>Samsung Internet Browser 5.4.02.3 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that redirects to a child tab and rewrites the innerHTML property.</description>
    <dc:date>2017-12-21T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16727">
    <title>CVE-2017-16727 (nport_w2150a_firmware, nport_w2250a_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16727</link>
    <description>A Credentials Management issue was discovered in Moxa NPort W2150A versions prior to 1.11, and NPort W2250A versions prior to 1.11. The default password is empty on the device. An unauthorized user can access the device without a password. An unauthorized user has the ability to completely compromise the confidentiality and integrity of the wireless traffic.</description>
    <dc:date>2017-12-22T02:29:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10907">
    <title>CVE-2017-10907 (onethird_cms_show_off)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10907</link>
    <description>Directory traversal vulnerability in OneThird CMS Show Off v1.85 and earlier. Show Off v1.85 en and earlier allows an attacker to read arbitrary files via unspecified vectors.</description>
    <dc:date>2017-12-22T14:29:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10909">
    <title>CVE-2017-10909 (music_center)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10909</link>
    <description>Untrusted search path vulnerability in Music Center for PC version 1.0.01 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.</description>
    <dc:date>2017-12-22T14:29:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16766">
    <title>CVE-2017-16766 (diskstation_manager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16766</link>
    <description>An improper access control vulnerability in synodsmnotify in Synology DiskStation Manager (DSM) before 6.1.4-15217 and before 6.0.3-8754-6 allows local users to inject arbitrary web script or HTML via the -fn option.</description>
    <dc:date>2017-12-22T14:29:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15307">
    <title>CVE-2017-15307 (honor_8_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15307</link>
    <description>Huawei Honor 8 smartphone with software versions earlier than FRD-L04C567B389 and earlier than FRD-L14C567B389 have a permission control vulnerability due to improper authorization configuration on specific device information.</description>
    <dc:date>2017-12-22T17:29:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15311">
    <title>CVE-2017-15311 (mate_10_firmware, mate_10_pro_firmware, mate_9_firmware, mate_9_pro_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15311</link>
    <description>The baseband modules of Mate 10, Mate 10 Pro, Mate 9, Mate 9 Pro Huawei smart phones with software before ALP-AL00 8.0.0.120(SP2C00), before BLA-AL00 8.0.0.120(SP2C00), before MHA-AL00B 8.0.0.334(C00), and before LON-AL00B 8.0.0.334(C00) have a stack overflow vulnerability due to the lack of parameter validation. An attacker could send malicious packets to the smart phones within radio range by special wireless device, which leads stack overflow when the baseband module handles these packets. The attacker could exploit this vulnerability to perform a denial of service attack or remote code execution in baseband module.</description>
    <dc:date>2017-12-22T17:29:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15322">
    <title>CVE-2017-15322 (baggio-l03a_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15322</link>
    <description>Some Huawei smartphones with software of BGO-L03C158B003CUSTC158D001 and BGO-L03C331B009CUSTC331D001 have a DoS vulnerability due to insufficient input validation. An attacker could exploit this vulnerability by sending specially crafted NFC messages to the target device. Successful exploit could make a service crash.</description>
    <dc:date>2017-12-22T17:29:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14022">
    <title>CVE-2017-14022 (factorytalk_alarms_and_events)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14022</link>
    <description>An Improper Input Validation issue was discovered in Rockwell Automation FactoryTalk Alarms and Events, Version 2.90 and earlier. An unauthenticated attacker with remote access to a network with FactoryTalk Alarms and Events can send a specially crafted set of packets packet to Port 403/TCP (the history archiver service), causing the service to either stall or terminate.</description>
    <dc:date>2017-12-23T00:29:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1698">
    <title>CVE-2017-1698 (websphere_portal)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1698</link>
    <description>IBM WebSphere Portal 7.0, 8.0, 8.5, and 9.0 could reveal sensitive information from an error message that could lead to further attacks against the system. IBM X-Force ID: 124390.</description>
    <dc:date>2017-12-27T17:08:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16995">
    <title>CVE-2017-16995 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16995</link>
    <description>The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.</description>
    <dc:date>2017-12-27T17:08:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16996">
    <title>CVE-2017-16996 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16996</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.</description>
    <dc:date>2017-12-27T17:08:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17010">
    <title>CVE-2017-17010 (content_manager_assistant)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17010</link>
    <description>Untrusted search path vulnerability in Content Manager Assistant for PlayStation version 3.55.7671.0901 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.</description>
    <dc:date>2017-12-27T17:08:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17843">
    <title>CVE-2017-17843 (debian_linux, enigmail)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17843</link>
    <description>An issue was discovered in Enigmail before 1.9.9 that allows remote attackers to trigger use of an intended public key for encryption, because incorrect regular expressions are used for extraction of an e-mail address from a comma-separated list, as demonstrated by a modified Full Name field and a homograph attack, aka TBE-01-002.</description>
    <dc:date>2017-12-27T17:08:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17844">
    <title>CVE-2017-17844 (debian_linux, enigmail)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17844</link>
    <description>An issue was discovered in Enigmail before 1.9.9. A remote attacker can obtain cleartext content by sending an encrypted data block (that the attacker cannot directly decrypt) to a victim, and relying on the victim to automatically decrypt that block and then send it back to the attacker as quoted text, aka the TBE-01-005 &amp;quot;replay&amp;quot; issue.</description>
    <dc:date>2017-12-27T17:08:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17845">
    <title>CVE-2017-17845 (debian_linux, enigmail)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17845</link>
    <description>An issue was discovered in Enigmail before 1.9.9. Improper Random Secret Generation occurs because Math.Random() is used by pretty Easy privacy (pEp), aka TBE-01-001.</description>
    <dc:date>2017-12-27T17:08:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17846">
    <title>CVE-2017-17846 (debian_linux, enigmail)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17846</link>
    <description>An issue was discovered in Enigmail before 1.9.9. Regular expressions are exploitable for Denial of Service, because of attempts to match arbitrarily long strings, aka TBE-01-003.</description>
    <dc:date>2017-12-27T17:08:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17847">
    <title>CVE-2017-17847 (debian_linux, enigmail)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17847</link>
    <description>An issue was discovered in Enigmail before 1.9.9. Signature spoofing is possible because the UI does not properly distinguish between an attachment signature, and a signature that applies to the entire containing message, aka TBE-01-021. This is demonstrated by an e-mail message with an attachment that is a signed e-mail message in message/rfc822 format.</description>
    <dc:date>2017-12-27T17:08:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17848">
    <title>CVE-2017-17848 (debian_linux, enigmail)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17848</link>
    <description>An issue was discovered in Enigmail before 1.9.9. In a variant of CVE-2017-17847, signature spoofing is possible for multipart/related messages because a signed message part can be referenced with a cid: URI but not actually displayed. In other words, the entire containing message appears to be signed, but the recipient does not see any of the signed text.</description>
    <dc:date>2017-12-27T17:08:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17850">
    <title>CVE-2017-17850 (asterisk, certified_asterisk)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17850</link>
    <description>An issue was discovered in Asterisk 13.18.4 and older, 14.7.4 and older, 15.1.4 and older, and 13.18-cert1 and older. A select set of SIP messages create a dialog in Asterisk. Those SIP messages must contain a contact header. For those messages, if the header was not present and the PJSIP channel driver was used, Asterisk would crash. The severity of this vulnerability is somewhat mitigated if authentication is enabled. If authentication is enabled, a user would have to first be authorized before reaching the crash point.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17852">
    <title>CVE-2017-17852 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17852</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17853">
    <title>CVE-2017-17853 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17853</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17854">
    <title>CVE-2017-17854 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17854</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17855">
    <title>CVE-2017-17855 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17855</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17856">
    <title>CVE-2017-17856 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17856</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17857">
    <title>CVE-2017-17857 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17857</link>
    <description>The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17862">
    <title>CVE-2017-17862 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17862</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17863">
    <title>CVE-2017-17863 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17863</link>
    <description>kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory access) or possibly have unspecified other impact.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17864">
    <title>CVE-2017-17864 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17864</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a &amp;quot;pointer leak.&amp;quot;</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17868">
    <title>CVE-2017-17868 (liferay_portal)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17868</link>
    <description>In Liferay Portal 6.1.0, the tags section has XSS via a Public Render Parameter (p_r_p) value, as demonstrated by p_r_p_564233524_tag.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17869">
    <title>CVE-2017-17869 (mgl-instagram-gallery)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17869</link>
    <description>The mgl-instagram-gallery plugin for WordPress has XSS via the single-gallery.php media parameter.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17873">
    <title>CVE-2017-17873 (marketplace_digital_products_php)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17873</link>
    <description>Vanguard Marketplace Digital Products PHP 1.4 has SQL Injection via the PATH_INFO to the /p URI.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17876">
    <title>CVE-2017-17876 (shift)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17876</link>
    <description>Biometric Shift Employee Management System 3.0 allows remote attackers to bypass intended file-read restrictions via a user=download request with a pathname in the path parameter.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17891">
    <title>CVE-2017-17891 (readymade_video_sharing_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17891</link>
    <description>Readymade Video Sharing Script has CSRF via user-profile-edit.php.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17892">
    <title>CVE-2017-17892 (readymade_video_sharing_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17892</link>
    <description>Readymade Video Sharing Script has SQL Injection via the viewsubs.php chnlid parameter or the search_video.php search parameter.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17893">
    <title>CVE-2017-17893 (readymade_video_sharing_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17893</link>
    <description>Readymade Video Sharing Script has XSS via the search_video.php search parameter, the viewsubs.php chnlid parameter, or the user-profile-edit.php fname parameter.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17894">
    <title>CVE-2017-17894 (basic_job_site_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17894</link>
    <description>Readymade Job Site Script has CSRF via the /job URI.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17895">
    <title>CVE-2017-17895 (basic_job_site_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17895</link>
    <description>Readymade Job Site Script has SQL Injection via the location_name array parameter to the /job URI.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17896">
    <title>CVE-2017-17896 (basic_job_site_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17896</link>
    <description>Readymade Job Site Script has XSS via the keyword parameter to the /job URI.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17897">
    <title>CVE-2017-17897 (dolibarr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17897</link>
    <description>SQL injection vulnerability in comm/multiprix.php in Dolibarr ERP/CRM version 6.0.4 allows remote attackers to execute arbitrary SQL commands via the id parameter.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17898">
    <title>CVE-2017-17898 (dolibarr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17898</link>
    <description>Dolibarr ERP/CRM version 6.0.4 does not block direct requests to *.tpl.php files, which allows remote attackers to obtain sensitive information.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17899">
    <title>CVE-2017-17899 (dolibarr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17899</link>
    <description>SQL injection vulnerability in adherents/subscription/info.php in Dolibarr ERP/CRM version 6.0.4 allows remote attackers to execute arbitrary SQL commands via the rowid parameter.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17900">
    <title>CVE-2017-17900 (dolibarr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17900</link>
    <description>SQL injection vulnerability in fourn/index.php in Dolibarr ERP/CRM version 6.0.4 allows remote attackers to execute arbitrary SQL commands via the socid parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17903">
    <title>CVE-2017-17903 (lynda_clone)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17903</link>
    <description>FS Lynda Clone has CSRF via user/edit_profile, as demonstrated by adding content to the user panel.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17904">
    <title>CVE-2017-17904 (lynda_clone)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17904</link>
    <description>FS Lynda Clone has XSS via the keywords parameter to tutorial/ or the edit_profile_first_name parameter to user/edit_profile.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17905">
    <title>CVE-2017-17905 (car_rental_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17905</link>
    <description>PHP Scripts Mall Car Rental Script has CSRF via admin/sitesettings.php.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17906">
    <title>CVE-2017-17906 (car_rental_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17906</link>
    <description>PHP Scripts Mall Car Rental Script has SQL Injection via the admin/carlistedit.php carid parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17907">
    <title>CVE-2017-17907 (car_rental_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17907</link>
    <description>PHP Scripts Mall Car Rental Script has XSS via the admin/areaedit.php carid parameter or the admin/sitesettings.php websitename parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17908">
    <title>CVE-2017-17908 (responsive_realestate_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17908</link>
    <description>PHP Scripts Mall Responsive Realestate Script has CSRF via admin/general.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17909">
    <title>CVE-2017-17909 (responsive_realestate_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17909</link>
    <description>PHP Scripts Mall Responsive Realestate Script has XSS via the admin/general.php gplus parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17911">
    <title>CVE-2017-17911 (archon)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17911</link>
    <description>packages/core/contact.php in Archon 3.21 rev-1 has XSS in the referer parameter in an index.php?p=core/contact request, aka Open Bug Bounty ID OBB-278503.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17924">
    <title>CVE-2017-17924 (professional_service_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17924</link>
    <description>PHP Scripts Mall Professional Service Script allows remote attackers to obtain sensitive full-path information via the id parameter to admin/review_userwise.php.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17925">
    <title>CVE-2017-17925 (professional_service_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17925</link>
    <description>PHP Scripts Mall Professional Service Script has XSS via the admin/general_settingupd.php website_title parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17926">
    <title>CVE-2017-17926 (professional_service_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17926</link>
    <description>PHP Scripts Mall Professional Service Script has a predicable registration URL, which makes it easier for remote attackers to register with an invalid or spoofed e-mail address.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17927">
    <title>CVE-2017-17927 (professional_service_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17927</link>
    <description>PHP Scripts Mall Professional Service Script allows remote attackers to obtain sensitive full-path information via a crafted PATH_INFO to service-list/category/.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17928">
    <title>CVE-2017-17928 (professional_service_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17928</link>
    <description>PHP Scripts Mall Professional Service Script has SQL injection via the admin/review.php id parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17929">
    <title>CVE-2017-17929 (professional_service_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17929</link>
    <description>PHP Scripts Mall Professional Service Script has XSS via the admin/bannerview.php view parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17930">
    <title>CVE-2017-17930 (professional_service_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17930</link>
    <description>PHP Scripts Mall Professional Service Script has CSRF via admin/general_settingupd.php, as demonstrated by modifying a setting in the user panel.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17931">
    <title>CVE-2017-17931 (resume_clone_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17931</link>
    <description>PHP Scripts Mall Resume Clone Script has SQL Injection via the forget.php username parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17935">
    <title>CVE-2017-17935 (wireshark)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17935</link>
    <description>The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6914">
    <title>CVE-2016-6914 (unifi_video)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6914</link>
    <description>Ubiquiti UniFi Video before 3.8.0 for Windows uses weak permissions for the installation directory, which allows local users to gain SYSTEM privileges via a Trojan horse taskkill.exe file.</description>
    <dc:date>2017-12-27T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-13056">
    <title>CVE-2017-13056 (pdf-xchange_viewer)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-13056</link>
    <description>The launchURL function in PDF-XChange Viewer 2.5 (Build 314.0) might allow remote attackers to execute arbitrary code via a crafted PDF file.</description>
    <dc:date>2017-12-27T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16768">
    <title>CVE-2017-16768 (mailplus_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16768</link>
    <description>Cross-site scripting (XSS) vulnerability in User Policy editor in Synology MailPlus Server before 1.4.0-0415 allows remote authenticated users to inject arbitrary HTML via the name parameter.</description>
    <dc:date>2017-12-27T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7668">
    <title>CVE-2015-7668 (easy2map)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7668</link>
    <description>Cross-site scripting (XSS) vulnerability in includes/MapPinImageSave.php in the Easy2Map plugin before 1.3.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the map_id parameter.</description>
    <dc:date>2017-12-27T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11695">
    <title>CVE-2017-11695 (network_security_services)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11695</link>
    <description>Heap-based buffer overflow in the alloc_segs function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.</description>
    <dc:date>2017-12-27T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11696">
    <title>CVE-2017-11696 (network_security_services)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11696</link>
    <description>Heap-based buffer overflow in the __hash_open function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.</description>
    <dc:date>2017-12-27T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11697">
    <title>CVE-2017-11697 (network_security_services)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11697</link>
    <description>The __hash_open function in hash.c:229 in Mozilla Network Security Services (NSS) allows context-dependent attackers to cause a denial of service (floating point exception and crash) via a crafted cert8.db file.</description>
    <dc:date>2017-12-27T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11698">
    <title>CVE-2017-11698 (network_security_services)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11698</link>
    <description>Heap-based buffer overflow in the __get_page function in lib/dbm/src/h_page.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.</description>
    <dc:date>2017-12-27T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10910">
    <title>CVE-2017-10910 (mqtt.js)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10910</link>
    <description>MQTT.js 2.x.x prior to 2.15.0 issue in handling PUBLISH tickets may lead to an attacker causing a denial-of-service condition.</description>
    <dc:date>2017-12-28T02:29:03Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17932">
    <title>CVE-2017-17932 (allmediaserver)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17932</link>
    <description>A buffer overflow vulnerability exists in MediaServer.exe in ALLPlayer ALLMediaServer 0.95 and earlier that could allow remote attackers to execute arbitrary code and/or cause denial of service on the victim machine/computer via a long string to TCP port 888.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17936">
    <title>CVE-2017-17936 (marketplace_digital_products_php)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17936</link>
    <description>Vanguard Marketplace Digital Products PHP has CSRF via /search.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17937">
    <title>CVE-2017-17937 (marketplace_digital_products_php)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17937</link>
    <description>Vanguard Marketplace Digital Products PHP has XSS via the phps_query parameter to /search.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17938">
    <title>CVE-2017-17938 (single_theater_booking_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17938</link>
    <description>PHP Scripts Mall Single Theater Booking has XSS via the admin/viewtheatre.php theatreid parameter.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17939">
    <title>CVE-2017-17939 (single_theater_booking_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17939</link>
    <description>PHP Scripts Mall Single Theater Booking has CSRF via admin/sitesettings.php.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17940">
    <title>CVE-2017-17940 (single_theater_booking_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17940</link>
    <description>PHP Scripts Mall Single Theater Booking has XSS via the title parameter to admin/sitesettings.php.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17941">
    <title>CVE-2017-17941 (single_theater_booking_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17941</link>
    <description>PHP Scripts Mall Single Theater Booking has SQL Injection via the admin/movieview.php movieid parameter.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17942">
    <title>CVE-2017-17942 (libtiff)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17942</link>
    <description>In LibTIFF 4.0.9, there is a heap-based buffer over-read in the function PackBitsEncode in tif_packbits.c.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-7400">
    <title>CVE-2013-7400 (direct_mail)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-7400</link>
    <description>The Direct Mail (direct_mail) extension before 3.1.2 for TYPO3 allows remote attackers to obtain sensitive information by leveraging improper checking of authentication codes.</description>
    <dc:date>2017-12-29T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3695">
    <title>CVE-2016-3695 (enterprise_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3695</link>
    <description>The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.</description>
    <dc:date>2017-12-29T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16876">
    <title>CVE-2017-16876 (fedora, mistune)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16876</link>
    <description>Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py in Mistune before 0.8.1 allows remote attackers to inject arbitrary web script or HTML by leveraging failure to escape the &amp;quot;key&amp;quot; argument.</description>
    <dc:date>2017-12-29T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17916">
    <title>CVE-2017-17916 (ruby_on_rails)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17916</link>
    <description>** DISPUTED ** SQL injection vulnerability in the 'find_by' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.</description>
    <dc:date>2017-12-29T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17917">
    <title>CVE-2017-17917 (ruby_on_rails)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17917</link>
    <description>** DISPUTED ** SQL injection vulnerability in the 'where' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.</description>
    <dc:date>2017-12-29T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17919">
    <title>CVE-2017-17919 (ruby_on_rails)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17919</link>
    <description>** DISPUTED ** SQL injection vulnerability in the 'order' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id desc' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.</description>
    <dc:date>2017-12-29T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17920">
    <title>CVE-2017-17920 (ruby_on_rails)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17920</link>
    <description>** DISPUTED ** SQL injection vulnerability in the 'reorder' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.</description>
    <dc:date>2017-12-29T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17760">
    <title>CVE-2017-17760 (opencv)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17760</link>
    <description>OpenCV 3.3.1 has a Buffer Overflow in the cv::PxMDecoder::readData function in grfmt_pxm.cpp, because an incorrect size value is used.</description>
    <dc:date>2017-12-29T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17973">
    <title>CVE-2017-17973 (libtiff)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17973</link>
    <description>In LibTIFF 4.0.8, there is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c.</description>
    <dc:date>2017-12-29T21:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0120">
    <title>CVE-2014-0120 (hawtio, jboss_fuse)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0120</link>
    <description>Cross-site request forgery (CSRF) vulnerability in the admin terminal in Hawt.io allows remote attackers to hijack the authentication of arbitrary users for requests that run commands on the Karaf server, as demonstrated by running &amp;quot;shutdown -f.&amp;quot;</description>
    <dc:date>2017-12-29T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0121">
    <title>CVE-2014-0121 (hawtio, jboss_fuse)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0121</link>
    <description>The admin terminal in Hawt.io does not require authentication, which allows remote attackers to execute arbitrary commands via the k parameter.</description>
    <dc:date>2017-12-29T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3630">
    <title>CVE-2014-3630 (play)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3630</link>
    <description>XML external entity (XXE) vulnerability in the Java XML processing functionality in Play before 2.2.6 and 2.3.x before 2.3.5 might allow remote attackers to read arbitrary files, cause a denial of service, or have unspecified other impact via crafted XML data.</description>
    <dc:date>2017-12-29T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4978">
    <title>CVE-2014-4978 (fedora, rawstudio)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4978</link>
    <description>The rs_filter_graph function in librawstudio/rs-filter.c in rawstudio might allow local users to truncate arbitrary files via a symlink attack on (1) /tmp/rs-filter-graph.png or (2) /tmp/rs-filter-graph.</description>
    <dc:date>2017-12-29T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8119">
    <title>CVE-2014-8119 (enterprise_linux, fedora, netcf)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8119</link>
    <description>The find_ifcfg_path function in netcf before 0.2.7 might allow attackers to cause a denial of service (application crash) via vectors involving augeas path expressions.</description>
    <dc:date>2017-12-29T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9515">
    <title>CVE-2014-9515 (dozer)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9515</link>
    <description>Dozer improperly uses a reflection-based approach to type conversion, which might allow remote attackers to execute arbitrary code via a crafted serialized object.</description>
    <dc:date>2017-12-29T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3302">
    <title>CVE-2015-3302 (thecartpress_ecommerce_shopping_cart)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3302</link>
    <description>The TheCartPress eCommerce Shopping Cart (aka The Professional WordPress eCommerce Plugin) plugin for WordPress before 1.3.9.3 allows remote attackers to obtain sensitive order detail information by leveraging a &amp;quot;broken authentication mechanism.&amp;quot;</description>
    <dc:date>2017-12-29T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17975">
    <title>CVE-2017-17975 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17975</link>
    <description>Use-after-free in the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c in the Linux kernel through 4.14.10 allows attackers to cause a denial of service (system crash) or possibly have unspecified other impact by triggering failure of audio registration, because a kfree of the usbtv data structure occurs during a usbtv_video_free call, but the usbtv_video_fail label's code attempts to both access and free this data structure.</description>
    <dc:date>2017-12-30T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17981">
    <title>CVE-2017-17981 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17981</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script has XSS via the admin/slider_edit.php edit_id parameter.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17982">
    <title>CVE-2017-17982 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17982</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script has CSRF via admin/subadmin_edit.php.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17983">
    <title>CVE-2017-17983 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17983</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script has SQL injection via the view-profile.php mem_id parameter.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17984">
    <title>CVE-2017-17984 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17984</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script has XSS via the admin/event_edit.php edit_id parameter.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17985">
    <title>CVE-2017-17985 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17985</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script has XSS via the admin/state_view.php cou_id parameter.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17986">
    <title>CVE-2017-17986 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17986</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script has XSS via the admin/caste_view.php comm_id parameter.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17987">
    <title>CVE-2017-17987 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17987</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script allows arbitrary file upload via admin/mydetails_edit.php.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17988">
    <title>CVE-2017-17988 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17988</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script has XSS via the admin/event_add.php event_title parameter.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17989">
    <title>CVE-2017-17989 (biometric_shift_employee_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17989</link>
    <description>Biometric Shift Employee Management System has XSS via the index.php holiday_name parameter in an edit_holiday action.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17990">
    <title>CVE-2017-17990 (biometric_shift_employee_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17990</link>
    <description>Biometric Shift Employee Management System has CSRF via index.php in an edit_holiday action.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17991">
    <title>CVE-2017-17991 (biometric_shift_employee_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17991</link>
    <description>Biometric Shift Employee Management System has XSS via the expense_name parameter in an index.php?user=expenses request.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17992">
    <title>CVE-2017-17992 (biometric_shift_employee_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17992</link>
    <description>Biometric Shift Employee Management System allows Arbitrary File Download via directory traversal sequences in the index.php form_file_name parameter in a download_form action.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17993">
    <title>CVE-2017-17993 (biometric_shift_employee_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17993</link>
    <description>Biometric Shift Employee Management System has XSS via the amount parameter in an index.php?user=addition_deduction request.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17994">
    <title>CVE-2017-17994 (biometric_shift_employee_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17994</link>
    <description>Biometric Shift Employee Management System has XSS via the criteria parameter in an index.php?user=competency_criteria request.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17995">
    <title>CVE-2017-17995 (biometric_shift_employee_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17995</link>
    <description>Biometric Shift Employee Management System has XSS via the Last_Name parameter in an index.php?user=ajax request.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5753">
    <title>CVE-2017-5753 (atom_c, atom_e, atom_x3, atom_z, celeron_j, celeron_n, core_i3, core_i5, core_i7, core_m, core_m3, core_m5, core_m7, cortex-a, pentium_j, pentium_n, xeon, xeon_bronze, xeon_e3, xeon_e5, xeon_e7, xeon_gold, xeon_phi, xeon_platinum, xeon_silver)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5753</link>
    <description>Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.</description>
    <dc:date>2018-01-04T13:29:00Z</dc:date>
  </item>
</rdf:RDF>

