<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="https://web.nvd.nist.gov/view/vuln/search">
    <title>National Vulnerability Database</title>
    <link>https://web.nvd.nist.gov/view/vuln/search</link>
    <description>This feed contains the most recent CVE cyber vulnerabilities published within the National Vulnerability Database.</description>
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2576" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3353" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4364" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-7400" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0120" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0121" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-10069" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1858" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1859" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2071" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3607" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3630" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4337" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4338" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4972" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4978" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4991" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4992" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4993" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4994" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4995" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4996" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4997" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4998" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4999" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5000" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5001" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5002" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5003" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5004" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5069" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5071" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5334" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5394" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5509" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7221" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7222" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8119" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9515" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1208" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1290" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2318" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2319" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2320" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3302" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4100" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7224" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7668" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10256" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10257" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3695" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6810" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6914" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9722" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0301" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0304" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000415" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000428" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000429" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000465" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10907" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10909" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10910" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11003" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11066" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11069" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11079" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11080" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11081" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11305" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11695" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11696" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11697" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11698" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12169" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12189" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12622" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12695" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12697" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-13056" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14022" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14387" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14589" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1459" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14869" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14870" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14873" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14879" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1493" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15048" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15049" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15124" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15129" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15131" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15307" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15311" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15322" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1533" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1534" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15662" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15663" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15664" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15665" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15717" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15845" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15847" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15848" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15849" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15850" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15883" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15913" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15941" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1612" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1623" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16514" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1666" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1668" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1670" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1671" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16727" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16740" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16766" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16768" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16786" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16876" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16878" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1698" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16995" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16996" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17010" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17408" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17409" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17410" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17411" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17485" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17558" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17562" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17662" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17692" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17719" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17744" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17746" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17752" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17759" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17760" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17780" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17805" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17806" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17807" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17809" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17821" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17831" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17841" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17843" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17844" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17845" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17846" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17847" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17848" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17850" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17852" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17853" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17854" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17855" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17856" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17857" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17862" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17863" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17864" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17868" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17869" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17873" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17876" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17891" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17892" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17893" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17894" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17895" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17896" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17897" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17898" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17899" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17900" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17903" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17904" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17905" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17906" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17907" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17908" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17909" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17911" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17916" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17917" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17919" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17920" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17924" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17925" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17926" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17927" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17928" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17929" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17930" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17931" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17932" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17935" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17936" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17937" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17938" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17939" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17940" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17941" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17942" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17946" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17973" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17975" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17981" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17982" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17983" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17984" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17985" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17986" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17987" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17988" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17989" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17990" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17991" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17992" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17993" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17994" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17995" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18023" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18024" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18025" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18026" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-3765" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-4940" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-4949" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-4950" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5254" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5255" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5256" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5257" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5258" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5259" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5260" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5261" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5753" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5971" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6129" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6133" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6139" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6140" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6151" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6164" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6167" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7536" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7559" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7997" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7998" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9663" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9689" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9705" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9712" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9795" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9796" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0001" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0002" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0003" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0004" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0005" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0006" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0007" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0008" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0009" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0010" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0011" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0012" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0013" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0014" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0118" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0764" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0784" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0785" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0786" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0789" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0790" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0791" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0792" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0793" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0794" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0795" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0796" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0797" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0798" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0799" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0801" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0802" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0804" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0805" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0806" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0807" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0812" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0818" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0819" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-2360" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-2361" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-2362" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-2363" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-3610" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-3815" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-4871" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5071" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5205" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5206" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5207" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5208" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5211" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5221" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5259" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5263" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5266" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5267" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5268" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5269" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5270" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5271" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5272" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5273" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5274" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5275" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5276" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5277" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5278" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5279" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5280" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5281" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5282" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5283" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5284" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5285" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5286" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5287" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5288" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5289" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5290" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5291" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5292" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5293" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5294" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5295" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5296" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5298" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5301" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5308" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5309" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5310" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5311" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5312" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5316" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5331" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5332" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5333" />
      </rdf:Seq>
    </items>
    <dc:date>2018-01-11T15:00:08Z</dc:date>
    <dc:language>en-us</dc:language>
    <dc:rights>This material is not copywritten and may be freely used, however, attribution is requested.</dc:rights>
  </channel>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2576">
    <title>CVE-2012-2576 (backup_profiler, storage_manager, storage_profiler)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2576</link>
    <description>SQL injection vulnerability in the LoginServlet page in SolarWinds Storage Manager before 5.1.2, SolarWinds Storage Profiler before 5.1.2, and SolarWinds Backup Profiler before 5.1.2 allows remote attackers to execute arbitrary SQL commands via the loginName field.</description>
    <dc:date>2017-12-20T21:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3353">
    <title>CVE-2012-3353</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3353</link>
    <description>The Apache Sling JCR ContentLoader 2.1.4 XmlReader used in the Sling JCR content loader module makes it possible to import arbitrary files in the content repository, including local files, causing potential information leaks. Users should upgrade to version 2.1.6 of the JCR ContentLoader</description>
    <dc:date>2018-01-09T02:29:02Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4364">
    <title>CVE-2013-4364</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4364</link>
    <description>(1) oo-analytics-export and (2) oo-analytics-import in the openshift-origin-broker-util package in Red Hat OpenShift Enterprise 1 and 2 allow local users to have unspecified impact via a symlink attack on an unspecified file in /tmp.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-7400">
    <title>CVE-2013-7400 (direct_mail)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-7400</link>
    <description>The Direct Mail (direct_mail) extension before 3.1.2 for TYPO3 allows remote attackers to obtain sensitive information by leveraging improper checking of authentication codes.</description>
    <dc:date>2017-12-29T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0120">
    <title>CVE-2014-0120 (hawtio, jboss_fuse)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0120</link>
    <description>Cross-site request forgery (CSRF) vulnerability in the admin terminal in Hawt.io allows remote attackers to hijack the authentication of arbitrary users for requests that run commands on the Karaf server, as demonstrated by running &amp;quot;shutdown -f.&amp;quot;</description>
    <dc:date>2017-12-29T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0121">
    <title>CVE-2014-0121 (hawtio, jboss_fuse)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0121</link>
    <description>The admin terminal in Hawt.io does not require authentication, which allows remote attackers to execute arbitrary commands via the k parameter.</description>
    <dc:date>2017-12-29T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-10069">
    <title>CVE-2014-10069</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-10069</link>
    <description>Hitron CVE-30360 devices use a 578A958E3DD933FC DES key that is shared across different customers' installations, which makes it easier for attackers to obtain sensitive information by decrypting a backup configuration file, as demonstrated by a password hash in the um_auth_account_password field.</description>
    <dc:date>2018-01-07T20:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1858">
    <title>CVE-2014-1858</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1858</link>
    <description>__init__.py in f2py in NumPy before 1.8.1 allows local users to write to arbitrary files via a symlink attack on a temporary file.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1859">
    <title>CVE-2014-1859</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1859</link>
    <description>(1) core/tests/test_memmap.py, (2) core/tests/test_multiarray.py, (3) f2py/f2py2e.py, and (4) lib/tests/test_io.py in NumPy before 1.8.1 allow local users to write to arbitrary files via a symlink attack on a temporary file.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2071">
    <title>CVE-2014-2071</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2071</link>
    <description>Aruba Networks ClearPass Policy Manager 6.1.x, 6.2.x before 6.2.5.61640 and 6.3.x before 6.3.0.61712, when configured to use tunneled and non-tunneled EAP methods in a single policy construct, allows remote authenticated users to gain privileges by advertising independent inner and outer identities within a tunneled EAP method.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3607">
    <title>CVE-2014-3607</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3607</link>
    <description>DefaultHostnameVerifier in Ldaptive (formerly vt-ldap) does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3630">
    <title>CVE-2014-3630 (play)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3630</link>
    <description>XML external entity (XXE) vulnerability in the Java XML processing functionality in Play before 2.2.6 and 2.3.x before 2.3.5 might allow remote attackers to read arbitrary files, cause a denial of service, or have unspecified other impact via crafted XML data.</description>
    <dc:date>2017-12-29T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4337">
    <title>CVE-2014-4337 (cups-filters)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4337</link>
    <description>The process_browse_data function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted packet data.</description>
    <dc:date>2014-06-22T21:55:03Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4338">
    <title>CVE-2014-4338 (cups-filters)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4338</link>
    <description>cups-browsed in cups-filters before 1.0.53 allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a malformed cups-browsed.conf BrowseAllow directive that is interpreted as granting browse access to all IP addresses.</description>
    <dc:date>2014-06-22T21:55:03Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4972">
    <title>CVE-2014-4972</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4972</link>
    <description>Unrestricted file upload vulnerability in the Gravity Upload Ajax plugin 1.1 and earlier for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file under wp-content/uploads/gravity_forms.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4978">
    <title>CVE-2014-4978 (fedora, rawstudio)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4978</link>
    <description>The rs_filter_graph function in librawstudio/rs-filter.c in rawstudio might allow local users to truncate arbitrary files via a symlink attack on (1) /tmp/rs-filter-graph.png or (2) /tmp/rs-filter-graph.</description>
    <dc:date>2017-12-29T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4991">
    <title>CVE-2014-4991</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4991</link>
    <description>(1) lib/dataset/database/mysql.rb and (2) lib/dataset/database/postgresql.rb in the codders-dataset gem 1.3.2.1 for Ruby place credentials on the mysqldump command line, which allows local users to obtain sensitive information by listing the process.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4992">
    <title>CVE-2014-4992</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4992</link>
    <description>lib/cap-strap/helpers.rb in the cap-strap gem 0.1.5 for Ruby places credentials on the useradd command line, which allows local users to obtain sensitive information by listing the process.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4993">
    <title>CVE-2014-4993</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4993</link>
    <description>(1) lib/backup/cli/utility.rb in the backup-agoddard gem 3.0.28 and (2) lib/backup/cli/utility.rb in the backup_checksum gem 3.0.23 for Ruby place credentials on the openssl command line, which allows local users to obtain sensitive information by listing the process.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4994">
    <title>CVE-2014-4994</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4994</link>
    <description>lib/gyazo/client.rb in the gyazo gem 1.0.0 for Ruby allows local users to write to arbitrary files via a symlink attack on a temporary file, related to time-based filenames.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4995">
    <title>CVE-2014-4995</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4995</link>
    <description>Race condition in lib/vlad/dba/mysql.rb in the VladTheEnterprising gem 0.2 for Ruby allows local users to obtain sensitive information by reading the MySQL root password from a temporary file before it is removed.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4996">
    <title>CVE-2014-4996</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4996</link>
    <description>lib/vlad/dba/mysql.rb in the VladTheEnterprising gem 0.2 for Ruby allows local users to write to arbitrary files via a symlink attack on /tmp/my.cnf.#{target_host}.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4997">
    <title>CVE-2014-4997</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4997</link>
    <description>lib/commands/setup.rb in the point-cli gem 0.0.1 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4998">
    <title>CVE-2014-4998</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4998</link>
    <description>test/tc_database.rb in the lean-ruport gem 0.3.8 for Ruby places the mysql user password on the mysqldump command line, which allows local users to obtain sensitive information by listing the process.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4999">
    <title>CVE-2014-4999</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4999</link>
    <description>vendor/plugins/dataset/lib/dataset/database/mysql.rb in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local users to obtain sensitive information by listing the process.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5000">
    <title>CVE-2014-5000</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5000</link>
    <description>The login function in lib/lawn.rb in the lawn-login gem 0.0.7 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5001">
    <title>CVE-2014-5001</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5001</link>
    <description>lib/ksymfony1.rb in the kcapifony gem 2.1.6 for Ruby places database user passwords on the (1) mysqldump, (2) pg_dump, (3) mysql, and (4) psql command lines, which allows local users to obtain sensitive information by listing the processes.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5002">
    <title>CVE-2014-5002</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5002</link>
    <description>The lynx gem 0.2.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5003">
    <title>CVE-2014-5003</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5003</link>
    <description>chef/travis-cookbooks/ci_environment/perlbrew/recipes/default.rb in the ciborg gem 3.0.0 for Ruby allows local users to write to arbitrary files and gain privileges via a symlink attack on /tmp/perlbrew-installer.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5004">
    <title>CVE-2014-5004</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5004</link>
    <description>lib/brbackup.rb in the brbackup gem 0.1.1 for Ruby places the database password on the mysql command line, which allows local users to obtain sensitive information by listing the process.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5069">
    <title>CVE-2014-5069</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5069</link>
    <description>Cross-site scripting (XSS) vulnerability in Symmetricom s350i 2.70.15 allows remote attackers to inject arbitrary web script or HTML via vectors involving system logs.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5071">
    <title>CVE-2014-5071</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5071</link>
    <description>SQL injection vulnerability in the checkPassword function in Symmetricom s350i 2.70.15 allows remote attackers to execute arbitrary SQL commands via vectors involving a username.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5334">
    <title>CVE-2014-5334</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5334</link>
    <description>FreeNAS before 9.3-M3 has a blank admin password, which allows remote attackers to gain root privileges by leveraging a WebGui login.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5394">
    <title>CVE-2014-5394</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5394</link>
    <description>Multiple Huawei Campus switches allow remote attackers to enumerate usernames via vectors involving use of SSH by the maintenance terminal.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5509">
    <title>CVE-2014-5509</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5509</link>
    <description>clipedit in the Clipboard module for Perl allows local users to delete arbitrary files via a symlink attack on /tmp/clipedit$$.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7221">
    <title>CVE-2014-7221</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7221</link>
    <description>TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (buffer overflow and application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab containing [img]//http:// substrings.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7222">
    <title>CVE-2014-7222</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7222</link>
    <description>Buffer overflow in TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab with two \\ (backslash) characters, a digit, a \ (backslash) character, and &amp;quot;z&amp;quot; in a series of nested img BBCODE tags.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8119">
    <title>CVE-2014-8119 (enterprise_linux, fedora, netcf)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8119</link>
    <description>The find_ifcfg_path function in netcf before 0.2.7 might allow attackers to cause a denial of service (application crash) via vectors involving augeas path expressions.</description>
    <dc:date>2017-12-29T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9515">
    <title>CVE-2014-9515 (dozer)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9515</link>
    <description>Dozer improperly uses a reflection-based approach to type conversion, which might allow remote attackers to execute arbitrary code via a crafted serialized object.</description>
    <dc:date>2017-12-29T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1208">
    <title>CVE-2015-1208</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1208</link>
    <description>Integer underflow in the mov_read_default function in libavformat/mov.c in FFmpeg before 2.4.6 allows remote attackers to obtain sensitive information from heap and/or stack memory via a crafted MP4 file.</description>
    <dc:date>2018-01-09T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1290">
    <title>CVE-2015-1290</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1290</link>
    <description>The Google V8 engine, as used in Google Chrome before 44.0.2403.89 and QtWebEngineCore in Qt before 5.5.1, allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted web site.</description>
    <dc:date>2018-01-09T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2318">
    <title>CVE-2015-2318</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2318</link>
    <description>The TLS stack in Mono before 3.12.1 allows man-in-the-middle attackers to conduct message skipping attacks and consequently impersonate clients by leveraging missing handshake state validation, aka a &amp;quot;SMACK SKIP-TLS&amp;quot; issue.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2319">
    <title>CVE-2015-2319</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2319</link>
    <description>The TLS stack in Mono before 3.12.1 makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the &amp;quot;FREAK&amp;quot; issue, a different vulnerability than CVE-2015-0204.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2320">
    <title>CVE-2015-2320</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2320</link>
    <description>The TLS stack in Mono before 3.12.1 allows remote attackers to have unspecified impact via vectors related to client-side SSLv2 fallback.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3302">
    <title>CVE-2015-3302 (thecartpress_ecommerce_shopping_cart)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3302</link>
    <description>The TheCartPress eCommerce Shopping Cart (aka The Professional WordPress eCommerce Plugin) plugin for WordPress before 1.3.9.3 allows remote attackers to obtain sensitive order detail information by leveraging a &amp;quot;broken authentication mechanism.&amp;quot;</description>
    <dc:date>2017-12-29T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4100">
    <title>CVE-2015-4100 (puppet)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4100</link>
    <description>Puppet Enterprise 3.7.x and 3.8.0 might allow remote authenticated users to manage certificates for arbitrary nodes by leveraging a client certificate trusted by the master, aka a &amp;quot;Certificate Authority Reverse Proxy Vulnerability.&amp;quot;</description>
    <dc:date>2017-12-21T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7224">
    <title>CVE-2015-7224 (puppetlabs-mysql)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7224</link>
    <description>puppetlabs-mysql 3.1.0 through 3.6.0 allow remote attackers to bypass authentication by leveraging creation of a database account without a password when a 'mysql_user' user parameter contains a host with a netmask.</description>
    <dc:date>2017-12-21T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7668">
    <title>CVE-2015-7668 (easy2map)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7668</link>
    <description>Cross-site scripting (XSS) vulnerability in includes/MapPinImageSave.php in the Easy2Map plugin before 1.3.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the map_id parameter.</description>
    <dc:date>2017-12-27T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10256">
    <title>CVE-2016-10256</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10256</link>
    <description>The Symantec ProxySG 6.5 (prior to 6.5.10.6), 6.6, and 6.7 (prior to 6.7.2.1) management console is susceptible to a reflected XSS vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to inject arbitrary JavaScript code into the management console web client application. This is a separate vulnerability from CVE-2016-10257.</description>
    <dc:date>2018-01-10T02:29:31Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10257">
    <title>CVE-2016-10257</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10257</link>
    <description>The Symantec Advanced Secure Gateway (ASG) 6.6, ASG 6.7 (prior to 6.7.2.1), ProxySG 6.5 (prior to 6.5.10.6), ProxySG 6.6, and ProxySG 6.7 (prior to 6.7.2.1) management console is susceptible to a reflected XSS vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to inject arbitrary JavaScript code into the management console web client application. This is a separate vulnerability from CVE-2016-10256.</description>
    <dc:date>2018-01-10T02:29:31Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3695">
    <title>CVE-2016-3695 (enterprise_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3695</link>
    <description>The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.</description>
    <dc:date>2017-12-29T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6810">
    <title>CVE-2016-6810</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6810</link>
    <description>In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identified to be present in the web based administration console. The root cause of this issue is improper user data output validation.</description>
    <dc:date>2018-01-10T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6914">
    <title>CVE-2016-6914 (unifi_video)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6914</link>
    <description>Ubiquiti UniFi Video before 3.8.0 for Windows uses weak permissions for the installation directory, which allows local users to gain SYSTEM privileges via a Trojan horse taskkill.exe file.</description>
    <dc:date>2017-12-27T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9722">
    <title>CVE-2016-9722</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9722</link>
    <description>IBM QRadar 7.2 and 7.3 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 119737.</description>
    <dc:date>2018-01-10T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0301">
    <title>CVE-2017-0301 (big-ip_access_policy_manager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0301</link>
    <description>In F5 BIG-IP APM software versions 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 and 12.1.2 BIG-IP APM portal access requests do not return the intended resources in some cases. This may allow access to internal BIG-IP APM resources, however the application resources and backend servers are unaffected.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0304">
    <title>CVE-2017-0304 (big-ip_advanced_firewall_manager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0304</link>
    <description>A SQL injection vulnerability exists in the BIG-IP AFM management UI on versions 12.0.0, 12.1.0, 12.1.1, 12.1.2 and 13.0.0 that may allow a copy of the firewall rules to be tampered with and impact the Configuration Utility until there is a resync of the rules. Traffic processing and the live firewall rules in use are not affected.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000415">
    <title>CVE-2017-1000415</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000415</link>
    <description>MatrixSSL version 3.7.2 has an incorrect UTCTime date range validation in its X.509 certificate validation process resulting in some certificates have their expiration (beginning) year extended (delayed) by 100 years.</description>
    <dc:date>2018-01-09T20:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000428">
    <title>CVE-2017-1000428</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000428</link>
    <description>flatCore-CMS 1.4.6 is vulnerable to reflected XSS in user_management.php due to the use of $_SERVER['PHP_SELF'] to build links and a stored XSS in the admin log panel by specifying a malformed User-Agent string.</description>
    <dc:date>2018-01-10T02:29:31Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000429">
    <title>CVE-2017-1000429</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000429</link>
    <description>rui Li finecms 5.0.10 is vulnerable to a reflected XSS in the file Weixin.php.</description>
    <dc:date>2018-01-09T21:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000465">
    <title>CVE-2017-1000465</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000465</link>
    <description>Sulu-standard version 1.6.6 is vulnerable to stored cross-site scripting vulnerability, within the page creation page, which can result in disruption of service and execution of javascript code.</description>
    <dc:date>2018-01-09T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10907">
    <title>CVE-2017-10907 (onethird_cms_show_off)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10907</link>
    <description>Directory traversal vulnerability in OneThird CMS Show Off v1.85 and earlier. Show Off v1.85 en and earlier allows an attacker to read arbitrary files via unspecified vectors.</description>
    <dc:date>2017-12-22T14:29:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10909">
    <title>CVE-2017-10909 (music_center)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10909</link>
    <description>Untrusted search path vulnerability in Music Center for PC version 1.0.01 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.</description>
    <dc:date>2017-12-22T14:29:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10910">
    <title>CVE-2017-10910 (mqtt.js)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10910</link>
    <description>MQTT.js 2.x.x prior to 2.15.0 issue in handling PUBLISH tickets may lead to an attacker causing a denial-of-service condition.</description>
    <dc:date>2017-12-28T02:29:03Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11003">
    <title>CVE-2017-11003</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11003</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while updating a firmware image, data is read from flash into RAM without checking that the data fits into allotted RAM size.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11066">
    <title>CVE-2017-11066</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11066</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while flashing ubi image an uninitialized memory could be accessed.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11069">
    <title>CVE-2017-11069</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11069</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, manipulation of SafeSwitch Image data can result in Heap overflow.</description>
    <dc:date>2018-01-10T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11079">
    <title>CVE-2017-11079</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11079</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing sparse image, uninitialized heap memory can potentially be flashed due to the lack of validation of sparse image block header size.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11080">
    <title>CVE-2017-11080</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11080</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing a user supplied sparse image, a buffer overflow vulnerability could occur if the sparse header block size is equal to 4294967296.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11081">
    <title>CVE-2017-11081</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11081</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, there is a potential buffer overflow vulnerability in hdd_parse_setrmcenable_command and hdd_parse_setrmcactionperiod_command APIs as buffers defined in this API can hold maximum 32 bytes but data more than 32 bytes can get copied.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11305">
    <title>CVE-2017-11305 (flash_player)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11305</link>
    <description>A regression affecting Adobe Flash Player version 27.0.0.187 (and earlier versions) causes the unintended reset of the global settings preference file when a user clears browser data.</description>
    <dc:date>2017-12-13T21:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11695">
    <title>CVE-2017-11695 (network_security_services)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11695</link>
    <description>Heap-based buffer overflow in the alloc_segs function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.</description>
    <dc:date>2017-12-27T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11696">
    <title>CVE-2017-11696 (network_security_services)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11696</link>
    <description>Heap-based buffer overflow in the __hash_open function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.</description>
    <dc:date>2017-12-27T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11697">
    <title>CVE-2017-11697 (network_security_services)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11697</link>
    <description>The __hash_open function in hash.c:229 in Mozilla Network Security Services (NSS) allows context-dependent attackers to cause a denial of service (floating point exception and crash) via a crafted cert8.db file.</description>
    <dc:date>2017-12-27T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11698">
    <title>CVE-2017-11698 (network_security_services)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11698</link>
    <description>Heap-based buffer overflow in the __get_page function in lib/dbm/src/h_page.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.</description>
    <dc:date>2017-12-27T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12169">
    <title>CVE-2017-12169</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12169</link>
    <description>It was found that FreeIPA 4.2.0 and later could disclose password hashes to users having the 'System: Read Stage Users' permission. A remote, authenticated attacker could potentially use this flaw to disclose the password hashes belonging to Stage Users. This security issue does not result in disclosure of password hashes belonging to active standard users.</description>
    <dc:date>2018-01-10T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12189">
    <title>CVE-2017-12189</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12189</link>
    <description>It was discovered that the jboss init script as used in Red Hat JBoss Enterprise Application Platform 7.0.7.GA performed unsafe file handling which could result in local privilege escalation. This issue is a result of an incomplete fix for CVE-2016-8656.</description>
    <dc:date>2018-01-10T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12622">
    <title>CVE-2017-12622</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12622</link>
    <description>When an Apache Geode cluster before v1.3.0 is operating in secure mode and an authenticated user connects to a Geode cluster using the gfsh tool with HTTP, the user is able to obtain status information and control cluster members even without CLUSTER:MANAGE privileges.</description>
    <dc:date>2018-01-10T03:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12695">
    <title>CVE-2017-12695</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12695</link>
    <description>An Improper Authentication issue was discovered in General Motors (GM) and Shanghai OnStar (SOS) SOS iOS Client 7.1. Successful exploitation of this vulnerability may allow an attacker to subvert security mechanisms and reset a user account password.</description>
    <dc:date>2018-01-09T21:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12697">
    <title>CVE-2017-12697</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12697</link>
    <description>A Man-in-the-Middle issue was discovered in General Motors (GM) and Shanghai OnStar (SOS) SOS iOS Client 7.1. Successful exploitation of this vulnerability may allow an attacker to intercept sensitive information when the client connects to the server.</description>
    <dc:date>2018-01-09T21:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-13056">
    <title>CVE-2017-13056 (pdf-xchange_viewer)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-13056</link>
    <description>The launchURL function in PDF-XChange Viewer 2.5 (Build 314.0) might allow remote attackers to execute arbitrary code via a crafted PDF file.</description>
    <dc:date>2017-12-27T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14022">
    <title>CVE-2017-14022 (factorytalk_alarms_and_events)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14022</link>
    <description>An Improper Input Validation issue was discovered in Rockwell Automation FactoryTalk Alarms and Events, Version 2.90 and earlier. An unauthenticated attacker with remote access to a network with FactoryTalk Alarms and Events can send a specially crafted set of packets packet to Port 403/TCP (the history archiver service), causing the service to either stall or terminate.</description>
    <dc:date>2017-12-23T00:29:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14387">
    <title>CVE-2017-14387 (isilon_onefs)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14387</link>
    <description>The NFS service in EMC Isilon OneFS 8.1.0.0, 8.0.1.0 - 8.0.1.1, and 8.0.0.0 - 8.0.0.4 maintains default NFS export settings (including the NFS export security flavor for authentication) that can be leveraged by current and future NFS exports. This NFS service contained a flaw that did not properly propagate changes made to the default security flavor to all new and existing NFS exports that are configured to use default NFS export settings and that are mounted after those changes are made. This flaw may potentially allow NFS clients to access affected NFS exports using the default and potentially weaker security flavor even if a more secure one was selected to be used by the OneFS administrator, aka an &amp;quot;NFS Export Security Setting Fallback Vulnerability.&amp;quot;</description>
    <dc:date>2017-12-20T23:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14589">
    <title>CVE-2017-14589 (bamboo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14589</link>
    <description>It was possible for double OGNL evaluation in FreeMarker templates through Struts FreeMarker tags to occur. An attacker who has restricted administration rights to Bamboo or who hosts a website that a Bamboo administrator visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Bamboo. All versions of Bamboo before 6.1.6 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.5 (the fixed version for 6.2.x) are affected by this vulnerability.</description>
    <dc:date>2017-12-13T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1459">
    <title>CVE-2017-1459</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1459</link>
    <description>IBM Security Access Manager Appliance 8.0.0 and 9.0.0 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 128378.</description>
    <dc:date>2018-01-10T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14869">
    <title>CVE-2017-14869</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14869</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while performing update of FOTA partition, uninitialized data can be pushed to storage.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14870">
    <title>CVE-2017-14870</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14870</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while updating the recovery message for eMMC devices, 1088 bytes of stack memory can potentially be leaked.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14873">
    <title>CVE-2017-14873</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14873</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the pp_pgc_get_config() graphics driver function, a kernel memory overwrite can potentially occur.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14879">
    <title>CVE-2017-14879</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14879</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, by calling an IPA ioctl and searching for routing/filer/hdr rule handle from ipa_idr pointer using ipa_idr_find() function, the wrong structure pointer can be returned resulting in a slab out of bound access in the IPA driver.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1493">
    <title>CVE-2017-1493</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1493</link>
    <description>IBM UrbanCode Deploy (UCD) 6.1 and 6.2 could allow an authenticated user to edit objects that they should not have access to due to improper access controls. IBM X-Force ID: 128691.</description>
    <dc:date>2018-01-09T20:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15048">
    <title>CVE-2017-15048 (zoom_client)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15048</link>
    <description>Stack-based buffer overflow in the ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.</description>
    <dc:date>2017-12-19T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15049">
    <title>CVE-2017-15049 (zoom_client)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15049</link>
    <description>The ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 does not properly sanitize user input when constructing a shell command, which allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.</description>
    <dc:date>2017-12-19T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15124">
    <title>CVE-2017-15124</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15124</link>
    <description>VNC server implementation in Quick Emulator (QEMU) before 2.14.3 was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host.</description>
    <dc:date>2018-01-09T21:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15129">
    <title>CVE-2017-15129</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15129</link>
    <description>A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.</description>
    <dc:date>2018-01-09T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15131">
    <title>CVE-2017-15131</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15131</link>
    <description>It was found that system umask policy is not being honored when creating XDG user directories, since Xsession sources xdg-user-dirs.sh before setting umask policy. This only affects xdg-user-dirs before 0.15.5 as shipped with Red Hat Enterprise Linux.</description>
    <dc:date>2018-01-09T21:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15307">
    <title>CVE-2017-15307 (honor_8_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15307</link>
    <description>Huawei Honor 8 smartphone with software versions earlier than FRD-L04C567B389 and earlier than FRD-L14C567B389 have a permission control vulnerability due to improper authorization configuration on specific device information.</description>
    <dc:date>2017-12-22T17:29:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15311">
    <title>CVE-2017-15311 (mate_10_firmware, mate_10_pro_firmware, mate_9_firmware, mate_9_pro_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15311</link>
    <description>The baseband modules of Mate 10, Mate 10 Pro, Mate 9, Mate 9 Pro Huawei smart phones with software before ALP-AL00 8.0.0.120(SP2C00), before BLA-AL00 8.0.0.120(SP2C00), before MHA-AL00B 8.0.0.334(C00), and before LON-AL00B 8.0.0.334(C00) have a stack overflow vulnerability due to the lack of parameter validation. An attacker could send malicious packets to the smart phones within radio range by special wireless device, which leads stack overflow when the baseband module handles these packets. The attacker could exploit this vulnerability to perform a denial of service attack or remote code execution in baseband module.</description>
    <dc:date>2017-12-22T17:29:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15322">
    <title>CVE-2017-15322 (baggio-l03a_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15322</link>
    <description>Some Huawei smartphones with software of BGO-L03C158B003CUSTC158D001 and BGO-L03C331B009CUSTC331D001 have a DoS vulnerability due to insufficient input validation. An attacker could exploit this vulnerability by sending specially crafted NFC messages to the target device. Successful exploit could make a service crash.</description>
    <dc:date>2017-12-22T17:29:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1533">
    <title>CVE-2017-1533</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1533</link>
    <description>IBM Security Access Manager Appliance 9.0.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 130675.</description>
    <dc:date>2018-01-10T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1534">
    <title>CVE-2017-1534</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1534</link>
    <description>IBM Security Access Manager Appliance 8.0.0 and 9.0.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 130676.</description>
    <dc:date>2018-01-10T17:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15662">
    <title>CVE-2017-15662</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15662</link>
    <description>In Flexense VX Search Enterprise v10.1.12, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9123.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15663">
    <title>CVE-2017-15663</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15663</link>
    <description>In Flexense Disk Pulse Enterprise v10.1.18, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9120.</description>
    <dc:date>2018-01-10T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15664">
    <title>CVE-2017-15664</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15664</link>
    <description>In Flexense Sync Breeze Enterprise v10.1.16, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9121.</description>
    <dc:date>2018-01-10T18:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15665">
    <title>CVE-2017-15665</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15665</link>
    <description>In Flexense DiskBoss Enterprise 8.5.12, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 8094.</description>
    <dc:date>2018-01-10T18:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15717">
    <title>CVE-2017-15717</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15717</link>
    <description>A flaw in the way URLs are escaped and encoded in the org.apache.sling.xss.impl.XSSAPIImpl#getValidHref and org.apache.sling.xss.impl.XSSFilterImpl#isValidHref allows special crafted URLs to pass as valid, although they carry XSS payloads. The affected versions are Apache Sling XSS Protection API 1.0.4 to 1.0.18, Apache Sling XSS Protection API Compat 1.1.0 and Apache Sling XSS Protection API 2.0.0.</description>
    <dc:date>2018-01-10T14:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15845">
    <title>CVE-2017-15845</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15845</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, an invalid input of firmware size (negative value) from user space can potentially lead to the memory leak or buffer overflow during the WLAN cal data store operation.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15847">
    <title>CVE-2017-15847</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15847</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the SPCom kernel driver, a race condition exists when creating a channel.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15848">
    <title>CVE-2017-15848</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15848</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the fastrpc kernel driver, a buffer overflow vulnerability from userspace may potentially exist.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15849">
    <title>CVE-2017-15849</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15849</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a LayerStack can be destroyed in between Validate and Commit by the application resulting in a Use After Free condition.</description>
    <dc:date>2018-01-10T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15850">
    <title>CVE-2017-15850</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15850</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, userspace can read values from audio codec registers.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15883">
    <title>CVE-2017-15883</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15883</link>
    <description>Sitefinity 5.1, 5.2, 5.3, 5.4, 6.x, 7.x, 8.x, 9.x, and 10.x allow remote attackers to bypass authentication and consequently cause a denial of service on load balanced sites or gain privileges via vectors related to weak cryptography.</description>
    <dc:date>2018-01-08T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15913">
    <title>CVE-2017-15913</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15913</link>
    <description>The Installer in Whale allows DLL hijacking.</description>
    <dc:date>2018-01-08T03:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15941">
    <title>CVE-2017-15941</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15941</link>
    <description>Cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.7, when the GlobalProtect gateway or portal is configured, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</description>
    <dc:date>2018-01-10T18:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1612">
    <title>CVE-2017-1612</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1612</link>
    <description>IBM WebSphere MQ 7.0, 7.1, 7.5, 8.0, and 9.0 service trace module could be used to execute untrusted code under 'mqm' user. IBM X-Force ID: 132953.</description>
    <dc:date>2018-01-09T20:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1623">
    <title>CVE-2017-1623</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1623</link>
    <description>IBM QRadar 7.2 and 7.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 133121.</description>
    <dc:date>2018-01-10T17:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16514">
    <title>CVE-2017-16514</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16514</link>
    <description>Multiple persistent stored Cross-Site-Scripting (XSS) vulnerabilities in the files /wb/admin/admintools/tool.php (Droplet Description) and /install/index.php (Site Title) in WebsiteBaker 2.10.0 allow attackers to insert persistent JavaScript code that gets reflected back to users in multiple areas in the application.</description>
    <dc:date>2018-01-10T17:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1666">
    <title>CVE-2017-1666</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1666</link>
    <description>IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 133540.</description>
    <dc:date>2018-01-09T20:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1668">
    <title>CVE-2017-1668</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1668</link>
    <description>IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 133562.</description>
    <dc:date>2018-01-09T20:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1670">
    <title>CVE-2017-1670</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1670</link>
    <description>IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 133637.</description>
    <dc:date>2018-01-09T20:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1671">
    <title>CVE-2017-1671</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1671</link>
    <description>IBM Tivoli Key Lifecycle Manager 2.5, 2.6, and 2.7 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing &amp;quot;dot dot&amp;quot; sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 133638.</description>
    <dc:date>2018-01-09T20:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16727">
    <title>CVE-2017-16727 (nport_w2150a_firmware, nport_w2250a_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16727</link>
    <description>A Credentials Management issue was discovered in Moxa NPort W2150A versions prior to 1.11, and NPort W2250A versions prior to 1.11. The default password is empty on the device. An unauthorized user can access the device without a password. An unauthorized user has the ability to completely compromise the confidentiality and integrity of the wireless traffic.</description>
    <dc:date>2017-12-22T02:29:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16740">
    <title>CVE-2017-16740</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16740</link>
    <description>A Buffer Overflow issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers, Series B and C Versions 21.002 and earlier. The stack-based buffer overflow vulnerability has been identified, which may allow remote code execution.</description>
    <dc:date>2018-01-09T21:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16766">
    <title>CVE-2017-16766 (diskstation_manager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16766</link>
    <description>An improper access control vulnerability in synodsmnotify in Synology DiskStation Manager (DSM) before 6.1.4-15217 and before 6.0.3-8754-6 allows local users to inject arbitrary web script or HTML via the -fn option.</description>
    <dc:date>2017-12-22T14:29:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16768">
    <title>CVE-2017-16768 (mailplus_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16768</link>
    <description>Cross-site scripting (XSS) vulnerability in User Policy editor in Synology MailPlus Server before 1.4.0-0415 allows remote authenticated users to inject arbitrary HTML via the name parameter.</description>
    <dc:date>2017-12-27T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16786">
    <title>CVE-2017-16786 (lantime_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16786</link>
    <description>The Web Configuration Utility in Meinberg LANTIME devices with firmware before 6.24.004 allows remote authenticated users with certain privileges to read arbitrary files via (1) the ntpclientcounterlogfile parameter to cgi-bin/mainv2 or (2) vectors involving curl support of the &amp;quot;file&amp;quot; schema in the firmware update functionality.</description>
    <dc:date>2017-12-19T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16876">
    <title>CVE-2017-16876 (fedora, mistune)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16876</link>
    <description>Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py in Mistune before 0.8.1 allows remote attackers to inject arbitrary web script or HTML by leveraging failure to escape the &amp;quot;key&amp;quot; argument.</description>
    <dc:date>2017-12-29T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16878">
    <title>CVE-2017-16878</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16878</link>
    <description>Cross-site scripting (XSS) vulnerability in the Captive Portal function in Palo Alto Networks PAN-OS before 8.0.7 allows remote attackers to inject arbitrary web script or HTML by leveraging an unspecified configuration.</description>
    <dc:date>2018-01-10T18:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1698">
    <title>CVE-2017-1698 (websphere_portal)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1698</link>
    <description>IBM WebSphere Portal 7.0, 8.0, 8.5, and 9.0 could reveal sensitive information from an error message that could lead to further attacks against the system. IBM X-Force ID: 124390.</description>
    <dc:date>2017-12-27T17:08:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16995">
    <title>CVE-2017-16995 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16995</link>
    <description>The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.</description>
    <dc:date>2017-12-27T17:08:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16996">
    <title>CVE-2017-16996 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16996</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.</description>
    <dc:date>2017-12-27T17:08:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17010">
    <title>CVE-2017-17010 (content_manager_assistant)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17010</link>
    <description>Untrusted search path vulnerability in Content Manager Assistant for PlayStation version 3.55.7671.0901 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.</description>
    <dc:date>2017-12-27T17:08:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17408">
    <title>CVE-2017-17408 (internet_security_2018)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17408</link>
    <description>This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security 2018. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within cevakrnl.xmd. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code under the context of SYSTEM. Was ZDI-CAN-5101.</description>
    <dc:date>2017-12-21T14:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17409">
    <title>CVE-2017-17409 (internet_security_2018)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17409</link>
    <description>This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security 2018. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within emulator 0x10A in cevakrnl.xmd. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code under the context of SYSTEM. Was ZDI-CAN-5102.</description>
    <dc:date>2017-12-21T14:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17410">
    <title>CVE-2017-17410 (internet_security_2018)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17410</link>
    <description>This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security 2018. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within emulator 0x102 in cevakrnl.xmd. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code under the context of SYSTEM. Was ZDI-CAN-5116.</description>
    <dc:date>2017-12-21T14:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17411">
    <title>CVE-2017-17411 (wvbr0_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17411</link>
    <description>This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0 WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.</description>
    <dc:date>2017-12-21T14:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17485">
    <title>CVE-2017-17485</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17485</link>
    <description>FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.</description>
    <dc:date>2018-01-10T18:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17558">
    <title>CVE-2017-17558 (linux_enterprise_server, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17558</link>
    <description>The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.</description>
    <dc:date>2017-12-12T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17562">
    <title>CVE-2017-17562 (goahead)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17562</link>
    <description>Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0.</description>
    <dc:date>2017-12-12T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17662">
    <title>CVE-2017-17662</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17662</link>
    <description>Directory traversal in the HTTP server on Yawcam 0.2.6 through 0.6.0 devices allows attackers to read arbitrary files through a sequence of the form '.x./' or '....\x/' where x is a pattern composed of one or more (zero or more for the second pattern) of either \ or ..\ -- for example a '.\./', '....\/' or '...\./' sequence. For files with no extension, a single dot needs to be appended to ensure the HTTP server does not alter the request, e.g., a &amp;quot;GET /.\./.\./.\./.\./.\./.\./.\./windows/system32/drivers/etc/hosts.&amp;quot; request.</description>
    <dc:date>2018-01-10T18:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17692">
    <title>CVE-2017-17692 (internet_browser)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17692</link>
    <description>Samsung Internet Browser 5.4.02.3 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that redirects to a child tab and rewrites the innerHTML property.</description>
    <dc:date>2017-12-21T19:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17719">
    <title>CVE-2017-17719 (wp-concours)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17719</link>
    <description>A cross-site scripting (XSS) vulnerability in the wp-concours plugin through 1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the result_message parameter to includes/concours_page.php.</description>
    <dc:date>2017-12-19T20:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17744">
    <title>CVE-2017-17744 (custom_map)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17744</link>
    <description>A cross-site scripting (XSS) vulnerability in the custom-map plugin through 1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the map_id parameter to view/advancedsettings.php.</description>
    <dc:date>2017-12-19T20:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17746">
    <title>CVE-2017-17746 (tl-sg108e_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17746</link>
    <description>Weak access control methods on the TP-Link TL-SG108E 1.0.0 allow any user on a NAT network with an authenticated administrator to access the device without entering user credentials. The authentication record is stored on the device; thus if an administrator authenticates from a NAT network, the authentication applies to the IP address of the NAT gateway, and any user behind that NAT gateway is also treated as authenticated.</description>
    <dc:date>2017-12-20T20:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17752">
    <title>CVE-2017-17752 (ability_mail_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17752</link>
    <description>Ability Mail Server 3.3.2 has Cross Site Scripting (XSS) via the body of an e-mail message, with JavaScript code executed on the Read Mail screen (aka the /_readmail URI). This is fixed in version 4.2.4.</description>
    <dc:date>2017-12-20T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17759">
    <title>CVE-2017-17759 (ichannel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17759</link>
    <description>Conarc iChannel allows remote attackers to obtain sensitive information, modify the configuration, or cause a denial of service (by deleting the configuration) via a wc.dll?wwMaint~EditConfig request (which reaches an older version of a West Wind Web Connection HTTP service).</description>
    <dc:date>2017-12-19T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17760">
    <title>CVE-2017-17760 (opencv)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17760</link>
    <description>OpenCV 3.3.1 has a Buffer Overflow in the cv::PxMDecoder::readData function in grfmt_pxm.cpp, because an incorrect size value is used.</description>
    <dc:date>2017-12-29T18:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17780">
    <title>CVE-2017-17780 (booking_calendar, clockwork_sms_notfications, contact_form_7, fast_secure_contact_form, formidable, gravity_forms, two-factor_authentication, wp_e-commerce)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17780</link>
    <description>The Clockwork SMS clockwork-test-message.php component has XSS via a crafted &amp;quot;to&amp;quot; parameter in a clockwork-test-message request to wp-admin/admin.php. This component code is found in the following WordPress plugins: Clockwork Free and Paid SMS Notifications 2.0.3, Two-Factor Authentication - Clockwork SMS 1.0.2, Booking Calendar - Clockwork SMS 1.0.5, Contact Form 7 - Clockwork SMS 2.3.0, Fast Secure Contact Form - Clockwork SMS 2.1.2, Formidable - Clockwork SMS 1.0.2, Gravity Forms - Clockwork SMS 2.2, and WP e-Commerce - Clockwork SMS 2.0.5.</description>
    <dc:date>2017-12-20T03:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17805">
    <title>CVE-2017-17805 (debian_linux, leap, linux_enterprise_desktop, linux_enterprise_server, linux_enterprise_server_for_raspberry_pi, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17805</link>
    <description>The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.</description>
    <dc:date>2017-12-20T23:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17806">
    <title>CVE-2017-17806 (debian_linux, leap, linux_enterprise_desktop, linux_enterprise_server, linux_enterprise_server_for_raspberry_pi, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17806</link>
    <description>The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.</description>
    <dc:date>2017-12-20T23:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17807">
    <title>CVE-2017-17807 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17807</link>
    <description>The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's &amp;quot;default request-key keyring&amp;quot; via the request_key() system call, allowing a local user to use a sequence of crafted system calls to add keys to a keyring with only Search permission (not Write permission) to that keyring, related to construct_get_dest_keyring() in security/keys/request_key.c.</description>
    <dc:date>2017-12-20T23:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17809">
    <title>CVE-2017-17809 (vyprvpn)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17809</link>
    <description>In Golden Frog VyprVPN before 2.15.0.5828 for macOS, the vyprvpnservice launch daemon has an unprotected XPC service that allows attackers to update the underlying OpenVPN configuration and the arguments passed to the OpenVPN binary when executed. An attacker can abuse this vulnerability by forcing the VyprVPN application to load a malicious dynamic library every time a new connection is made.</description>
    <dc:date>2017-12-20T23:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17821">
    <title>CVE-2017-17821 (safari)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17821</link>
    <description>WTF/wtf/FastBitVector.h in WebKit, as distributed in Safari Technology Preview Release 46, allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact because it calls the FastBitVectorWordOwner::resizeSlow function (in WTF/wtf/FastBitVector.cpp) for a purpose other than initializing a bitvector size, and resizeSlow mishandles cases where the old array length is greater than the new array length.</description>
    <dc:date>2017-12-21T03:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17831">
    <title>CVE-2017-17831 (git-lfs)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17831</link>
    <description>GitHub Git LFS before 2.1.1 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, located on a &amp;quot;url =&amp;quot; line in a .lfsconfig file within a repository.</description>
    <dc:date>2017-12-21T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17841">
    <title>CVE-2017-17841</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17841</link>
    <description>Palo Alto Networks PAN-OS 6.1, 7.1, and 8.0.x before 8.0.7, when an interface implements SSL decryption with RSA enabled or hosts a GlobalProtect portal or gateway, might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.</description>
    <dc:date>2018-01-10T18:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17843">
    <title>CVE-2017-17843 (debian_linux, enigmail)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17843</link>
    <description>An issue was discovered in Enigmail before 1.9.9 that allows remote attackers to trigger use of an intended public key for encryption, because incorrect regular expressions are used for extraction of an e-mail address from a comma-separated list, as demonstrated by a modified Full Name field and a homograph attack, aka TBE-01-002.</description>
    <dc:date>2017-12-27T17:08:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17844">
    <title>CVE-2017-17844 (debian_linux, enigmail)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17844</link>
    <description>An issue was discovered in Enigmail before 1.9.9. A remote attacker can obtain cleartext content by sending an encrypted data block (that the attacker cannot directly decrypt) to a victim, and relying on the victim to automatically decrypt that block and then send it back to the attacker as quoted text, aka the TBE-01-005 &amp;quot;replay&amp;quot; issue.</description>
    <dc:date>2017-12-27T17:08:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17845">
    <title>CVE-2017-17845 (debian_linux, enigmail)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17845</link>
    <description>An issue was discovered in Enigmail before 1.9.9. Improper Random Secret Generation occurs because Math.Random() is used by pretty Easy privacy (pEp), aka TBE-01-001.</description>
    <dc:date>2017-12-27T17:08:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17846">
    <title>CVE-2017-17846 (debian_linux, enigmail)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17846</link>
    <description>An issue was discovered in Enigmail before 1.9.9. Regular expressions are exploitable for Denial of Service, because of attempts to match arbitrarily long strings, aka TBE-01-003.</description>
    <dc:date>2017-12-27T17:08:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17847">
    <title>CVE-2017-17847 (debian_linux, enigmail)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17847</link>
    <description>An issue was discovered in Enigmail before 1.9.9. Signature spoofing is possible because the UI does not properly distinguish between an attachment signature, and a signature that applies to the entire containing message, aka TBE-01-021. This is demonstrated by an e-mail message with an attachment that is a signed e-mail message in message/rfc822 format.</description>
    <dc:date>2017-12-27T17:08:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17848">
    <title>CVE-2017-17848 (debian_linux, enigmail)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17848</link>
    <description>An issue was discovered in Enigmail before 1.9.9. In a variant of CVE-2017-17847, signature spoofing is possible for multipart/related messages because a signed message part can be referenced with a cid: URI but not actually displayed. In other words, the entire containing message appears to be signed, but the recipient does not see any of the signed text.</description>
    <dc:date>2017-12-27T17:08:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17850">
    <title>CVE-2017-17850 (asterisk, certified_asterisk)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17850</link>
    <description>An issue was discovered in Asterisk 13.18.4 and older, 14.7.4 and older, 15.1.4 and older, and 13.18-cert1 and older. A select set of SIP messages create a dialog in Asterisk. Those SIP messages must contain a contact header. For those messages, if the header was not present and the PJSIP channel driver was used, Asterisk would crash. The severity of this vulnerability is somewhat mitigated if authentication is enabled. If authentication is enabled, a user would have to first be authorized before reaching the crash point.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17852">
    <title>CVE-2017-17852 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17852</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17853">
    <title>CVE-2017-17853 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17853</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17854">
    <title>CVE-2017-17854 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17854</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17855">
    <title>CVE-2017-17855 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17855</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17856">
    <title>CVE-2017-17856 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17856</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17857">
    <title>CVE-2017-17857 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17857</link>
    <description>The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17862">
    <title>CVE-2017-17862 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17862</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17863">
    <title>CVE-2017-17863 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17863</link>
    <description>kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory access) or possibly have unspecified other impact.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17864">
    <title>CVE-2017-17864 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17864</link>
    <description>kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a &amp;quot;pointer leak.&amp;quot;</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17868">
    <title>CVE-2017-17868 (liferay_portal)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17868</link>
    <description>In Liferay Portal 6.1.0, the tags section has XSS via a Public Render Parameter (p_r_p) value, as demonstrated by p_r_p_564233524_tag.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17869">
    <title>CVE-2017-17869 (mgl-instagram-gallery)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17869</link>
    <description>The mgl-instagram-gallery plugin for WordPress has XSS via the single-gallery.php media parameter.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17873">
    <title>CVE-2017-17873 (marketplace_digital_products_php)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17873</link>
    <description>Vanguard Marketplace Digital Products PHP 1.4 has SQL Injection via the PATH_INFO to the /p URI.</description>
    <dc:date>2017-12-27T17:08:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17876">
    <title>CVE-2017-17876 (shift)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17876</link>
    <description>Biometric Shift Employee Management System 3.0 allows remote attackers to bypass intended file-read restrictions via a user=download request with a pathname in the path parameter.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17891">
    <title>CVE-2017-17891 (readymade_video_sharing_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17891</link>
    <description>Readymade Video Sharing Script has CSRF via user-profile-edit.php.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17892">
    <title>CVE-2017-17892 (readymade_video_sharing_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17892</link>
    <description>Readymade Video Sharing Script has SQL Injection via the viewsubs.php chnlid parameter or the search_video.php search parameter.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17893">
    <title>CVE-2017-17893 (readymade_video_sharing_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17893</link>
    <description>Readymade Video Sharing Script has XSS via the search_video.php search parameter, the viewsubs.php chnlid parameter, or the user-profile-edit.php fname parameter.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17894">
    <title>CVE-2017-17894 (basic_job_site_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17894</link>
    <description>Readymade Job Site Script has CSRF via the /job URI.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17895">
    <title>CVE-2017-17895 (basic_job_site_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17895</link>
    <description>Readymade Job Site Script has SQL Injection via the location_name array parameter to the /job URI.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17896">
    <title>CVE-2017-17896 (basic_job_site_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17896</link>
    <description>Readymade Job Site Script has XSS via the keyword parameter to the /job URI.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17897">
    <title>CVE-2017-17897 (dolibarr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17897</link>
    <description>SQL injection vulnerability in comm/multiprix.php in Dolibarr ERP/CRM version 6.0.4 allows remote attackers to execute arbitrary SQL commands via the id parameter.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17898">
    <title>CVE-2017-17898 (dolibarr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17898</link>
    <description>Dolibarr ERP/CRM version 6.0.4 does not block direct requests to *.tpl.php files, which allows remote attackers to obtain sensitive information.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17899">
    <title>CVE-2017-17899 (dolibarr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17899</link>
    <description>SQL injection vulnerability in adherents/subscription/info.php in Dolibarr ERP/CRM version 6.0.4 allows remote attackers to execute arbitrary SQL commands via the rowid parameter.</description>
    <dc:date>2017-12-27T17:08:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17900">
    <title>CVE-2017-17900 (dolibarr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17900</link>
    <description>SQL injection vulnerability in fourn/index.php in Dolibarr ERP/CRM version 6.0.4 allows remote attackers to execute arbitrary SQL commands via the socid parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17903">
    <title>CVE-2017-17903 (lynda_clone)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17903</link>
    <description>FS Lynda Clone has CSRF via user/edit_profile, as demonstrated by adding content to the user panel.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17904">
    <title>CVE-2017-17904 (lynda_clone)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17904</link>
    <description>FS Lynda Clone has XSS via the keywords parameter to tutorial/ or the edit_profile_first_name parameter to user/edit_profile.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17905">
    <title>CVE-2017-17905 (car_rental_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17905</link>
    <description>PHP Scripts Mall Car Rental Script has CSRF via admin/sitesettings.php.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17906">
    <title>CVE-2017-17906 (car_rental_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17906</link>
    <description>PHP Scripts Mall Car Rental Script has SQL Injection via the admin/carlistedit.php carid parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17907">
    <title>CVE-2017-17907 (car_rental_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17907</link>
    <description>PHP Scripts Mall Car Rental Script has XSS via the admin/areaedit.php carid parameter or the admin/sitesettings.php websitename parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17908">
    <title>CVE-2017-17908 (responsive_realestate_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17908</link>
    <description>PHP Scripts Mall Responsive Realestate Script has CSRF via admin/general.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17909">
    <title>CVE-2017-17909 (responsive_realestate_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17909</link>
    <description>PHP Scripts Mall Responsive Realestate Script has XSS via the admin/general.php gplus parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17911">
    <title>CVE-2017-17911 (archon)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17911</link>
    <description>packages/core/contact.php in Archon 3.21 rev-1 has XSS in the referer parameter in an index.php?p=core/contact request, aka Open Bug Bounty ID OBB-278503.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17916">
    <title>CVE-2017-17916 (ruby_on_rails)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17916</link>
    <description>** DISPUTED ** SQL injection vulnerability in the 'find_by' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.</description>
    <dc:date>2017-12-29T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17917">
    <title>CVE-2017-17917 (ruby_on_rails)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17917</link>
    <description>** DISPUTED ** SQL injection vulnerability in the 'where' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.</description>
    <dc:date>2017-12-29T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17919">
    <title>CVE-2017-17919 (ruby_on_rails)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17919</link>
    <description>** DISPUTED ** SQL injection vulnerability in the 'order' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id desc' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.</description>
    <dc:date>2017-12-29T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17920">
    <title>CVE-2017-17920 (ruby_on_rails)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17920</link>
    <description>** DISPUTED ** SQL injection vulnerability in the 'reorder' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.</description>
    <dc:date>2017-12-29T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17924">
    <title>CVE-2017-17924 (professional_service_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17924</link>
    <description>PHP Scripts Mall Professional Service Script allows remote attackers to obtain sensitive full-path information via the id parameter to admin/review_userwise.php.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17925">
    <title>CVE-2017-17925 (professional_service_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17925</link>
    <description>PHP Scripts Mall Professional Service Script has XSS via the admin/general_settingupd.php website_title parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17926">
    <title>CVE-2017-17926 (professional_service_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17926</link>
    <description>PHP Scripts Mall Professional Service Script has a predicable registration URL, which makes it easier for remote attackers to register with an invalid or spoofed e-mail address.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17927">
    <title>CVE-2017-17927 (professional_service_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17927</link>
    <description>PHP Scripts Mall Professional Service Script allows remote attackers to obtain sensitive full-path information via a crafted PATH_INFO to service-list/category/.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17928">
    <title>CVE-2017-17928 (professional_service_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17928</link>
    <description>PHP Scripts Mall Professional Service Script has SQL injection via the admin/review.php id parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17929">
    <title>CVE-2017-17929 (professional_service_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17929</link>
    <description>PHP Scripts Mall Professional Service Script has XSS via the admin/bannerview.php view parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17930">
    <title>CVE-2017-17930 (professional_service_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17930</link>
    <description>PHP Scripts Mall Professional Service Script has CSRF via admin/general_settingupd.php, as demonstrated by modifying a setting in the user panel.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17931">
    <title>CVE-2017-17931 (resume_clone_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17931</link>
    <description>PHP Scripts Mall Resume Clone Script has SQL Injection via the forget.php username parameter.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17932">
    <title>CVE-2017-17932 (allmediaserver)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17932</link>
    <description>A buffer overflow vulnerability exists in MediaServer.exe in ALLPlayer ALLMediaServer 0.95 and earlier that could allow remote attackers to execute arbitrary code and/or cause denial of service on the victim machine/computer via a long string to TCP port 888.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17935">
    <title>CVE-2017-17935 (wireshark)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17935</link>
    <description>The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.</description>
    <dc:date>2017-12-27T17:08:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17936">
    <title>CVE-2017-17936 (marketplace_digital_products_php)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17936</link>
    <description>Vanguard Marketplace Digital Products PHP has CSRF via /search.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17937">
    <title>CVE-2017-17937 (marketplace_digital_products_php)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17937</link>
    <description>Vanguard Marketplace Digital Products PHP has XSS via the phps_query parameter to /search.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17938">
    <title>CVE-2017-17938 (single_theater_booking_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17938</link>
    <description>PHP Scripts Mall Single Theater Booking has XSS via the admin/viewtheatre.php theatreid parameter.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17939">
    <title>CVE-2017-17939 (single_theater_booking_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17939</link>
    <description>PHP Scripts Mall Single Theater Booking has CSRF via admin/sitesettings.php.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17940">
    <title>CVE-2017-17940 (single_theater_booking_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17940</link>
    <description>PHP Scripts Mall Single Theater Booking has XSS via the title parameter to admin/sitesettings.php.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17941">
    <title>CVE-2017-17941 (single_theater_booking_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17941</link>
    <description>PHP Scripts Mall Single Theater Booking has SQL Injection via the admin/movieview.php movieid parameter.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17942">
    <title>CVE-2017-17942 (libtiff)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17942</link>
    <description>In LibTIFF 4.0.9, there is a heap-based buffer over-read in the function PackBitsEncode in tif_packbits.c.</description>
    <dc:date>2017-12-28T06:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17946">
    <title>CVE-2017-17946</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17946</link>
    <description>A buffer overflow in Handy Password 4.9.3 allows remote attackers to execute arbitrary code via a long &amp;quot;Title name&amp;quot; field in &amp;quot;mail box&amp;quot; data that is mishandled in an &amp;quot;Open from mail box&amp;quot; action.</description>
    <dc:date>2018-01-10T20:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17973">
    <title>CVE-2017-17973 (libtiff)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17973</link>
    <description>In LibTIFF 4.0.8, there is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c.</description>
    <dc:date>2017-12-29T21:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17975">
    <title>CVE-2017-17975 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17975</link>
    <description>Use-after-free in the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c in the Linux kernel through 4.14.10 allows attackers to cause a denial of service (system crash) or possibly have unspecified other impact by triggering failure of audio registration, because a kfree of the usbtv data structure occurs during a usbtv_video_free call, but the usbtv_video_fail label's code attempts to both access and free this data structure.</description>
    <dc:date>2017-12-30T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17981">
    <title>CVE-2017-17981 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17981</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script has XSS via the admin/slider_edit.php edit_id parameter.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17982">
    <title>CVE-2017-17982 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17982</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script has CSRF via admin/subadmin_edit.php.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17983">
    <title>CVE-2017-17983 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17983</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script has SQL injection via the view-profile.php mem_id parameter.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17984">
    <title>CVE-2017-17984 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17984</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script has XSS via the admin/event_edit.php edit_id parameter.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17985">
    <title>CVE-2017-17985 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17985</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script has XSS via the admin/state_view.php cou_id parameter.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17986">
    <title>CVE-2017-17986 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17986</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script has XSS via the admin/caste_view.php comm_id parameter.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17987">
    <title>CVE-2017-17987 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17987</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script allows arbitrary file upload via admin/mydetails_edit.php.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17988">
    <title>CVE-2017-17988 (muslim_matrimonial_script)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17988</link>
    <description>PHP Scripts Mall Muslim Matrimonial Script has XSS via the admin/event_add.php event_title parameter.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17989">
    <title>CVE-2017-17989 (biometric_shift_employee_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17989</link>
    <description>Biometric Shift Employee Management System has XSS via the index.php holiday_name parameter in an edit_holiday action.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17990">
    <title>CVE-2017-17990 (biometric_shift_employee_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17990</link>
    <description>Biometric Shift Employee Management System has CSRF via index.php in an edit_holiday action.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17991">
    <title>CVE-2017-17991 (biometric_shift_employee_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17991</link>
    <description>Biometric Shift Employee Management System has XSS via the expense_name parameter in an index.php?user=expenses request.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17992">
    <title>CVE-2017-17992 (biometric_shift_employee_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17992</link>
    <description>Biometric Shift Employee Management System allows Arbitrary File Download via directory traversal sequences in the index.php form_file_name parameter in a download_form action.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17993">
    <title>CVE-2017-17993 (biometric_shift_employee_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17993</link>
    <description>Biometric Shift Employee Management System has XSS via the amount parameter in an index.php?user=addition_deduction request.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17994">
    <title>CVE-2017-17994 (biometric_shift_employee_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17994</link>
    <description>Biometric Shift Employee Management System has XSS via the criteria parameter in an index.php?user=competency_criteria request.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17995">
    <title>CVE-2017-17995 (biometric_shift_employee_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-17995</link>
    <description>Biometric Shift Employee Management System has XSS via the Last_Name parameter in an index.php?user=ajax request.</description>
    <dc:date>2017-12-30T04:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18023">
    <title>CVE-2017-18023</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18023</link>
    <description>Office Tracker 11.2.5 has XSS via the logincount parameter to the /otweb/OTPClientLogin URI.</description>
    <dc:date>2018-01-10T18:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18024">
    <title>CVE-2017-18024</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18024</link>
    <description>AvantFAX 3.3.3 has XSS via an arbitrary parameter name to the default URI, as demonstrated by a parameter whose name contains a SCRIPT element and whose value is 1.</description>
    <dc:date>2018-01-10T18:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18025">
    <title>CVE-2017-18025</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18025</link>
    <description>cgi-bin/drknow.cgi in Innotube ITGuard-Manager 0.0.0.1 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the username field, as demonstrated by a username beginning with &amp;quot;admin|&amp;quot; to use the '|' metacharacter.</description>
    <dc:date>2018-01-09T03:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18026">
    <title>CVE-2017-18026</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18026</link>
    <description>Redmine before 3.2.9, 3.3.x before 3.3.6, and 3.4.x before 3.4.4 does not block the --config and --debugger flags to the Mercurial hg program, which allows remote attackers to execute arbitrary commands (through the Mercurial adapter) via vectors involving a branch whose name begins with a --config= or --debugger= substring, a related issue to CVE-2017-17536.</description>
    <dc:date>2018-01-10T09:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-3765">
    <title>CVE-2017-3765</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-3765</link>
    <description>In Enterprise Networking Operating System (ENOS) in Lenovo and IBM RackSwitch and BladeCenter products, an authentication bypass known as &amp;quot;HP Backdoor&amp;quot; was discovered during a Lenovo security audit in the serial console, Telnet, SSH, and Web interfaces. This bypass mechanism can be accessed when performing local authentication under specific circumstances. If exploited, admin-level access to the switch is granted.</description>
    <dc:date>2018-01-10T18:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-4940">
    <title>CVE-2017-4940 (esxi)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-4940</link>
    <description>The ESXi Host Client in VMware ESXi (6.5 before ESXi650-201712103-SG, 5.5 before ESXi600-201711103-SG and 5.5 before ESXi550-201709102-SG) contains a vulnerability that may allow for stored cross-site scripting (XSS). An attacker can exploit this vulnerability by injecting Javascript, which might get executed when other users access the Host Client.</description>
    <dc:date>2017-12-20T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-4949">
    <title>CVE-2017-4949</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-4949</link>
    <description>VMware Workstation and Fusion contain a use-after-free vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may allow a guest to execute code on the host. Note: IPv6 mode for VMNAT is not enabled by default.</description>
    <dc:date>2018-01-11T14:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-4950">
    <title>CVE-2017-4950</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-4950</link>
    <description>VMware Workstation and Fusion contain an integer overflow vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may lead to an out-of-bound read which can then be used to execute code on the host in conjunction with other issues. Note: IPv6 mode for VMNAT is not enabled by default.</description>
    <dc:date>2018-01-11T14:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5254">
    <title>CVE-2017-5254 (epmp_1000_firmware, epmp_2000_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5254</link>
    <description>In version 3.5 and prior of Cambium Networks ePMP firmware, the non-administrative users 'installer' and 'home' have the capability of changing passwords for other accounts, including admin, after disabling a client-side protection mechanism.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5255">
    <title>CVE-2017-5255 (epmp_1000_firmware, epmp_2000_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5255</link>
    <description>In version 3.5 and prior of Cambium Networks ePMP firmware, a lack of input sanitation for certain parameters on the web management console allows any authenticated user (including the otherwise low-privilege readonly user) to inject shell meta-characters as part of a specially-crafted POST request to the get_chart function and run OS-level commands, effectively as root.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5256">
    <title>CVE-2017-5256 (epmp_1000_firmware, epmp_2000_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5256</link>
    <description>In version 3.5 and prior of Cambium Networks ePMP firmware, all authenticated users have the ability to update the Device Name and System Description fields in the web administration console, and those fields are vulnerable to persistent cross-site scripting (XSS) injection.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5257">
    <title>CVE-2017-5257 (epmp_1000_firmware, epmp_2000_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5257</link>
    <description>In version 3.5 and prior of Cambium Networks ePMP firmware, an attacker who knows (or guesses) the SNMP read/write (RW) community string can insert XSS strings in certain SNMP OIDs which will execute in the context of the currently-logged on user.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5258">
    <title>CVE-2017-5258 (epmp_1000_firmware, epmp_2000_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5258</link>
    <description>In version 3.5 and prior of Cambium Networks ePMP firmware, an attacker who knows or can guess the RW community string can provide a URL for a configuration file over SNMP with XSS strings in certain SNMP OIDs, serve it via HTTP, and the affected device will perform a configuration restore using the attacker's supplied config file, including the inserted XSS strings.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5259">
    <title>CVE-2017-5259 (cnpilot_e400_firmware, cnpilot_e410_firmware, cnpilot_e600_firmware, cnpilot_r190n_firmware, cnpilot_r190v_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5259</link>
    <description>In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, an undocumented, root-privilege administration web shell is available using the HTTP path https://&amp;lt;device-ip-or-hostname&amp;gt;/adm/syscmd.asp.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5260">
    <title>CVE-2017-5260 (cnpilot_e400_firmware, cnpilot_e410_firmware, cnpilot_e600_firmware, cnpilot_r190n_firmware, cnpilot_r190v_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5260</link>
    <description>In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, although the option to access the configuration file is not available in the normal web administrative console for the 'user' account, the configuration file is accessible via direct object reference (DRO) at http://&amp;lt;device-ip-or-hostname&amp;gt;/goform/down_cfg_file by this otherwise low privilege 'user' account.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5261">
    <title>CVE-2017-5261 (cnpilot_e400_firmware, cnpilot_e410_firmware, cnpilot_e600_firmware, cnpilot_r190n_firmware, cnpilot_r190v_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5261</link>
    <description>In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, the 'ping' and 'traceroute' functions of the web administrative console expose a file path traversal vulnerability, accessible to all authenticated users.</description>
    <dc:date>2017-12-20T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5753">
    <title>CVE-2017-5753 (atom_c, atom_e, atom_x3, atom_z, celeron_j, celeron_n, core_i3, core_i5, core_i7, core_m, core_m3, core_m5, core_m7, cortex-a, pentium_j, pentium_n, xeon, xeon_bronze, xeon_e3, xeon_e5, xeon_e7, xeon_gold, xeon_phi, xeon_platinum, xeon_silver)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5753</link>
    <description>Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.</description>
    <dc:date>2018-01-04T13:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5971">
    <title>CVE-2017-5971</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5971</link>
    <description>SQL injection vulnerability in NewsBee CMS allow remote attackers to execute arbitrary SQL commands.</description>
    <dc:date>2018-01-08T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6129">
    <title>CVE-2017-6129 (big-ip_access_policy_manager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6129</link>
    <description>In F5 BIG-IP APM software version 13.0.0 and 12.1.2, in some circumstances, APM tunneled VPN flows can cause a VPN/PPP connflow to be prematurely freed or cause TMM to stop responding with a &amp;quot;flow not in use&amp;quot; assertion. An attacker may be able to disrupt traffic or cause the BIG-IP system to fail over to another device in the device group.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6133">
    <title>CVE-2017-6133 (big-ip_access_policy_manager, big-ip_advanced_firewall_manager, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_security_manager, big-ip_dns, big-ip_link_controller, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager, big-ip_websafe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6133</link>
    <description>In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM and WebSafe software version 13.0.0 and 12.1.0 - 12.1.2, undisclosed HTTP requests may cause a denial of service.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6139">
    <title>CVE-2017-6139 (big-ip_access_policy_manager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6139</link>
    <description>In F5 BIG-IP APM software version 13.0.0 and 12.1.2, under rare conditions, the BIG-IP APM system appends log details when responding to client requests. Details in the log file can vary; customers running debug mode logging with BIG-IP APM are at highest risk.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6140">
    <title>CVE-2017-6140 (big-ip_advanced_firewall_manager, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_security_manager, big-ip_dns, big-ip_global_traffic_manager, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6140</link>
    <description>On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6151">
    <title>CVE-2017-6151 (big-ip_access_policy_manager, big-ip_advanced_firewall_manager, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_security_manager, big-ip_dns, big-ip_edge_gateway, big-ip_global_traffic_manager, big-ip_link_controller, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager, big-ip_webaccelerator, big-ip_websafe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6151</link>
    <description>In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator and WebSafe software version 13.0.0, undisclosed requests made to BIG-IP virtual servers which make use of the &amp;quot;HTTP/2 profile&amp;quot; may result in a disruption of service to TMM.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6164">
    <title>CVE-2017-6164 (big-ip_access_policy_manager, big-ip_advanced_firewall_manager, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_security_manager, big-ip_dns, big-ip_edge_gateway, big-ip_global_traffic_manager, big-ip_link_controller, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager, big-ip_webaccelerator, big-ip_websafe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6164</link>
    <description>In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator and WebSafe software version 13.0.0, 12.0.0 - 12.1.2, 11.6.0 - 11.6.1 and 11.5.0 - 11.5.4, in some circumstances, Traffic Management Microkernel (TMM) does not properly handle certain malformed TLS1.2 records, which allows remote attackers to cause a denial-of-service (DoS) or possible remote command execution on the BIG-IP system.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6167">
    <title>CVE-2017-6167 (big-ip_access_policy_manager, big-ip_advanced_firewall_manager, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_security_manager, big-ip_dns, big-ip_link_controller, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager, big-ip_websafe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6167</link>
    <description>In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM and WebSafe software version 13.0.0 and 12.1.0 - 12.1.2, race conditions in iControl REST may lead to commands being executed with different privilege levels than expected.</description>
    <dc:date>2017-12-21T17:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7536">
    <title>CVE-2017-7536</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7536</link>
    <description>In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue().</description>
    <dc:date>2018-01-10T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7559">
    <title>CVE-2017-7559</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7559</link>
    <description>In Undertow 2.x before 2.0.0.Alpha2, 1.4.x before 1.4.17.Final, and 1.3.x before 1.3.31.Final, it was found that the fix for CVE-2017-2666 was incomplete and invalid characters are still allowed in the query string and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.</description>
    <dc:date>2018-01-10T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7997">
    <title>CVE-2017-7997</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7997</link>
    <description>Multiple SQL injection vulnerabilities in Gespage before 7.4.9 allow remote attackers to execute arbitrary SQL commands via the (1) show_prn parameter to webapp/users/prnow.jsp or show_month parameter to (2) webapp/users/blhistory.jsp or (3) webapp/users/prhistory.jsp.</description>
    <dc:date>2018-01-08T19:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7998">
    <title>CVE-2017-7998</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7998</link>
    <description>Multiple cross-site scripting (XSS) vulnerabilities in Gespage before 7.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) printer name when adding a printer in the admin panel or (2) username parameter to webapp/users/user_reg.jsp.</description>
    <dc:date>2018-01-08T19:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9663">
    <title>CVE-2017-9663</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9663</link>
    <description>An Cleartext Storage of Sensitive Information issue was discovered in General Motors (GM) and Shanghai OnStar (SOS) SOS iOS Client 7.1. Successful exploitation of this vulnerability may allow a remote attacker to access an encryption key that is stored in cleartext in memory.</description>
    <dc:date>2018-01-09T21:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9689">
    <title>CVE-2017-9689</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9689</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a specially-crafted HDMI CEC message can be used to cause stack memory corruption.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9705">
    <title>CVE-2017-9705</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9705</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, concurrent rx notifications and read() operations in the G-Link PKT driver can result in a double free condition due to missing locking resulting in list_del() and list_add() overlapping and corrupting the next and previous pointers.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9712">
    <title>CVE-2017-9712</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9712</link>
    <description>In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, if userspace provides a too-large IE length in wlan_hdd_cfg80211_set_ie, a buffer over-read occurs.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9795">
    <title>CVE-2017-9795</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9795</link>
    <description>When an Apache Geode cluster before v1.3.0 is operating in secure mode, a user with read access to specific regions within a Geode cluster may execute OQL queries that allow read and write access to objects within unauthorized regions. In addition a user could invoke methods that allow remote code execution.</description>
    <dc:date>2018-01-10T03:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9796">
    <title>CVE-2017-9796</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9796</link>
    <description>When an Apache Geode cluster before v1.3.0 is operating in secure mode, a user with read access to specific regions within a Geode cluster may execute OQL queries containing a region name as a bind parameter that allow read access to objects within unauthorized regions.</description>
    <dc:date>2018-01-10T03:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0001">
    <title>CVE-2018-0001</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0001</link>
    <description>A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D67; 12.3 versions prior to 12.3R12-S5; 12.3X48 versions prior to 12.3X48-D35; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D44, 14.1X53-D50; 14.2 versions prior to 14.2R7-S7, 14.2R8; 15.1 versions prior to 15.1R3; 15.1X49 versions prior to 15.1X49-D30; 15.1X53 versions prior to 15.1X53-D70.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0002">
    <title>CVE-2018-0002</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0002</link>
    <description>On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeated crashes of the flowd daemon which results in an extended Denial of Service condition. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D60 on SRX series; 12.3X48 versions prior to 12.3X48-D35 on SRX series; 14.1 versions prior to 14.1R9 on MX series; 14.2 versions prior to 14.2R8 on MX series; 15.1X49 versions prior to 15.1X49-D60 on SRX series; 15.1 versions prior to 15.1R5-S8, 15.1F6-S9, 15.1R6-S4, 15.1R7 on MX series; 16.1 versions prior to 16.1R6 on MX series; 16.2 versions prior to 16.2R3 on MX series; 17.1 versions prior to 17.1R2-S4, 17.1R3 on MX series. No other Juniper Networks products or platforms are affected by this issue.</description>
    <dc:date>2018-01-10T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0003">
    <title>CVE-2018-0003</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0003</link>
    <description>A specially crafted MPLS packet received or processed by the system, on an interface configured with MPLS, will store information in the system memory. Subsequently, if this stored information is accessed, this may result in a kernel crash leading to a denial of service. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71; 12.3R12 versions prior to 12.3R12-S7; 12.3X48 versions prior to 12.3X48-D55; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D45, 14.1X53-D107; 14.2 versions prior to 14.2R7-S7, 14.2R8; 15.1 versions prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7; 15.1X49 versions prior to 15.1X49-D100; 15.1X53 versions prior to 15.1X53-D65, 15.1X53-D231; 16.1 versions prior to 16.1R3-S6, 16.1R4-S6, 16.1R5; 16.1X65 versions prior to 16.1X65-D45; 16.2 versions prior to 16.2R2-S1, 16.2R3; 17.1 versions prior to 17.1R2-S2, 17.1R3; 17.2 versions prior to 17.2R1-S3, 17.2R2; 17.2X75 versions prior to 17.2X75-D50. No other Juniper Networks products or platforms are affected by this issue.</description>
    <dc:date>2018-01-10T22:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0004">
    <title>CVE-2018-0004</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0004</link>
    <description>A sustained sequence of different types of normal transit traffic can trigger a high CPU consumption denial of service condition in the Junos OS register and schedule software interrupt handler subsystem when a specific command is issued to the device. This affects one or more threads and conversely one or more running processes running on the system. Once this occurs, the high CPU event(s) affects either or both the forwarding and control plane. As a result of this condition the device can become inaccessible in either or both the control and forwarding plane and stops forwarding traffic until the device is rebooted. The issue will reoccur after reboot upon receiving further transit traffic. Score: 5.7 MEDIUM (CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) For network designs utilizing layer 3 forwarding agents or other ARP through layer 3 technologies, the score is slightly higher. Score: 6.5 MEDIUM (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) If the following entry exists in the RE message logs then this may indicate the issue is present. This entry may or may not appear when this issue occurs. /kernel: Expensive timeout(9) function: Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D50; 12.3X48 versions prior to 12.3X48-D30; 12.3R versions prior to 12.3R12-S7; 14.1 versions prior to 14.1R8-S4, 14.1R9; 14.1X53 versions prior to 14.1X53-D30, 14.1X53-D34; 14.2 versions prior to 14.2R8; 15.1 versions prior to 15.1F6, 15.1R3; 15.1X49 versions prior to 15.1X49-D40; 15.1X53 versions prior to 15.1X53-D31, 15.1X53-D33, 15.1X53-D60. No other Juniper Networks products or platforms are affected by this issue.</description>
    <dc:date>2018-01-10T22:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0005">
    <title>CVE-2018-0005</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0005</link>
    <description>QFX and EX Series switches configured to drop traffic when the MAC move limit is exceeded will forward traffic instead of dropping traffic. This can lead to denials of services or other unintended conditions. Affected releases are Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D40; 15.1X53 versions prior to 15.1X53-D55; 15.1 versions prior to 15.1R7.</description>
    <dc:date>2018-01-10T22:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0006">
    <title>CVE-2018-0006</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0006</link>
    <description>A high rate of VLAN authentication attempts sent from an adjacent host on the local broadcast domain can trigger high memory utilization by the BBE subscriber management daemon (bbe-smgd), and lead to a denial of service condition. The issue was caused by attempting to process an unbounded number of pending VLAN authentication requests, leading to excessive memory allocation. This issue only affects devices configured for DHCPv4/v6 over AE auto-sensed VLANs, utilized in Broadband Edge (BBE) deployments. Other configurations are unaffected by this issue. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R6-S2, 15.1R7; 16.1 versions prior to 16.1R5-S1, 16.1R6; 16.2 versions prior to 16.2R2-S2, 16.2R3; 17.1 versions prior to 17.1R2-S5, 17.1R3; 17.2 versions prior to 17.2R2.</description>
    <dc:date>2018-01-10T22:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0007">
    <title>CVE-2018-0007</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0007</link>
    <description>An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to the local segment, through a local segment broadcast, may be able to cause a Junos device to enter an improper boundary check condition allowing a memory corruption to occur, leading to a denial of service. Further crafted packets may be able to sustain the denial of service condition. Score: 6.5 MEDIUM (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Further, if the attacker is authenticated on the target device receiving and processing the malicious LLDP packet, while receiving the crafted packets, the attacker may be able to perform command or arbitrary code injection over the target device thereby elevating their permissions and privileges, and taking control of the device. Score: 7.8 HIGH (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to one or more local segments, via LLDP proxy / tunneling agents or other LLDP through Layer 3 deployments, through one or more local segment broadcasts, may be able to cause multiple Junos devices to enter an improper boundary check condition allowing a memory corruption to occur, leading to multiple distributed Denials of Services. These Denials of Services attacks may have cascading Denials of Services to adjacent connected devices, impacts network devices, servers, workstations, etc. Further crafted packets may be able to sustain these Denials of Services conditions. Score 6.8 MEDIUM (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H) Further, if the attacker is authenticated on one or more target devices receiving and processing these malicious LLDP packets, while receiving the crafted packets, the attacker may be able to perform command or arbitrary code injection over multiple target devices thereby elevating their permissions and privileges, and taking control multiple devices. Score: 7.8 HIGH (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71; 12.3 versions prior to 12.3R12-S7; 12.3X48 versions prior to 12.3X48-D55; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D46, 14.1X53-D50, 14.1X53-D107; 14.2 versions prior to 14.2R7-S9, 14.2R8; 15.1 versions prior to 15.1F2-S17, 15.1F5-S8, 15.1F6-S8, 15.1R5-S7, 15.1R7; 15.1X49 versions prior to 15.1X49-D90; 15.1X53 versions prior to 15.1X53-D65; 16.1 versions prior to 16.1R4-S6, 16.1R5; 16.1X65 versions prior to 16.1X65-D45; 16.2 versions prior to 16.2R2; 17.1 versions prior to 17.1R2. No other Juniper Networks products or platforms are affected by this issue.</description>
    <dc:date>2018-01-10T22:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0008">
    <title>CVE-2018-0008</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0008</link>
    <description>An unauthenticated root login may allow upon reboot when a commit script is used. A commit script allows a device administrator to execute certain instructions during commit, which is configured under the [system scripts commit] stanza. Certain commit scripts that work without a problem during normal commit may cause unexpected behavior upon reboot which can leave the system in a state where root CLI login is allowed without a password due to the system reverting to a &amp;quot;safe mode&amp;quot; authentication state. Lastly, only logging in physically to the console port as root, with no password, will work. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71 on SRX; 12.3X48 versions prior to 12.3X48-D55 on SRX; 14.1 versions prior to 14.1R9; 14.1X53 versions prior to 14.1X53-D40 on QFX, EX; 14.2 versions prior to 14.2R7-S9, 14.2R8; 15.1 versions prior to 15.1F5-S7, 15.1F6-S8, 15.1R5-S6, 15.1R6; 15.1X49 versions prior to 15.1X49-D110 on SRX; 15.1X53 versions prior to 15.1X53-D232 on QFX5200/5110; 15.1X53 versions prior to 15.1X53-D49, 15.1X53-D470 on NFX; 15.1X53 versions prior to 15.1X53-D65 on QFX10K; 16.1 versions prior to 16.1R2. No other Juniper Networks products or platforms are affected by this issue.</description>
    <dc:date>2018-01-10T22:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0009">
    <title>CVE-2018-0009</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0009</link>
    <description>On Juniper Networks SRX series devices, firewall rules configured to match custom application UUIDs starting with zeros can match all TCP traffic. Due to this issue, traffic that should have been blocked by other rules is permitted to flow through the device resulting in a firewall bypass condition. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71 on SRX series; 12.3X48 versions prior to 12.3X48-D55 on SRX series; 15.1X49 versions prior to 15.1X49-D100 on SRX series.</description>
    <dc:date>2018-01-10T22:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0010">
    <title>CVE-2018-0010</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0010</link>
    <description>A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was created for another user to perform SSH access. Affected releases are all versions of Junos Space Security Director prior to 17.2R1.</description>
    <dc:date>2018-01-10T22:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0011">
    <title>CVE-2018-0011</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0011</link>
    <description>A reflected cross site scripting (XSS) vulnerability in Junos Space may potentially allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a session, and to perform administrative actions on the Junos Space network management device.</description>
    <dc:date>2018-01-10T22:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0012">
    <title>CVE-2018-0012</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0012</link>
    <description>Junos Space is affected by a privilege escalation vulnerability that may allow a local authenticated attacker to gain root privileges.</description>
    <dc:date>2018-01-10T22:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0013">
    <title>CVE-2018-0013</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0013</link>
    <description>A local file inclusion vulnerability in Juniper Networks Junos Space Network Management Platform may allow an authenticated user to retrieve files from the system.</description>
    <dc:date>2018-01-10T22:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0014">
    <title>CVE-2018-0014</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0014</link>
    <description>Juniper Networks ScreenOS devices do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is often detected as CVE-2003-0001. The issue affects all versions of Juniper Networks ScreenOS prior to 6.3.0r25.</description>
    <dc:date>2018-01-10T22:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0118">
    <title>CVE-2018-0118</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0118</link>
    <description>A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to perform a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the web-based management interface to click a link that is designed to submit malicious input to the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information on the targeted device. Cisco Bug IDs: CSCvg51264.</description>
    <dc:date>2018-01-11T09:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0764">
    <title>CVE-2018-0764</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0764</link>
    <description>Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 5.7 and .NET Core 1.0. 1.1 and 2.0 allow a denial of service vulnerability due to the way XML documents are processed, aka &amp;quot;.NET and .NET Core Denial Of Service Vulnerability&amp;quot;. This CVE is unique from CVE-2018-0765.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0784">
    <title>CVE-2018-0784</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0784</link>
    <description>ASP.NET Core 1.0. 1.1, and 2.0 allow an elevation of privilege vulnerability due to the ASP.NET Core project templates, aka &amp;quot;ASP.NET Core Elevation Of Privilege Vulnerability&amp;quot;. This CVE is unique from CVE-2018-0808.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0785">
    <title>CVE-2018-0785</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0785</link>
    <description>ASP.NET Core 1.0. 1.1, and 2.0 allow a cross site request forgery vulnerability due to the ASP.NET Core project templates, aka &amp;quot;ASP.NET Core Cross Site Request Forgery Vulnerability&amp;quot;.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0786">
    <title>CVE-2018-0786</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0786</link>
    <description>Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, and 4.7 and .NET Core 1.0 and 2.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka &amp;quot;.NET Security Feature Bypass Vulnerability&amp;quot;.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0789">
    <title>CVE-2018-0789</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0789</link>
    <description>Microsoft SharePoint Foundation 2010, Microsoft SharePoint Server 2013 and Microsoft SharePoint Server 2016 allow an elevation of privilege vulnerability due to the way web requests are handled, aka &amp;quot;Microsoft SharePoint Elevation of Privilege Vulnerability&amp;quot;. This CVE is unique from CVE-2018-0790.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0790">
    <title>CVE-2018-0790</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0790</link>
    <description>Microsoft SharePoint Foundation 2010, Microsoft SharePoint Server 2013 and Microsoft SharePoint Server 2016 allow an elevation of privilege vulnerability due to the way web requests are handled, aka &amp;quot;Microsoft SharePoint Elevation of Privilege Vulnerability&amp;quot;. This CVE is unique from CVE-2018-0789.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0791">
    <title>CVE-2018-0791</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0791</link>
    <description>Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, and Microsoft Outlook 2016 allow a remote code execution vulnerability due to the way email messages are parsed, aka &amp;quot;Microsoft Outlook Remote Code Execution Vulnerability&amp;quot;. This CVE is unique from CVE-2018-0793.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0792">
    <title>CVE-2018-0792</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0792</link>
    <description>Microsoft Word 2016 in Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka &amp;quot;Microsoft Word Remote Code Execution Vulnerability&amp;quot;. This CVE is unique from CVE-2018-0794.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0793">
    <title>CVE-2018-0793</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0793</link>
    <description>Microsoft Outlook 2007, Microsoft Outlook 2010 and Microsoft Outlook 2013 allow a remote code execution vulnerability due to the way email messages are parsed, aka &amp;quot;Microsoft Outlook Remote Code Execution Vulnerability&amp;quot;. This CVE is unique from CVE-2018-0791.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0794">
    <title>CVE-2018-0794</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0794</link>
    <description>Microsoft Word in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka &amp;quot;Microsoft Word Remote Code Execution Vulnerability&amp;quot;. This CVE is unique from CVE-2018-0792.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0795">
    <title>CVE-2018-0795</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0795</link>
    <description>Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka &amp;quot;Microsoft Office Remote Code Execution Vulnerability&amp;quot;.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0796">
    <title>CVE-2018-0796</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0796</link>
    <description>Microsoft Excel in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka &amp;quot;Microsoft Excel Remote Code Execution Vulnerability&amp;quot;.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0797">
    <title>CVE-2018-0797</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0797</link>
    <description>Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way RTF content is handled, aka &amp;quot;Microsoft Word Memory Corruption Vulnerability&amp;quot;.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0798">
    <title>CVE-2018-0798</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0798</link>
    <description>Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka &amp;quot;Microsoft Office Memory Corruption Vulnerability&amp;quot;.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0799">
    <title>CVE-2018-0799</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0799</link>
    <description>Microsoft Access in Microsoft SharePoint Enterprise Server 2013 and Microsoft SharePoint Enterprise Server 2016 allows a cross-site-scripting (XSS) vulnerability due to the way image field values are handled, aka &amp;quot;Microsoft Access Tampering Vulnerability&amp;quot;.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0801">
    <title>CVE-2018-0801</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0801</link>
    <description>Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka &amp;quot;Microsoft Office Remote Code Execution Vulnerability&amp;quot;.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0802">
    <title>CVE-2018-0802</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0802</link>
    <description>Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka &amp;quot;Microsoft Office Memory Corruption Vulnerability&amp;quot;. This CVE is unique from CVE-2018-0797 and CVE-2018-0812.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0804">
    <title>CVE-2018-0804</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0804</link>
    <description>Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka &amp;quot;Microsoft Word Remote Code Execution Vulnerability&amp;quot;. This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0805">
    <title>CVE-2018-0805</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0805</link>
    <description>Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka &amp;quot;Microsoft Word Remote Code Execution Vulnerability&amp;quot;. This CVE is unique from CVE-2018-0804, CVE-2018-0806, and CVE-2018-0807</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0806">
    <title>CVE-2018-0806</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0806</link>
    <description>Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka &amp;quot;Microsoft Word Remote Code Execution Vulnerability&amp;quot;. This CVE is unique from CVE-2018-0804, CVE-2018-0805, and CVE-2018-0807.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0807">
    <title>CVE-2018-0807</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0807</link>
    <description>Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka &amp;quot;Microsoft Word Remote Code Execution Vulnerability&amp;quot;. This CVE is unique from CVE-2018-0804, CVE-2018-0805, and CVE-2018-0806.</description>
    <dc:date>2018-01-10T01:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0812">
    <title>CVE-2018-0812</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0812</link>
    <description>Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka &amp;quot;Microsoft Word Memory Corruption Vulnerability&amp;quot;.</description>
    <dc:date>2018-01-10T01:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0818">
    <title>CVE-2018-0818</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0818</link>
    <description>Microsoft ChakraCore allows an attacker to bypass Control Flow Guard (CFG) in conjunction with another vulnerability to run arbitrary code on a target system, due to how the Chakra scripting engine handles accessing memory, aka &amp;quot;Scripting Engine Security Feature Bypass&amp;quot;.</description>
    <dc:date>2018-01-10T01:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0819">
    <title>CVE-2018-0819</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0819</link>
    <description>Microsoft Office 2016 for Mac allows an attacker to send a specially crafted email attachment to a user in an attempt to launch a social engineering attack, such as phishing, due to how Outlook for Mac displays encoded email addresses, aka &amp;quot;Spoofing Vulnerability in Microsoft Office for Mac.&amp;quot;</description>
    <dc:date>2018-01-10T01:29:01Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-2360">
    <title>CVE-2018-2360</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-2360</link>
    <description>SAP Startup Service, SAP KERNEL 7.45, 7.49, and 7.52, is missing an authentication check for functionalities that require user identity and cause consumption of file system storage.</description>
    <dc:date>2018-01-09T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-2361">
    <title>CVE-2018-2361</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-2361</link>
    <description>In SAP Solution Manager 7.20, the role SAP_BPO_CONFIG gives the Business Process Operations (BPO) configuration user more authorization than required for configuring the BPO tools.</description>
    <dc:date>2018-01-09T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-2362">
    <title>CVE-2018-2362</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-2362</link>
    <description>A remote unauthenticated attacker, SAP HANA 1.00 and 2.00, could send specially crafted SOAP requests to the SAP Startup Service and disclose information such as the platform's hostname.</description>
    <dc:date>2018-01-09T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-2363">
    <title>CVE-2018-2363</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-2363</link>
    <description>SAP NetWeaver, SAP BASIS from 7.00 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.52, contains code that allows you to execute arbitrary program code of the user's choice. A malicious user can therefore control the behaviour of the system or can potentially escalate privileges by executing malicious code without legitimate credentials.</description>
    <dc:date>2018-01-09T15:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-3610">
    <title>CVE-2018-3610</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-3610</link>
    <description>SEMA driver in Intel Driver and Support Assistant before version 3.1.1 allows a local attacker the ability to read and writing to Memory Status registers potentially allowing information disclosure or a denial of service condition.</description>
    <dc:date>2018-01-09T21:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-3815">
    <title>CVE-2018-3815</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-3815</link>
    <description>The &amp;quot;XML Interface to Messaging, Scheduling, and Signaling&amp;quot; (XIMSS) protocol implementation in CommuniGate Pro (CGP) 6.2 suffers from a Missing XIMSS Protocol Validation attack that leads to an email spoofing attack, allowing a malicious authenticated attacker to send a message from any source email address. The attack uses an HTTP POST request to a /Session URI, and interchanges the XML From and To elements.</description>
    <dc:date>2018-01-08T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-4871">
    <title>CVE-2018-4871</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-4871</link>
    <description>An Out-of-bounds Read issue was discovered in Adobe Flash Player before 28.0.0.137. This vulnerability occurs because of computation that reads data that is past the end of the target buffer. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.</description>
    <dc:date>2018-01-09T21:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5071">
    <title>CVE-2018-5071</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5071</link>
    <description>Persistent XSS exists in the web server on Cobham Sea Tel 116 build 222429 satellite communication system devices: remote attackers can inject malicious JavaScript code using the device's TELNET shell built-in commands, as demonstrated by the &amp;quot;set ship name&amp;quot; command. This is similar to a Cross Protocol Injection with SNMP.</description>
    <dc:date>2018-01-08T03:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5205">
    <title>CVE-2018-5205</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5205</link>
    <description>When using incomplete escape codes, Irssi before 1.0.6 may access data beyond the end of the string.</description>
    <dc:date>2018-01-06T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5206">
    <title>CVE-2018-5206</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5206</link>
    <description>When the channel topic is set without specifying a sender, Irssi before 1.0.6 may dereference a NULL pointer.</description>
    <dc:date>2018-01-06T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5207">
    <title>CVE-2018-5207</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5207</link>
    <description>When using an incomplete variable argument, Irssi before 1.0.6 may access data beyond the end of the string.</description>
    <dc:date>2018-01-06T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5208">
    <title>CVE-2018-5208</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5208</link>
    <description>In Irssi before 1.0.6, a calculation error in the completion code could cause a heap buffer overflow when completing certain strings.</description>
    <dc:date>2018-01-06T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5211">
    <title>CVE-2018-5211</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5211</link>
    <description>PHP Melody version 2.7.1 suffer from SQL Injection Time-based attack on the page ajax.php with the parameter playlist.</description>
    <dc:date>2018-01-09T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5221">
    <title>CVE-2018-5221</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5221</link>
    <description>Multiple buffer overflows in BarCodeWiz BarCode before 6.7 ActiveX control (BarcodeWiz.DLL) allow remote attackers to execute arbitrary code via a long argument to the (1) BottomText or (2) TopText property.</description>
    <dc:date>2018-01-09T16:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5259">
    <title>CVE-2018-5259</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5259</link>
    <description>Discuz! DiscuzX X3.4 allows remote authenticated users to bypass intended attachment-deletion restrictions via a modified aid parameter.</description>
    <dc:date>2018-01-08T09:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5263">
    <title>CVE-2018-5263</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5263</link>
    <description>The StackIdeas EasyDiscuss (aka com_easydiscuss) extension before 4.0.21 for Joomla! allows XSS.</description>
    <dc:date>2018-01-08T23:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5266">
    <title>CVE-2018-5266</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5266</link>
    <description>Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potentially sensitive information about valid usernames by reading the loginName lines at the js/userLogin.js URI. NOTE: default passwords for the standard usernames are listed in the product's documentation: Dealer with password seatel3, SysAdmin with password seatel2, and User with password seatel1.</description>
    <dc:date>2018-01-08T03:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5267">
    <title>CVE-2018-5267</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5267</link>
    <description>Cobham Sea Tel 121 build 222701 devices allow remote attackers to bypass authentication via a direct request to MenuDealerGx.html, MenuDealer.html, MenuEuNCGx.html, MenuEuNC.html, MenuSysGx.html, or MenuSys.html.</description>
    <dc:date>2018-01-08T03:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5268">
    <title>CVE-2018-5268</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5268</link>
    <description>In OpenCV 3.3.1, a heap-based buffer overflow happens in cv::Jpeg2KDecoder::readComponent8u in modules/imgcodecs/src/grfmt_jpeg2000.cpp when parsing a crafted image file.</description>
    <dc:date>2018-01-08T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5269">
    <title>CVE-2018-5269</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5269</link>
    <description>In OpenCV 3.3.1, an assertion failure happens in cv::RBaseStream::setPos in modules/imgcodecs/src/bitstrm.cpp because of an incorrect integer cast.</description>
    <dc:date>2018-01-08T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5270">
    <title>CVE-2018-5270</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5270</link>
    <description>In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e010.</description>
    <dc:date>2018-01-08T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5271">
    <title>CVE-2018-5271</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5271</link>
    <description>In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e008.</description>
    <dc:date>2018-01-08T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5272">
    <title>CVE-2018-5272</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5272</link>
    <description>In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e004.</description>
    <dc:date>2018-01-08T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5273">
    <title>CVE-2018-5273</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5273</link>
    <description>In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e014.</description>
    <dc:date>2018-01-08T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5274">
    <title>CVE-2018-5274</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5274</link>
    <description>In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C40E024.</description>
    <dc:date>2018-01-08T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5275">
    <title>CVE-2018-5275</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5275</link>
    <description>In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C40E020.</description>
    <dc:date>2018-01-08T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5276">
    <title>CVE-2018-5276</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5276</link>
    <description>In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e018.</description>
    <dc:date>2018-01-08T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5277">
    <title>CVE-2018-5277</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5277</link>
    <description>In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e000.</description>
    <dc:date>2018-01-08T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5278">
    <title>CVE-2018-5278</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5278</link>
    <description>In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e00c.</description>
    <dc:date>2018-01-08T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5279">
    <title>CVE-2018-5279</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5279</link>
    <description>In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e02c.</description>
    <dc:date>2018-01-08T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5280">
    <title>CVE-2018-5280</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5280</link>
    <description>SonicWall SonicOS on Network Security Appliance (NSA) 2016 Q4 devices has XSS via the Configure SSO screens.</description>
    <dc:date>2018-01-08T09:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5281">
    <title>CVE-2018-5281</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5281</link>
    <description>SonicWall SonicOS on Network Security Appliance (NSA) 2017 Q4 devices has XSS via the CFS Custom Category and Cloud AV DB Exclusion Settings screens.</description>
    <dc:date>2018-01-08T09:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5282">
    <title>CVE-2018-5282</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5282</link>
    <description>Kentico 9.0 through 11.0 has a stack-based buffer overflow via the SqlName, SqlPswd, Database, UserName, or Password field in a SilentInstall XML document.</description>
    <dc:date>2018-01-08T09:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5283">
    <title>CVE-2018-5283</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5283</link>
    <description>The Photos in Wifi application 1.0.1 for iOS has directory traversal via the ext parameter to assets-library://asset/asset.php.</description>
    <dc:date>2018-01-08T09:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5284">
    <title>CVE-2018-5284</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5284</link>
    <description>The ImageInject plugin 1.15 for WordPress has XSS via the flickr_appid parameter to wp-admin/options-general.php.</description>
    <dc:date>2018-01-08T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5285">
    <title>CVE-2018-5285</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5285</link>
    <description>The ImageInject plugin 1.15 for WordPress has CSRF via wp-admin/options-general.php.</description>
    <dc:date>2018-01-08T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5286">
    <title>CVE-2018-5286</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5286</link>
    <description>The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-about page.</description>
    <dc:date>2018-01-08T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5287">
    <title>CVE-2018-5287</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5287</link>
    <description>The GD Rating System plugin 2.3 for WordPress has Directory Traversal in the wp-admin/admin.php panel parameter for the gd-rating-system-about page.</description>
    <dc:date>2018-01-08T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5288">
    <title>CVE-2018-5288</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5288</link>
    <description>The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-transfer page.</description>
    <dc:date>2018-01-08T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5289">
    <title>CVE-2018-5289</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5289</link>
    <description>The GD Rating System plugin 2.3 for WordPress has Directory Traversal in the wp-admin/admin.php panel parameter for the gd-rating-system-information page.</description>
    <dc:date>2018-01-08T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5290">
    <title>CVE-2018-5290</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5290</link>
    <description>The GD Rating System plugin 2.3 for WordPress has Directory Traversal in the wp-admin/admin.php panel parameter for the gd-rating-system-transfer page.</description>
    <dc:date>2018-01-08T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5291">
    <title>CVE-2018-5291</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5291</link>
    <description>The GD Rating System plugin 2.3 for WordPress has Directory Traversal in the wp-admin/admin.php panel parameter for the gd-rating-system-tools page.</description>
    <dc:date>2018-01-08T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5292">
    <title>CVE-2018-5292</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5292</link>
    <description>The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-information page.</description>
    <dc:date>2018-01-08T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5293">
    <title>CVE-2018-5293</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5293</link>
    <description>The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-tools page.</description>
    <dc:date>2018-01-08T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5294">
    <title>CVE-2018-5294</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5294</link>
    <description>In libming 0.4.8, there is an integer overflow (caused by an out-of-range left shift) in the readUInt32 function (util/read.c). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted swf file.</description>
    <dc:date>2018-01-08T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5295">
    <title>CVE-2018-5295</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5295</link>
    <description>In PoDoFo 0.9.5, there is an integer overflow in the PdfXRefStreamParserObject::ParseStream function (base/PdfXRefStreamParserObject.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted pdf file.</description>
    <dc:date>2018-01-08T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5296">
    <title>CVE-2018-5296</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5296</link>
    <description>In PoDoFo 0.9.5, there is an uncontrolled memory allocation in the PdfParser::ReadXRefSubsection function (base/PdfParser.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted pdf file.</description>
    <dc:date>2018-01-08T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5298">
    <title>CVE-2018-5298</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5298</link>
    <description>In the Procter &amp;amp; Gamble &amp;quot;Oral-B App&amp;quot; (aka com.pg.oralb.oralbapp) application 5.0.0 for Android, AES encryption with static parameters is used to secure the locally stored shared preferences. An attacker can gain access to locally stored user data more easily by leveraging access to the preferences XML file.</description>
    <dc:date>2018-01-08T08:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5301">
    <title>CVE-2018-5301</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5301</link>
    <description>Magento Community Edition and Enterprise Edition before 2.0.10 and 2.1.x before 2.1.2 have CSRF resulting in deletion of a customer address from an address book, aka APPSEC-1433.</description>
    <dc:date>2018-01-08T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5308">
    <title>CVE-2018-5308</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5308</link>
    <description>PoDoFo 0.9.5 does not properly validate memcpy arguments in the PdfMemoryOutputStream::Write function (base/PdfOutputStream.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service or possibly unspecified other impact via a crafted pdf file.</description>
    <dc:date>2018-01-09T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5309">
    <title>CVE-2018-5309</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5309</link>
    <description>In PoDoFo 0.9.5, there is an integer overflow in the PdfObjectStreamParserObject::ReadObjectsFromStream function (base/PdfObjectStreamParserObject.cpp). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted pdf file.</description>
    <dc:date>2018-01-09T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5310">
    <title>CVE-2018-5310</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5310</link>
    <description>In the &amp;quot;Media from FTP&amp;quot; plugin before 9.85 for WordPress, Directory Traversal exists via the searchdir parameter to the wp-admin/admin.php?page=mediafromftp-search-register URI.</description>
    <dc:date>2018-01-09T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5311">
    <title>CVE-2018-5311</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5311</link>
    <description>The Easy Custom Auto Excerpt plugin 2.4.6 for WordPress has XSS via the tonjoo_ecae_options[custom_css] parameter to the wp-admin/admin.php?page=tonjoo_excerpt URI.</description>
    <dc:date>2018-01-09T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5312">
    <title>CVE-2018-5312</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5312</link>
    <description>The tabs-responsive plugin 1.8.0 for WordPress has XSS via the post_title parameter to wp-admin/post.php.</description>
    <dc:date>2018-01-09T05:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5316">
    <title>CVE-2018-5316</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5316</link>
    <description>The &amp;quot;SagePay Server Gateway for WooCommerce&amp;quot; plugin before 1.0.9 for WordPress has XSS via the includes/pages/redirect.php page parameter.</description>
    <dc:date>2018-01-09T22:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5331">
    <title>CVE-2018-5331</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5331</link>
    <description>Discuz! DiscuzX X3.4 has XSS via the view parameter to include/space/space_poll.php, as demonstrated by a mod=space do=poll request to home.php.</description>
    <dc:date>2018-01-10T09:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5332">
    <title>CVE-2018-5332</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5332</link>
    <description>In the Linux kernel through 4.14.13, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).</description>
    <dc:date>2018-01-11T07:29:00Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5333">
    <title>CVE-2018-5333</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5333</link>
    <description>In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.</description>
    <dc:date>2018-01-11T07:29:00Z</dc:date>
  </item>
</rdf:RDF>

