Vulnerabilities > Debian > Debian Linux > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-04-24 | CVE-2017-3461 | Remote Security vulnerability in Oracle MySQL Server Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). | 4.0 |
2017-04-24 | CVE-2017-3456 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). | 4.0 |
2017-04-24 | CVE-2017-3453 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). | 4.0 |
2017-04-24 | CVE-2017-3329 | Remote Security vulnerability in Oracle MySQL Server Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Thread Pooling). | 5.0 |
2017-04-24 | CVE-2017-3309 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). | 4.0 |
2017-04-24 | CVE-2017-3308 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). | 4.0 |
2017-04-24 | CVE-2017-3305 | Cleartext Transmission of Sensitive Information vulnerability in multiple products Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: C API). | 6.3 |
2017-04-21 | CVE-2016-2347 | Integer Overflow or Wraparound vulnerability in multiple products Integer underflow in the decode_level3_header function in lib/lha_file_header.c in Lhasa before 0.3.1 allows remote attackers to execute arbitrary code via a crafted archive. | 6.8 |
2017-04-20 | CVE-2017-7718 | Out-of-bounds Read vulnerability in multiple products hw/display/cirrus_vga_rop.h in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions. | 5.5 |
2017-04-18 | CVE-2017-7943 | Missing Release of Resource after Effective Lifetime vulnerability in multiple products The ReadSVGImage function in svg.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file. | 4.3 |