Vulnerabilities > Medium

DATE CVE VULNERABILITY TITLE RISK
2017-08-09 CVE-2017-0736 Unspecified vulnerability in Google Android
A denial of service vulnerability in the Android media framework (libavc).
local
low complexity
google
5.5
2017-08-09 CVE-2017-0735 Improper Initialization vulnerability in Google Android
A denial of service vulnerability in the Android media framework (libavc).
local
low complexity
google CWE-665
5.5
2017-08-09 CVE-2017-0734 Unspecified vulnerability in Google Android
A denial of service vulnerability in the Android media framework (libavc).
local
low complexity
google
5.5
2017-08-09 CVE-2017-0733 Improper Resource Shutdown or Release vulnerability in Google Android
A denial of service vulnerability in the Android media framework (libmediaplayerservice).
local
low complexity
google CWE-404
5.5
2017-08-09 CVE-2017-0730 Missing Initialization of Resource vulnerability in Google Android
A denial of service vulnerability in the Android media framework (h264 decoder).
local
low complexity
google CWE-909
5.5
2017-08-09 CVE-2017-0726 Missing Release of Resource after Effective Lifetime vulnerability in Google Android
A denial of service vulnerability in the Android media framework (libstagefright).
local
low complexity
google CWE-772
5.5
2017-08-09 CVE-2017-0725 Allocation of Resources Without Limits or Throttling vulnerability in Google Android
A denial of service vulnerability in the Android media framework (libskia).
local
low complexity
google CWE-770
5.5
2017-08-09 CVE-2017-0724 Improper Input Validation vulnerability in Google Android
A denial of service vulnerability in the Android media framework (libmpeg2).
local
low complexity
google CWE-20
5.5
2017-08-09 CVE-2017-1448 Open Redirect vulnerability in IBM products
IBM Emptoris Supplier Lifecycle Management 10.0.x and 10.1.x could allow a remote attacker to conduct phishing attacks, using an open redirect attack.
network
low complexity
ibm CWE-601
5.4
2017-08-09 CVE-2017-1357 Improper Input Validation vulnerability in IBM products
IBM Maximo Asset Management 7.5 and 7.6 could allow an authenticated user to manipulate work orders to forge emails which could be used to conduct further advanced attacks.
network
low complexity
ibm CWE-20
4.3