Vulnerability Database

The Rapid7 Vulnerability Database is a list of 70,000 vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions. Each vulnerability has links to relevant groups like Mitre and other CVE Numbering Authorities as well as additional technical documentation. These vulnerabilities are utilized by our vulnerability management tool Nexpose and provided here for additional visibility.


Displaying vulnerability details 121 - 130 of 120779 in total

Debian: CVE-2017-8823: tor -- security update Vulnerability

  • Severity: 4
  • Published: December 01, 2017

In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, there is a use-after-free in onion service v2 during intro-point expiration because the expiring list is mismanaged in certain error cases, aka TROVE-2017-013.

SUSE: CVE-2017-8819: SUSE Linux Security Advisory Vulnerability

  • Severity: 4
  • Published: December 01, 2017

In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, the replay-cache protection mechanism is ineffective for v2 onion services, aka TROVE-2017-009. An attacker can send many INTRODUCE2 cells to trigger this issue.

Debian: CVE-2017-8821: tor -- security update Vulnerability

  • Severity: 4
  • Published: December 01, 2017

In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, an attacker can cause a denial of service (application hang) via crafted PEM input that signifies a public key requiring a password, which triggers an attempt by the OpenSSL library to ask the user for the ...

Debian: CVE-2017-8822: tor -- security update Vulnerability

  • Severity: 4
  • Published: December 01, 2017

In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, relays (that have incompletely downloaded descriptors) can pick themselves in a circuit path, leading to a degradation of anonymity, aka TROVE-2017-012.

Debian: CVE-2017-17085: wireshark -- security update Vulnerability

  • Severity: 4
  • Published: November 30, 2017

In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length.

OS X update for Kernel (CVE-2017-13873) Vulnerability

  • Severity: 4
  • Published: November 30, 2017
An application was able to access network activity information maintained by the operating system unrestricted. This issue was addressed by reducing the information available to third party applications.

Debian: CVE-2017-17083: wireshark -- security update Vulnerability

  • Severity: 4
  • Published: November 30, 2017

In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer.

Debian: CVE-2017-17084: wireshark -- security update Vulnerability

  • Severity: 4
  • Published: November 30, 2017

In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU length.

SUSE: CVE-2017-17085: SUSE Linux Security Advisory Vulnerability

  • Severity: 4
  • Published: November 30, 2017

In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length.