Note:
This project will be discontinued after December 13, 2021. [more]
Main entries ~3682 :
Remaining NVD entries (unprocessed / no code available): ~296983 :
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2014-03-01 | CVE-2014-1912 | Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string. | Mac_os_x, Python | N/A | ||
2014-04-07 | CVE-2014-0160 | Heartbleed - The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. | Symantec_messaging_gateway, Ubuntu_linux, Debian_linux, Fedora, Filezilla_server, V100_firmware, V60_firmware, Micollab, Mivoice, Openssl, Opensuse, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Gluster_storage, Storage, Virtualization, S9922l_firmware, Application_processing_engine_firmware, Cp_1543\-1_firmware, Elan\-8\.2, Simatic_s7\-1500_firmware, Simatic_s7\-1500t_firmware, Wincc_open_architecture, Splunk | 7.5 | ||
2021-09-08 | CVE-2021-40346 | An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs. | Haproxy, Haproxy_docker_image | 7.5 | ||
2016-06-08 | CVE-2016-5108 | Buffer overflow in the DecodeAdpcmImaQT function in modules/codec/adpcm.c in VideoLAN VLC media player before 2.2.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted QuickTime IMA file. | Debian_linux, Vlc_media_player | 9.8 | ||
2017-06-01 | CVE-2017-8386 | git-shell did not correctly validate the given project path, allowing an argument injection which leads to arbitrary file reads and in some configurations command execution. | Ubuntu_linux, Debian_linux, Fedora, Git\-Shell, Leap | 8.8 | ||
2018-04-06 | CVE-2018-1000156 | GNU patch is processd by ed. This allows arbitrary command executions through a line beginning with ! | Ubuntu_linux, Debian_linux, Patch, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation | 7.8 | ||
2018-06-08 | CVE-2018-4222 | There is an out-of-bounds read when compiling WebAssembly source buffers in WebKit. If the buffer is a view, the offset is added to the buffer twice before this is copied. This could allow memory off the heap to be read out of the source buffer, either though parsing exceptions or data sections when they are copied | Icloud, Iphone_os, Itunes, Safari, Tvos, Watchos, Ubuntu_linux | 8.8 |
Date | Id | Summary | Products | Score | Patch |
---|---|---|---|---|---|
2019-11-05 | CVE-2019-5089 | An exploitable memory corruption vulnerability exists in Investintech Able2Extract Professional 4.0.7 x64. A specially crafted JPEG file can cause an out-of-bounds memory write, allowing an attacker to execute arbitrary code on the victim machine. An attacker could exploit a vulnerability by providing the user with a specially crafted JPEG file. | Able2extract | 7.8 | |
2019-11-05 | CVE-2019-16284 | A potential security vulnerability has been identified in multiple HP products and versions which involves possible execution of arbitrary code during boot services that can result in elevation of privilege. The EFI_BOOT_SERVICES structure might be overwritten by an attacker to execute arbitrary SMM (System Management Mode) code. A list of affected products and versions are available in https://support.hp.com/rs-en/document/c06456250. | 260_g1_dm_firmware, 280_pro_g1_firmware, 285_g2_firmware, 340_g3_firmware, 340_g4_firmware, 346_g3_firmware, 346_g4_firmware, 348_g3_firmware, 348_g4_firmware, Elite_slice_firmware, Elite_x2_1011_g1_firmware, Elite_x2_1012_g1_firmware, Elitebook_1030_g1_firmware, Elitebook_1040_g2_firmware, Elitebook_720_g1__firmware, Elitebook_720_g2_firmware, Elitebook_740_g1_firmware, Elitebook_740_g2_firmware, Elitebook_750_g1_firmware, Elitebook_750_g2_firmware, Elitebook_820_g1_firmware, Elitebook_820_g2_firmware, Elitebook_820_g3_firmware, Elitebook_828_g3_firmware, Elitebook_840_g1_firmware, Elitebook_840_g2_firmware, Elitebook_840_g3_firmware, Elitebook_848_g3_firmware, Elitebook_850_g1_firmware, Elitebook_850_g2_firmware, Elitebook_850_g3_firmware, Elitebook_folio_1020_g1_firmware, Elitebook_folio_1040_g1_firmware, Elitebook_folio_1040_g3_firmware, Elitebook_folio_9480m_firmware, Elitebook_folio_g1_firmware, Elitebook_revolve_810_g2_firmware, Elitebook_revolve_810_g3_firmware, Elitedesk_800_g2_dm_firmware, Elitedesk_800_g2_sff_firmware, Elitedesk_800_g2_twr_firmware, Eliteone_800_g2_aio_firmware, Elitepad_1000_g2_firmware, Mp9_g2_retail_system_firmware, Pro_tablet_10_ee_g1_firmware, Pro_tablet_608_g1_firmware, Pro_tablet_610_g1_firmware, Pro_x2_612_g1_firmware, Probook_11_g1_firmware, Probook_11_g2_firmware, Probook_430_g1_firmware, Probook_430_g2_firmware, Probook_430_g3_firmware, Probook_440_g1_firmware, Probook_440_g2_firmware, Probook_440_g3_firmware, Probook_450_g1_firmware, Probook_450_g2_firmware, Probook_450_g3_firmware, Probook_470_g1_firmware, Probook_470_g2_firmware, Probook_470_g3_firmware, Probook_640_g1_firmware, Probook_640_g2_firmware, Probook_650_g1_firmware, Probook_650_g2_firmware, Probook_x360_11_g1_firmware, Prodesk_400_g1_dm_firmware, Prodesk_400_g2\.5_sff_firmware, Prodesk_400_g2_dm_firmware, Prodesk_400_g3_sff_firmware, Prodesk_405_g2_mt_firmware, Prodesk_480_g3_sff_firmware, Prodesk_485_g2_mt_firmware, Prodesk_490_g2_mt_firmware, Prodesk_490_g3_sff_firmware, Prodesk_498_g2_mt_firmware, Prodesk_498_g3_sff_firmware, Prodesk_600_g2_dm_firmware, Prodesk_600_g2_sff_firmware, Proone_400_g2_aio_firmware, Proone_600_g2_aio_firmware, Rp2_retail_system_firmware, Rp9_g1_retail_system_9015_firmware, Rp9_g1_retail_system_9018_firmware, Sprout_pro_firmware, Z1_g3_firmware, Z238_microtower_firmware, Z240_sff_firmware, Z240_tower_firmware, Z2_mini_g3_firmware, Zbook_14_firmware, Zbook_14_g2_firmware, Zbook_15_firmware, Zbook_15_g2_firmware, Zbook_15_g3_firmware, Zbook_15u_g2_firmware, Zbook_15u_g3_firmware, Zbook_17_firmware, Zbook_17_g2_firmware, Zbook_17_g3_firmware, Zbook_studio_g3_firmware | N/A | |
2019-11-05 | CVE-2011-1135 | Cross-Site Scripting (XSS) in Xinha, as included in the Serendipity package before 1.5.5, allows remote attackers to execute arbitrary code in plugins/ExtendedFileManager/manager.php and plugins/ImageManager/manager.php. | Serendipity | N/A | |
2019-11-05 | CVE-2011-1134 | Cross-Site Scripting (XSS) in Xinha, as included in the Serendipity package before 1.5.5, allows remote attackers to execute arbitrary code in the image manager. | Serendipity | N/A | |
2019-11-05 | CVE-2011-1133 | Cross-Site Scripting (XSS) in Xinha, as included in the Serendipity package before 1.5.5, allows remote attackers to execute arbitrary code via plugins/ExtendedFileManager/backend.php. | Serendipity | N/A | |
2019-11-05 | CVE-2019-1978 | A vulnerability in the stream reassembly component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper reassembly of traffic streams. An attacker could exploit this vulnerability by sending crafted streams through an affected device. An exploit could allow the attacker to bypass filtering and... | Firepower_services_software_for_asa, Firepower_threat_defense, Secure_firewall_management_center | 5.8 | |
2019-11-05 | CVE-2019-1980 | A vulnerability in the protocol detection component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper detection of the initial use of a protocol on a nonstandard port. An attacker could exploit this vulnerability by sending traffic on a nonstandard port for the protocol in use through an... | Firepower_services_software_for_asa, Firepower_threat_defense, Secure_firewall_management_center | 5.3 |