Main entries ~3682 :
Date Id Summary Products Score Patch Annotated
2014-03-01 CVE-2014-1912 Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string. Mac_os_x, Python N/A
2014-04-07 CVE-2014-0160 Heartbleed - The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. Symantec_messaging_gateway, Ubuntu_linux, Debian_linux, Fedora, Filezilla_server, V100_firmware, V60_firmware, Micollab, Mivoice, Openssl, Opensuse, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Gluster_storage, Storage, Virtualization, S9922l_firmware, Application_processing_engine_firmware, Cp_1543\-1_firmware, Elan\-8\.2, Simatic_s7\-1500_firmware, Simatic_s7\-1500t_firmware, Wincc_open_architecture, Splunk 7.5
2021-09-08 CVE-2021-40346 An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs. Haproxy, Haproxy_docker_image 7.5
2016-06-08 CVE-2016-5108 Buffer overflow in the DecodeAdpcmImaQT function in modules/codec/adpcm.c in VideoLAN VLC media player before 2.2.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted QuickTime IMA file. Debian_linux, Vlc_media_player 9.8
2017-06-01 CVE-2017-8386 git-shell did not correctly validate the given project path, allowing an argument injection which leads to arbitrary file reads and in some configurations command execution. Ubuntu_linux, Debian_linux, Fedora, Git\-Shell, Leap 8.8
2018-04-06 CVE-2018-1000156 GNU patch is processd by ed. This allows arbitrary command executions through a line beginning with ! Ubuntu_linux, Debian_linux, Patch, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation 7.8
2018-06-08 CVE-2018-4222 There is an out-of-bounds read when compiling WebAssembly source buffers in WebKit. If the buffer is a view, the offset is added to the buffer twice before this is copied. This could allow memory off the heap to be read out of the source buffer, either though parsing exceptions or data sections when they are copied Icloud, Iphone_os, Itunes, Safari, Tvos, Watchos, Ubuntu_linux 8.8
Remaining NVD entries (unprocessed / no code available): ~296983 :
Date Id Summary Products Score Patch
2019-11-05 CVE-2019-5089 An exploitable memory corruption vulnerability exists in Investintech Able2Extract Professional 4.0.7 x64. A specially crafted JPEG file can cause an out-of-bounds memory write, allowing an attacker to execute arbitrary code on the victim machine. An attacker could exploit a vulnerability by providing the user with a specially crafted JPEG file. Able2extract 7.8
2019-11-05 CVE-2019-16284 A potential security vulnerability has been identified in multiple HP products and versions which involves possible execution of arbitrary code during boot services that can result in elevation of privilege. The EFI_BOOT_SERVICES structure might be overwritten by an attacker to execute arbitrary SMM (System Management Mode) code. A list of affected products and versions are available in https://support.hp.com/rs-en/document/c06456250. 260_g1_dm_firmware, 280_pro_g1_firmware, 285_g2_firmware, 340_g3_firmware, 340_g4_firmware, 346_g3_firmware, 346_g4_firmware, 348_g3_firmware, 348_g4_firmware, Elite_slice_firmware, Elite_x2_1011_g1_firmware, Elite_x2_1012_g1_firmware, Elitebook_1030_g1_firmware, Elitebook_1040_g2_firmware, Elitebook_720_g1__firmware, Elitebook_720_g2_firmware, Elitebook_740_g1_firmware, Elitebook_740_g2_firmware, Elitebook_750_g1_firmware, Elitebook_750_g2_firmware, Elitebook_820_g1_firmware, Elitebook_820_g2_firmware, Elitebook_820_g3_firmware, Elitebook_828_g3_firmware, Elitebook_840_g1_firmware, Elitebook_840_g2_firmware, Elitebook_840_g3_firmware, Elitebook_848_g3_firmware, Elitebook_850_g1_firmware, Elitebook_850_g2_firmware, Elitebook_850_g3_firmware, Elitebook_folio_1020_g1_firmware, Elitebook_folio_1040_g1_firmware, Elitebook_folio_1040_g3_firmware, Elitebook_folio_9480m_firmware, Elitebook_folio_g1_firmware, Elitebook_revolve_810_g2_firmware, Elitebook_revolve_810_g3_firmware, Elitedesk_800_g2_dm_firmware, Elitedesk_800_g2_sff_firmware, Elitedesk_800_g2_twr_firmware, Eliteone_800_g2_aio_firmware, Elitepad_1000_g2_firmware, Mp9_g2_retail_system_firmware, Pro_tablet_10_ee_g1_firmware, Pro_tablet_608_g1_firmware, Pro_tablet_610_g1_firmware, Pro_x2_612_g1_firmware, Probook_11_g1_firmware, Probook_11_g2_firmware, Probook_430_g1_firmware, Probook_430_g2_firmware, Probook_430_g3_firmware, Probook_440_g1_firmware, Probook_440_g2_firmware, Probook_440_g3_firmware, Probook_450_g1_firmware, Probook_450_g2_firmware, Probook_450_g3_firmware, Probook_470_g1_firmware, Probook_470_g2_firmware, Probook_470_g3_firmware, Probook_640_g1_firmware, Probook_640_g2_firmware, Probook_650_g1_firmware, Probook_650_g2_firmware, Probook_x360_11_g1_firmware, Prodesk_400_g1_dm_firmware, Prodesk_400_g2\.5_sff_firmware, Prodesk_400_g2_dm_firmware, Prodesk_400_g3_sff_firmware, Prodesk_405_g2_mt_firmware, Prodesk_480_g3_sff_firmware, Prodesk_485_g2_mt_firmware, Prodesk_490_g2_mt_firmware, Prodesk_490_g3_sff_firmware, Prodesk_498_g2_mt_firmware, Prodesk_498_g3_sff_firmware, Prodesk_600_g2_dm_firmware, Prodesk_600_g2_sff_firmware, Proone_400_g2_aio_firmware, Proone_600_g2_aio_firmware, Rp2_retail_system_firmware, Rp9_g1_retail_system_9015_firmware, Rp9_g1_retail_system_9018_firmware, Sprout_pro_firmware, Z1_g3_firmware, Z238_microtower_firmware, Z240_sff_firmware, Z240_tower_firmware, Z2_mini_g3_firmware, Zbook_14_firmware, Zbook_14_g2_firmware, Zbook_15_firmware, Zbook_15_g2_firmware, Zbook_15_g3_firmware, Zbook_15u_g2_firmware, Zbook_15u_g3_firmware, Zbook_17_firmware, Zbook_17_g2_firmware, Zbook_17_g3_firmware, Zbook_studio_g3_firmware N/A
2019-11-05 CVE-2011-1135 Cross-Site Scripting (XSS) in Xinha, as included in the Serendipity package before 1.5.5, allows remote attackers to execute arbitrary code in plugins/ExtendedFileManager/manager.php and plugins/ImageManager/manager.php. Serendipity N/A
2019-11-05 CVE-2011-1134 Cross-Site Scripting (XSS) in Xinha, as included in the Serendipity package before 1.5.5, allows remote attackers to execute arbitrary code in the image manager. Serendipity N/A
2019-11-05 CVE-2011-1133 Cross-Site Scripting (XSS) in Xinha, as included in the Serendipity package before 1.5.5, allows remote attackers to execute arbitrary code via plugins/ExtendedFileManager/backend.php. Serendipity N/A
2019-11-05 CVE-2019-1978 A vulnerability in the stream reassembly component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper reassembly of traffic streams. An attacker could exploit this vulnerability by sending crafted streams through an affected device. An exploit could allow the attacker to bypass filtering and... Firepower_services_software_for_asa, Firepower_threat_defense, Secure_firewall_management_center 5.8
2019-11-05 CVE-2019-1980 A vulnerability in the protocol detection component of Cisco Firepower Threat Defense Software, Cisco FirePOWER Services Software for ASA, and Cisco Firepower Management Center Software could allow an unauthenticated, remote attacker to bypass filtering protections. The vulnerability is due to improper detection of the initial use of a protocol on a nonstandard port. An attacker could exploit this vulnerability by sending traffic on a nonstandard port for the protocol in use through an... Firepower_services_software_for_asa, Firepower_threat_defense, Secure_firewall_management_center 5.3