Note:
This project will be discontinued after December 13, 2021. [more]
Main entries ~3682 :
Remaining NVD entries (unprocessed / no code available): ~297333 :
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2014-03-01 | CVE-2014-1912 | Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string. | Mac_os_x, Python | N/A | ||
2014-04-07 | CVE-2014-0160 | Heartbleed - The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. | Symantec_messaging_gateway, Ubuntu_linux, Debian_linux, Fedora, Filezilla_server, V100_firmware, V60_firmware, Micollab, Mivoice, Openssl, Opensuse, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Gluster_storage, Storage, Virtualization, S9922l_firmware, Application_processing_engine_firmware, Cp_1543\-1_firmware, Elan\-8\.2, Simatic_s7\-1500_firmware, Simatic_s7\-1500t_firmware, Wincc_open_architecture, Splunk | 7.5 | ||
2021-09-08 | CVE-2021-40346 | An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs. | Haproxy, Haproxy_docker_image | 7.5 | ||
2016-06-08 | CVE-2016-5108 | Buffer overflow in the DecodeAdpcmImaQT function in modules/codec/adpcm.c in VideoLAN VLC media player before 2.2.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted QuickTime IMA file. | Debian_linux, Vlc_media_player | 9.8 | ||
2017-06-01 | CVE-2017-8386 | git-shell did not correctly validate the given project path, allowing an argument injection which leads to arbitrary file reads and in some configurations command execution. | Ubuntu_linux, Debian_linux, Fedora, Git\-Shell, Leap | 8.8 | ||
2018-04-06 | CVE-2018-1000156 | GNU patch is processd by ed. This allows arbitrary command executions through a line beginning with ! | Ubuntu_linux, Debian_linux, Patch, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation | 7.8 | ||
2018-06-08 | CVE-2018-4222 | There is an out-of-bounds read when compiling WebAssembly source buffers in WebKit. If the buffer is a view, the offset is added to the buffer twice before this is copied. This could allow memory off the heap to be read out of the source buffer, either though parsing exceptions or data sections when they are copied | Icloud, Iphone_os, Itunes, Safari, Tvos, Watchos, Ubuntu_linux | 8.8 |
Date | Id | Summary | Products | Score | Patch |
---|---|---|---|---|---|
2021-09-13 | CVE-2021-33545 | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in the counter parameter which may allow an attacker to remotely execute arbitrary code. | G\-Cam_ebc\-2110_firmware, G\-Cam_ebc\-2111_firmware, G\-Cam_ebc\-2112_firmware, G\-Cam_efd\-2241_firmware, G\-Cam_efd\-2250_firmware, G\-Cam_efd\-2251_firmware, G\-Cam_ethc\-2230_firmware, G\-Cam_ethc\-2239_firmware, G\-Cam_ethc\-2240_firmware, G\-Cam_ethc\-2249_firmware, G\-Cam_ewpc\-2270_firmware, G\-Cam_ewpc\-2271_firmware, G\-Cam_ewpc\-2275_firmware, G\-Code_eec\-2400_firmware, G\-Code_een\-2010_firmware, G\-Code_een\-2040_firmware | 7.2 | |
2021-09-13 | CVE-2021-33547 | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in the profile parameter which may allow an attacker to remotely execute arbitrary code. | G\-Cam_ebc\-2110_firmware, G\-Cam_ebc\-2111_firmware, G\-Cam_ebc\-2112_firmware, G\-Cam_efd\-2241_firmware, G\-Cam_efd\-2250_firmware, G\-Cam_efd\-2251_firmware, G\-Cam_ethc\-2230_firmware, G\-Cam_ethc\-2239_firmware, G\-Cam_ethc\-2240_firmware, G\-Cam_ethc\-2249_firmware, G\-Cam_ewpc\-2270_firmware, G\-Cam_ewpc\-2271_firmware, G\-Cam_ewpc\-2275_firmware, G\-Code_eec\-2400_firmware, G\-Code_een\-2010_firmware, G\-Code_een\-2040_firmware | 7.2 | |
2021-09-13 | CVE-2021-33548 | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. | G\-Cam_ebc\-2110_firmware, G\-Cam_ebc\-2111_firmware, G\-Cam_ebc\-2112_firmware, G\-Cam_efd\-2241_firmware, G\-Cam_efd\-2250_firmware, G\-Cam_efd\-2251_firmware, G\-Cam_ethc\-2230_firmware, G\-Cam_ethc\-2239_firmware, G\-Cam_ethc\-2240_firmware, G\-Cam_ethc\-2249_firmware, G\-Cam_ewpc\-2270_firmware, G\-Cam_ewpc\-2271_firmware, G\-Cam_ewpc\-2275_firmware, G\-Code_eec\-2400_firmware, G\-Code_een\-2010_firmware, G\-Code_een\-2040_firmware | N/A | |
2021-09-13 | CVE-2021-24431 | The Language Bar Flags WordPress plugin through 1.0.8 does not have any CSRF in place when saving its settings and did not sanitise or escape them when generating the flag bar in the frontend. This could allow attackers to make a logged in admin change the settings, and set Cross-Site Scripting payload in them, which will be executed in the frontend for all users | Language_bar_flags | 4.3 | |
2021-09-13 | CVE-2021-24490 | The Email Artillery (MASS EMAIL) WordPress plugin through 4.1 does not properly check the uploaded files from the Import Emails feature, allowing arbitrary files to be uploaded. Furthermore, the plugin is also lacking any CSRF check, allowing such issue to be exploited via a CSRF attack as well. However, due to the presence of a .htaccess, denying access to everything in the folder the file is uploaded to, the malicious uploaded file will only be accessible on Web Servers such as Nginx/IIS | Email_artillery | 6.8 | |
2021-09-13 | CVE-2021-24491 | The Fileviewer WordPress plugin through 2.2 does not have CSRF checks in place when performing actions such as upload and delete files. As a result, attackers could make a logged in administrator delete and upload arbitrary files via a CSRF attack | Fileviewer | 8.8 | |
2021-09-13 | CVE-2021-24493 | The shopp_upload_file AJAX action of the Shopp WordPress plugin through 1.4, available to both unauthenticated and authenticated user does not have any security measure in place to prevent upload of malicious files, such as PHP, allowing unauthenticated users to upload arbitrary files and leading to RCE | Shopp | 9.8 |