Main entries ~3682 :
Date Id Summary Products Score Patch Annotated
2014-03-01 CVE-2014-1912 Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string. Mac_os_x, Python N/A
2014-04-07 CVE-2014-0160 Heartbleed - The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. Symantec_messaging_gateway, Ubuntu_linux, Debian_linux, Fedora, Filezilla_server, V100_firmware, V60_firmware, Micollab, Mivoice, Openssl, Opensuse, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Gluster_storage, Storage, Virtualization, S9922l_firmware, Application_processing_engine_firmware, Cp_1543\-1_firmware, Elan\-8\.2, Simatic_s7\-1500_firmware, Simatic_s7\-1500t_firmware, Wincc_open_architecture, Splunk 7.5
2021-09-08 CVE-2021-40346 An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs. Haproxy, Haproxy_docker_image 7.5
2016-06-08 CVE-2016-5108 Buffer overflow in the DecodeAdpcmImaQT function in modules/codec/adpcm.c in VideoLAN VLC media player before 2.2.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted QuickTime IMA file. Debian_linux, Vlc_media_player 9.8
2017-06-01 CVE-2017-8386 git-shell did not correctly validate the given project path, allowing an argument injection which leads to arbitrary file reads and in some configurations command execution. Ubuntu_linux, Debian_linux, Fedora, Git\-Shell, Leap 8.8
2018-04-06 CVE-2018-1000156 GNU patch is processd by ed. This allows arbitrary command executions through a line beginning with ! Ubuntu_linux, Debian_linux, Patch, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation 7.8
2018-06-08 CVE-2018-4222 There is an out-of-bounds read when compiling WebAssembly source buffers in WebKit. If the buffer is a view, the offset is added to the buffer twice before this is copied. This could allow memory off the heap to be read out of the source buffer, either though parsing exceptions or data sections when they are copied Icloud, Iphone_os, Itunes, Safari, Tvos, Watchos, Ubuntu_linux 8.8
Remaining NVD entries (unprocessed / no code available): ~297333 :
Date Id Summary Products Score Patch
2022-12-01 CVE-2022-4251 A vulnerability was found in Movie Ticket Booking System and classified as problematic. Affected by this issue is some unknown functionality of the file editBooking.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214628. Movie_ticket_booking_system 5.4
2022-12-01 CVE-2022-4252 A vulnerability was found in SourceCodester Canteen Management System. It has been classified as problematic. This affects the function builtin_echo of the file categories.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-214629 was assigned to this vulnerability. Canteen_management_system 6.1
2022-12-01 CVE-2022-4253 A vulnerability was found in SourceCodester Canteen Management System. It has been declared as problematic. This vulnerability affects the function builtin_echo of the file customer.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-214630 is the identifier assigned to this vulnerability. Canteen_management_system 5.4
2022-12-01 CVE-2022-36431 An arbitrary file upload vulnerability in Rocket TRUfusion Enterprise before 7.9.6.1 allows unauthenticated attackers to execute arbitrary code via a crafted JSP file. Issue fixed in version 7.9.6.1. Trufusion 9.8
2022-12-01 CVE-2022-44262 ff4j 1.8.1 is vulnerable to Remote Code Execution (RCE). Ff4j 9.8
2022-12-01 CVE-2022-45045 Multiple Xiongmai NVR devices, including MBD6304T V4.02.R11.00000117.10001.131900.00000 and NBD6808T-PL V4.02.R11.C7431119.12001.130000.00000, allow authenticated users to execute arbitrary commands as root, as exploited in the wild starting in approximately 2019. A remote and authenticated attacker, possibly using the default admin:tlJwpbo6 credentials, can connect to port 34567 and execute arbitrary operating system commands via a crafted JSON file during an upgrade request. Since at least... Mbd6304t, Mbd6304t_firmware, Nbd6808t\-Pl, Nbd6808t\-Pl_firmware, Nbd7004t\-P, Nbd7004t\-P_firmware, Nbd7008t\-P, Nbd7008t\-P_firmware, Nbd7016t\-F\-V2, Nbd7016t\-F\-V2_firmware, Nbd7024h\-P, Nbd7024h\-P_firmware, Nbd7024t\-P, Nbd7024t\-P_firmware, Nbd7804r\-F\(Ep\), Nbd7804r\-F\(Ep\)_firmware, Nbd7804r\-F\(Hdmi\), Nbd7804r\-F\(Hdmi\)_firmware, Nbd7804r\-Fw, Nbd7804r\-Fw_firmware, Nbd7804t\-Pl, Nbd7804t\-Pl_firmware, Nbd7808r\-Pl\(Ep\), Nbd7808r\-Pl\(Ep\)_firmware, Nbd7808r\-Pl\(Hdmi\), Nbd7808r\-Pl\(Hdmi\)_firmware, Nbd7808t\-Pl, Nbd7808t\-Pl_firmware, Nbd7904r\-Fs, Nbd7904r\-Fs_firmware, Nbd7904t\-P, Nbd7904t\-P_firmware, Nbd7904t\-Pl, Nbd7904t\-Pl\-Xpoe, Nbd7904t\-Pl\-Xpoe_firmware, Nbd7904t\-Pl_firmware, Nbd7904t\-Plc\-Xpoe, Nbd7904t\-Plc\-Xpoe_firmware, Nbd7904t\-Q, Nbd7904t\-Q_firmware, Nbd7908t\-Q, Nbd7908t\-Q_firmware, Nbd8004r\-Pl\(Ep\), Nbd8004r\-Pl\(Ep\)_firmware, Nbd8004r\-Yl\(Ep\), Nbd8004r\-Yl\(Ep\)_firmware, Nbd8004t\-Q, Nbd8004t\-Q_firmware, Nbd8008r\-Pl, Nbd8008r\-Pl\(Ep\), Nbd8008r\-Pl\(Ep\)_firmware, Nbd8008r\-Pl_firmware, Nbd8008r\-Yl\(Ep\), Nbd8008r\-Yl\(Ep\)_firmware, Nbd8008ra\-Gl, Nbd8008ra\-Gl_firmware, Nbd8008ra\-Glk, Nbd8008ra\-Glk_firmware, Nbd8008ra\-Ul\(Ep\), Nbd8008ra\-Ul\(Ep\)_firmware, Nbd8008ra\-Ula, Nbd8008ra\-Ula_firmware, Nbd8008ra\-Ulk, Nbd8008ra\-Ulk_firmware, Nbd8008t\-Q, Nbd8008t\-Q_firmware, Nbd8009s\-Ula\-V2, Nbd8009s\-Ula\-V2_firmware, Nbd8010s\-Kl\-V2, Nbd8010s\-Kl\-V2_firmware, Nbd8016r\-Ul, Nbd8016r\-Ul_firmware, Nbd8016ra\-K\(Ep\), Nbd8016ra\-K\(Ep\)_firmware, Nbd8016ra\-Ul, Nbd8016ra\-Ul\(Ep\), Nbd8016ra\-Ul\(Ep\)_firmware, Nbd8016ra\-Ul_firmware, Nbd8016ra\-Ula, Nbd8016ra\-Ula_firmware, Nbd8016ra\-Ulk, Nbd8016ra\-Ulk_firmware, Nbd8016s\-Kl\-V2, Nbd8016s\-Kl\-V2_firmware, Nbd8016s\-Ula\-V2, Nbd8016s\-Ula\-V2_firmware, Nbd8016t\-Q\-V2, Nbd8016t\-Q\-V2_firmware, Nbd8025r\-Ul, Nbd8025r\-Ul_firmware, Nbd8032h4\-P, Nbd8032h4\-P_firmware, Nbd8032h4\-Q, Nbd8032h4\-Q_firmware, Nbd8032h4\-Qe, Nbd8032h4\-Qe_firmware, Nbd8032h4\-Ul, Nbd8032h4\-Ul_firmware, Nbd8032h8\-P, Nbd8032h8\-P_firmware, Nbd8032h8\-Qe, Nbd8032h8\-Qe_firmware, Nbd8032ra\-Ul\-V2, Nbd8032ra\-Ul\-V2_firmware, Nbd8064h8\-P, Nbd8064h8\-P_firmware, Nbd80n16ra\-Kl, Nbd80n16ra\-Kl\(Ep\), Nbd80n16ra\-Kl\(Ep\)_firmware, Nbd80n16ra\-Kl_firmware, Nbd80s08s\-Kl\(Ep\), Nbd80s08s\-Kl\(Ep\)_firmware, Nbd80s10s\-Kl, Nbd80s10s\-Kl_firmware, Nbd80s16s\-Kl, Nbd80s16s\-Kl\(Ep\), Nbd80s16s\-Kl\(Ep\)_firmware, Nbd80s16s\-Kl_firmware, Nbd80x09ra\-Kl, Nbd80x09ra\-Kl_firmware, Nbd80x09s\-Kl, Nbd80x09s\-Kl_firmware, Nbd88x09s\-Kl, Nbd88x09s\-Kl_firmware, Nbd8904r\-Pl, Nbd8904r\-Pl_firmware, Nbd8904r\-Yl, Nbd8904r\-Yl_firmware, Nbd8904t\-Gsc\-Xpoe, Nbd8904t\-Gsc\-Xpoe_firmware, Nbd8904t\-Q, Nbd8904t\-Q_firmware, Nbd8908r\-Pl, Nbd8908r\-Pl_firmware, Nbd8908r\-Yl, Nbd8908r\-Yl_firmware, Nbd8908t\-Pl\-Xpoe, Nbd8908t\-Pl\-Xpoe_firmware, Nbd8908t\-Plc\-Xpoe, Nbd8908t\-Plc\-Xpoe_firmware, Nbd8916f4\-Q, Nbd8916f4\-Q_firmware, Nbd8916f8\-Q, Nbd8916f8\-Q_firmware 8.8
2022-12-01 CVE-2022-40489 ThinkCMF version 6.0.7 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows a Super Administrator user to be injected into administrative users. Thinkcmf 8.8