Note:
This project will be discontinued after December 13, 2021. [more]
Main entries ~3682 :
Remaining NVD entries (unprocessed / no code available): ~286405 :
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2011-04-13 | CVE-2011-0991 | Use-after-free vulnerability in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to finalizing and then resurrecting a DynamicMethod instance. | Mono, Moonlight | N/A | ||
2011-04-13 | CVE-2011-0990 | Race condition in the FastCopy optimization in the Array.Copy method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, allows remote attackers to trigger a buffer overflow and modify internal data structures, and cause a denial of service (plugin crash) or corrupt the internal state of the security manager, via a crafted media file in which a thread makes a change after a type check but before a copy action. | Mono, Moonlight | N/A | ||
2011-04-13 | CVE-2011-0989 | The RuntimeHelpers.InitializeArray method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, does not properly restrict data types, which allows remote attackers to modify internal read-only data structures, and cause a denial of service (plugin crash) or corrupt the internal state of the security manager, via a crafted media file, as demonstrated by modifying a C# struct. | Mono, Moonlight | N/A | ||
2011-05-31 | CVE-2011-0766 | The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys. | Crypto, Erlang\/otp, Ssh | N/A | ||
2012-06-21 | CVE-2011-0716 | The br_multicast_add_group function in net/bridge/br_multicast.c in the Linux kernel before 2.6.38, when a certain Ethernet bridge configuration is used, allows local users to cause a denial of service (memory corruption and system crash) by sending IGMP packets to a local interface. | Linux_kernel | N/A | ||
2011-02-22 | CVE-2011-0530 | Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. | Nbd | N/A | ||
2017-08-17 | CVE-2011-0469 | Code injection in openSUSE when running some source services used in the open build service 2.1 before March 11 2011. | Opensuse | 9.8 |
Date | Id | Summary | Products | Score | Patch |
---|---|---|---|---|---|
2025-05-13 | CVE-2025-47858 | Rejected reason: Not used | N/A | N/A | |
2025-05-13 | CVE-2025-47859 | Rejected reason: Not used | N/A | N/A | |
2025-05-13 | CVE-2025-47860 | Rejected reason: Not used | N/A | N/A | |
2025-05-13 | CVE-2025-47861 | Rejected reason: Not used | N/A | N/A | |
2025-05-13 | CVE-2025-47862 | Rejected reason: Not used | N/A | N/A | |
2025-05-13 | CVE-2025-47863 | Rejected reason: Not used | N/A | N/A | |
2025-05-13 | CVE-2025-4396 | The Relevanssi – A Better Search plugin for WordPress is vulnerable to time-based SQL Injection via the cats and tags query parameters in all versions up to, and including, 4.24.4 (Free) and <= 2.27.4 (Premium) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries to already existing queries that can be used to extract sensitive... | N/A | 7.5 |