Note:
This project will be discontinued after December 13, 2021. [more]
Main entries ~3682 :
Remaining NVD entries (unprocessed / no code available): ~264672 :
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2014-03-01 | CVE-2014-1912 | Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string. | Mac_os_x, Python | N/A | ||
2014-04-07 | CVE-2014-0160 | Heartbleed - The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. | Symantec_messaging_gateway, Ubuntu_linux, Debian_linux, Fedora, Filezilla_server, V100_firmware, V60_firmware, Micollab, Mivoice, Openssl, Opensuse, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Gluster_storage, Storage, Virtualization, S9922l_firmware, Application_processing_engine_firmware, Cp_1543\-1_firmware, Elan\-8\.2, Simatic_s7\-1500_firmware, Simatic_s7\-1500t_firmware, Wincc_open_architecture, Splunk | 7.5 | ||
2021-09-08 | CVE-2021-40346 | An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs. | Haproxy, Haproxy_docker_image | 7.5 | ||
2016-06-08 | CVE-2016-5108 | Buffer overflow in the DecodeAdpcmImaQT function in modules/codec/adpcm.c in VideoLAN VLC media player before 2.2.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted QuickTime IMA file. | Debian_linux, Vlc_media_player | 9.8 | ||
2017-06-01 | CVE-2017-8386 | git-shell did not correctly validate the given project path, allowing an argument injection which leads to arbitrary file reads and in some configurations command execution. | Ubuntu_linux, Debian_linux, Fedora, Git\-Shell, Leap | 8.8 | ||
2018-04-06 | CVE-2018-1000156 | GNU patch is processd by ed. This allows arbitrary command executions through a line beginning with ! | Ubuntu_linux, Debian_linux, Patch, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation | 7.8 | ||
2018-06-08 | CVE-2018-4222 | There is an out-of-bounds read when compiling WebAssembly source buffers in WebKit. If the buffer is a view, the offset is added to the buffer twice before this is copied. This could allow memory off the heap to be read out of the source buffer, either though parsing exceptions or data sections when they are copied | Icloud, Iphone_os, Itunes, Safari, Tvos, Watchos, Ubuntu_linux | 8.8 |
Date | Id | Summary | Products | Score | Patch |
---|---|---|---|---|---|
2024-07-01 | CVE-2024-21586 | An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series and NFX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If an affected device receives specific valid traffic destined to the device, it will cause the PFE to crash and restart. Continued receipt and processing of this traffic will create a sustained DoS condition. This issue affects Junos OS on... | N/A | 7.5 | |
2024-07-01 | CVE-2024-36401 | GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them... | Geoserver, Geotools | 9.8 | |
2024-07-01 | CVE-2024-36420 | Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, the `/api/v1/openai-assistants-file` endpoint in `index.ts` is vulnerable to arbitrary file read due to lack of sanitization of the `fileName` body parameter. No known patches for this issue are available. | Flowise | 7.5 | |
2024-07-01 | CVE-2024-36421 | Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, A CORS misconfiguration sets the Access-Control-Allow-Origin header to all, allowing arbitrary origins to connect to the website. In the default configuration (unauthenticated), arbitrary origins may be able to make requests to Flowise, stealing information from the user. This CORS misconfiguration may be chained with the path injection to allow an attacker attackers without... | Flowise | 7.5 | |
2024-07-01 | CVE-2024-36422 | Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `api/v1/chatflows/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without... | Flowise | 6.1 | |
2024-07-01 | CVE-2023-43554 | Memory corruption while processing IOCTL handler in FastRPC. | Aqt1000_firmware, Fastconnect_6200_firmware, Fastconnect_6700_firmware, Fastconnect_6800_firmware, Fastconnect_6900_firmware, Fastconnect_7800_firmware, Qca6391_firmware, Qca6420_firmware, Qca6430_firmware, Qcm5430_firmware, Qcm6490_firmware, Qcs5430_firmware, Qcs6490_firmware, Qualcomm_video_collaboration_vc3_platform_firmware, Sc8180x\+sdx55_firmware, Sc8180x\-Aa_firmware, Sc8180x\-Ab_firmware, Sc8180x\-Ac_firmware, Sc8180x\-Ad_firmware, Sc8180x\-Af_firmware, Sc8180xp\-Aa_firmware, Sc8180xp\-Ab_firmware, Sc8180xp\-Ac_firmware, Sc8180xp\-Ad_firmware, Sc8180xp\-Af_firmware, Sc8280xp\-Ab_firmware, Sc8280xp\-Bb_firmware, Sc8380xp_firmware, Snapdragon_7c\+_gen_3_firmware, Wcd9340_firmware, Wcd9341_firmware, Wcd9370_firmware, Wcd9375_firmware, Wcd9380_firmware, Wcd9385_firmware, Wsa8810_firmware, Wsa8815_firmware, Wsa8830_firmware, Wsa8835_firmware, Wsa8840_firmware, Wsa8845_firmware, Wsa8845h_firmware | 7.8 | |
2024-07-01 | CVE-2024-21456 | Information Disclosure while parsing beacon frame in STA. | Ar8035_firmware, Fastconnect_7800_firmware, Qam8255p_firmware, Qam8620p_firmware, Qam8650p_firmware, Qam8775p_firmware, Qamsrv1h_firmware, Qamsrv1m_firmware, Qca6554a_firmware, Qca6564au_firmware, Qca6574_firmware, Qca6574a_firmware, Qca6574au_firmware, Qca6584au_firmware, Qca6595_firmware, Qca6595au_firmware, Qca6678aq_firmware, Qca6696_firmware, Qca6698aq_firmware, Qca8081_firmware, Qca8337_firmware, Qcc2073_firmware, Qcc2076_firmware, Qcc710_firmware, Qcn6224_firmware, Qcn6274_firmware, Qfw7114_firmware, Qfw7124_firmware, Sa7255p_firmware, Sa7775p_firmware, Sa8255p_firmware, Sa8650p_firmware, Sa8770p_firmware, Sa8775p_firmware, Sa9000p_firmware, Snapdragon_auto_5g_modem\-Rf_gen_2_firmware, Snapdragon_x72_5g_modem\-Rf_system_firmware, Snapdragon_x75_5g_modem\-Rf_system_firmware, Srv1h_firmware, Srv1l_firmware, Srv1m_firmware, Wcd9340_firmware | 9.1 |