Main entries ~3682 :
Date Id Summary Products Score Patch Annotated
2014-03-01 CVE-2014-1912 Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string. Mac_os_x, Python N/A
2014-04-07 CVE-2014-0160 Heartbleed - The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. Symantec_messaging_gateway, Ubuntu_linux, Debian_linux, Fedora, Filezilla_server, V100_firmware, V60_firmware, Micollab, Mivoice, Openssl, Opensuse, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Gluster_storage, Storage, Virtualization, S9922l_firmware, Application_processing_engine_firmware, Cp_1543\-1_firmware, Elan\-8\.2, Simatic_s7\-1500_firmware, Simatic_s7\-1500t_firmware, Wincc_open_architecture, Splunk 7.5
2021-09-08 CVE-2021-40346 An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs. Haproxy, Haproxy_docker_image 7.5
2016-06-08 CVE-2016-5108 Buffer overflow in the DecodeAdpcmImaQT function in modules/codec/adpcm.c in VideoLAN VLC media player before 2.2.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted QuickTime IMA file. Debian_linux, Vlc_media_player 9.8
2017-06-01 CVE-2017-8386 git-shell did not correctly validate the given project path, allowing an argument injection which leads to arbitrary file reads and in some configurations command execution. Ubuntu_linux, Debian_linux, Fedora, Git\-Shell, Leap 8.8
2018-04-06 CVE-2018-1000156 GNU patch is processd by ed. This allows arbitrary command executions through a line beginning with ! Ubuntu_linux, Debian_linux, Patch, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation 7.8
2018-06-08 CVE-2018-4222 There is an out-of-bounds read when compiling WebAssembly source buffers in WebKit. If the buffer is a view, the offset is added to the buffer twice before this is copied. This could allow memory off the heap to be read out of the source buffer, either though parsing exceptions or data sections when they are copied Icloud, Iphone_os, Itunes, Safari, Tvos, Watchos, Ubuntu_linux 8.8
Remaining NVD entries (unprocessed / no code available): ~274338 :
Date Id Summary Products Score Patch
2024-09-04 CVE-2024-45450 Permission control vulnerability in the software update module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. Emui, Harmonyos 7.5
2024-09-04 CVE-2024-41927 Cleartext transmission of sensitive information vulnerability exists in multiple IDEC PLCs. If an attacker sends a specific command to PLC's serial communication port, user credentials may be obtained. As a result, the program of the PLC may be obtained, and the PLC may be manipulated. Ft1a\-B12ra_firmware, Ft1a\-B24ra_firmware, Ft1a\-H12ra_firmware, Ft1a\-H12rc_firmware, Ft1a\-H24ra_firmware, Ft1a\-H24rc_firmware, Ft1a\-Pc1_firmware, Ft1a\-Pc2_firmware, Ft1a\-Pc3_firmware, Ft1a\-Pm1_firmware, Ft9z\-1a01_firmware, Ft9z\-Psp1pn05_firmware, Hg9z\-Xcm2a_firmware, Kit\-Fc6a\-16\-Kc_firmware, Kit\-Fc6a\-16\-Kd_firmware, Kit\-Fc6a\-16\-Pc_firmware, Kit\-Fc6a\-16\-Pd_firmware, Kit\-Fc6a\-16\-Ra\-Hg1g_firmware, Kit\-Fc6a\-16\-Ra\-Hg2g\-5tn_firmware, Kit\-Fc6a\-16\-Ra\-Hg2g\-5tt_firmware, Kit\-Fc6a\-16\-Ra_firmware, Kit\-Fc6a\-16\-Rc\-Hg1g_firmware, Kit\-Fc6a\-16\-Rc\-Hg2g\-5tn_firmware, Kit\-Fc6a\-16\-Rc\-Hg2g\-5tt_firmware, Kit\-Fc6a\-16\-Rc_firmware, Kit\-Fc6a\-16\-Rd_firmware, Kit\-Fc6a\-24\-Kc_firmware, Kit\-Fc6a\-24\-Pc_firmware, Kit\-Fc6a\-24\-Ra\-Hg1g_firmware, Kit\-Fc6a\-24\-Ra\-Hg2g\-5tn_firmware, Kit\-Fc6a\-24\-Ra\-Hg2g\-5tt_firmware, Kit\-Fc6a\-24\-Ra_firmware, Kit\-Fc6a\-24\-Rc\-Hg1g_firmware, Kit\-Fc6a\-24\-Rc\-Hg2g\-5tn_firmware, Kit\-Fc6a\-24\-Rc\-Hg2g\-5tt_firmware, Kit\-Fc6a\-24\-Rc_firmware, Kit\-Fc6a\-40\-Kd_firmware, Kit\-Fc6a\-40\-Pc_firmware, Kit\-Fc6a\-40\-Pd_firmware, Kit\-Fc6a\-40\-Ra_firmware, Kit\-Fc6a\-40\-Rc_firmware, Kit\-Fc6a\-40\-Rd_firmware, Kit\-Fc6a\-C16r\-Hg2g\-Vhp_firmware, Kit\-Fc6a\-C16r\-Hg3g\-V8hp_firmware, Kit\-Fc6a\-C16r\-Hg3g\-Vahp_firmware, Kit\-Fc6a\-C16r\-Hg5g\-Vhp_firmware, Kit\-Fc6a\-C24r\-Hg2g\-Vhp_firmware, Kit\-Fc6a\-C24r\-Hg3g\-V8hp_firmware, Kit\-Fc6a\-C24r\-Hg3g\-Vahp_firmware, Kit\-Fc6a\-C24r\-Hg4g\-Vhp_firmware, Kit\-Fc6a\-C24r\-Hg5g\-Vhp_firmware, Kit\-Fc6a\-D16p\-Hg1g_firmware, Kit\-Fc6a\-D16p\-Hg2g\-5tn_firmware, Kit\-Fc6a\-D16p\-Hg2g\-5tt_firmware, Kit\-Fc6a\-D16r\-Hg1g_firmware, Kit\-Fc6a\-D16r\-Hg2g\-5tn_firmware, Kit\-Fc6a\-D16r\-Hg2g\-5tt_firmware, Kit\-Fc6a\-D16r\-Hg2g\-Vhp_firmware, Kit\-Fc6a\-D16r\-Hg3g\-V8hp_firmware, Kit\-Fc6a\-D16r\-Hg3g\-Vahp_firmware, Kit\-Fc6a\-D16r\-Hg4g\-Vhp_firmware, Kit\-Fc6a\-D16r\-Hg5g\-Vhp_firmware, Kit\-Fc6a\-D32p\-Hg1g_firmware, Kit\-Fc6a\-D32p\-Hg2g\-5tn_firmware, Kit\-Fc6a\-D32p\-Hg2g\-5tt_firmware, Kit\-Fc6a\-P16\-K_firmware, Kit\-Fc6a\-P16\-R_firmware, Kit\-Fc6a\-P16\-S_firmware, Kit\-Fc6a\-P32\-K_firmware, Kit\-Fc6a\-P32\-S_firmware, Kit\-Smart\-12\-Bac_firmware, Kit\-Smart\-12\-Bdc_firmware, Kit\-Smart\-12\-Hac_firmware, Kit\-Smart\-12\-Hdc_firmware, Kit\-Smart\-24\-Bac_firmware, Kit\-Smart\-24\-Bdc_firmware, Kit\-Smart\-24\-Hac_firmware, Kit\-Smart\-24\-Hdc_firmware, Kit\-Smart\-40\-Bac\-R_firmware, Kit\-Smart\-40\-Bdc\-Rk_firmware, Kit\-Smart\-40\-Bdc\-Rs_firmware, Kit\-Smart\-40\-Hac\-R_firmware, Kit\-Smart\-40\-Hdc\-Rk_firmware, Kit\-Smart\-40\-Hdc\-Rs_firmware, Kit\-Smart\-48\-Bac\-K_firmware, Kit\-Smart\-48\-Bac\-S_firmware, Kit\-Smart\-48\-Bdc\-K_firmware, Kit\-Smart\-48\-Bdc\-S_firmware, Kit\-Smart\-48\-Hac\-K_firmware, Kit\-Smart\-48\-Hac\-S_firmware, Kit\-Smart\-48\-Hdc\-S_firmware 4.6
2024-09-04 CVE-2024-41716 Cleartext storage of sensitive information vulnerability exists in WindLDR and WindO/I-NV4. If this vulnerability is exploited, an attacker who obtained the product's project file may obtain user credentials of the PLC or Operator Interfaces. As a result, an attacker may be able to manipulate and/or suspend the PLC and Operator Interfaces by accessing or hijacking them. Windldr, Windo\/i\-Nv4 8.1
2024-09-03 CVE-2024-7970 Out of bounds write in V8 in Google Chrome prior to 128.0.6613.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Chrome 8.8
2024-09-03 CVE-2024-8362 Use after free in WebAudio in Google Chrome prior to 128.0.6613.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Chrome 8.8
2024-09-03 CVE-2024-45619 A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed. Opensc, Enterprise_linux 4.3
2024-09-03 CVE-2024-45620 A vulnerability was found in the pkcs15-init tool in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed. Opensc, Enterprise_linux 3.9