id stringlengths 13 16 | sourceIdentifier stringclasses 367
values | published stringlengths 23 23 | lastModified stringlengths 23 23 | vulnStatus stringclasses 6
values | cveTags listlengths 0 1 | descriptions listlengths 1 2 | metrics dict | weaknesses listlengths 1 3 ⌀ | configurations listlengths 1 2.88k ⌀ | references listlengths 0 281 | cisaExploitAdd stringclasses 263
values | cisaActionDue stringclasses 282
values | cisaRequiredAction stringclasses 31
values | cisaVulnerabilityName stringclasses 724
values | vendorComments listlengths 1 1 ⌀ | evaluatorComment stringclasses 13
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2019-3494 | cve@mitre.org | 2019-01-01T15:29:00.240 | 2024-11-21T04:42:08.157 | Modified | [] | [
{
"lang": "en",
"value": "Simply-Blog through 2019-01-01 has SQL Injection via the admin/deleteCategories.php delete parameter."
},
{
"lang": "es",
"value": "Simply-Blog tiene una inyección SQL hasta el 1/1/2019 mediante el parámetro delete en admin/deleteCategories.php."
}
] | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:simply-blog_project:simply-blog:*:*:*:*:*:*:*:*",
"matchCriteriaId": "257FE15E-5891-4363-A84A-ED68191BAEBD",
"versionEndExcluding": null,
"versionEndIncluding": "2019-01-01",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Paroxyste/Simply-Blog/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thir... | null | null | null | null | null | null |
CVE-2018-20650 | cve@mitre.org | 2019-01-01T16:29:00.233 | 2024-11-21T04:01:56.097 | Modified | [] | [
{
"lang": "en",
"value": "A reachable Object::dictLookup assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to the lack of a check for the dict data type, as demonstrated by use of the FileSpec class (in FileSpec.cc) in pdfdetach."
},
{
"lang": "es",
"value": "Una aser... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F021BE1-4D2A-4D00-9491-714CD38A7B2E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106459"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2022"
},
{
... | null | null | null | null | null | null |
CVE-2018-20651 | cve@mitre.org | 2019-01-01T16:29:00.343 | 2024-11-21T04:01:56.270 | Modified | [] | [
{
"lang": "en",
"value": "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remot... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A2A091-F7E8-438C-8DE8-788A1DD5D11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html"
},
{
"source": "cve@mit... | null | null | null | null | null | null |
CVE-2018-20652 | cve@mitre.org | 2019-01-01T16:29:00.403 | 2024-11-21T04:01:56.420 | Modified | [] | [
{
"lang": "en",
"value": "An attempted excessive memory allocation was discovered in the function tinyexr::AllocateImage in tinyexr.h in tinyexr v0.9.5. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted input, which leads to an out-of-memory exception."
},
{
... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tinyexr_project:tinyexr:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6839BA33-4B4D-413F-8E81-0C4F9784EBBB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/syoyo/tinyexr/issues/104"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.co... | null | null | null | null | null | null |
CVE-2019-3500 | cve@mitre.org | 2019-01-02T07:29:00.197 | 2024-11-21T04:42:08.880 | Modified | [] | [
{
"lang": "en",
"value": "aria2c in aria2 1.33.1, when --log is used, can store an HTTP Basic Authentication username and password in a file, which might allow local users to obtain sensitive information by reading this file."
},
{
"lang": "es",
"value": "aria2c en la versión 1.33.1 de aria2, cu... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-532"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:aria2_project:aria2:1.33.1:*:*:*:*:*:*:*",
"matchCriteriaId": "96C8BA0F-F5C0-4768-A381-B61A776211B2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/aria2/aria2/issues/1329"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | null | null | null | null | null | null |
CVE-2019-3501 | cve@mitre.org | 2019-01-02T13:29:00.283 | 2024-11-21T04:42:09.037 | Modified | [] | [
{
"lang": "en",
"value": "The OUGC Awards plugin before 1.8.19 for MyBB allows XSS via a crafted award reason that is mishandled on the awards page or in a user profile."
},
{
"lang": "es",
"value": "El plugin OUGC Awards en versiones anteriores a la 1.8.19 para MyBB permite Cross-Site Scripting... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ougc_awards_project:ougc_awards:*:*:*:*:*:mybb:*:*",
"matchCriteriaId": "5B7E7E8E-4508-44F9-861D-A5D9FEE232E7",
"versionEndExcluding": "1.8.19",
"versionEndIncluding": null,
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Sama34/OUGC-Awards/issues/29"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Sama34/OUG... | null | null | null | null | null | null |
CVE-2018-15760 | security_alert@emc.com | 2019-01-02T14:15:09.007 | 2023-11-07T02:53:19.973 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2018-15799 | security_alert@emc.com | 2019-01-02T14:15:09.020 | 2023-11-07T02:53:23.870 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2018-15802 | security_alert@emc.com | 2019-01-02T14:15:09.053 | 2023-11-07T02:53:24.100 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2018-15803 | security_alert@emc.com | 2019-01-02T14:15:09.067 | 2023-11-07T02:53:24.320 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2018-17188 | security@apache.org | 2019-01-02T14:29:00.267 | 2024-11-21T03:54:03.020 | Modified | [] | [
{
"lang": "en",
"value": "Prior to CouchDB version 2.3.0, CouchDB allowed for runtime-configuration of key components of the database. In some cases, this lead to vulnerabilities where CouchDB admin users could access the underlying operating system as the CouchDB user. Together with other vulnerabilities, ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB74D165-EAB4-486E-9E0B-9DE1333B4EC9",
"versionEndExcluding": "2.3.0",
"versionEndIncluding": null,
"versionStartExcludin... | [
{
"source": "security@apache.org",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://blog.couchdb.org/2018/12/17/cve-2018-17188/"
},
{
"source": "security@apache.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.... | null | null | null | null | null | null |
CVE-2018-20657 | cve@mitre.org | 2019-01-02T14:29:00.313 | 2024-11-21T04:01:56.693 | Modified | [] | [
{
"lang": "en",
"value": "The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, has a memory leak via a crafted string, leading to a denial of service (memory consumption), as demonstrated by cxxfilt, a related issue to CVE-2018-12698."
},
{
"lang": "... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-772"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A2A091-F7E8-438C-8DE8-788A1DD5D11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106444"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHSA-2019:3352"
},
{
"source": "cve@mitre.org",
... | null | null | null | null | null | null |
CVE-2018-5197 | vuln@krcert.or.kr | 2019-01-02T14:29:00.360 | 2024-11-21T04:08:18.907 | Modified | [] | [
{
"lang": "en",
"value": "A vulnerability in the ExtCommon.dll user extension module version 9.2, 9.2.1, 9.2.2 of Xplatform ActiveX could allow attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command parameters. An crafted malicious parameters cou... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tobesoft:xplatform:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "32A3070D-31CF-4085-AD51-929E1DAE70DA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
{
"source": "vuln@krcert.or.kr",
"tags": [
"Vendor Advisory"
],
"url": "http://support.tobesoft.co.kr/Support/index.html"
},
{
"source": "vuln@krcert.or.kr",
"tags": [
"Third Party Advisory"
],
"url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_se... | null | null | null | null | null | null |
CVE-2018-20658 | cve@mitre.org | 2019-01-02T15:29:00.250 | 2024-11-21T04:01:56.843 | Modified | [] | [
{
"lang": "en",
"value": "The server in Core FTP 2.0 build 653 on 32-bit platforms allows remote attackers to cause a denial of service (daemon crash) via a crafted XRMD command."
},
{
"lang": "es",
"value": "El servidor en Core FTP 2.0 build 653 en plataformas de 32 bits permite a los atacantes... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:coreftp:core_ftp:2.0:*:*:*:*:*:x86:*",
"matchCriteriaId": "1B0FE693-04EE-4751-BCBA-333E4AA2318E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://coreftp.com/forums/viewtopic.php?f=15&t=4022509"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/... | null | null | null | null | null | null |
CVE-2019-3572 | cve@mitre.org | 2019-01-02T15:29:00.330 | 2024-11-21T04:42:11.410 | Modified | [] | [
{
"lang": "en",
"value": "An issue was discovered in libming 0.4.8. There is a heap-based buffer over-read in the function writePNG in the file util/dbl2png.c of the dbl2png command-line program. Because this is associated with an erroneous call to png_write_row in libpng, an out-of-bounds write might occur... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/169"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | null | null | null | null | null | null |
CVE-2019-3573 | cve@mitre.org | 2019-01-02T15:29:00.360 | 2024-11-21T04:42:11.550 | Modified | [] | [
{
"lang": "en",
"value": "In libsixel v1.8.2, there is an infinite loop in the function sixel_decode_raw_impl() in the file fromsixel.c, as demonstrated by sixel2png."
},
{
"lang": "es",
"value": "En la versión v1.8.2 de libsixel, hay un bucle infinito en la función sixel_decode_raw_impl() en el... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"description": [
{
"lang": "en",
"value": "CWE-835"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TeamSeri0us/pocs/tree/master/libsixel"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/... | null | null | null | null | null | null |
CVE-2019-3574 | cve@mitre.org | 2019-01-02T15:29:00.423 | 2024-11-21T04:42:11.697 | Modified | [] | [
{
"lang": "en",
"value": "In libsixel v1.8.2, there is a heap-based buffer over-read in the function load_jpeg() in the file loader.c, as demonstrated by img2sixel."
},
{
"lang": "es",
"value": "En la versión v1.8.2 de libsixel, hay una sobrelectura de búfer basada en memoria dinámica (heap) en ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TeamSeri0us/pocs/tree/master/libsixel"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/... | null | null | null | null | null | null |
CVE-2018-7900 | psirt@huawei.com | 2019-01-02T16:29:00.217 | 2024-11-21T04:12:56.553 | Modified | [] | [
{
"lang": "en",
"value": "There is an information leak vulnerability in some Huawei HG products. An attacker may obtain information about the HG device by exploiting this vulnerability."
},
{
"lang": "es",
"value": "Hay una vulnerabilidad de fuga de información en algunos productos Huawei HG. Un... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hg8010h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A136EB1-9A7C-42C9-A20C-B6B75B237D4E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20181219-01-hg-en"
},
{
"source": "psirt@huawei.com",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.newskysecurity.com/informati... | null | null | null | null | null | null |
CVE-2018-20659 | cve@mitre.org | 2019-01-02T17:29:00.220 | 2024-11-21T04:01:56.993 | Modified | [] | [
{
"lang": "en",
"value": "An issue was discovered in Bento4 1.5.1-627. The AP4_StcoAtom class in Core/Ap4StcoAtom.cpp has an attempted excessive memory allocation when called from AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp, as demonstrated by mp42hls."
},
{
"lang": "es",
"v... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*",
"matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/350"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:... | null | null | null | null | null | null |
CVE-2019-3576 | cve@mitre.org | 2019-01-02T17:29:00.267 | 2024-11-21T04:42:11.970 | Modified | [] | [
{
"lang": "en",
"value": "inxedu through 2018-12-24 has a SQL Injection vulnerability that can lead to information disclosure via the deleteFaveorite/ PATH_INFO. The vulnerable code location is com.inxedu.os.edu.controller.user.UserController#deleteFavorite (aka deleteFavorite in com/inxedu/os/edu/controlle... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:inxedu_project:inxedu:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A51341-29F4-473B-996D-38F203D60696",
"versionEndExcluding": null,
"versionEndIncluding": "2018-12-24",
"versionS... | [
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "https://gitee.com/inxeduopen/inxedu/issues/IQIIV"
},
{
"source": "nvd@nist.gov",
"tags": [
"Third Party Advisory"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabi... | null | null | null | null | null | null |
CVE-2019-3577 | cve@mitre.org | 2019-01-02T17:29:00.300 | 2024-11-21T04:42:12.143 | Modified | [] | [
{
"lang": "en",
"value": "An issue was discovered in Waimai Super Cms 20150505. web/Lib/Action/ProductAction.class.php allows blind SQL Injection via the id[0] parameter to the /product URI."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en Waimai Super Cms 20150505. web/Lib/Action/... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bijiadao:waimai_super_cms:20150505:*:*:*:*:*:*:*",
"matchCriteriaId": "8945479A-0C5E-4FC7-9D88-BC42E8EA0C3C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/caokang/waimai/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/caokang/waimai/issues/9"
}
] | null | null | null | null | null | null |
CVE-2018-13045 | cve@mitre.org | 2019-01-02T18:29:00.247 | 2024-11-21T03:46:18.293 | Modified | [] | [
{
"lang": "en",
"value": "SQL injection vulnerability in the \"Bazar\" page in Yeswiki Cercopitheque 2018-06-19-1 and earlier allows attackers to execute arbitrary SQL commands via the \"id\" parameter."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyección SQL en la página \"Bazar\" en Y... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yeswiki:cercopitheque:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3D2095-1E9F-48BF-BEA1-218F4F2F49E8",
"versionEndExcluding": null,
"versionEndIncluding": "2018-06-19-1",
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/150848/Yeswiki-Cercopitheque-SQL-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entr... | null | null | null | null | null | null |
CVE-2018-14718 | cve@mitre.org | 2019-01-02T18:29:00.310 | 2024-11-21T03:49:39.707 | Modified | [] | [
{
"lang": "en",
"value": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization."
},
{
"lang": "es",
"value": "Las versiones 2.x de FasterXML jackson-databind anterior... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106601"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:0959"
},
{
... | null | null | null | null | null | null |
CVE-2018-14719 | cve@mitre.org | 2019-01-02T18:29:00.387 | 2024-11-21T03:49:40.010 | Modified | [] | [
{
"lang": "en",
"value": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization."
},
{
"lang": "es",
"value": "Las versiones 2.x de FasterXML ja... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:0959"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
},
{
"source"... | null | null | null | null | null | null |
CVE-2018-14720 | cve@mitre.org | 2019-01-02T18:29:00.467 | 2024-11-21T03:49:40.270 | Modified | [] | [
{
"lang": "en",
"value": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization."
},
{
"lang": "es",
"value": "Las versiones 2.x de FasterXML jackson-d... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
},
{
"lang": "en",
"value": "CWE-611"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1BA8F04-46A7-4804-A997-59080034013F",
"versionEndExcluding": "2.6.7.2",
"versionEndIncluding": null,
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:0959"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
},
{
"source"... | null | null | null | null | null | null |
CVE-2018-14721 | cve@mitre.org | 2019-01-02T18:29:00.543 | 2024-11-21T03:49:40.523 | Modified | [] | [
{
"lang": "en",
"value": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization."
},
{
"lang": "es",
"value": "Las versiones 2.x de Faste... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-918"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1BA8F04-46A7-4804-A997-59080034013F",
"versionEndExcluding": "2.6.7.2",
"versionEndIncluding": null,
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:0959"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
},
{
"source"... | null | null | null | null | null | null |
CVE-2018-15490 | cve@mitre.org | 2019-01-02T18:29:00.653 | 2024-11-21T03:50:55.377 | Modified | [] | [
{
"lang": "en",
"value": "An issue was discovered in ExpressVPN on Windows. The Xvpnd.exe process (which runs as a service with SYSTEM privileges) listens on TCP port 2015, which is used as an RPC interface for communication with the client side of the ExpressVPN application. A JSON-RPC protocol over HTTP i... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.6,
"confidentialityImpact": "COMPLETE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:expressvpn:expressvpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98F7AD93-3730-4D97-983B-1CD3F1580A40",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://medium.com/%40Wflki/https-medium-com-wflki-cve-2018-15490-expressvpn-local-privilege-escalation-d22c86fecc47"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://medium.com/%40Wflki/https-medium-c... | null | null | null | null | null | null |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 3