Dataset Viewer
Auto-converted to Parquet Duplicate
id
stringlengths
13
16
sourceIdentifier
stringclasses
367 values
published
stringlengths
23
23
lastModified
stringlengths
23
23
vulnStatus
stringclasses
6 values
cveTags
listlengths
0
1
descriptions
listlengths
1
2
metrics
dict
weaknesses
listlengths
1
3
configurations
listlengths
1
2.88k
references
listlengths
0
281
cisaExploitAdd
stringclasses
263 values
cisaActionDue
stringclasses
282 values
cisaRequiredAction
stringclasses
31 values
cisaVulnerabilityName
stringclasses
724 values
vendorComments
listlengths
1
1
evaluatorComment
stringclasses
13 values
CVE-2019-3494
cve@mitre.org
2019-01-01T15:29:00.240
2024-11-21T04:42:08.157
Modified
[]
[ { "lang": "en", "value": "Simply-Blog through 2019-01-01 has SQL Injection via the admin/deleteCategories.php delete parameter." }, { "lang": "es", "value": "Simply-Blog tiene una inyección SQL hasta el 1/1/2019 mediante el parámetro delete en admin/deleteCategories.php." } ]
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:simply-blog_project:simply-blog:*:*:*:*:*:*:*:*", "matchCriteriaId": "257FE15E-5891-4363-A84A-ED68191BAEBD", "versionEndExcluding": null, "versionEndIncluding": "2019-01-01", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paroxyste/Simply-Blog/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
null
null
null
null
null
null
CVE-2018-20650
cve@mitre.org
2019-01-01T16:29:00.233
2024-11-21T04:01:56.097
Modified
[]
[ { "lang": "en", "value": "A reachable Object::dictLookup assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to the lack of a check for the dict data type, as demonstrated by use of the FileSpec class (in FileSpec.cc) in pdfdetach." }, { "lang": "es", "value": "Una aser...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F021BE1-4D2A-4D00-9491-714CD38A7B2E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106459" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2022" }, { ...
null
null
null
null
null
null
CVE-2018-20651
cve@mitre.org
2019-01-01T16:29:00.343
2024-11-21T04:01:56.270
Modified
[]
[ { "lang": "en", "value": "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remot...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*", "matchCriteriaId": "A8A2A091-F7E8-438C-8DE8-788A1DD5D11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" }, { "source": "cve@mit...
null
null
null
null
null
null
CVE-2018-20652
cve@mitre.org
2019-01-01T16:29:00.403
2024-11-21T04:01:56.420
Modified
[]
[ { "lang": "en", "value": "An attempted excessive memory allocation was discovered in the function tinyexr::AllocateImage in tinyexr.h in tinyexr v0.9.5. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted input, which leads to an out-of-memory exception." }, { ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinyexr_project:tinyexr:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "6839BA33-4B4D-413F-8E81-0C4F9784EBBB", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/issues/104" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
null
null
null
null
null
null
CVE-2019-3500
cve@mitre.org
2019-01-02T07:29:00.197
2024-11-21T04:42:08.880
Modified
[]
[ { "lang": "en", "value": "aria2c in aria2 1.33.1, when --log is used, can store an HTTP Basic Authentication username and password in a file, which might allow local users to obtain sensitive information by reading this file." }, { "lang": "es", "value": "aria2c en la versión 1.33.1 de aria2, cu...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:aria2_project:aria2:1.33.1:*:*:*:*:*:*:*", "matchCriteriaId": "96C8BA0F-F5C0-4768-A381-B61A776211B2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/aria2/aria2/issues/1329" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
null
null
null
null
null
null
CVE-2019-3501
cve@mitre.org
2019-01-02T13:29:00.283
2024-11-21T04:42:09.037
Modified
[]
[ { "lang": "en", "value": "The OUGC Awards plugin before 1.8.19 for MyBB allows XSS via a crafted award reason that is mishandled on the awards page or in a user profile." }, { "lang": "es", "value": "El plugin OUGC Awards en versiones anteriores a la 1.8.19 para MyBB permite Cross-Site Scripting...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ougc_awards_project:ougc_awards:*:*:*:*:*:mybb:*:*", "matchCriteriaId": "5B7E7E8E-4508-44F9-861D-A5D9FEE232E7", "versionEndExcluding": "1.8.19", "versionEndIncluding": null, ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Sama34/OUGC-Awards/issues/29" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Sama34/OUG...
null
null
null
null
null
null
CVE-2018-15760
security_alert@emc.com
2019-01-02T14:15:09.007
2023-11-07T02:53:19.973
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2018-15799
security_alert@emc.com
2019-01-02T14:15:09.020
2023-11-07T02:53:23.870
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2018-15802
security_alert@emc.com
2019-01-02T14:15:09.053
2023-11-07T02:53:24.100
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2018-15803
security_alert@emc.com
2019-01-02T14:15:09.067
2023-11-07T02:53:24.320
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2018-17188
security@apache.org
2019-01-02T14:29:00.267
2024-11-21T03:54:03.020
Modified
[]
[ { "lang": "en", "value": "Prior to CouchDB version 2.3.0, CouchDB allowed for runtime-configuration of key components of the database. In some cases, this lead to vulnerabilities where CouchDB admin users could access the underlying operating system as the CouchDB user. Together with other vulnerabilities, ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB74D165-EAB4-486E-9E0B-9DE1333B4EC9", "versionEndExcluding": "2.3.0", "versionEndIncluding": null, "versionStartExcludin...
[ { "source": "security@apache.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://blog.couchdb.org/2018/12/17/cve-2018-17188/" }, { "source": "security@apache.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists....
null
null
null
null
null
null
CVE-2018-20657
cve@mitre.org
2019-01-02T14:29:00.313
2024-11-21T04:01:56.693
Modified
[]
[ { "lang": "en", "value": "The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, has a memory leak via a crafted string, leading to a denial of service (memory consumption), as demonstrated by cxxfilt, a related issue to CVE-2018-12698." }, { "lang": "...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*", "matchCriteriaId": "A8A2A091-F7E8-438C-8DE8-788A1DD5D11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106444" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2019:3352" }, { "source": "cve@mitre.org", ...
null
null
null
null
null
null
CVE-2018-5197
vuln@krcert.or.kr
2019-01-02T14:29:00.360
2024-11-21T04:08:18.907
Modified
[]
[ { "lang": "en", "value": "A vulnerability in the ExtCommon.dll user extension module version 9.2, 9.2.1, 9.2.2 of Xplatform ActiveX could allow attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command parameters. An crafted malicious parameters cou...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tobesoft:xplatform:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "32A3070D-31CF-4085-AD51-929E1DAE70DA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ { "source": "vuln@krcert.or.kr", "tags": [ "Vendor Advisory" ], "url": "http://support.tobesoft.co.kr/Support/index.html" }, { "source": "vuln@krcert.or.kr", "tags": [ "Third Party Advisory" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_se...
null
null
null
null
null
null
CVE-2018-20658
cve@mitre.org
2019-01-02T15:29:00.250
2024-11-21T04:01:56.843
Modified
[]
[ { "lang": "en", "value": "The server in Core FTP 2.0 build 653 on 32-bit platforms allows remote attackers to cause a denial of service (daemon crash) via a crafted XRMD command." }, { "lang": "es", "value": "El servidor en Core FTP 2.0 build 653 en plataformas de 32 bits permite a los atacantes...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:coreftp:core_ftp:2.0:*:*:*:*:*:x86:*", "matchCriteriaId": "1B0FE693-04EE-4751-BCBA-333E4AA2318E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://coreftp.com/forums/viewtopic.php?f=15&t=4022509" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/...
null
null
null
null
null
null
CVE-2019-3572
cve@mitre.org
2019-01-02T15:29:00.330
2024-11-21T04:42:11.410
Modified
[]
[ { "lang": "en", "value": "An issue was discovered in libming 0.4.8. There is a heap-based buffer over-read in the function writePNG in the file util/dbl2png.c of the dbl2png command-line program. Because this is associated with an erroneous call to png_write_row in libpng, an out-of-bounds write might occur...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
null
null
null
null
null
null
CVE-2019-3573
cve@mitre.org
2019-01-02T15:29:00.360
2024-11-21T04:42:11.550
Modified
[]
[ { "lang": "en", "value": "In libsixel v1.8.2, there is an infinite loop in the function sixel_decode_raw_impl() in the file fromsixel.c, as demonstrated by sixel2png." }, { "lang": "es", "value": "En la versión v1.8.2 de libsixel, hay un bucle infinito en la función sixel_decode_raw_impl() en el...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TeamSeri0us/pocs/tree/master/libsixel" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/...
null
null
null
null
null
null
CVE-2019-3574
cve@mitre.org
2019-01-02T15:29:00.423
2024-11-21T04:42:11.697
Modified
[]
[ { "lang": "en", "value": "In libsixel v1.8.2, there is a heap-based buffer over-read in the function load_jpeg() in the file loader.c, as demonstrated by img2sixel." }, { "lang": "es", "value": "En la versión v1.8.2 de libsixel, hay una sobrelectura de búfer basada en memoria dinámica (heap) en ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TeamSeri0us/pocs/tree/master/libsixel" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/...
null
null
null
null
null
null
CVE-2018-7900
psirt@huawei.com
2019-01-02T16:29:00.217
2024-11-21T04:12:56.553
Modified
[]
[ { "lang": "en", "value": "There is an information leak vulnerability in some Huawei HG products. An attacker may obtain information about the HG device by exploiting this vulnerability." }, { "lang": "es", "value": "Hay una vulnerabilidad de fuga de información en algunos productos Huawei HG. Un...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hg8010h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A136EB1-9A7C-42C9-A20C-B6B75B237D4E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20181219-01-hg-en" }, { "source": "psirt@huawei.com", "tags": [ "Third Party Advisory" ], "url": "https://blog.newskysecurity.com/informati...
null
null
null
null
null
null
CVE-2018-20659
cve@mitre.org
2019-01-02T17:29:00.220
2024-11-21T04:01:56.993
Modified
[]
[ { "lang": "en", "value": "An issue was discovered in Bento4 1.5.1-627. The AP4_StcoAtom class in Core/Ap4StcoAtom.cpp has an attempted excessive memory allocation when called from AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp, as demonstrated by mp42hls." }, { "lang": "es", "v...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*", "matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/350" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
null
null
null
null
null
null
CVE-2019-3576
cve@mitre.org
2019-01-02T17:29:00.267
2024-11-21T04:42:11.970
Modified
[]
[ { "lang": "en", "value": "inxedu through 2018-12-24 has a SQL Injection vulnerability that can lead to information disclosure via the deleteFaveorite/ PATH_INFO. The vulnerable code location is com.inxedu.os.edu.controller.user.UserController#deleteFavorite (aka deleteFavorite in com/inxedu/os/edu/controlle...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:inxedu_project:inxedu:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A51341-29F4-473B-996D-38F203D60696", "versionEndExcluding": null, "versionEndIncluding": "2018-12-24", "versionS...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable", "Third Party Advisory" ], "url": "https://gitee.com/inxeduopen/inxedu/issues/IQIIV" }, { "source": "nvd@nist.gov", "tags": [ "Third Party Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabi...
null
null
null
null
null
null
CVE-2019-3577
cve@mitre.org
2019-01-02T17:29:00.300
2024-11-21T04:42:12.143
Modified
[]
[ { "lang": "en", "value": "An issue was discovered in Waimai Super Cms 20150505. web/Lib/Action/ProductAction.class.php allows blind SQL Injection via the id[0] parameter to the /product URI." }, { "lang": "es", "value": "Se ha descubierto un problema en Waimai Super Cms 20150505. web/Lib/Action/...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bijiadao:waimai_super_cms:20150505:*:*:*:*:*:*:*", "matchCriteriaId": "8945479A-0C5E-4FC7-9D88-BC42E8EA0C3C", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/caokang/waimai/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/caokang/waimai/issues/9" } ]
null
null
null
null
null
null
CVE-2018-13045
cve@mitre.org
2019-01-02T18:29:00.247
2024-11-21T03:46:18.293
Modified
[]
[ { "lang": "en", "value": "SQL injection vulnerability in the \"Bazar\" page in Yeswiki Cercopitheque 2018-06-19-1 and earlier allows attackers to execute arbitrary SQL commands via the \"id\" parameter." }, { "lang": "es", "value": "Una vulnerabilidad de inyección SQL en la página \"Bazar\" en Y...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yeswiki:cercopitheque:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D3D2095-1E9F-48BF-BEA1-218F4F2F49E8", "versionEndExcluding": null, "versionEndIncluding": "2018-06-19-1", "versio...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150848/Yeswiki-Cercopitheque-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entr...
null
null
null
null
null
null
CVE-2018-14718
cve@mitre.org
2019-01-02T18:29:00.310
2024-11-21T03:49:39.707
Modified
[]
[ { "lang": "en", "value": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization." }, { "lang": "es", "value": "Las versiones 2.x de FasterXML jackson-databind anterior...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106601" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { ...
null
null
null
null
null
null
CVE-2018-14719
cve@mitre.org
2019-01-02T18:29:00.387
2024-11-21T03:49:40.010
Modified
[]
[ { "lang": "en", "value": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization." }, { "lang": "es", "value": "Las versiones 2.x de FasterXML ja...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0782" }, { "source"...
null
null
null
null
null
null
CVE-2018-14720
cve@mitre.org
2019-01-02T18:29:00.467
2024-11-21T03:49:40.270
Modified
[]
[ { "lang": "en", "value": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization." }, { "lang": "es", "value": "Las versiones 2.x de FasterXML jackson-d...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-502" }, { "lang": "en", "value": "CWE-611" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1BA8F04-46A7-4804-A997-59080034013F", "versionEndExcluding": "2.6.7.2", "versionEndIncluding": null, "versio...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0782" }, { "source"...
null
null
null
null
null
null
CVE-2018-14721
cve@mitre.org
2019-01-02T18:29:00.543
2024-11-21T03:49:40.523
Modified
[]
[ { "lang": "en", "value": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization." }, { "lang": "es", "value": "Las versiones 2.x de Faste...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1BA8F04-46A7-4804-A997-59080034013F", "versionEndExcluding": "2.6.7.2", "versionEndIncluding": null, "versio...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0782" }, { "source"...
null
null
null
null
null
null
CVE-2018-15490
cve@mitre.org
2019-01-02T18:29:00.653
2024-11-21T03:50:55.377
Modified
[]
[ { "lang": "en", "value": "An issue was discovered in ExpressVPN on Windows. The Xvpnd.exe process (which runs as a service with SYSTEM privileges) listens on TCP port 2015, which is used as an RPC interface for communication with the client side of the ExpressVPN application. A JSON-RPC protocol over HTTP i...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.6, "confidentialityImpact": "COMPLETE", ...
[ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:expressvpn:expressvpn:-:*:*:*:*:*:*:*", "matchCriteriaId": "98F7AD93-3730-4D97-983B-1CD3F1580A40", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://medium.com/%40Wflki/https-medium-com-wflki-cve-2018-15490-expressvpn-local-privilege-escalation-d22c86fecc47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://medium.com/%40Wflki/https-medium-c...
null
null
null
null
null
null
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
3