id
stringlengths
13
16
sourceIdentifier
stringclasses
367 values
published
stringlengths
23
23
lastModified
stringlengths
23
23
vulnStatus
stringclasses
6 values
cveTags
listlengths
0
1
descriptions
listlengths
1
2
metrics
dict
weaknesses
listlengths
1
3
configurations
listlengths
1
2.88k
references
listlengths
0
281
cisaExploitAdd
stringclasses
263 values
cisaActionDue
stringclasses
282 values
cisaRequiredAction
stringclasses
31 values
cisaVulnerabilityName
stringclasses
724 values
vendorComments
listlengths
1
1
evaluatorComment
stringclasses
13 values
CVE-2019-3494
cve@mitre.org
2019-01-01T15:29:00.240
2024-11-21T04:42:08.157
Modified
[]
[ { "lang": "en", "value": "Simply-Blog through 2019-01-01 has SQL Injection via the admin/deleteCategories.php delete parameter." }, { "lang": "es", "value": "Simply-Blog tiene una inyección SQL hasta el 1/1/2019 mediante el parámetro delete en admin/deleteCategories.php." } ]
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:simply-blog_project:simply-blog:*:*:*:*:*:*:*:*", "matchCriteriaId": "257FE15E-5891-4363-A84A-ED68191BAEBD", "versionEndExcluding": null, "versionEndIncluding": "2019-01-01", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paroxyste/Simply-Blog/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
null
null
null
null
null
null
CVE-2018-20650
cve@mitre.org
2019-01-01T16:29:00.233
2024-11-21T04:01:56.097
Modified
[]
[ { "lang": "en", "value": "A reachable Object::dictLookup assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to the lack of a check for the dict data type, as demonstrated by use of the FileSpec class (in FileSpec.cc) in pdfdetach." }, { "lang": "es", "value": "Una aser...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F021BE1-4D2A-4D00-9491-714CD38A7B2E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106459" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2022" }, { ...
null
null
null
null
null
null
CVE-2018-20651
cve@mitre.org
2019-01-01T16:29:00.343
2024-11-21T04:01:56.270
Modified
[]
[ { "lang": "en", "value": "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remot...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*", "matchCriteriaId": "A8A2A091-F7E8-438C-8DE8-788A1DD5D11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" }, { "source": "cve@mit...
null
null
null
null
null
null
CVE-2018-20652
cve@mitre.org
2019-01-01T16:29:00.403
2024-11-21T04:01:56.420
Modified
[]
[ { "lang": "en", "value": "An attempted excessive memory allocation was discovered in the function tinyexr::AllocateImage in tinyexr.h in tinyexr v0.9.5. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted input, which leads to an out-of-memory exception." }, { ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinyexr_project:tinyexr:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "6839BA33-4B4D-413F-8E81-0C4F9784EBBB", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/issues/104" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
null
null
null
null
null
null
CVE-2019-3500
cve@mitre.org
2019-01-02T07:29:00.197
2024-11-21T04:42:08.880
Modified
[]
[ { "lang": "en", "value": "aria2c in aria2 1.33.1, when --log is used, can store an HTTP Basic Authentication username and password in a file, which might allow local users to obtain sensitive information by reading this file." }, { "lang": "es", "value": "aria2c en la versión 1.33.1 de aria2, cu...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:aria2_project:aria2:1.33.1:*:*:*:*:*:*:*", "matchCriteriaId": "96C8BA0F-F5C0-4768-A381-B61A776211B2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/aria2/aria2/issues/1329" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
null
null
null
null
null
null
CVE-2019-3501
cve@mitre.org
2019-01-02T13:29:00.283
2024-11-21T04:42:09.037
Modified
[]
[ { "lang": "en", "value": "The OUGC Awards plugin before 1.8.19 for MyBB allows XSS via a crafted award reason that is mishandled on the awards page or in a user profile." }, { "lang": "es", "value": "El plugin OUGC Awards en versiones anteriores a la 1.8.19 para MyBB permite Cross-Site Scripting...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ougc_awards_project:ougc_awards:*:*:*:*:*:mybb:*:*", "matchCriteriaId": "5B7E7E8E-4508-44F9-861D-A5D9FEE232E7", "versionEndExcluding": "1.8.19", "versionEndIncluding": null, ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Sama34/OUGC-Awards/issues/29" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Sama34/OUG...
null
null
null
null
null
null
CVE-2018-15760
security_alert@emc.com
2019-01-02T14:15:09.007
2023-11-07T02:53:19.973
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2018-15799
security_alert@emc.com
2019-01-02T14:15:09.020
2023-11-07T02:53:23.870
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2018-15802
security_alert@emc.com
2019-01-02T14:15:09.053
2023-11-07T02:53:24.100
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2018-15803
security_alert@emc.com
2019-01-02T14:15:09.067
2023-11-07T02:53:24.320
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2018-17188
security@apache.org
2019-01-02T14:29:00.267
2024-11-21T03:54:03.020
Modified
[]
[ { "lang": "en", "value": "Prior to CouchDB version 2.3.0, CouchDB allowed for runtime-configuration of key components of the database. In some cases, this lead to vulnerabilities where CouchDB admin users could access the underlying operating system as the CouchDB user. Together with other vulnerabilities, ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB74D165-EAB4-486E-9E0B-9DE1333B4EC9", "versionEndExcluding": "2.3.0", "versionEndIncluding": null, "versionStartExcludin...
[ { "source": "security@apache.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://blog.couchdb.org/2018/12/17/cve-2018-17188/" }, { "source": "security@apache.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists....
null
null
null
null
null
null
CVE-2018-20657
cve@mitre.org
2019-01-02T14:29:00.313
2024-11-21T04:01:56.693
Modified
[]
[ { "lang": "en", "value": "The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, has a memory leak via a crafted string, leading to a denial of service (memory consumption), as demonstrated by cxxfilt, a related issue to CVE-2018-12698." }, { "lang": "...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*", "matchCriteriaId": "A8A2A091-F7E8-438C-8DE8-788A1DD5D11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106444" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2019:3352" }, { "source": "cve@mitre.org", ...
null
null
null
null
null
null
CVE-2018-5197
vuln@krcert.or.kr
2019-01-02T14:29:00.360
2024-11-21T04:08:18.907
Modified
[]
[ { "lang": "en", "value": "A vulnerability in the ExtCommon.dll user extension module version 9.2, 9.2.1, 9.2.2 of Xplatform ActiveX could allow attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command parameters. An crafted malicious parameters cou...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tobesoft:xplatform:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "32A3070D-31CF-4085-AD51-929E1DAE70DA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ { "source": "vuln@krcert.or.kr", "tags": [ "Vendor Advisory" ], "url": "http://support.tobesoft.co.kr/Support/index.html" }, { "source": "vuln@krcert.or.kr", "tags": [ "Third Party Advisory" ], "url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_se...
null
null
null
null
null
null
CVE-2018-20658
cve@mitre.org
2019-01-02T15:29:00.250
2024-11-21T04:01:56.843
Modified
[]
[ { "lang": "en", "value": "The server in Core FTP 2.0 build 653 on 32-bit platforms allows remote attackers to cause a denial of service (daemon crash) via a crafted XRMD command." }, { "lang": "es", "value": "El servidor en Core FTP 2.0 build 653 en plataformas de 32 bits permite a los atacantes...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:coreftp:core_ftp:2.0:*:*:*:*:*:x86:*", "matchCriteriaId": "1B0FE693-04EE-4751-BCBA-333E4AA2318E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://coreftp.com/forums/viewtopic.php?f=15&t=4022509" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/...
null
null
null
null
null
null
CVE-2019-3572
cve@mitre.org
2019-01-02T15:29:00.330
2024-11-21T04:42:11.410
Modified
[]
[ { "lang": "en", "value": "An issue was discovered in libming 0.4.8. There is a heap-based buffer over-read in the function writePNG in the file util/dbl2png.c of the dbl2png command-line program. Because this is associated with an erroneous call to png_write_row in libpng, an out-of-bounds write might occur...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "description": [ { "lang": "en", "value": "CWE-125" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
null
null
null
null
null
null
CVE-2019-3573
cve@mitre.org
2019-01-02T15:29:00.360
2024-11-21T04:42:11.550
Modified
[]
[ { "lang": "en", "value": "In libsixel v1.8.2, there is an infinite loop in the function sixel_decode_raw_impl() in the file fromsixel.c, as demonstrated by sixel2png." }, { "lang": "es", "value": "En la versión v1.8.2 de libsixel, hay un bucle infinito en la función sixel_decode_raw_impl() en el...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TeamSeri0us/pocs/tree/master/libsixel" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/...
null
null
null
null
null
null
CVE-2019-3574
cve@mitre.org
2019-01-02T15:29:00.423
2024-11-21T04:42:11.697
Modified
[]
[ { "lang": "en", "value": "In libsixel v1.8.2, there is a heap-based buffer over-read in the function load_jpeg() in the file loader.c, as demonstrated by img2sixel." }, { "lang": "es", "value": "En la versión v1.8.2 de libsixel, hay una sobrelectura de búfer basada en memoria dinámica (heap) en ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TeamSeri0us/pocs/tree/master/libsixel" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/...
null
null
null
null
null
null
CVE-2018-7900
psirt@huawei.com
2019-01-02T16:29:00.217
2024-11-21T04:12:56.553
Modified
[]
[ { "lang": "en", "value": "There is an information leak vulnerability in some Huawei HG products. An attacker may obtain information about the HG device by exploiting this vulnerability." }, { "lang": "es", "value": "Hay una vulnerabilidad de fuga de información en algunos productos Huawei HG. Un...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hg8010h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A136EB1-9A7C-42C9-A20C-B6B75B237D4E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20181219-01-hg-en" }, { "source": "psirt@huawei.com", "tags": [ "Third Party Advisory" ], "url": "https://blog.newskysecurity.com/informati...
null
null
null
null
null
null
CVE-2018-20659
cve@mitre.org
2019-01-02T17:29:00.220
2024-11-21T04:01:56.993
Modified
[]
[ { "lang": "en", "value": "An issue was discovered in Bento4 1.5.1-627. The AP4_StcoAtom class in Core/Ap4StcoAtom.cpp has an attempted excessive memory allocation when called from AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp, as demonstrated by mp42hls." }, { "lang": "es", "v...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*", "matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/350" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
null
null
null
null
null
null
CVE-2019-3576
cve@mitre.org
2019-01-02T17:29:00.267
2024-11-21T04:42:11.970
Modified
[]
[ { "lang": "en", "value": "inxedu through 2018-12-24 has a SQL Injection vulnerability that can lead to information disclosure via the deleteFaveorite/ PATH_INFO. The vulnerable code location is com.inxedu.os.edu.controller.user.UserController#deleteFavorite (aka deleteFavorite in com/inxedu/os/edu/controlle...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:inxedu_project:inxedu:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A51341-29F4-473B-996D-38F203D60696", "versionEndExcluding": null, "versionEndIncluding": "2018-12-24", "versionS...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable", "Third Party Advisory" ], "url": "https://gitee.com/inxeduopen/inxedu/issues/IQIIV" }, { "source": "nvd@nist.gov", "tags": [ "Third Party Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabi...
null
null
null
null
null
null
CVE-2019-3577
cve@mitre.org
2019-01-02T17:29:00.300
2024-11-21T04:42:12.143
Modified
[]
[ { "lang": "en", "value": "An issue was discovered in Waimai Super Cms 20150505. web/Lib/Action/ProductAction.class.php allows blind SQL Injection via the id[0] parameter to the /product URI." }, { "lang": "es", "value": "Se ha descubierto un problema en Waimai Super Cms 20150505. web/Lib/Action/...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bijiadao:waimai_super_cms:20150505:*:*:*:*:*:*:*", "matchCriteriaId": "8945479A-0C5E-4FC7-9D88-BC42E8EA0C3C", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/caokang/waimai/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/caokang/waimai/issues/9" } ]
null
null
null
null
null
null
CVE-2018-13045
cve@mitre.org
2019-01-02T18:29:00.247
2024-11-21T03:46:18.293
Modified
[]
[ { "lang": "en", "value": "SQL injection vulnerability in the \"Bazar\" page in Yeswiki Cercopitheque 2018-06-19-1 and earlier allows attackers to execute arbitrary SQL commands via the \"id\" parameter." }, { "lang": "es", "value": "Una vulnerabilidad de inyección SQL en la página \"Bazar\" en Y...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yeswiki:cercopitheque:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D3D2095-1E9F-48BF-BEA1-218F4F2F49E8", "versionEndExcluding": null, "versionEndIncluding": "2018-06-19-1", "versio...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150848/Yeswiki-Cercopitheque-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entr...
null
null
null
null
null
null
CVE-2018-14718
cve@mitre.org
2019-01-02T18:29:00.310
2024-11-21T03:49:39.707
Modified
[]
[ { "lang": "en", "value": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization." }, { "lang": "es", "value": "Las versiones 2.x de FasterXML jackson-databind anterior...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106601" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { ...
null
null
null
null
null
null
CVE-2018-14719
cve@mitre.org
2019-01-02T18:29:00.387
2024-11-21T03:49:40.010
Modified
[]
[ { "lang": "en", "value": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization." }, { "lang": "es", "value": "Las versiones 2.x de FasterXML ja...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0782" }, { "source"...
null
null
null
null
null
null
CVE-2018-14720
cve@mitre.org
2019-01-02T18:29:00.467
2024-11-21T03:49:40.270
Modified
[]
[ { "lang": "en", "value": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization." }, { "lang": "es", "value": "Las versiones 2.x de FasterXML jackson-d...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-502" }, { "lang": "en", "value": "CWE-611" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1BA8F04-46A7-4804-A997-59080034013F", "versionEndExcluding": "2.6.7.2", "versionEndIncluding": null, "versio...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0782" }, { "source"...
null
null
null
null
null
null
CVE-2018-14721
cve@mitre.org
2019-01-02T18:29:00.543
2024-11-21T03:49:40.523
Modified
[]
[ { "lang": "en", "value": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization." }, { "lang": "es", "value": "Las versiones 2.x de Faste...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1BA8F04-46A7-4804-A997-59080034013F", "versionEndExcluding": "2.6.7.2", "versionEndIncluding": null, "versio...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0782" }, { "source"...
null
null
null
null
null
null
CVE-2018-15490
cve@mitre.org
2019-01-02T18:29:00.653
2024-11-21T03:50:55.377
Modified
[]
[ { "lang": "en", "value": "An issue was discovered in ExpressVPN on Windows. The Xvpnd.exe process (which runs as a service with SYSTEM privileges) listens on TCP port 2015, which is used as an RPC interface for communication with the client side of the ExpressVPN application. A JSON-RPC protocol over HTTP i...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.6, "confidentialityImpact": "COMPLETE", ...
[ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:expressvpn:expressvpn:-:*:*:*:*:*:*:*", "matchCriteriaId": "98F7AD93-3730-4D97-983B-1CD3F1580A40", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://medium.com/%40Wflki/https-medium-com-wflki-cve-2018-15490-expressvpn-local-privilege-escalation-d22c86fecc47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://medium.com/%40Wflki/https-medium-c...
null
null
null
null
null
null
CVE-2018-19360
cve@mitre.org
2019-01-02T18:29:00.717
2024-11-21T03:57:48.200
Modified
[]
[ { "lang": "en", "value": "FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization." }, { "lang": "es", "value": "Las versiones 2.x de FasterXML jackson-databind ante...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "5128ECDA-6F9A-42AC-9063-CDFC4C256537", "versionEndExcluding": null, "versionEndIncluding": "2.6.7.2", "versio...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107985" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { ...
null
null
null
null
null
null
CVE-2018-19361
cve@mitre.org
2019-01-02T18:29:00.827
2024-11-21T03:57:48.437
Modified
[]
[ { "lang": "en", "value": "FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization." }, { "lang": "es", "value": "Las versiones 2.x de FasterXML jackson-databind anteriores a la ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "5128ECDA-6F9A-42AC-9063-CDFC4C256537", "versionEndExcluding": null, "versionEndIncluding": "2.6.7.2", "versio...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107985" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { ...
null
null
null
null
null
null
CVE-2018-19362
cve@mitre.org
2019-01-02T18:29:00.933
2024-11-21T03:57:48.657
Modified
[]
[ { "lang": "en", "value": "FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization." }, { "lang": "es", "value": "Las versiones 2.x de FasterXML jackson-databind anteri...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "5128ECDA-6F9A-42AC-9063-CDFC4C256537", "versionEndExcluding": null, "versionEndIncluding": "2.6.7.2", "versio...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107985" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { ...
null
null
null
null
null
null
CVE-2018-19371
cve@mitre.org
2019-01-02T18:29:01.060
2024-11-21T03:57:49.520
Modified
[]
[ { "lang": "en", "value": "The SaveUserSettings service in Content Manager in SDL Web 8.5.0 has an XXE Vulnerability that allows reading sensitive files from the system." }, { "lang": "es", "value": "El servicio SaveUserSettings en Content Manager en la versión 8.5.0 de SDL Web tiene una vulnerab...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-611" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sdl:web_content_manager:8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D56D5D4-06FF-4769-BA06-D64444CCF39D", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150826/SDL-Web-Content-Manager-8.5.0-XML-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party A...
null
null
null
null
null
null
CVE-2018-19478
cve@mitre.org
2019-01-02T18:29:01.123
2024-11-21T03:57:59.870
Modified
[]
[ { "lang": "en", "value": "In Artifex Ghostscript before 9.26, a carefully crafted PDF file can trigger an extremely long running computation when parsing the file." }, { "lang": "es", "value": "En las versiones anteriores de la 9.26 de Artifex Ghostscript, un archivo PDF especialmente manipulado...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "A224A817-11B3-45FF-B210-3DF1C83AE63D", "versionEndExcluding": "9.26", "versionEndIncluding": null, "versionStartExcl...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=0a7e5a1c309fa0911b892fa40996a7d55d90bace" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com...
null
null
null
null
null
null
CVE-2018-20100
cve@mitre.org
2019-01-02T18:29:01.230
2024-11-21T04:00:52.620
Modified
[]
[ { "lang": "en", "value": "An issue was discovered on August Connect devices. Insecure data transfer between the August app and August Connect during configuration allows attackers to discover home Wi-Fi credentials. This data transfer uses an unencrypted access point for these credentials, and passes them i...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-311" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:august:august_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A596E54-0B34-4D90-8554-575B7091758A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://dojo.bullguard.com/dojo-by-bullguard/blog/august-connect/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://dojo.bullguard.com/do...
null
null
null
null
null
null
CVE-2018-20114
cve@mitre.org
2019-01-02T18:29:01.277
2024-11-21T04:00:53.623
Modified
[]
[ { "lang": "en", "value": "On D-Link DIR-818LW Rev.A 2.05.B03 and DIR-860L Rev.B 2.03.B03 devices, unauthenticated remote OS command execution can occur in the soap.cgi service of the cgibin binary via an \"&&\" substring in the service parameter. NOTE: this issue exists because of an incomplete fix for CVE...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE"...
[ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-818lw_firmware:2.05.b03:*:*:*:*:*:*:*", "matchCriteriaId": "4349ECC4-5F0F-496C-92E9-39932A40FE8A", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-20114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-20114" ...
null
null
null
null
null
null
CVE-2018-20166
cve@mitre.org
2019-01-02T18:29:01.310
2024-11-21T04:00:59.557
Modified
[]
[ { "lang": "en", "value": "A file-upload vulnerability exists in Rukovoditel 2.3.1. index.php?module=configuration/save allows the user to upload a background image, and mishandles extension checking. It accepts uploads of PHP content if the first few characters match GIF data, and the filename ends in \".ph...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "548ADBFF-AC51-443A-916C-8CBE47A247A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://pentest.com.tr/exploits/Rukovoditel-Project-Management-CRM-2-3-1-Authenticated-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party...
null
null
null
null
null
null
CVE-2018-20211
cve@mitre.org
2019-01-02T18:29:01.373
2024-11-21T04:01:05.517
Modified
[]
[ { "lang": "en", "value": "ExifTool 8.32 allows local users to gain privileges by creating a %TEMP%\\par-%username%\\cache-exiftool-8.32 folder with a victim's username, and then copying a Trojan horse ws32_32.dll file into this new folder, aka DLL Hijacking. NOTE: 8.32 is an obsolete version from 2010 (9.x...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiftool_project:exiftool:8.32:*:*:*:*:*:*:*", "matchCriteriaId": "65CA6F69-B3BB-461D-9261-51EBE63ACC08", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150892/Exiftool-8.3.2.0-DLL-Hijacking.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Thir...
null
null
null
null
null
null
CVE-2018-20326
cve@mitre.org
2019-01-02T18:29:01.433
2024-11-21T04:01:14.227
Modified
[]
[ { "lang": "en", "value": "ChinaMobile PLC Wireless Router GPN2.4P21-C-CN devices with firmware W2001EN-00 have XSS via the cgi-bin/webproc?getpage=html/index.html var:subpage parameter." }, { "lang": "es", "value": "Los dispositivos ChinaMobile PLC Wireless Router GPN2.4P21-C-CN con un firmware ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:chinamobile:gpn2.4p21-c-cn_firmware:w2001en-00:*:*:*:*:*:*:*", "matchCriteriaId": "9AA6F6DD-1AAD-4122-BB8C-720D27E3CD7D", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150918/PLC-Wireless-Router-GPN2.4P21-C-CN-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "T...
null
null
null
null
null
null
CVE-2017-14808
security@opentext.com
2019-01-02T19:15:08.583
2023-11-07T02:39:13.920
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2017-14809
security@opentext.com
2019-01-02T19:15:08.600
2023-11-07T02:39:14.160
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2017-14810
security@opentext.com
2019-01-02T19:15:08.617
2023-11-07T02:39:14.420
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2017-14811
security@opentext.com
2019-01-02T19:15:08.630
2023-11-07T02:39:14.667
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2017-14812
security@opentext.com
2019-01-02T19:15:08.647
2023-11-07T02:39:14.903
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2017-14813
security@opentext.com
2019-01-02T19:15:08.647
2023-11-07T02:39:15.153
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2017-14814
security@opentext.com
2019-01-02T19:15:08.663
2023-11-07T02:39:15.390
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2017-14815
security@opentext.com
2019-01-02T19:15:08.677
2023-11-07T02:39:15.637
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2017-14816
security@opentext.com
2019-01-02T19:15:08.693
2023-11-07T02:39:15.870
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2017-14817
security@opentext.com
2019-01-02T19:15:08.707
2023-11-07T02:39:16.103
Rejected
[]
[ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none" } ]
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null, "cvssMetricV40": null }
null
null
[]
null
null
null
null
null
null
CVE-2018-18264
cve@mitre.org
2019-01-03T01:29:00.270
2024-11-21T03:55:37.590
Modified
[]
[ { "lang": "en", "value": "Kubernetes Dashboard before 1.10.1 allows attackers to bypass authentication and use Dashboard's Service Account for reading secrets within the cluster." }, { "lang": "es", "value": "Las versiones de Kubernetes Dashboard anteriores a la 1.10.1 permitían a los atacantes ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:dashboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "29E409E4-81D2-42F9-AF24-499A399D060A", "versionEndExcluding": "1.10.1", "versionEndIncluding": null, "versionStartE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106493" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/dashboard/pull...
null
null
null
null
null
null
CVE-2018-18893
cve@mitre.org
2019-01-03T01:29:00.380
2024-11-21T03:56:50.273
Modified
[]
[ { "lang": "en", "value": "Jinjava before 2.4.6 does not block the getClass method, related to com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java." }, { "lang": "es", "value": "En las versiones anteriores a la 2.4.6, Jinjava no bloquea el método getClass relacionado con com/hubspot/jinjava/el/...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hubspot:jinjava:*:*:*:*:*:*:*:*", "matchCriteriaId": "73BF4536-14D1-4C8E-AEAF-41E2886D0DCF", "versionEndExcluding": "2.4.6", "versionEndIncluding": null, "versionStartExcludi...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/HubSpot/jinjava/blob/master/CHANGES.md" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Hub...
null
null
null
null
null
null
CVE-2018-20131
cve@mitre.org
2019-01-03T01:29:00.443
2024-11-21T04:00:55.130
Modified
[]
[ { "lang": "en", "value": "The Code42 app before 6.8.4, as used in Code42 for Enterprise, on Linux installs with overly permissive permissions on the /usr/local/crashplan/log directory. This allows a user to manipulate symbolic links to escalate privileges, or show the contents of sensitive files that a regu...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code42:code42:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "7584B102-7D10-4B64-939B-6D0C4C405585", "versionEndExcluding": "6.8.4", "versionEndIncluding": null, "versionStart...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106452" }, { "source": "cve@mitre.org", "tags": null, "url": "https://code42.com/r/support/CVE-2018-20131" }, { "source": "af854a3a-2127-422b-91a...
null
null
null
null
null
null
CVE-2019-3580
cve@mitre.org
2019-01-03T01:29:00.490
2024-11-21T04:42:12.580
Modified
[]
[ { "lang": "en", "value": "OpenRefine through 3.1 allows arbitrary file write because Directory Traversal can occur during the import of a crafted project file." }, { "lang": "es", "value": "OpenRefine hasta la versión 3.1 permite la escritura de archivos arbitrarios debido a que pueden ocurrir s...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*", "matchCriteriaId": "A371C8E5-A486-40DE-8750-DAFA4D592354", "versionEndExcluding": null, "versionEndIncluding": "3.1", "versionStartExc...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OpenRefine/OpenRefine/issues/1927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
null
null
null
null
null
null
CVE-2018-17172
cve@mitre.org
2019-01-03T03:29:00.213
2024-11-21T03:54:00.250
Modified
[]
[ { "lang": "en", "value": "The web application on Xerox AltaLink B80xx before 100.008.028.05200, C8030/C8035 before 100.001.028.05200, C8045/C8055 before 100.002.028.05200, and C8070 before 100.003.028.05200 allows unauthenticated command injection." }, { "lang": "es", "value": "La aplicación web...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:xerox:altalink_c8030_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E65972A0-1138-496C-851B-1624F22D390D", "versionEndExcluding": "100.001.028.05200", "versionEndIncluding": null, ...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2018/12/cert_Security_Mini_Bulletin_XRX18AL_for_ALB80xx-C80xx_v1.1.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advi...
null
null
null
null
null
null
CVE-2018-20662
cve@mitre.org
2019-01-03T13:29:00.237
2024-11-21T04:01:57.143
Modified
[]
[ { "lang": "en", "value": "In Poppler 0.72.0, PDFDoc::setup in PDFDoc.cc allows attackers to cause a denial-of-service (application crash caused by Object.h SIGABRT, because of a wrong return value from PDFDoc::setup) by crafting a PDF file in which an xref data structure is mishandled during extractPDFSubty...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F021BE1-4D2A-4D00-9491-714CD38A7B2E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2022" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2713" }, { "source"...
null
null
null
null
null
null
CVE-2018-16879
secalert@redhat.com
2019-01-03T14:29:00.197
2024-11-21T03:53:30.993
Modified
[]
[ { "lang": "en", "value": "Ansible Tower before version 3.3.3 does not set a secure channel as it is using the default insecure configuration channel settings for messaging celery workers from RabbitMQ. This could lead in data leak of sensitive information such as passwords as well as denial of service attac...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-311" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-311" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCB1BD7D-CCB1-4536-9111-91D6DEF88848", "versionEndExcluding": "3.3.3", "versionEndIncluding": null, "versionStartEx...
[ { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106310" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https:/...
null
null
null
null
null
null
CVE-2017-11004
product-security@qualcomm.com
2019-01-03T15:29:00.270
2024-11-21T03:06:56.057
Modified
[]
[ { "lang": "en", "value": "A non-secure user may be able to access certain registers in snapdragon automobile, snapdragon mobile and snapdragon wear in versions IPQ8074, MDM9206, MDM9607, MDM9635M, MDM9650, MDM9655, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2914BF98-E69C-4C8D-8B10-759642ADD7B4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106128" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company...
null
null
null
null
null
null
CVE-2017-18141
product-security@qualcomm.com
2019-01-03T15:29:00.333
2024-11-21T03:19:26.580
Modified
[]
[ { "lang": "en", "value": "When a 3rd party TEE has been loaded it is possible for the non-secure world to create a secure monitor call which will give it access to privileged functions meant to only be accessible from the TEE in Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear in versions IPQ807...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE",...
[ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2914BF98-E69C-4C8D-8B10-759642ADD7B4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106128" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company...
null
null
null
null
null
null
CVE-2017-18319
product-security@qualcomm.com
2019-01-03T15:29:00.413
2024-11-21T03:19:50.847
Modified
[]
[ { "lang": "en", "value": "Information leak in UIM API debug messages in snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 6...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-320" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106128" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company...
null
null
null
null
null
null
CVE-2017-18320
product-security@qualcomm.com
2019-01-03T15:29:00.583
2024-11-21T03:19:51.000
Modified
[]
[ { "lang": "en", "value": "QSEE unload attempt on a 3rd party TEE without previously loading results in a data abort in snapdragon automobile and snapdragon mobile in versions MSM8996AU, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, S...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE",...
[ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106128" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company...
null
null
null
null
null
null
CVE-2017-18321
product-security@qualcomm.com
2019-01-03T15:29:00.833
2024-11-21T03:19:51.157
Modified
[]
[ { "lang": "en", "value": "Security keys used by the terminal and NW for a session could be leaked in snapdragon mobile in versions MDM9650, MDM9655, SD 835, SDA660." }, { "lang": "es", "value": "Las claves de seguridad utilizadas por el terminal y NW para una sesión podrían filtrarse en snapdrag...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106128" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company...
null
null
null
null
null
null
CVE-2017-18322
product-security@qualcomm.com
2019-01-03T15:29:00.867
2024-11-21T03:19:51.280
Modified
[]
[ { "lang": "en", "value": "Cryptographic key material leaked in WCDMA debug messages in snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106128" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company...
null
null
null
null
null
null
CVE-2017-18323
product-security@qualcomm.com
2019-01-03T15:29:00.897
2024-11-21T03:19:51.420
Modified
[]
[ { "lang": "en", "value": "Cryptographic key material leaked in TDSCDMA RRC debug messages in snapdragon automobile, snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430,...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-320" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106128" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company...
null
null
null
null
null
null
CVE-2017-18324
product-security@qualcomm.com
2019-01-03T15:29:00.927
2024-11-21T03:19:51.670
Modified
[]
[ { "lang": "en", "value": "Cryptographic key material leaked in debug messages - GERAN in snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106128" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company...
null
null
null
null
null
null
CVE-2017-18326
product-security@qualcomm.com
2019-01-03T15:29:00.960
2024-11-21T03:19:51.857
Modified
[]
[ { "lang": "en", "value": "Cryptographic keys are printed in modem debug messages in snapdragon mobile and snapdragon wear in versions MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106128" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company...
null
null
null
null
null
null
CVE-2017-18327
product-security@qualcomm.com
2019-01-03T15:29:00.990
2024-11-21T03:19:52.010
Modified
[]
[ { "lang": "en", "value": "Security keys are logged when any WCDMA call is configured or reconfigured in snapdragon automobile, snapdragon mobile and snapdragon wear in versions MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, S...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106128" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company...
null
null
null
null
null
null
CVE-2017-18328
product-security@qualcomm.com
2019-01-03T15:29:01.020
2024-11-21T03:19:52.170
Modified
[]
[ { "lang": "en", "value": "Use after free in QSH client rule processing in snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 820, SD 835, SDA660, SDM630, ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE",...
[ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106128" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company...
null
null
null
null
null
null
CVE-2017-18329
product-security@qualcomm.com
2019-01-03T15:29:01.067
2024-11-21T03:19:52.310
Modified
[]
[ { "lang": "en", "value": "Possible Buffer overflow when transmitting an RTP packet in snapdragon automobile and snapdragon wear in versions MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE",...
[ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71E28EA6-0683-4755-8ABB-7F37DA810E4F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106128" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company...
null
null
null
null
null
null
CVE-2017-18330
product-security@qualcomm.com
2019-01-03T15:29:01.117
2024-11-21T03:19:52.467
Modified
[]
[ { "lang": "en", "value": "Buffer overflow in AES-CCM and AES-GCM encryption via initialization vector in snapdragon automobile, snapdragon mobile and snapdragon wear in versions IPQ8074, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 4...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE",...
[ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2914BF98-E69C-4C8D-8B10-759642ADD7B4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106128" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company...
null
null
null
null
null
null
CVE-2018-16876
secalert@redhat.com
2019-01-03T15:29:01.163
2024-11-21T03:53:30.457
Modified
[]
[ { "lang": "en", "value": "ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data." }, { "lang": "es", "value": "ansible en versiones anteriores a las 2.5.14, 2.6.11 y 2.7.5 es vulnerable a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL"...
[ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC90599B-B3DE-4F3C-809E-2AC639AB1C9D", "versionEndExcluding": "2.5.14", "versionEndIncluding": null, "versionStartExcludi...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opens...
null
null
null
null
null
null
CVE-2018-16870
secalert@redhat.com
2019-01-03T16:29:00.227
2024-11-21T03:53:29.530
Modified
[]
[ { "lang": "en", "value": "It was found that wolfssl before 3.15.7 is vulnerable to a new variant of the Bleichenbacher attack to perform downgrade attacks against TLS. This may lead to leakage of sensible data." }, { "lang": "es", "value": "Se ha detectado que wolfssl, en versiones anteriores a ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6F4CF5D-69C9-4F89-A85F-99C7564DC9B8", "versionEndExcluding": "3.15.7", "versionEndIncluding": null, "versionStartExclud...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://cat.eyalro.net/" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/wolfSSL/wolfssl/pull/1950" }, { "source":...
null
null
null
null
null
null
CVE-2018-16882
secalert@redhat.com
2019-01-03T16:29:00.303
2024-11-21T03:53:31.467
Modified
[]
[ { "lang": "en", "value": "A use-after-free issue was found in the way the Linux kernel's KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the 'pi_desc_page' without res...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE",...
[ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "52E774F9-E7BA-4145-954A-46F52D403BDF", "versionEndExcluding": "4.14.91", "versionEndIncluding": null, "versionStartEx...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106254" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://...
null
null
null
null
null
null
CVE-2018-16885
secalert@redhat.com
2019-01-03T16:29:00.477
2024-11-21T03:53:31.970
Modified
[]
[ { "lang": "en", "value": "A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length which causes the read beyond the buffer boundaries, in certain cases causing a memory access fault and a system halt by accessing ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "secalert@redhat.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Secondary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E830885-46C1-4A5F-AF6B-320ADFC7B788", "versionEndExcluding": null, "versionEndIncluding": "3.10.90", "versionStartEx...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106296" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2019:2029" }, { "source": "secale...
null
null
null
null
null
null
CVE-2019-3701
cve@mitre.org
2019-01-03T16:29:00.553
2024-11-21T04:42:21.783
Modified
[]
[ { "lang": "en", "value": "An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user \"root\" with CAP_NET_ADMIN can create a CAN frame mod...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE279FFB-2E93-4DB8-B46B-C16E88F9941D", "versionEndExcluding": null, "versionEndIncluding": "4.19.13", "versionStartEx...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106443" }, { "s...
null
null
null
null
null
null
CVE-2018-17161
secteam@freebsd.org
2019-01-03T17:29:00.190
2024-11-21T03:53:59.480
Modified
[]
[ { "lang": "en", "value": "In FreeBSD before 11.2-STABLE(r348229), 11.2-RELEASE-p7, 12.0-STABLE(r342228), and 12.0-RELEASE-p1, insufficient validation of network-provided data in bootpd may make it possible for a malicious attacker to craft a bootp packet which could cause a stack buffer overflow. It is poss...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:11.2:-:*:*:*:*:*:*", "matchCriteriaId": "3ACD1D8D-B3BC-4E99-B846-90A4071DB87B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ { "source": "secteam@freebsd.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106292" }, { "source": "secteam@freebsd.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.freebsd.org/adv...
null
null
null
null
null
null
CVE-2018-14481
cve@mitre.org
2019-01-03T19:29:00.430
2024-11-21T03:49:10.263
Modified
[]
[ { "lang": "en", "value": "Osclass 3.7.4 has XSS via the query string to index.php, a different vulnerability than CVE-2014-6280." }, { "lang": "es", "value": "La versión 3.7.4 de Osclass tiene Cross-Site Scripting (XSS) mediante la cadena de consulta en index.php. Esta vulnerabilidad es diferent...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:osclass:osclass:3.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D9F59049-31FD-47B3-AE55-79672A9DAB59", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150643/OSclass-3.7.4-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ...
null
null
null
null
null
null
CVE-2018-19414
cve@mitre.org
2019-01-03T19:29:00.523
2024-11-21T03:57:52.690
Modified
[]
[ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Plikli CMS 4.0.0 allow remote attackers to inject arbitrary web script or HTML via the (1) keyword parameter to groups.php; (2) username parameter to login.php; or (3) date parameter to search.php." }, { "lang": "es", ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:plikli:plikli_cms:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "692E724F-713A-4244-86D0-11EB6769537F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150657/Plikli-4.0.0-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "T...
null
null
null
null
null
null
CVE-2018-19415
cve@mitre.org
2019-01-03T19:29:00.600
2024-11-21T03:57:52.840
Modified
[]
[ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in Plikli CMS 4.0.0 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to join_group.php or (2) comment_id parameter to story.php." }, { "lang": "es", "value": "Múltiples vulnerabilidades de inyección...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:plikli:plikli_cms:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "692E724F-713A-4244-86D0-11EB6769537F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Dec/8" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.netsparker.com/web-ap...
null
null
null
null
null
null
CVE-2018-19505
cve@mitre.org
2019-01-03T19:29:00.663
2024-11-21T03:58:02.883
Modified
[]
[ { "lang": "en", "value": "Remedy AR System Server in BMC Remedy 7.1 may fail to set the correct user context in certain impersonation scenarios, which can allow a user to act with the identity of a different user, because userdata.js in the WOI:WorkOrderConsole component allows a username substitution invol...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bmc:remedy_action_request_system_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B76F9D9-AB96-4753-856A-4AB22DFFE261", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150492/BMC-Remedy-7.1-User-Impersonation.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "u...
null
null
null
null
null
null
CVE-2018-19523
cve@mitre.org
2019-01-03T19:29:00.757
2024-11-21T03:58:05.687
Modified
[]
[ { "lang": "en", "value": "DriverAgent 2.2015.7.14, which includes DrvAgent64.sys 1.0.0.1, allows a user to send an IOCTL (0x80002068) with a user defined buffer size. If the size of the buffer is less than 512 bytes, then the driver will overwrite the next pool header if there is one next to the user buffer...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:driveagent:driveagent:2.2015.7.14:*:*:*:*:*:*:*", "matchCriteriaId": "3CB63593-2233-456F-B388-73E74CE649CF", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86ahttps://downwithup.github.io/CVEPosts.html" }, { "source": "nvd@nist.gov", "tags": [ "Third Party Advisory" ], "ur...
null
null
null
null
null
null
CVE-2018-19861
cve@mitre.org
2019-01-03T19:29:00.803
2024-11-21T03:58:42.430
Modified
[]
[ { "lang": "en", "value": "Buffer overflow in MiniShare 1.4.1 and earlier allows remote attackers to execute arbitrary code via a long HTTP HEAD request. NOTE: this product is discontinued." }, { "lang": "es", "value": "MiniShare en la versión 1.4.1 y sus anteriores versiones permite a los ataca...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:minishare_project:minishare:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D3534A6-1C2F-4134-996B-74E417DBF5B4", "versionEndExcluding": null, "versionEndIncluding": "1.4.1", "version...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", ...
null
null
null
null
null
null
CVE-2018-19862
cve@mitre.org
2019-01-03T19:29:00.897
2024-11-21T03:58:42.577
Modified
[]
[ { "lang": "en", "value": "Buffer overflow in MiniShare 1.4.1 and earlier allows remote attackers to execute arbitrary code via a long HTTP POST request. NOTE: this product is discontinued." }, { "lang": "es", "value": "MiniShare, en la versión 1.4.1 y anteriores, tiene un desbordamiento de búfe...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:minishare_project:minishare:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D3534A6-1C2F-4134-996B-74E417DBF5B4", "versionEndExcluding": null, "versionEndIncluding": "1.4.1", "version...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", ...
null
null
null
null
null
null
CVE-2018-19992
cve@mitre.org
2019-01-03T19:29:00.977
2024-11-21T03:58:57.537
Modified
[]
[ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in Dolibarr 8.0.2 allows remote authenticated users to inject arbitrary web script or HTML via the \"address\" (POST) or \"town\" (POST) parameter to adherents/type.php." }, { "lang": "es", "value": "Una vulnerabilidad d...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "30608213-F99C-4D9E-B848-794532E85267", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Dolibarr/dolibarr/commit/0f06e39d23636bd1e4039ac61a743c79725c798b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory"...
null
null
null
null
null
null
CVE-2018-19993
cve@mitre.org
2019-01-03T19:29:01.007
2024-11-21T03:58:57.687
Modified
[]
[ { "lang": "en", "value": "A reflected cross-site scripting (XSS) vulnerability in Dolibarr 8.0.2 allows remote attackers to inject arbitrary web script or HTML via the transphrase parameter to public/notice.php." }, { "lang": "es", "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) refle...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "30608213-F99C-4D9E-B848-794532E85267", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Dolibarr/dolibarr/commit/fc3fcc5455d9a610b85723e89e8be43a41ad1378" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory"...
null
null
null
null
null
null
CVE-2018-19994
cve@mitre.org
2019-01-03T19:29:01.053
2024-11-21T03:58:57.827
Modified
[]
[ { "lang": "en", "value": "An error-based SQL injection vulnerability in product/card.php in Dolibarr version 8.0.2 allows remote authenticated users to execute arbitrary SQL commands via the desiredstock parameter." }, { "lang": "es", "value": "Una vulnerabilidad de inyección SQL basada en error...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "30608213-F99C-4D9E-B848-794532E85267", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Dolibarr/dolibarr/commit/850b939ffd2c7a4443649331b923d5e0da2d6446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory"...
null
null
null
null
null
null
CVE-2018-19995
cve@mitre.org
2019-01-03T19:29:01.087
2024-11-21T03:58:57.960
Modified
[]
[ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in Dolibarr 8.0.2 allows remote authenticated users to inject arbitrary web script or HTML via the \"address\" (POST) or \"town\" (POST) parameter to user/card.php." }, { "lang": "es", "value": "Una vulnerabilidad de Cro...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "30608213-F99C-4D9E-B848-794532E85267", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Dolibarr/dolibarr/commit/4b8be6ed64763327018ac1c076f81ddffa87855e" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "htt...
null
null
null
null
null
null
CVE-2018-19998
cve@mitre.org
2019-01-03T19:29:01.350
2024-11-21T03:58:58.097
Modified
[]
[ { "lang": "en", "value": "SQL injection vulnerability in user/card.php in Dolibarr version 8.0.2 allows remote authenticated users to execute arbitrary SQL commands via the employee parameter." }, { "lang": "es", "value": "Una vulnerabilidad de inyección SQL basada en errores en la versión 8.0.2...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "30608213-F99C-4D9E-B848-794532E85267", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Dolibarr/dolibarr/commit/2b088a73c121a52e006c0d76ea4da7ffeb7b4f4a" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "htt...
null
null
null
null
null
null
CVE-2018-20512
cve@mitre.org
2019-01-03T19:29:01.600
2024-11-21T04:01:38.670
Modified
[]
[ { "lang": "en", "value": "EPON CPE-WiFi devices 2.0.4-X000 are vulnerable to escalation of privileges by sending cooLogin=1, cooUser=admin, and timestamp=-1 cookies." }, { "lang": "es", "value": "Los dispositivos EPON CPE-WiFi 2.0.4-X000 son vulnerables a un escalado de privilegios enviando cook...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE"...
[ { "description": [ { "lang": "en", "value": "CWE-565" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cdatatec:epon_cpe-wifi_devices_firmware:2.0.4-x000:*:*:*:*:*:*:*", "matchCriteriaId": "9B09F37C-DD48-4521-80AC-5CC6C4E0592A", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.reddit.com/r/networking/comments/abu4kq/vulnerability_in_cdata_technologies_epon_cpewifi/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "...
null
null
null
null
null
null
CVE-2018-20663
cve@mitre.org
2019-01-03T19:29:01.633
2024-11-21T04:01:57.350
Modified
[]
[ { "lang": "en", "value": "The Reporting Addon (aka Reports Addon) through 2019-01-02 for CUBA Platform through 6.10.x has Persistent XSS via the \"Reports > Reports\" name field." }, { "lang": "es", "value": "Reporting Addon (también conocido como Reports Addon) hasta el 02/01/2019 para CUBA Pla...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haulmont:cuba_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F6B5878-0971-4E5A-A121-439A3E3F0DEA", "versionEndExcluding": null, "versionEndIncluding": "6.10.7", "versionStar...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cuba-platform/reports/issues/140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
null
null
null
null
null
null
CVE-2018-20664
cve@mitre.org
2019-01-03T19:29:01.680
2024-11-21T04:01:57.493
Modified
[]
[ { "lang": "en", "value": "Zoho ManageEngine ADSelfService Plus 5.x before build 5701 has XXE via an uploaded product license." }, { "lang": "es", "value": "Zoho ManageEngine ADSelfService Plus, en sus versiones 5.x antes del build 5701, tiene XEE (XML External Entity) mediante una licencia de pr...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-611" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:4500:*:*:*:*:*:*", "matchCriteriaId": "796A4512-DC6E-42A1-9A57-D4F446A9BC34", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.excellium-services.com/cert-xlm-advisory/cve-2018-20664/" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/pr...
null
null
null
null
null
null
CVE-2019-3575
cve@mitre.org
2019-01-03T19:29:01.727
2024-11-21T04:42:11.833
Modified
[]
[ { "lang": "en", "value": "Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load." }, { "lang": "es", "value": "La versión 0.9.1 de Sqla_yaml_fixtures permite a los usuarios locales ejecutar código arbitrario de pytho...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sqla_yaml_fixtures_project:sqla_yaml_fixtures:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "7ED3C927-3CA7-415E-9574-6D108DC91EA7", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/schettino72/sqla_yaml_fixtures/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
null
null
null
null
null
null
CVE-2019-3905
cve@mitre.org
2019-01-03T19:29:01.757
2024-11-21T04:42:50.110
Modified
[]
[ { "lang": "en", "value": "Zoho ManageEngine ADSelfService Plus 5.x before build 5703 has SSRF." }, { "lang": "es", "value": "Zoho ManageEngine ADSelfService Plus, en sus versiones 5.x antes del build 5703, tiene Server-Side Request Forgery (SSRF)." } ]
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5000:*:*:*:*:*:*", "matchCriteriaId": "9B826420-BD33-4C0F-A0C8-E614AFA0AE5F", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.excellium-services.com/cert-xlm-advisory/cve-2019-3905/" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.manageengine.com/pro...
null
null
null
null
null
null
CVE-2018-18004
cve@mitre.org
2019-01-03T20:29:00.267
2024-11-21T03:55:21.190
Modified
[]
[ { "lang": "en", "value": "Incorrect Access Control in mod_inetd.cgi in VIVOTEK Network Camera Series products with firmware before XXXXXX-VVTK-0X09a allows remote attackers to enable arbitrary system services via a URL parameter." }, { "lang": "es", "value": "Control de acceso incorrecto en mod_...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*", "matchCriteriaId": "C70F3D07-A12A-48F8-B5B9-FD25F19701F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://download.vivotek.com/downloadfile/support/cyber-security/vvtk-sa-2018-006-v1.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.secur...
null
null
null
null
null
null
CVE-2018-18005
cve@mitre.org
2019-01-03T20:29:00.327
2024-11-21T03:55:21.337
Modified
[]
[ { "lang": "en", "value": "Cross-site scripting in event_script.js in VIVOTEK Network Camera Series products with firmware 0x06x to 0x08x allows remote attackers to execute arbitrary JavaScript via a URL query string parameter." }, { "lang": "es", "value": "Cross-Site Scripting (XSS) en event_scr...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*", "matchCriteriaId": "C70F3D07-A12A-48F8-B5B9-FD25F19701F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://download.vivotek.com/downloadfile/support/cyber-security/vvtk-sa-2018-006-v1.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.secur...
null
null
null
null
null
null
CVE-2018-18244
cve@mitre.org
2019-01-03T20:29:00.373
2024-11-21T03:55:34.567
Modified
[]
[ { "lang": "en", "value": "Cross-site scripting in syslog.html in VIVOTEK Network Camera Series products with firmware 0x06x to 0x08x allows remote attackers to execute arbitrary JavaScript code via an HTTP Referer Header." }, { "lang": "es", "value": "Cross-Site Scripting (XSS) en syslog.html en...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*", "matchCriteriaId": "C70F3D07-A12A-48F8-B5B9-FD25F19701F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://download.vivotek.com/downloadfile/support/cyber-security/vvtk-sa-2018-006-v1.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.secur...
null
null
null
null
null
null
CVE-2018-19600
cve@mitre.org
2019-01-03T20:29:00.437
2024-11-21T03:58:16.093
Modified
[]
[ { "lang": "en", "value": "Rhymix CMS 1.9.8.1 allows XSS via an index.php?module=admin&act=dispModuleAdminFileBox SVG upload." }, { "lang": "es", "value": "La versión 1.9.8.1 de Rhymix permite Cross-Site Scripting (XSS) mediante una subida SVG en index.php?module=adminact=dispModuleAdminFileBox."...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rhymix:rhymix:1.9.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2833B50-FE4E-40C7-AB0B-3572D5C8A103", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rhymix/rhymix/issues/1088" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "...
null
null
null
null
null
null
CVE-2018-19601
cve@mitre.org
2019-01-03T20:29:00.500
2024-11-21T03:58:16.237
Modified
[]
[ { "lang": "en", "value": "Rhymix CMS 1.9.8.1 allows SSRF via an index.php?module=admin&act=dispModuleAdminFileBox SVG upload." }, { "lang": "es", "value": "La versión 1.9.8.1 de Rhymix permite Server-Side Request Forgery (SSRF) mediante una subida SVG en index.php?module=adminact=dispModuleAdmin...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rhymix:rhymix:1.9.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2833B50-FE4E-40C7-AB0B-3572D5C8A103", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rhymix/rhymix/issues/1089" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "...
null
null
null
null
null
null
CVE-2018-15780
security_alert@emc.com
2019-01-03T21:29:00.200
2024-11-21T03:51:27.217
Modified
[]
[ { "lang": "en", "value": "RSA Archer versions prior to 6.5.0.1 contain an improper access control vulnerability. A remote malicious user could potentially exploit this vulnerability to bypass authorization checks and gain read access to restricted user information." }, { "lang": "es", "value": "...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsa:archer_grc_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C51A5DA-5A0C-4051-A4B7-C0C5B5A3B61A", "versionEndExcluding": "6.5.0.1", "versionEndIncluding": null, "versionSt...
[ { "source": "security_alert@emc.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106396" }, { "source": "security_alert@emc.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.or...
null
null
null
null
null
null
CVE-2018-18995
ics-cert@hq.dhs.gov
2019-01-03T22:29:00.247
2024-11-21T03:57:00.443
Modified
[]
[ { "lang": "en", "value": "Pluto Safety PLC Gateway Ethernet devices ABB GATE-E1 and GATE-E2 all versions do not allow authentication to be configured on administrative telnet or web interfaces, which could enable various effects vectors, including conducting device resets, reading or modifying registers, an...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:gate-e1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D27F9314-660C-46AC-91A6-14DD2AFB3518", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106247" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "ur...
null
null
null
null
null
null
CVE-2018-18997
ics-cert@hq.dhs.gov
2019-01-03T22:29:00.293
2024-11-21T03:57:00.680
Modified
[]
[ { "lang": "en", "value": "Pluto Safety PLC Gateway Ethernet devices in ABB GATE-E1 and GATE-E2 all versions allows an unauthenticated attacker using the administrative web interface to insert an HTML/Javascript payload into any of the device properties, which may allow an attacker to display/execute the pay...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:gate-e1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D27F9314-660C-46AC-91A6-14DD2AFB3518", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106247" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "ur...
null
null
null
null
null
null
CVE-2018-19249
cve@mitre.org
2019-01-03T22:29:00.323
2024-11-21T03:57:38.607
Modified
[]
[ { "lang": "en", "value": "The Stripe API v1 allows remote attackers to bypass intended access restrictions by replaying api.stripe.com /v1/tokens XMLHttpRequest data, parsing the response under the object card{}, and reading the cvc_check information if the creation is successful without charging the actual...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stripe:stripe_api:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1EE77B7B-8714-46E9-86E5-10A0E102A213", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://fredmooredamian.blogspot.com/2019/01/improper-authentication-on-stripe-api-v1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http...
null
null
null
null
null
null
CVE-2018-3986
talos-cna@cisco.com
2019-01-03T22:29:00.370
2024-11-21T04:06:26.403
Modified
[]
[ { "lang": "en", "value": "An exploitable information disclosure vulnerability exists in the \"Secret Chats\" functionality of the Telegram Android messaging application version 4.9.0. The \"Secret Chats\" functionality allows a user to delete all traces of a chat, either by using a time trigger or by direct...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:telegram:telegram:4.9.0:*:*:*:*:android:*:*", "matchCriteriaId": "D8F8E255-2E37-43E2-B42E-133D6EB33985", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ { "source": "talos-cna@cisco.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106295" }, { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://w...
null
null
null
null
null
null