Search Results (72730 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2014-10066 1 Fancy-server Project 1 Fancy-server 2024-11-21 7.5 High
Versions less than 0.1.4 of the static file server module fancy-server are vulnerable to directory traversal. An attacker can provide input such as `../` to read files outside of the served directory.
CVE-2014-0242 2 Modwsgi, Redhat 2 Mod Wsgi, Enterprise Linux 2024-11-21 7.5 High
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
CVE-2014-0212 1 Apache 1 Qpid-cpp 2024-11-21 7.5 High
qpid-cpp: ACL policies only loaded if the acl-file option specified enabling DoS by consuming all available file descriptors
CVE-2014-0197 1 Redhat 3 Cloudforms, Cloudforms Management Engine, Cloudforms Managementengine 2024-11-21 8.8 High
CFME: CSRF protection vulnerability via permissive check of the referrer header
CVE-2014-0163 1 Redhat 1 Openshift 2024-11-21 8.8 High
Openshift has shell command injection flaws due to unsanitized data being passed into shell commands.
CVE-2014-0144 2 Qemu, Redhat 11 Qemu, Enterprise Linux, Enterprise Linux Desktop and 8 more 2024-11-21 8.6 High
QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
CVE-2014-0023 1 Redhat 1 Openshift 2024-11-21 7.8 High
OpenShift: Install script has temporary file creation vulnerability which can result in arbitrary code execution
CVE-2014-0021 3 Chrony Project, Debian, Fedoraproject 3 Chrony, Debian Linux, Fedora 2024-11-21 7.5 High
Chrony before 1.29.1 has traffic amplification in cmdmon protocol
CVE-2013-7488 3 Convert\, Fedoraproject, Redhat 3 \, Fedora, Enterprise Linux 2024-11-21 7.5 High
perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows remote attackers to cause an infinite loop via unexpected input.
CVE-2013-7484 1 Zabbix 1 Zabbix 2024-11-21 7.5 High
Zabbix before 5.0 represents passwords in the users table with unsalted MD5.
CVE-2013-7333 1 Projectfloodlight 1 Open Sdn Controller 2024-11-21 7.5 High
A vulnerability in version 0.90 of the Open Floodlight SDN controller software could allow an attacker with access to the OpenFlow control network to selectively disconnect individual switches from the SDN controller, causing degradation and eventually denial of network access to all devices connected to the targeted switch.
CVE-2013-7325 1 Debian 2 Debian Linux, Devscripts 2024-11-21 8.8 High
An issue exists in uscan in devscripts before 2.13.19, which could let a remote malicious user execute arbitrary code via a crafted tarball.
CVE-2013-7286 1 Att 2 Mobileiron Sentry, Mobileiron Virtual Smartphone Platform 2024-11-21 7.5 High
MobileIron VSP < 5.9.1 and Sentry < 5.0 has a weak password obfuscation algorithm
CVE-2013-7185 1 Daum 1 Potplayer 2024-11-21 7.8 High
PotPlayer 1.5.40688: .avi File Memory Corruption
CVE-2013-7172 1 Slackware 1 Slackware Linux 2024-11-21 7.8 High
Slackware 13.1, 13.37, 14.0 and 14.1 contain world-writable permissions on the iodbctest and iodbctestw programs within the libiodbc package, which could allow local users to use RPATH information to execute arbitrary code with root privileges.
CVE-2013-7089 3 Clamav, Debian, Fedoraproject 3 Clamav, Debian Linux, Fedora 2024-11-21 7.5 High
ClamAV before 0.97.7: dbg_printhex possible information leak
CVE-2013-7053 1 Dlink 2 Dir-100, Dir-100 Firmware 2024-11-21 8.8 High
D-Link DIR-100 4.03B07: cli.cgi CSRF
CVE-2013-7051 1 Dlink 2 Dir-100, Dir-100 Firmware 2024-11-21 8.8 High
D-Link DIR-100 4.03B07: cli.cgi security bypass due to failure to check authentication parameters
CVE-2013-6811 1 D-link 2 Dsl6740u, Dsl6740u Firmware 2024-11-21 8.8 High
Multiple cross-site request forgery (CSRF) vulnerabilities in the D-Link DSL-6740U gateway (Rev. H1) allow remote attackers to hijack the authentication of administrators for requests that change administrator credentials or enable remote management services to (1) Custom Services in Port Forwarding, (2) Port Triggering Entries, (3) URL Filters in Parental Control, (4) Print Server settings, (5) QoS Queue Setup, or (6) QoS Classification Entries.
CVE-2013-6773 2 Microsoft, Splunk 2 Windows, Splunk 2024-11-21 7.8 High
Splunk 5.0.3 has an Unquoted Service Path in Windows for Universal Forwarder which can allow an attacker to escalate privileges