Report Name: Linux Patch Wednesday May 2024
Generated: 2024-06-16 00:43:13

Vulristics Vulnerability Scores
Basic Vulnerability Scores
Products

Product NamePrevalenceUCHMLAComment
Kerberos12431257Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet
AMD Processor0.9224Processor
Active Directory0.911Active Directory is a directory service developed by Microsoft for Windows domain networks
Apache HTTP Server0.921314534Apache HTTP Server is a free and open-source web server that delivers web content through the internet
GNU Bash0.922Bash is the shell, or command language interpreter, for the GNU operating system
GitLab0.944GitLab is a DevOps software package that combines the ability to develop, secure, and operate software in a single application
HTTP/20.91146HTTP/2 is a major revision of the HTTP network protocol used by the World Wide Web
Intel(R) Processor0.922Intel's processors from the pioneering 4-bit 4004 (1971) to the present high-end offerings
Linux Kernel0.93435335131092The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
Microsoft SCOM0.911System Center Operations Manager
Sudo0.9126514Sudo is a program for Unix-like computer operating systems that allows users to run programs with the security privileges of another user
Windows Encrypting File System0.929516Encrypting File System (EFS) on Microsoft Windows is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption
Windows Kernel0.921432553Windows Kernel
Windows LDAP0.92633344Windows LDAP (Lightweight Directory Access Protocol) is an open and cross platform protocol used for directory services authentication
nghttp20.9224nghttp2 is an implementation of HTTP/2 and its header compression algorithm HPACK in C
APT0.818411262A free-software user interface that works with core libraries to handle the installation and removal of software on Debian
ASP.NET0.8314An open-source, server-side web-application framework designed for web development
Adobe Reader0.8112Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage Portable Document Format files
Binutils0.81162441The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
Chromium0.8473142Chromium is a free and open-source web browser project, mainly developed and maintained by Google
FreeIPA0.81427FreeIPA is a free and open source identity management system
GNOME desktop0.8852969GNOME originally an acronym for GNU Network Object Model Environment, is a free and open-source desktop environment for Linux and other Unix-like operating systems
GNU C Library0.84828444The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library
Google Chrome0.82103951102Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
ICMP0.8156The Internet Control Message Protocol (ICMP) is a network layer protocol used by network devices to diagnose network communication issues
Mozilla Firefox0.8441529106Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
Netty0.833Netty is a non-blocking I/O client-server framework for the development of Java network applications such as protocol servers and clients
Node.js0.83635751Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more
OpenSSH0.8131222644OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture
OpenSSL0.81314381773A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end
PHP0.8289932642477PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
RPC0.8837550Remote Procedure Call Runtime
Safari0.8265529110Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
Samba0.881021544Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell
Visual Basic for Applications0.81124Visual Basic for Applications is a computer programming language developed and owned by Microsoft
Webkit0.8213WebKit is a browser engine developed by Apple and primarily used in its Safari web browser, as well as all web browsers on iOS and iPadOS
WinRAR0.8314WinRAR is a trialware file archiver utility for Windows, developed by Eugene Roshal of win.rar GmbH
Windows NTFS0.813114The default file system of the Windows NT family
Windows Remote Desktop Protocol0.811Windows component
Xlib0.8112Xlib (also known as libX11) is an X Window System protocol client library written in the C programming language
Zoom0.822Zoom is the leader in modern enterprise video communications
libvpx0.8268libvpx is a free software video codec library from Google and the Alliance for Open Media (AOMedia)
libwebp0.822libwebp is a code library used to render and display images in the WebP format
.NET0.755.NET
.NET and Visual Studio0.711.NET and Visual Studio
Apache Tomcat0.712216Apache Tomcat is a free and open-source implementation of the Jakarta Servlet, Jakarta Expression Language, and WebSocket technologies
Apache Traffic Server0.721113The Apache Traffic Server is a modular, high-performance reverse proxy and forward proxy server, generally comparable to Nginx and Squid
BIND0.711729855BIND is a suite of software for interacting with the Domain Name System
Babel0.7141318Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
Confluence0.711Confluence is a web-based corporate wiki
Curl0.7513422Curl is a command-line tool for transferring data specified with URL syntax
ESXi0.733VMware ESXi (formerly ESX) is an enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers
FFmpeg0.78171003128FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
Kubernetes0.76410Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management
MariaDB0.7112MariaDB is a community-developed, commercially supported fork of the MySQL relational database management system, intended to remain free and open-source software under the GNU General Public License
MediaWiki0.778132120MediaWiki is a free server-based wiki software, licensed under the GNU General Public License (GPL)
Oracle MySQL0.711MySQL is an open-source relational database management system
Point-to-Point Tunneling Protocol0.7112The Point to Point Tunneling Protocol (PPTP) is a network protocol used to create VPN tunnels between public networks
QEMU0.7532441QEMU is a generic and open source machine & userspace emulator and virtualizer
SQLite0.7510217SQLite is a database engine written in the C programming language
Struts0.711Apache Struts is a free, open-source, MVC framework for creating elegant, modern Java web applications. It favors convention over configuration, is extensible using a plugin architecture, and ships with plugins to support REST, AJAX and JSON
VMware Tools0.711VMware Tools is a set of services and modules that enable several features in VMware products for better management of, and seamless user interactions with, guests operating systems
Windows Security Center0.711Windows Security Center (WSC) is a comprehensive reporting tool that helps users establish and maintain a protective security layer around their computer systems
iOS0.71721644iOS is an operating system developed and marketed by Apple Inc
macOS0.7213macOS is an operating system developed and marketed by Apple Inc
vim0.766113Vim is a free and open-source, screen-based text editor program
Apache ActiveMQ0.6115310Apache ActiveMQ is an open source message broker written in Java together with a full Java Message Service (JMS) client
Bouncy Castle0.6369Bouncy Castle is a collection of APIs used in cryptography
DirectX0.622DirectX
Eclipse Mosquitto0.6325Eclipse Mosquitto provides a lightweight server implementation of the MQTT protocol that is suitable for all situations from full power machines to embedded and low power machines
Exim0.6112417Exim is a mail transfer agent (MTA) used on Unix-like operating systems
FreeRDP0.651713FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
ImageMagick0.6262771ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images
Internet Explorer0.6113115Internet Explorer is a discontinued series of graphical web browsers developed by Microsoft
Jetty0.61113Jetty is a Java based web server and servlet engine
Microsoft Excel0.611MS Office product
Microsoft Word0.611Microsoft Word is a widely used commercial word processor developed by Microsoft. It is a component of the Microsoft Office suite of productivity software but can also be purchased as a standalone product.
Nokogiri0.622Nokogiri is an open source XML and HTML library for the Ruby programming language
Oracle Java SE0.6538Oracle Java SE
Perl0.6152370194617Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
Puma0.611Puma is a Ruby/Rack web server built for parallelism
Python0.6227043135Python is a high-level, general-purpose programming language
ReadyMedia0.644ReadyMedia (formerly known as MiniDLNA) is a simple media server software, with the aim of being fully compliant with DLNA/UPnP-AV clients
Redis0.6217515Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability
Roundcube0.61617630Roundcube is a web-based IMAP email client
Wireshark0.61413943196Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education
libxml20.6325libxml2 is an XML toolkit implemented in C, originally developed for the GNOME Project
ownCloud0.6213ownCloud is an open-source software product for sharing and syncing of files in distributed and federated enterprise scenarios
pgAdmin0.611pgAdmin is the most popular and feature rich Open Source administration and development platform for PostgreSQL, the most advanced Open Source database in the world
tiffcrop0.6224Tiffcrop processes one or more files created according to the Tag Image File Format, Revision 6.0, specification into one or more TIFF file(s)
wpa_supplicant0.61416wpa_supplicant is a free software implementation of an IEEE 802.11i supplicant for Linux, FreeBSD, NetBSD, QNX, AROS, Microsoft Windows, Solaris, OS/2 (including ArcaOS and eComStation) and Haiku
7-Zip0.544KeePass is a free open source password manager, which helps you to manage your passwords in a secure way
CNG0.511CNG
Cacti0.519303281Cacti is an open source operational monitoring and fault management framework
DNSSEC0.54610The Domain Name System Security Extensions (DNSSEC) is a feature of the Domain Name System (DNS) that authenticates responses to domain name lookups
Docker0.518716Docker
FRRouting0.5347Free Range Routing or FRRouting or FRR is a network routing software suite running on Unix-like platforms, particularly Linux, Solaris, OpenBSD, FreeBSD and NetBSD
Flask0.5224Flask is a lightweight WSGI web application framework
GDI0.51528GDI
Group Policy0.511Group Policy
HID0.5371323HID
KeePass0.52137-Zip is a file archiver with a high compression ratio
LNK0.5336LNK
Layer 2 Tunneling Protocol0.511Layer 2 Tunneling Protocol
Libarchive0.5110112Multi-format archive and compression library
NetBIOS0.511NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN)
NumPy0.5123NumPy is a library for the Python programming language, adding support for large, multi-dimensional arrays and matrices, along with a large collection of high-level mathematical functions
Openfire0.511Openfire is a real time collaboration (RTC) server licensed under the Open Source Apache License
Scripting Engine0.5112Scripting Engine
TLS0.510375097TLS
TLS/SSL0.522TLS/SSL
TRIE0.51331246TRIE
VBScript0.511VBScript
WEBDAV0.511WEBDAV
Werkzeug0.511Werkzeug is a comprehensive WSGI web application library
Word PDF0.511Word PDF
Xrdp0.544xrdp is an open source remote desktop protocol server
libjpeg0.513720libjpeg
nginx0.575113Nginx is an open-source web server that can also be used as a reverse proxy, load balancer, mail proxy and HTTP cache
ntopng0.52316ntopng is an open-source computer software for monitoring traffic on a computer network
spip0.5224SPIP is an open-source software content management system designed for web site publishing, oriented towards online collaborative editing
Azure0.433Azure
Flatpak0.4112Flatpak is a utility for software deployment and package management for Linux
GPAC0.4267336135GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity)
Git0.4136037110Git
LLDP0.411LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as Extreme's EDP (Extreme Discovery Protocol) and CDP (Cisco Discovery Protocol)
Artifex Ghostscript0.3819Artifex Ghostscript is an interpreter for the PostScript® language and PDF files
Visual Studio0.311Integrated development environment
Unknown Product010406248935376442Unknown Product


Vulnerability Types

Vulnerability TypeCriticalityUCHMLA
Remote Code Execution1.05884151048361592
Authentication Bypass0.98142267296
Code Injection0.9722212045
Command Injection0.972304779
XXE Injection0.97152329
Arbitrary File Writing0.951218843243
Security Feature Bypass0.915451463200
Elevation of Privilege0.852882395
Arbitrary File Reading0.837491268
Information Disclosure0.834328353379
Cross Site Scripting0.892458135685
Open Redirect0.7514216
Denial of Service0.7722815318252591
Path Traversal0.71175236106
Incorrect Calculation0.513492780
Memory Corruption0.517985884201123
Spoofing0.425512
Unknown Vulnerability Type028174032144037


Comments

SourceUCHMLA
almalinux584358114
debian913111255371480211438
oraclelinux584862123
redhat595265131
redos7155724103
ubuntu119180213413


Vulnerabilities

Urgent (9)

1. Remote Code Execution - Apache HTTP Server (CVE-2021-42013) - Urgent [864]

Description: It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, CISA object) website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Apache HTTP Server is a free and open-source web server that delivers web content through the internet
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-42013 was patched at 2024-05-15

2. Code Injection - PHP (CVE-2017-9841) - Urgent [842]

Description: {'vulners_cve_data_all': 'Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object), BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-9841 was patched at 2024-05-15

3. Remote Code Execution - Apache HTTP Server (CVE-2021-41773) - Urgent [840]

Description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, AttackerKB object, CISA object) website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Apache HTTP Server is a free and open-source web server that delivers web content through the internet
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-41773 was patched at 2024-05-15

4. Remote Code Execution - Google Chrome (CVE-2021-30632) - Urgent [835]

Description: Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object), BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30632 was patched at 2024-05-15

5. Remote Code Execution - Apache Tomcat (CVE-2022-22965) - Urgent [830]

Description: A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (cisa_kev object), BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Apache Tomcat is a free and open-source implementation of the Jakarta Servlet, Jakarta Expression Language, and WebSocket technologies
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-22965 was patched at 2024-05-15

6. Remote Code Execution - OpenSSL (CVE-2010-0742) - Urgent [823]

Description: The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object) website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] OpenSSL CMS结构处理内存破坏漏洞, [seebug] OpenSSL Cryptographic Message Syntax "OriginatorInfo" Vulnerability)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2010-0742 was patched at 2024-05-15

7. Code Injection - PHP (CVE-2009-1151) - Urgent [818]

Description: Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object) website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([canvas] Immunity Canvas: PHPMYADMIN_INJECTION, [packetstorm] phpMyAdmin /scripts/setup.php Code Injection, [packetstorm] PhpMyAdmin Config File Code Injection, [seebug] phpMyAdmin (/scripts/setup.php) PHP Code Injection Exploit, [seebug] PhpMyAdmin Config File Code Injection, [seebug] phpMyAdmin setup.php脚本PHP代码注入漏洞, [metasploit] PhpMyAdmin Config File Code Injection, [d2] DSquare Exploit Pack: D2SEC_PHPMYADMIN_RCE, [dsquare] Phpmyadmin File Upload, [exploitpack] phpMyAdmin - scriptssetup.php PHP Code Injection, [exploitdb] phpMyAdmin - '/scripts/setup.php' PHP Code Injection, [exploitdb] phpMyAdmin - Config File Code Injection (Metasploit))
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-1151 was patched at 2024-05-15

8. Security Feature Bypass - Google Chrome (CVE-2021-21220) - Urgent [817]

Description: Insufficient validation of untrusted input in V8 in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object) website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Google Chrome XOR Typer Out-Of-Bounds Access / Remote Code Execution, [githubexploit] Exploit for Out-of-bounds Write in Google Chrome, [zdt] Google Chrome XOR Typer Out-Of-Bounds Access / Remote Code Execution Exploit, [seebug] Chrome 远程代码执行漏洞(CVE-2021-21220))
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-21220 was patched at 2024-05-15

9. Authentication Bypass - OpenSSH (CVE-2019-6110) - Urgent [808]

Description: {'vulners_cve_data_all': 'In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object) website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] OpenSSH SCP Client - Write Arbitrary Files Exploit, [zdt] OpenSSH 7.6p1 SCP Client - Multiple Vulnerabilities (SSHtranger Things) Exploit, [packetstorm] SSHtranger Things SCP Client File Issue, [exploitpack] OpenSSH SCP Client - Write Arbitrary Files, [exploitpack] SCP Client - Multiple Vulnerabilities (SSHtranger Things), [exploitdb] SCP Client - Multiple Vulnerabilities (SSHtranger Things), [exploitdb] OpenSSH SCP Client - Write Arbitrary Files)
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.814OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2019-6110 was patched at 2024-05-15

Critical (132)

10. Security Feature Bypass - Apache ActiveMQ (CVE-2016-3088) - Critical [796]

Description: {'vulners_cve_data_all': 'The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object) website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.614Apache ActiveMQ is an open source message broker written in Java together with a full Java Message Service (JMS) client
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2016-3088 was patched at 2024-05-15

11. Security Feature Bypass - Google Chrome (CVE-2021-30533) - Critical [794]

Description: Insufficient policy enforcement in PopupBlocker in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass navigation restrictions via a crafted iframe.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (cisa_kev object) website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30533 was patched at 2024-05-15

12. Elevation of Privilege - BIND (CVE-2020-0041) - Critical [780]

Description: In binder_transaction of binder.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-145988638References: Upstream kernel

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object, cisa_kev object, cisa_kev object) website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Improper Input Validation in Google Android)
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.714BIND is a suite of software for interacting with the Domain Name System
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2020-0041 was patched at 2024-05-15

13. Denial of Service - Node.js (CVE-2015-8858) - Critical [770]

Description: The uglify-js package before 2.6.0 for Node.js allows attackers to cause a denial of service (CPU consumption) via crafted input in a parse call, aka a "regular expression denial of service (ReDoS)."

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2015-8858 was patched at 2024-05-15

14. Memory Corruption - Google Chrome (CVE-2021-30633) - Critical [758]

Description: Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object), BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score1.010CVSS Base Score is 9.6. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30633 was patched at 2024-05-15

15. Memory Corruption - nghttp2 (CVE-2024-27983) - Critical [751]

Description: An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for CVE-2024-27983)
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.914nghttp2 is an implementation of HTTP/2 and its header compression algorithm HPACK in C
CVSS Base Score0.810CVSS Base Score is 8.2. According to Vulners data source
EPSS Percentile010EPSS data is not available

almalinux: CVE-2024-27983 was patched at 2024-05-09, 2024-05-15, 2024-05-20

debian: CVE-2024-27983 was patched at 2024-05-15

oraclelinux: CVE-2024-27983 was patched at 2024-05-09, 2024-05-10, 2024-05-14, 2024-05-16, 2024-05-22

redhat: CVE-2024-27983 was patched at 2024-05-09, 2024-05-15, 2024-05-20, 2024-05-21, 2024-05-29, 2024-06-03

redos: CVE-2024-27983 was patched at 2024-04-25

16. Memory Corruption - Google Chrome (CVE-2021-21206) - Critical [746]

Description: Use after free in Blink in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object), BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-21206 was patched at 2024-05-15

17. Memory Corruption - Google Chrome (CVE-2021-30551) - Critical [746]

Description: Type confusion in V8 in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object) website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Type Confusion in Google Chrome)
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30551 was patched at 2024-05-15

18. Memory Corruption - Google Chrome (CVE-2021-30563) - Critical [746]

Description: Type Confusion in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object), BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30563 was patched at 2024-05-15

19. Path Traversal - Openfire (CVE-2023-32315) - Critical [720]

Description: Openfire is an XMPP server licensed under the Open Source Apache License. Openfire's administrative console, a web-based application, was found to be vulnerable to a path traversal attack via the setup environment. This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environment in an already configured Openfire environment to access restricted pages in the Openfire Admin Console reserved for administrative users. This vulnerability affects all versions of Openfire that have been released since April 2015, starting with version 3.10.0. The problem has been patched in Openfire release 4.7.5 and 4.6.8, and further improvements will be included in the yet-to-be released first version on the 4.8 branch (which is expected to be version 4.8.0). Users are advised to upgrade. If an Openfire upgrade isn’t available for a specific release, or isn’t quickly actionable, users may see the linked github advisory (GHSA-gw42-f939-fhvm) for mitigation advice.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object) website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Path Traversal
Vulnerable Product is Common0.514Openfire is a real time collaboration (RTC) server licensed under the Open Source Apache License
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

redos: CVE-2023-32315 was patched at 2024-05-03

20. Memory Corruption - Babel (CVE-2022-26127) - Critical [717]

Description: A buffer overflow vulnerability exists in FRRouting through 8.1.0 due to missing a check on the input packet length in the babel_packet_examin function in babeld/message.c.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.714Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-26127 was patched at 2024-05-15

ubuntu: CVE-2022-26127 was patched at 2024-06-05

21. Memory Corruption - Babel (CVE-2022-26128) - Critical [717]

Description: A buffer overflow vulnerability exists in FRRouting through 8.1.0 due to a wrong check on the input packet length in the babel_packet_examin function in babeld/message.c.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.714Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-26128 was patched at 2024-05-15

ubuntu: CVE-2022-26128 was patched at 2024-06-05

22. Memory Corruption - Babel (CVE-2022-26129) - Critical [717]

Description: {'vulners_cve_data_all': 'Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the subtlv length in the functions, parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv in babeld/message.c.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.714Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-26129 was patched at 2024-05-15

ubuntu: CVE-2022-26129 was patched at 2024-06-05

23. Denial of Service - HTTP/2 (CVE-2023-45288) - Critical [691]

Description: {'vulners_cve_data_all': 'An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for CVE-2023-45288)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914HTTP/2 is a major revision of the HTTP network protocol used by the World Wide Web
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS data is not available

almalinux: CVE-2023-45288 was patched at 2024-04-23, 2024-04-29, 2024-04-30, 2024-05-06, 2024-05-07, 2024-05-22, 2024-05-23

debian: CVE-2023-45288 was patched at 2024-05-15

oraclelinux: CVE-2023-45288 was patched at 2024-04-23, 2024-05-07, 2024-05-08, 2024-05-29

redhat: CVE-2023-45288 was patched at 2024-04-23, 2024-04-26, 2024-04-29, 2024-04-30, 2024-05-02, 2024-05-06, 2024-05-07, 2024-05-09, 2024-05-20, 2024-05-21, 2024-05-22, 2024-05-23, 2024-05-29

redos: CVE-2023-45288 was patched at 2024-04-22

24. Remote Code Execution - Unknown Product (CVE-2016-4437) - Critical [690]

Description: {'vulners_cve_data_all': 'Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (cisa_kev object) website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Apache Shiro 1.2.4 Remote Code Execution, [zdt] Apache Shiro 1.2.4 Remote Code Execution Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810CVSS Base Score is 8.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2016-4437 was patched at 2024-05-15

25. Remote Code Execution - Unknown Product (CVE-2019-17558) - Critical [690]

Description: {'vulners_cve_data_all': 'Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined configset could contain renderable, potentially malicious, templates. Parameter provided templates are disabled by default, but can be enabled by setting `params.resource.loader.enabled` by defining a response writer with that setting set to `true`. Defining a response writer requires configuration API access. Solr 8.4 removed the params resource loader entirely, and only enables the configset-provided template rendering when the configset is `trusted` (has been uploaded by an authenticated user).', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (cisa_kev object) website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Injection in Apache Solr, [githubexploit] Exploit for Injection in Apache Solr, [githubexploit] Exploit for Injection in Apache Solr, [zdt] Apache Solr 8.3.0 Velocity Template Remote Code Execution Exploit, [packetstorm] Apache Solr 8.3.0 Velocity Template Remote Code Execution)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2019-17558 was patched at 2024-05-15

26. Remote Code Execution - Unknown Product (CVE-2021-33035) - Critical [690]

Description: {'vulners_cve_data_all': 'Apache OpenOffice opens dBase/DBF documents and shows the contents as spreadsheets. DBF are database files with data organized in fields. When reading DBF data the size of certain fields is not checked: the data is just copied into local variables. A carefully crafted document could overflow the allocated space, leading to the execution of arbitrary code by altering the contents of the program stack. This issue affects Apache OpenOffice up to and including version 4.1.10', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-33035 was patched at 2024-05-15

27. Remote Code Execution - Unknown Product (CVE-2022-25942) - Critical [690]

Description: {'vulners_cve_data_all': 'An out-of-bounds read vulnerability exists in the gif2h5 functionality of HDF5 Group libhdf5 1.10.4. A specially-crafted GIF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-25942 was patched at 2024-05-15

28. Remote Code Execution - Unknown Product (CVE-2022-25972) - Critical [690]

Description: {'vulners_cve_data_all': 'An out-of-bounds write vulnerability exists in the gif2h5 functionality of HDF5 Group libhdf5 1.10.4. A specially-crafted GIF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-25972 was patched at 2024-05-15

29. Remote Code Execution - Unknown Product (CVE-2022-26061) - Critical [690]

Description: {'vulners_cve_data_all': 'A heap-based buffer overflow vulnerability exists in the gif2h5 functionality of HDF5 Group libhdf5 1.10.4. A specially-crafted GIF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-26061 was patched at 2024-05-15

30. Security Feature Bypass - Chromium (CVE-2024-3838) - Critical [680]

Description: {'vulners_cve_data_all': 'Inappropriate implementation in Autofill in Google Chrome prior to 124.0.6367.60 allowed an attacker who convinced a user to install a malicious app to perform UI spoofing via a crafted app. (Chromium security severity: Medium)', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2024-3838 was patched at 2024-04-20, 2024-05-15

redos: CVE-2024-3838 was patched at 2024-05-03

31. Denial of Service - GNU C Library (CVE-2024-2961) - Critical [675]

Description: The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for CVE-2024-2961, [githubexploit] Exploit for CVE-2024-2961, [githubexploit] Exploit for CVE-2024-2961)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS data is not available

almalinux: CVE-2024-2961 was patched at 2024-05-07, 2024-05-22, 2024-05-23

debian: CVE-2024-2961 was patched at 2024-04-23, 2024-05-15

oraclelinux: CVE-2024-2961 was patched at 2024-05-08, 2024-05-29, 2024-06-05

redhat: CVE-2024-2961 was patched at 2024-05-07, 2024-05-09, 2024-05-22, 2024-05-23, 2024-05-28, 2024-05-29, 2024-06-04

redos: CVE-2024-2961 was patched at 2024-05-03

ubuntu: CVE-2024-2961 was patched at 2024-04-18, 2024-04-29, 2024-05-02

32. Security Feature Bypass - Unknown Product (CVE-2020-35380) - Critical [672]

Description: {'vulners_cve_data_all': 'GJSON before 1.6.4 allows attackers to cause a denial of service via crafted JSON.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2020-35380 was patched at 2024-05-15

33. Denial of Service - Binutils (CVE-2017-16829) - Critical [669]

Description: The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-16829 was patched at 2024-05-15

34. Unknown Vulnerability Type - Node.js (CVE-2015-8857) - Critical [669]

Description: {'vulners_cve_data_all': 'The uglify-js package before 2.4.24 for Node.js does not properly account for non-boolean values when rewriting boolean expressions, which might allow attackers to bypass security mechanisms or possibly have unspecified other impact by leveraging improperly rewritten Javascript.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.814Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2015-8857 was patched at 2024-05-15

35. Denial of Service - nghttp2 (CVE-2024-28182) - Critical [650]

Description: {'vulners_cve_data_all': 'nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914nghttp2 is an implementation of HTTP/2 and its header compression algorithm HPACK in C
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

almalinux: CVE-2024-28182 was patched at 2024-05-09, 2024-05-15, 2024-05-20, 2024-05-30

debian: CVE-2024-28182 was patched at 2024-05-15

oraclelinux: CVE-2024-28182 was patched at 2024-05-09, 2024-05-10, 2024-05-14, 2024-05-16, 2024-05-22

redhat: CVE-2024-28182 was patched at 2024-05-09, 2024-05-15, 2024-05-20, 2024-05-21, 2024-05-30, 2024-06-03, 2024-06-06

redos: CVE-2024-28182 was patched at 2024-05-07

ubuntu: CVE-2024-28182 was patched at 2024-04-25, 2024-05-07

36. Unknown Vulnerability Type - Linux Kernel (CVE-2013-6282) - Critical [650]

Description: {'vulners_cve_data_all': 'The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (cisa_kev object) website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Linux ARM - Local Root Exploit, [zdt] Android get_user/put_user Exploit, [packetstorm] Android get_user/put_user Exploit, [metasploit] Android get_user/put_user Exploit, [exploitpack] Linux Kernel 3.4.5 (Android 4.2.24.4 ARM) - Local Privilege Escalation, [exploitdb] Google Android - get_user/put_user (Metasploit), [exploitdb] Linux Kernel < 3.4.5 (Android 4.2.2/4.4 ARM) - Local Privilege Escalation)
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.710CVSS Base Score is 7.2. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2013-6282 was patched at 2024-05-15

37. Memory Corruption - Chromium (CVE-2024-3834) - Critical [645]

Description: Use after free in Downloads in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2024-3834 was patched at 2024-04-20, 2024-05-15

redos: CVE-2024-3834 was patched at 2024-05-03

38. Memory Corruption - Google Chrome (CVE-2021-30549) - Critical [645]

Description: Use after free in Spell check in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30549 was patched at 2024-05-15

39. Memory Corruption - Google Chrome (CVE-2021-30554) - Critical [645]

Description: Use after free in WebGL in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object), BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30554 was patched at 2024-05-15

40. Memory Corruption - Chromium (CVE-2024-4671) - Critical [639]

Description: Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS data is not available

debian: CVE-2024-4671 was patched at 2024-05-10, 2024-05-15

41. Remote Code Execution - Windows Kernel (CVE-2008-2430) - Critical [638]

Description: Integer overflow in the Open function in modules/demux/wav.c in VLC Media Player 0.8.6h on Windows allows remote attackers to execute arbitrary code via a large fmt chunk in a WAV file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] VLC Media Player WAV文件缓冲区溢出漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-2430 was patched at 2024-05-15

42. Denial of Service - Unknown Product (CVE-2020-36066) - Critical [636]

Description: {'vulners_cve_data_all': 'GJSON <1.6.5 allows attackers to cause a denial of service (remote) via crafted JSON.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2020-36066 was patched at 2024-05-15

43. Remote Code Execution - GNU C Library (CVE-2002-0391) - Critical [633]

Description: Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([canvas] Immunity Canvas: TTDB_XDRARRAY, [canvas] Immunity Canvas: CMSD_XDRARRAY)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2002-0391 was patched at 2024-05-15

44. Remote Code Execution - GNU C Library (CVE-2014-9984) - Critical [633]

Description: nscd in the GNU C Library (aka glibc or libc6) before version 2.20 does not correctly compute the size of an internal buffer when processing netgroup requests, possibly leading to an nscd daemon crash or code execution as the user running nscd.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Cisco Device Hardcoded Credentials / GNU glibc / BusyBox, [packetstorm] WAGO 852 Industrial Managed Switch Series Code Execution / Hardcoded Credentials)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2014-9984 was patched at 2024-05-15

ubuntu: CVE-2014-9984 was patched at 2024-05-02

45. Remote Code Execution - Google Chrome (CVE-2012-2864) - Critical [633]

Description: Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow."

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Google Chrome OS 远程代码执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2012-2864 was patched at 2024-05-15

46. Remote Code Execution - Google Chrome (CVE-2020-6572) - Critical [633]

Description: Use after free in Media in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to execute arbitrary code via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object) website
Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2020-6572 was patched at 2024-05-15

47. Remote Code Execution - Mozilla Firefox (CVE-2009-3377) - Critical [633]

Description: Multiple unspecified vulnerabilities in liboggz before cf5feeaab69b05e24, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Mozilla Firefox多个内存破坏漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-3377 was patched at 2024-05-15

48. Remote Code Execution - OpenSSL (CVE-2022-2274) - Critical [633]

Description: The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Out-of-bounds Write in Openssl)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-2274 was patched at 2024-05-15

49. Remote Code Execution - PHP (CVE-2021-32708) - Critical [633]

Description: Flysystem is an open source file storage library for PHP. The whitespace normalisation using in 1.x and 2.x removes any unicode whitespace. Under certain specific conditions this could potentially allow a malicious user to execute code remotely. The conditions are: A user is allowed to supply the path or filename of an uploaded file, the supplied path or filename is not checked against unicode chars, the supplied pathname checked against an extension deny-list, not an allow-list, the supplied path or filename contains a unicode whitespace char in the extension, the uploaded file is stored in a directory that allows PHP code to be executed. Given these conditions are met a user can upload and execute arbitrary code on the system under attack. The unicode whitespace removal has been replaced with a rejection (exception). For 1.x users, upgrade to 1.1.4. For 2.x users, upgrade to 2.1.1.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([srcincite] SRC-2021-0021 : League flysystem removeFunkyWhiteSpace Time-Of-Check Time-Of-Use File Write Remote Code Execution Vulnerability)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-32708 was patched at 2024-05-15

50. Remote Code Execution - PHP (CVE-2023-24813) - Critical [633]

Description: Dompdf is an HTML to PDF converter written in php. Due to the difference in the attribute parser of Dompdf and php-svg-lib, an attacker can still call arbitrary URLs with arbitrary protocols. Dompdf parses the href attribute of `image` tags and respects `xlink:href` even if `href` is specified. However, php-svg-lib, which is later used to parse the svg file, parses the href attribute. Since `href` is respected if both `xlink:href` and `href` is specified, it's possible to bypass the protection on the Dompdf side by providing an empty `xlink:href` attribute. An attacker can exploit the vulnerability to call arbitrary URLs with arbitrary protocols if they provide an SVG file to the Dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, which will lead, at the very least, to arbitrary file deletion and might lead to remote code execution, depending on available classes. This vulnerability has been addressed in commit `95009ea98` which has been included in release version 2.0.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Incorrect Authorization in Dompdf Project Dompdf, [githubexploit] Exploit for Incorrect Authorization in Dompdf Project Dompdf)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2023-24813 was patched at 2024-05-15

51. Remote Code Execution - PHP (CVE-2023-28115) - Critical [633]

Description: Snappy is a PHP library allowing thumbnail, snapshot or PDF generation from a url or a html page. Prior to version 1.4.2, Snappy is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the `file_exists()` function. If an attacker can upload files of any type to the server he can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution especially when snappy is used with frameworks with documented POP chains like Laravel/Symfony vulnerable developer code. If a user can control the output file from the `generateFromHtml()` function, it will invoke deserialization. This vulnerability is capable of remote code execution if Snappy is used with frameworks or developer code with vulnerable POP chains. It has been fixed in version 1.4.2.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2023-28115 was patched at 2024-05-15

52. Remote Code Execution - Samba (CVE-2002-1318) - Critical [633]

Description: Buffer overflow in samba 2.2.2 through 2.2.6 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-endian UCS2 unicode string.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] Samba 2.2.2 < 2.2.6 - nttrans Buffer Overflow Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2002-1318 was patched at 2024-05-15

53. Remote Code Execution - Samba (CVE-2003-0085) - Critical [633]

Description: Buffer overflow in the SMB/CIFS packet fragment re-assembly code for SMB daemon (smbd) in Samba before 2.2.8, and Samba-TNG before 0.3.1, allows remote attackers to execute arbitrary code.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([canvas] Immunity Canvas: SAMBA_NTTRANS, [packetstorm] Samba nttrans Overflow)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2003-0085 was patched at 2024-05-15

54. Remote Code Execution - Samba (CVE-2003-0196) - Critical [633]

Description: Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([saint] Samba call_trans2open buffer overflow, [saint] Samba call_trans2open buffer overflow, [saint] Samba call_trans2open buffer overflow, [saint] Samba call_trans2open buffer overflow, [packetstorm] Samba trans2open Overflow (Solaris SPARC), [packetstorm] Samba trans2open Overflow, [packetstorm] Samba trans2open Overflow (Mac OS X), [canvas] Immunity Canvas: SAMBA_TRANS2)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2003-0196 was patched at 2024-05-15

55. Remote Code Execution - Samba (CVE-2003-0201) - Critical [633]

Description: Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([saint] Samba call_trans2open buffer overflow, [saint] Samba call_trans2open buffer overflow, [saint] Samba call_trans2open buffer overflow, [saint] Samba call_trans2open buffer overflow, [packetstorm] Samba trans2open Overflow (Solaris SPARC), [packetstorm] Samba trans2open Overflow, [packetstorm] Samba trans2open Overflow (Mac OS X), [canvas] Immunity Canvas: SAMBA_TRANS2)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2003-0201 was patched at 2024-05-15

56. Remote Code Execution - Samba (CVE-2004-0600) - Critical [633]

Description: Buffer overflow in the Samba Web Administration Tool (SWAT) in Samba 3.0.2 to 3.0.4 allows remote attackers to execute arbitrary code via an invalid base-64 character during HTTP basic authentication.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] sambaPoC.txt)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2004-0600 was patched at 2024-05-15

57. Command Injection - Node.js (CVE-2019-10061) - Critical [627]

Description: utils/find-opencv.js in node-opencv (aka OpenCV bindings for Node.js) prior to 6.1.0 is vulnerable to Command Injection. It does not validate user input allowing attackers to execute arbitrary commands.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for OS Command Injection in Node-Opencv Project Node-Opencv)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common0.814Node.js is a cross-platform, open-source server environment that can run on Windows, Linux, Unix, macOS, and more
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2019-10061 was patched at 2024-05-15

58. Remote Code Execution - Linux Kernel (CVE-2008-4395) - Critical [626]

Description: Multiple buffer overflows in the ndiswrapper module 1.53 for the Linux kernel 2.6 allow remote attackers to execute arbitrary code by sending packets over a local wireless network that specify long ESSIDs.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Linux Kernel ndiswrapper模块远程溢出漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.810CVSS Base Score is 8.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-4395 was patched at 2024-05-15

59. Remote Code Execution - Windows Kernel (CVE-2021-40826) - Critical [626]

Description: Clementine Music Player through 1.3.1 is vulnerable to a User Mode Write Access Violation, affecting the MP3 file parsing functionality at clementine+0x3aa207. The vulnerability is triggered when the user opens a crafted MP3 file or loads a remote stream URL that is mishandled by Clementine. Attackers could exploit this issue to cause a crash (DoS) of the clementine.exe process or achieve arbitrary code execution in the context of the current logged-in Windows user.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-40826 was patched at 2024-05-15

60. Remote Code Execution - Windows LDAP (CVE-2006-3747) - Critical [626]

Description: Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([saint] Apache mod_rewrite LDAP URL buffer overflow, [saint] Apache mod_rewrite LDAP URL buffer overflow, [saint] Apache mod_rewrite LDAP URL buffer overflow, [saint] Apache mod_rewrite LDAP URL buffer overflow, [packetstorm] apache2058-rewrite.txt, [packetstorm] Apache module mod_rewrite LDAP protocol Buffer Overflow, [packetstorm] apache-mod-rewrite.rb.txt, [packetstorm] modrewrite-offbyone.txt, [packetstorm] modrewritepoc.txt, [seebug] Apache Mod_Rewrite Off-by-one Remote Overflow Exploit (win32), [seebug] Apache mod_rewrite模块单字节缓冲区溢出漏洞, [seebug] Apache < 1.3.37 2.0.59 2.2.3 (mod_rewrite) Remote Overflow PoC, [seebug] Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC, [exploitpack] Apache mod_rewrite (Windows x86) - Off-by-One Remote Overflow, [exploitpack] Apache 1.3.372.0.592.2.3 mod_rewrite - Remote Overflow, [exploitdb] Apache mod_rewrite (Windows x86) - Off-by-One Remote Overflow, [exploitdb] Apache < 1.3.37/2.0.59/2.2.3 mod_rewrite - Remote Overflow)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Windows LDAP (Lightweight Directory Access Protocol) is an open and cross platform protocol used for directory services authentication
CVSS Base Score0.810CVSS Base Score is 7.6. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2006-3747 was patched at 2024-05-15

61. Memory Corruption - Unknown Product (CVE-2023-47212) - Critical [625]

Description: {'vulners_cve_data_all': 'A heap-based buffer overflow vulnerability exists in the comment functionality of stb _vorbis.c v1.22. A specially crafted .ogg file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2023-47212 was patched at 2024-05-15

62. Memory Corruption - FreeRDP (CVE-2024-32041) - Critical [623]

Description: FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, deactivate `/gfx` (on by default, set `/bpp` or `/rfx` options instead.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.614FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2024-32041 was patched at 2024-05-15

ubuntu: CVE-2024-32041 was patched at 2024-04-24

63. Memory Corruption - FreeRDP (CVE-2024-32458) - Critical [623]

Description: FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use `/gfx` or `/rfx` modes (on by default, require server side support).

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.614FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2024-32458 was patched at 2024-05-15

ubuntu: CVE-2024-32458 was patched at 2024-04-24

64. Memory Corruption - FreeRDP (CVE-2024-32459) - Critical [623]

Description: FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.614FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2024-32459 was patched at 2024-05-15

ubuntu: CVE-2024-32459 was patched at 2024-04-24

65. Remote Code Execution - Google Chrome (CVE-2021-30526) - Critical [621]

Description: Out of bounds write in TabStrip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30526 was patched at 2024-05-15

66. Remote Code Execution - Mozilla Firefox (CVE-2009-3378) - Critical [621]

Description: The oggplay_data_handle_theora_frame function in media/liboggplay/src/liboggplay/oggplay_data.c in liboggplay, as used in Mozilla Firefox 3.5.x before 3.5.4, attempts to reuse an earlier frame data structure upon encountering a decoding error for the first frame, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a crafted .ogg video file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Mozilla Firefox多个内存破坏漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-3378 was patched at 2024-05-15

67. Remote Code Execution - Mozilla Firefox (CVE-2010-1028) - Critical [621]

Description: Integer overflow in the decompression functionality in the Web Open Fonts Format (WOFF) decoder in Mozilla Firefox 3.6 before 3.6.2 and 3.7 before 3.7 alpha 3 allows remote attackers to execute arbitrary code via a crafted WOFF file that triggers a buffer overflow, as demonstrated by the vd_ff module in VulnDisco 9.0.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] Mozilla Firefox 3.6 - Integer Overflow Exploit, [seebug] Mozilla Firefox 3.6 WOFF解码器整数溢出漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2010-1028 was patched at 2024-05-15

68. Remote Code Execution - PHP (CVE-2018-14857) - Critical [621]

Description: Unrestricted file upload (with remote code execution) in require/mail/NotificationMail.php in Webconsole in OCS Inventory NG OCS Inventory Server through 2.5 allows a privileged user to gain access to the server via a template file containing PHP code, because file extensions other than .html are permitted.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] OCS Inventory NG Webconsole Shell Upload, [zdt] OCS Inventory NG Webconsole Shell Upload Vulnerability)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2018-14857 was patched at 2024-05-15

69. Remote Code Execution - Safari (CVE-2008-2307) - Critical [621]

Description: Unspecified vulnerability in WebKit in Apple Safari before 3.1.2, as distributed in Mac OS X before 10.5.4, and standalone for Windows and Mac OS X 10.4, allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors involving JavaScript arrays that trigger memory corruption.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Apple Safari内存破坏漏洞, [seebug] Apple Safari WebKit JavaScript数组远程溢出漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-2307 was patched at 2024-05-15

70. Remote Code Execution - Safari (CVE-2009-1686) - Critical [621]

Description: WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle constant (aka const) declarations in a type-conversion operation during JavaScript exception handling, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Apple Safari 4.0多个安全漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-1686 was patched at 2024-05-15

71. Remote Code Execution - Safari (CVE-2009-1701) - Critical [621]

Description: Use-after-free vulnerability in the JavaScript DOM implementation in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by destroying a document.body element that has an unspecified XML container with elements that support the dir attribute.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Apple Safari 4.0多个安全漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-1701 was patched at 2024-05-15

72. Remote Code Execution - Safari (CVE-2009-1711) - Critical [621]

Description: WebKit in Apple Safari before 4.0 does not properly initialize memory for Attr DOM objects, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Apple Safari 4.0多个安全漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-1711 was patched at 2024-05-15

73. Remote Code Execution - Safari (CVE-2009-1712) - Critical [621]

Description: WebKit in Apple Safari before 4.0 does not prevent remote loading of local Java applets, which allows remote attackers to execute arbitrary code, gain privileges, or obtain sensitive information via an APPLET or OBJECT element.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Apple Safari 4.0多个安全漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-1712 was patched at 2024-05-15

74. Remote Code Execution - Safari (CVE-2017-2505) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. tvOS before 10.2.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] WebKit JSC BindingNode::bindValue Failed Reference Count Increase, [seebug] WebKit: JSC: BindingNode::bindValue doesn't increase the scope's reference count(CVE-2017-2505))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-2505 was patched at 2024-05-15

75. Remote Code Execution - Safari (CVE-2017-2514) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] WebKit WebCore::FrameView::scheduleRelayout Use-After-Free, [zdt] Apple WebKit / Safari 10.0.3(12602.4.8) - WebCore::FrameView::scheduleRelayout Use-After-Free Exploi, [seebug] WebKit WebCore::FrameView::scheduleRelayout Use-After-Free(CVE-2017-2514))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-2514 was patched at 2024-05-15

76. Remote Code Execution - Safari (CVE-2017-2515) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. tvOS before 10.2.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] WebKit - Stealing Variables via Page Navigation in FrameLoader::clear Exploit, [packetstorm] WebKit FrameLoader::clear Variable Theft)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-2515 was patched at 2024-05-15

77. Remote Code Execution - Safari (CVE-2017-2521) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] WebKit JSC JSObject::ensureLength Failure Check Vulnerability, [seebug] WebKit Unspecified Memory Corruption Vulnerability(CVE-2017-2521), [packetstorm] WebKit JSC JSObject::ensureLength Failure Check)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-2521 was patched at 2024-05-15

78. Remote Code Execution - Safari (CVE-2017-2531) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. tvOS before 10.2.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] WebKit JSC emitPutDerivedConstructorToArrowFunctionContextScope Incorrect Check(CVE-2017-2531), [packetstorm] WebKit JSC emitPutDerivedConstructorToArrowFunctionContextScope Incorrect Check, [zdt] WebKit JSC emitPutDerivedConstructorToArrowFunctionContextScope Incorrect Check Vulnerability)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-2531 was patched at 2024-05-15

79. Remote Code Execution - Safari (CVE-2017-2536) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. tvOS before 10.2.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] Apple Safari 10.1 - Spread Operator Integer Overflow Remote Code Execution Exploit, [seebug] Exploiting an integer overflow with array spreading (WebKit))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-2536 was patched at 2024-05-15

80. Remote Code Execution - Safari (CVE-2017-2547) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] WebKit JSC Jit Optimization Check Failure, [zdt] WebKit JSC - JIT Optimization Check Failed in IntegerCheckCombiningPhase::handleBlock Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-2547 was patched at 2024-05-15

81. Remote Code Execution - Safari (CVE-2017-6980) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. tvOS before 10.2.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] WebKit JSC - arrayProtoFuncSplice does not Initialize all Indices Exploit, [packetstorm] WebKit JSC arrayProtoFuncSplice Initialization Fail)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-6980 was patched at 2024-05-15

82. Remote Code Execution - Safari (CVE-2017-6984) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. iTunes before 12.6.1 on Windows is affected. tvOS before 10.2.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] WebKit JSC - Heap Buffer Overflow in Intl.getCanonicalLocales Exploit, [packetstorm] WebKit JSC Intl.getCanonicalLocales Heap Buffer Overflow)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-6984 was patched at 2024-05-15

83. Remote Code Execution - Safari (CVE-2017-7040) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] WebKit: use-after-free in WebCore::getCachedWrapper(CVE-2017-7040), [packetstorm] WebKit WebCore::getCachedWrapper Use-After-Free, [zdt] WebKit - WebCore::getCachedWrapper Use-After-Free Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-7040 was patched at 2024-05-15

84. Remote Code Execution - Safari (CVE-2017-7041) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] WebKit - WebCore::Node::getFlag Use-After-Free Exploit, [seebug] WebKit: use-after-free in WebCore::Node::getFlag(CVE-2017-7041), [packetstorm] WebKit WebCore::Node::getFlag Use-After-Free)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-7041 was patched at 2024-05-15

85. Remote Code Execution - Safari (CVE-2017-7042) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] WebKit - WebCore::InputType::element Use-After-Free Exploit, [seebug] WebKit: use-after-free in WebCore::InputType::element(CVE-2017-7042), [packetstorm] WebKit WebCore::InputType::element Use-After-Free)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-7042 was patched at 2024-05-15

86. Remote Code Execution - Safari (CVE-2017-7043) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] WebKit WebCore::AccessibilityRenderObject::handleAriaExpandedChanged Use-After-Free, [zdt] WebKit - WebCore::AccessibilityRenderObject::handleAriaExpandedChanged Use-After-Free Exploit, [seebug] WebKit: use-after-free in WebCore::AccessibilityRenderObject::handleAriaExpandedChanged(CVE-2017-7043))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-7043 was patched at 2024-05-15

87. Remote Code Execution - Safari (CVE-2017-7049) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] WebKit - WebCore::RenderSearchField::addSearchResult Heap Buffer Overflow Exploit, [seebug] WebKit: heap-buffer-overflow in WebCore::RenderSearchField::addSearchResult(CVE-2017-7049), [packetstorm] WebKit WebCore::RenderSearchField::addSearchResult Heap Buffer Overflow)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-7049 was patched at 2024-05-15

88. Remote Code Execution - Safari (CVE-2017-7081) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] WebKitGTK+ Code Execution / Cookie Handling / Memory Corruption Vulnerabilities)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-7081 was patched at 2024-05-15

89. Remote Code Execution - Safari (CVE-2017-7094) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] WebKitGTK+ Code Execution / Cookie Handling / Memory Corruption Vulnerabilities)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-7094 was patched at 2024-05-15

90. Remote Code Execution - Safari (CVE-2017-7099) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] WebKitGTK+ Code Execution / Cookie Handling / Memory Corruption Vulnerabilities)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-7099 was patched at 2024-05-15

91. Remote Code Execution - Safari (CVE-2018-4089) - Critical [621]

Description: An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. Safari before 11.0.3 is affected. tvOS before 11.2.5 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] WebKit - detachWrapper Use-After-Free Exploit, [zdt] WebKitGTK+ Memory Corruption / Spoofing / Code Execution Vulnerabilities)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2018-4089 was patched at 2024-05-15

92. Remote Code Execution - Samba (CVE-2009-1886) - Critical [621]

Description: Multiple format string vulnerabilities in client/client.c in smbclient in Samba 3.2.0 through 3.2.12 might allow context-dependent attackers to execute arbitrary code via format string specifiers in a filename.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Samba格式串和安全绕过漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-1886 was patched at 2024-05-15

93. Remote Code Execution - Windows Remote Desktop Protocol (CVE-2008-1802) - Critical [621]

Description: Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] rdesktoppdu-overflow.txt, [seebug] rdesktop多个缓冲区溢出漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-1802 was patched at 2024-05-15

94. Authentication Bypass - OpenSSH (CVE-2006-5794) - Critical [617]

Description: Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object) website
Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.814OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2006-5794 was patched at 2024-05-15

95. Remote Code Execution - Babel (CVE-2022-41793) - Critical [616]

Description: An out-of-bounds write vulnerability exists in the CSR format title functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-41793 was patched at 2024-05-15

96. Remote Code Execution - Babel (CVE-2022-42885) - Critical [616]

Description: A use of uninitialized pointer vulnerability exists in the GRO format res functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-42885 was patched at 2024-05-15

97. Remote Code Execution - Babel (CVE-2022-43467) - Critical [616]

Description: An out-of-bounds write vulnerability exists in the PQS format coord_file functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-43467 was patched at 2024-05-15

98. Remote Code Execution - Babel (CVE-2022-44451) - Critical [616]

Description: A use of uninitialized pointer vulnerability exists in the MSI format atom functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-44451 was patched at 2024-05-15

99. Remote Code Execution - Babel (CVE-2022-46280) - Critical [616]

Description: A use of uninitialized pointer vulnerability exists in the PQS format pFormat functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-46280 was patched at 2024-05-15

100. Remote Code Execution - Babel (CVE-2022-46289) - Critical [616]

Description: Multiple out-of-bounds write vulnerabilities exist in the ORCA format nAtoms functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.nAtoms calculation wrap-around, leading to a small buffer allocation

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-46289 was patched at 2024-05-15

101. Remote Code Execution - Babel (CVE-2022-46290) - Critical [616]

Description: Multiple out-of-bounds write vulnerabilities exist in the ORCA format nAtoms functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.The loop that stores the coordinates does not check its index against nAtoms

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-46290 was patched at 2024-05-15

102. Remote Code Execution - Babel (CVE-2022-46292) - Critical [616]

Description: Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the MOPAC file format, inside the Unit Cell Translation section

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-46292 was patched at 2024-05-15

103. Remote Code Execution - Babel (CVE-2022-46293) - Critical [616]

Description: Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the MOPAC file format, inside the Final Point and Derivatives section

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-46293 was patched at 2024-05-15

104. Remote Code Execution - Babel (CVE-2022-46294) - Critical [616]

Description: Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the MOPAC Cartesian file format

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-46294 was patched at 2024-05-15

105. Remote Code Execution - Babel (CVE-2022-46295) - Critical [616]

Description: Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the Gaussian file format

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Babel is a free and open-source JavaScript transcompiler that is mainly used to convert ECMAScript 2015+ code into backwards-compatible JavaScript code that can be run by older JavaScript engines
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-46295 was patched at 2024-05-15

106. Remote Code Execution - FFmpeg (CVE-2009-4633) - Critical [616]

Description: vorbis_dec.c in FFmpeg 0.5 uses an assignment operator when a comparison operator was intended, which might allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted file that modifies a loop counter and triggers a heap-based buffer overflow.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] FFmpeg多个媒体文件解析拒绝服务和代码执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-4633 was patched at 2024-05-15

107. Remote Code Execution - FFmpeg (CVE-2009-4634) - Critical [616]

Description: Multiple integer underflows in FFmpeg 0.5 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted file that (1) bypasses a validation check in vorbis_dec.c and triggers a wraparound of the stack pointer, or (2) access a pointer from out-of-bounds memory in mov.c, related to an elst tag that appears before a tag that creates a stream.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] FFmpeg多个媒体文件解析拒绝服务和代码执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-4634 was patched at 2024-05-15

108. Remote Code Execution - FFmpeg (CVE-2009-4637) - Critical [616]

Description: FFmpeg 0.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger a stack-based buffer overflow.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] FFmpeg多个媒体文件解析拒绝服务和代码执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-4637 was patched at 2024-05-15

109. Remote Code Execution - FFmpeg (CVE-2016-10192) - Critical [616]

Description: Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check chunk size.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] FFmpeg Heap Overflow vulnerability (CVE-2016-10190))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2016-10192 was patched at 2024-05-15

110. Security Feature Bypass - PHP (CVE-2021-43617) - Critical [615]

Description: {'vulners_cve_data_all': 'Laravel Framework through 8.70.2 does not sufficiently block the upload of executable PHP content because Illuminate/Validation/Concerns/ValidatesAttributes.php lacks a check for .phar files, which are handled as application/x-httpd-php on systems based on Debian. NOTE: this CVE Record is for Laravel Framework, and is unrelated to any reports concerning incorrectly written user applications for image upload.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-43617 was patched at 2024-05-15

111. Remote Code Execution - Sudo (CVE-2012-0809) - Critical [614]

Description: Format string vulnerability in the sudo_debug function in Sudo 1.8.0 through 1.8.3p1 allows local users to execute arbitrary code via format string sequences in the program name for sudo.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([exploitpack] sudo 1.8.0 1.8.3p1 - sudo_debug glibc FORTIFY_SOURCE Bypass + Privilege Escalation, [zdt] Sudo v1.8.0-1.8.3p1 (sudo_debug) - Root Exploit, [seebug] sudo 1.8.0-1.8.3p1 (sudo_debug) - Root Exploit + glibc FORTIFY_SOURCE Bypass, [exploitdb] sudo 1.8.0 < 1.8.3p1 - 'sudo_debug' glibc FORTIFY_SOURCE Bypass + Privilege Escalation)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Sudo is a program for Unix-like computer operating systems that allows users to run programs with the security privileges of another user
CVSS Base Score0.710CVSS Base Score is 7.2. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2012-0809 was patched at 2024-05-15

112. Remote Code Execution - Windows LDAP (CVE-2021-42550) - Critical [614]

Description: In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Windows LDAP (Lightweight Directory Access Protocol) is an open and cross platform protocol used for directory services authentication
CVSS Base Score0.710CVSS Base Score is 6.6. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-42550 was patched at 2024-05-15

113. Denial of Service - Unknown Product (CVE-2024-0911) - Critical [613]

Description: {'vulners_cve_data_all': 'A flaw was found in indent, a program for formatting C code. This issue may allow an attacker to trick a user into processing a specially crafted file to trigger a heap-based buffer overflow, causing the application to crash.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2024-0911 was patched at 2024-05-15

114. Elevation of Privilege - Linux Kernel (CVE-2022-1043) - Critical [611]

Description: A flaw was found in the Linux kernel’s io_uring implementation. This flaw allows an attacker with a local account to corrupt system memory, crash the system or escalate privileges.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] io_uring Same Type Object Reuse Privilege Escalation Exploit, [metasploit] io_uring Same Type Object Reuse Priv Esc, [packetstorm] io_uring Same Type Object Reuse Privilege Escalation)
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-1043 was patched at 2024-05-15

115. Remote Code Execution - APT (CVE-2007-4629) - Critical [609]

Description: Buffer overflow in the processLine function in maptemplate.c in MapServer before 4.10.3 allows attackers to cause a denial of service and possibly execute arbitrary code via a mapfile with a long layer name, group name, or metadata entry name.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] MapServer远程栈溢出及跨站脚本漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814A free-software user interface that works with core libraries to handle the installation and removal of software on Debian
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2007-4629 was patched at 2024-05-15

116. Remote Code Execution - Adobe Reader (CVE-2006-3459) - Critical [609]

Description: Multiple stack-based buffer overflows in the TIFF library (libtiff) before 3.8.2, as used in Adobe Reader 9.3.0 and other products, allow context-dependent attackers to execute arbitrary code or cause a denial of service via unspecified vectors, including a large tdir_count value in the TIFFFetchShortPair function in tif_dirread.c.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Adobe Reader和Acrobat TIFF图像处理缓冲区溢出漏洞, [seebug] Libtiff图形库多个安全漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage Portable Document Format files
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2006-3459 was patched at 2024-05-15

117. Remote Code Execution - GNU C Library (CVE-2003-0028) - Critical [609]

Description: Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([canvas] Immunity Canvas: CMSD_XDRARRAY, [canvas] Immunity Canvas: TTDB_XDRARRAY)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814The GNU C Library, commonly known as glibc, is the GNU Project's implementation of the C standard library
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2003-0028 was patched at 2024-05-15

118. Remote Code Execution - Mozilla Firefox (CVE-2006-4253) - Critical [609]

Description: Concurrency vulnerability in Mozilla Firefox 1.5.0.6 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple Javascript timed events that load a deeply nested XML file, followed by redirecting the browser to another page, which leads to a concurrency failure that causes structures to be freed incorrectly, as demonstrated by (1) ffoxdie and (2) ffoxdie3. NOTE: it has been reported that Netscape 8.1 and K-Meleon 1.0.1 are also affected by ffoxdie. Mozilla confirmed to CVE that ffoxdie and ffoxdie3 trigger the same underlying vulnerability. NOTE: it was later reported that Firefox 2.0 RC2 and 1.5.0.7 are also affected.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.810CVSS Base Score is 7.6. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2006-4253 was patched at 2024-05-15

119. Remote Code Execution - OpenSSH (CVE-2019-16905) - Critical [609]

Description: OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2019-16905 was patched at 2024-05-15

120. Remote Code Execution - OpenSSL (CVE-2002-0656) - Critical [609]

Description: Buffer overflows in OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, allow remote attackers to execute arbitrary code via (1) a large client master key in SSL2 or (2) a large session ID in SSL3.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([exploitdb] OpenSSL SSLv2 - Malformed Client Key Remote Buffer Overflow Vulnerability 2, [canvas] Immunity Canvas: OPENSSL_KEYLEN)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2002-0656 was patched at 2024-05-15

121. Remote Code Execution - PHP (CVE-2011-4899) - Critical [609]

Description: wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier does not ensure that the specified MySQL database service is appropriate, which allows remote attackers to configure an arbitrary database via the dbhost and dbname parameters, and subsequently conduct static code injection and cross-site scripting (XSS) attacks via (1) an HTTP request or (2) a MySQL query. NOTE: the vendor disputes the significance of this issue; however, remote code execution makes the issue important in many realistic environments

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Elipse E3 Scada PLC Denial Of Service, [packetstorm] WordPress 3.3.1 Code Execution / Cross Site Scripting, [seebug] wordpress <= 3.3.1 - Multiple Vulnerabilities, [seebug] WordPress 3.3.1 Code Execution / Cross Site Scripting, [exploitpack] WordPress 3.3.1 - Multiple Vulnerabilities, [exploitdb] WordPress Core 3.3.1 - Multiple Vulnerabilities)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2011-4899 was patched at 2024-05-15

122. Remote Code Execution - Safari (CVE-2018-4192) - Critical [609]

Description: An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages a race condition.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] JavaScript Core - Arbitrary Code Execution Exploit, [packetstorm] JavaScript Core Arbitrary Code Execution)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2018-4192 was patched at 2024-05-15

123. Remote Code Execution - Safari (CVE-2020-15138) - Critical [609]

Description: Prism is vulnerable to Cross-Site Scripting. The easing preview of the Previewers plugin has an XSS vulnerability that allows attackers to execute arbitrary code in Safari and Internet Explorer. This impacts all Safari and Internet Explorer users of Prism >=v1.1.0 that use the _Previewers_ plugin (>=v1.10.0) or the _Previewer: Easing_ plugin (v1.1.0 to v1.9.0). This problem is fixed in version 1.21.0. To workaround the issue without upgrading, disable the easing preview on all impacted code blocks. You need Prism v1.10.0 or newer to apply this workaround.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Cross-site Scripting in Prismjs Previewers)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2020-15138 was patched at 2024-05-15

124. Remote Code Execution - Samba (CVE-2007-0454) - Critical [609]

Description: Format string vulnerability in the afsacl.so VFS module in Samba 3.0.6 through 3.0.23d allows context-dependent attackers to execute arbitrary code via format string specifiers in a filename on an AFS file system, which is not properly handled during Windows ACL mapping.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Samba服务器VFS插件afsacl.so远程格式串处理漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2007-0454 was patched at 2024-05-15

125. Authentication Bypass - Chromium (CVE-2021-30617) - Critical [605]

Description: {'vulners_cve_data_all': 'Chromium: CVE-2021-30617 Policy bypass in Blink', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object) website
Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30617 was patched at 2024-05-15

126. Authentication Bypass - OpenSSL (CVE-2016-7054) - Critical [605]

Description: {'vulners_cve_data_all': 'In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] OpenSSL 1.1.0a/1.1.0b - Denial of Service Exploit, [exploitpack] OpenSSL 1.1.0a1.1.0b - Denial of Service, [exploitdb] OpenSSL 1.1.0a/1.1.0b - Denial of Service)
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.814A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2016-7054 was patched at 2024-05-15

127. Authentication Bypass - Samba (CVE-2022-32743) - Critical [605]

Description: {'vulners_cve_data_all': 'Samba does not validate the Validated-DNS-Host-Name right for the dNSHostName attribute which could permit unprivileged users to write it.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.814Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-32743 was patched at 2024-05-15

128. Code Injection - PHP (CVE-2005-2612) - Critical [604]

Description: Direct code injection vulnerability in WordPress 1.5.1.3 and earlier allows remote attackers to execute arbitrary PHP code via the cache_lastpostdate[server] cookie.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] WordPress cache_lastpostdate Arbitrary Code Execution, [packetstorm] WordPress cache_lastpostdate Arbitrary Code Execution)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2005-2612 was patched at 2024-05-15

129. Code Injection - PHP (CVE-2009-1285) - Critical [604]

Description: Static code injection vulnerability in the getConfigFile function in setup/lib/ConfigFile.class.php in phpMyAdmin 3.x before 3.1.3.2 allows remote attackers to inject arbitrary PHP code into configuration files.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] phpMyAdmin配置文件PHP代码注入漏洞, [seebug] CVE-2009-1285: phpMyAdmin Code Injection)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-1285 was patched at 2024-05-15

130. Command Injection - OpenSSH (CVE-2020-15778) - Critical [604]

Description: scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for OS Command Injection in Openbsd Openssh, [githubexploit] Exploit for OS Command Injection in Openbsd Openssh)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common0.814OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

almalinux: CVE-2020-15778 was patched at 2024-05-22

debian: CVE-2020-15778 was patched at 2024-05-15

oraclelinux: CVE-2020-15778 was patched at 2024-05-23

redhat: CVE-2020-15778 was patched at 2024-05-22

131. Remote Code Execution - FFmpeg (CVE-2008-3162) - Critical [604]

Description: Stack-based buffer overflow in the str_read_packet function in libavformat/psxstr.c in FFmpeg before r13993 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted STR file that interleaves audio and video sectors.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-3162 was patched at 2024-05-15

132. Remote Code Execution - FFmpeg (CVE-2009-0385) - Critical [604]

Description: Integer signedness error in the fourxm_read_header function in libavformat/4xm.c in FFmpeg before revision 16846 allows remote attackers to execute arbitrary code via a malformed 4X movie file with a large current_track value, which triggers a NULL pointer dereference.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] FFmpeg 4xm文件解析内存破坏漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-0385 was patched at 2024-05-15

133. Remote Code Execution - FFmpeg (CVE-2009-4631) - Critical [604]

Description: Off-by-one error in the VP3 decoder (vp3.c) in FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted VP3 file that triggers an out-of-bounds read and possibly memory corruption.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] FFmpeg多个媒体文件解析拒绝服务和代码执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-4631 was patched at 2024-05-15

134. Remote Code Execution - FFmpeg (CVE-2009-4635) - Critical [604]

Description: FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted MOV container with improperly ordered tags that cause (1) mov.c and (2) utils.c to use inconsistent codec types and identifiers, leading to processing of a video-structure pointer by the mp3 decoder, and a stack-based buffer overflow.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] FFmpeg多个媒体文件解析拒绝服务和代码执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-4635 was patched at 2024-05-15

135. XXE Injection - Safari (CVE-2009-1699) - Critical [604]

Description: The XSL stylesheet implementation in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle XML external entities, which allows remote attackers to read arbitrary files via a crafted DTD, as demonstrated by a file:///etc/passwd URL in an entity declaration, related to an "XXE attack."

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([canvas] Immunity Canvas: SAFARI_FILE_STEALING2, [seebug] Apple Safari 4.0多个安全漏洞)
Criticality of Vulnerability Type0.9715XXE Injection
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-1699 was patched at 2024-05-15

136. Incorrect Calculation - FreeRDP (CVE-2024-32040) - Critical [600]

Description: {'vulners_cve_data_all': 'FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and have connections to servers using the `NSC` codec are vulnerable to integer underflow. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use the NSC codec (e.g. use `-nsc`).', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.515Incorrect Calculation
Vulnerable Product is Common0.614FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
CVSS Base Score0.810CVSS Base Score is 8.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2024-32040 was patched at 2024-05-15

ubuntu: CVE-2024-32040 was patched at 2024-04-24

137. Memory Corruption - FreeRDP (CVE-2024-32460) - Critical [600]

Description: FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.614FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license
CVSS Base Score0.810CVSS Base Score is 8.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2024-32460 was patched at 2024-05-15

ubuntu: CVE-2024-32460 was patched at 2024-04-24

138. Remote Code Execution - Perl (CVE-2011-2764) - Critical [600]

Description: The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin' Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Quake 3 Shell Injection / Code Execution)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2011-2764 was patched at 2024-05-15

139. Remote Code Execution - Redis (CVE-2016-8339) - Critical [600]

Description: A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store. A crafted CONFIG SET command can lead to an out of bounds write potentially resulting in code execution.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Redis CONFIG SET client-output-buffer-limit command Code Execution Vulnerability(CVE-2016-8339))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2016-8339 was patched at 2024-05-15

140. Remote Code Execution - Redis (CVE-2021-33026) - Critical [600]

Description: The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. NOTE: a third party indicates that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Deserialization of Untrusted Data in Flask-Caching Project Flask-Caching)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-33026 was patched at 2024-05-15

141. Remote Code Execution - Roundcube (CVE-2008-5619) - Critical [600]

Description: html2text.php in Chuggnutt HTML to Text Converter, as used in PHPMailer before 5.2.10, RoundCube Webmail (roundcubemail) 0.2-1.alpha and 0.2-3.beta, Mahara, and AtMail Open 1.03, allows remote attackers to execute arbitrary code via crafted input that is processed by the preg_replace function with the eval switch.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([exploitpack] Roundcube Webmail 0.2-3 Beta - Code Execution, [exploitpack] Roundcube Webmail 0.2b - Remote Code Execution, [packetstorm] RoundCube Webmail 0.2b Remote Code Execution, [packetstorm] RoundCube Webmail 0.2-3 Beta Code Execution, [seebug] RoundCube Webmail <= 0.2-3 beta Code Execution Vulnerability, [seebug] RoundCube Webmail <= 0.2b Remote Code Execution Exploit, [seebug] RoundCube Webmail <= 0.2-3 beta Code Execution Vulnerability, [seebug] RoundCube Webmail <= 0.2b Remote Code Execution Exploit, [dsquare] Roundcube 0.2beta RCE, [canvas] Immunity Canvas: ROUNDCUBE, [exploitdb] Roundcube Webmail 0.2b - Remote Code Execution, [exploitdb] Roundcube Webmail 0.2-3 Beta - Code Execution)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Roundcube is a web-based IMAP email client
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-5619 was patched at 2024-05-15

High (1129)

142. Remote Code Execution - GNOME desktop (CVE-2008-5987) - High [597]

Description: Untrusted search path vulnerability in the Python interface in Eye of GNOME (eog) 2.22.3, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] XChat PySys_SetArgv函数命令执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814GNOME originally an acronym for GNU Network Object Model Environment, is a free and open-source desktop environment for Linux and other Unix-like operating systems
CVSS Base Score0.710CVSS Base Score is 6.9. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-5987 was patched at 2024-05-15

143. Remote Code Execution - PHP (CVE-2007-1001) - High [597]

Description: Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allow context-dependent attackers to execute arbitrary code via Wireless Bitmap (WBMP) images with large width or height values.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Mac OS X 2007-007更新修复多个安全漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2007-1001 was patched at 2024-05-15

144. Path Traversal - Windows Kernel (CVE-2009-0841) - High [596]

Description: Directory traversal vulnerability in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when running on Windows with Cygwin, allows remote attackers to create arbitrary files via a .. (dot dot) in the id parameter.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] MapServer mapserv程序多个远程安全漏洞)
Criticality of Vulnerability Type0.715Path Traversal
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-0841 was patched at 2024-05-15

145. Security Feature Bypass - Linux Kernel (CVE-2018-14656) - High [596]

Description: {'vulners_cve_data_all': 'A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([canvas] Immunity Canvas: DMESG_LEAK)
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.710CVSS Base Score is 7.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2018-14656 was patched at 2024-05-15

146. Authentication Bypass - OpenSSH (CVE-2023-51767) - High [594]

Description: OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.814OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture
CVSS Base Score0.710CVSS Base Score is 7.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2023-51767 was patched at 2024-05-15

147. Command Injection - Python (CVE-2017-2810) - High [594]

Description: {'vulners_cve_data_all': 'An exploitable vulnerability exists in the Databook loading functionality of Tablib 0.11.4. A yaml loaded Databook can execute arbitrary python commands resulting in command execution. An attacker can insert python into loaded yaml to trigger this vulnerability.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Tablib Yaml Load Code Execution Vulnerability(CVE-2017-2810))
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-2810 was patched at 2024-05-15

148. Remote Code Execution - Apache Tomcat (CVE-2007-0774) - High [592]

Description: Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([d2] DSquare Exploit Pack: D2SEC_MOD_JK, [saint] Apache Tomcat JK Web Server Connector URI worker map buffer overflow, [saint] Apache Tomcat JK Web Server Connector URI worker map buffer overflow, [saint] Apache Tomcat JK Web Server Connector URI worker map buffer overflow, [saint] Apache Tomcat JK Web Server Connector URI worker map buffer overflow, [packetstorm] apache_modjk_overflow.rb.txt)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Apache Tomcat is a free and open-source implementation of the Jakarta Servlet, Jakarta Expression Language, and WebSocket technologies
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2007-0774 was patched at 2024-05-15

149. Remote Code Execution - Curl (CVE-2013-0249) - High [592]

Description: Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] cURL Buffer Overflow, [seebug] cURL Buffer Overflow Vulnerability, [zdt] cURL Buffer Overflow Vulnerability, [exploitpack] cURL - Buffer Overflow (PoC), [exploitdb] cURL - Buffer Overflow (PoC))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Curl is a command-line tool for transferring data specified with URL syntax
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2013-0249 was patched at 2024-05-15

150. Remote Code Execution - iOS (CVE-2012-6096) - High [592]

Description: Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Nagios3 history.cgi Host Command Execution, [packetstorm] Nagios 3.x Remote Command Execution, [seebug] Nagios 3.x Remote Command Execution(CVE-2012-6096), [seebug] Nagios history.cgi Remote Command Execution Vulnerability, [saint] Nagios 3 history.cgi Command Injection, [saint] Nagios 3 history.cgi Command Injection, [saint] Nagios 3 history.cgi Command Injection, [saint] Nagios 3 history.cgi Command Injection, [exploitpack] Nagios3 - history.cgi Remote Command Execution, [exploitpack] Nagios-history.cgi-Exec-Code, [exploitdb] Nagios3 - 'history.cgi' Remote Command Execution)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714iOS is an operating system developed and marketed by Apple Inc
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2012-6096 was patched at 2024-05-15

151. Security Feature Bypass - BIND (CVE-2024-3044) - High [592]

Description: {'vulners_cve_data_all': 'Unchecked script execution in Graphic on-click binding in affected LibreOffice versions allows an attacker to create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic. Such scripts were previously deemed trusted but are now deemed untrusted.\n', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.714BIND is a suite of software for interacting with the Domain Name System
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS data is not available

debian: CVE-2024-3044 was patched at 2024-05-15

redos: CVE-2024-3044 was patched at 2024-05-29

ubuntu: CVE-2024-3044 was patched at 2024-05-28

152. XXE Injection - PHP (CVE-2011-4107) - High [592]

Description: The simplexml_load_string function in the XML import plug-in (libraries/import/xml.php) in phpMyAdmin 3.4.x before 3.4.7.1 and 3.3.x before 3.3.10.5 allows remote authenticated users to read arbitrary files via XML data containing external entity references, aka an XML external entity (XXE) injection attack.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] phpMyAdmin 3.3.x / 3.4.x Local File Inclusion Via XXE Injection, [exploitpack] phpMyAdmin 3.3.x3.4.x - Local File Inclusion via XML External Entity Injection (Metasploit), [seebug] phpMyAdmin 3.3.X and 3.4.X - Local File Inclusion via XXE Injection, [seebug] phpMyAdmin 3.3.x & 3.4.x - Local File Inclusion via XXE Injection, [exploitdb] phpMyAdmin 3.3.x/3.4.x - Local File Inclusion via XML External Entity Injection (Metasploit))
Criticality of Vulnerability Type0.9715XXE Injection
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2011-4107 was patched at 2024-05-15

153. Remote Code Execution - Linux Kernel (CVE-2012-3364) - High [590]

Description: Multiple stack-based buffer overflows in the Near Field Communication Controller Interface (NCI) in the Linux kernel before 3.4.5 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via incoming frames with crafted length fields.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Linux Kernel NCI多个远程栈缓冲区溢出漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.510CVSS Base Score is 5.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2012-3364 was patched at 2024-05-15

154. Remote Code Execution - Unknown Product (CVE-2023-44452) - High [589]

Description: {'vulners_cve_data_all': 'Linux Mint Xreader CBT File Parsing Argument Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Mint Xreader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of CBT files. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22132.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

redos: CVE-2023-44452 was patched at 2024-04-18

155. Remote Code Execution - DirectX (CVE-2010-3275) - High [588]

Description: libdirectx_plugin.dll in VideoLAN VLC Media Player before 1.1.8 allows remote attackers to execute arbitrary code via a crafted width in an AMV file, related to a "dangling pointer vulnerability."

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] VLC AMV Dangling Pointer Vulnerability, [seebug] VLC Media Player ".AMV"和".NSV"多个远程缓冲区溢出漏洞, [packetstorm] VLC AMV Dangling Pointer Vulnerability, [metasploit] VLC AMV Dangling Pointer Vulnerability, [exploitdb] VideoLAN VLC Media Player 1.1.4 - 'AMV' Dangling Pointer (Metasploit))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614DirectX
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2010-3275 was patched at 2024-05-15

156. Remote Code Execution - DirectX (CVE-2010-3276) - High [588]

Description: libdirectx_plugin.dll in VideoLAN VLC Media Player before 1.1.8 allows remote attackers to execute arbitrary code via a crafted width in an NSV file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] VLC Media Player ".AMV"和".NSV"多个远程缓冲区溢出漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614DirectX
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2010-3276 was patched at 2024-05-15

157. Remote Code Execution - ImageMagick (CVE-2007-4987) - High [588]

Description: Off-by-one error in the ReadBlobString function in blob.c in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted image file, which triggers the writing of a '\0' character to an out-of-bounds address.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] ImageMagick blob.c文件单字节缓冲区溢出漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614ImageMagick, invoked from the command line as magick, is a free and open-source cross-platform software suite for displaying, creating, converting, modifying, and editing raster images
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2007-4987 was patched at 2024-05-15

158. Remote Code Execution - Perl (CVE-2008-2363) - High [588]

Description: The PartsBatch class in Pan 0.132 and earlier does not properly manage the data structures for Parts batches, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted .nzb file that triggers a heap-based buffer overflow.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Pan .nzb文件解析堆溢出漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-2363 was patched at 2024-05-15

159. Remote Code Execution - Python (CVE-2009-3850) - High [588]

Description: Blender 2.34, 2.35a, 2.40, and 2.49b allows remote attackers to execute arbitrary code via a .blend file that contains Python statements in the onLoad action of a ScriptLink SDNA.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([exploitpack] Blender 2.342.35a2.42.49b - .blend Command Injection, [packetstorm] Core Security Technologies Advisory 2009.0912, [seebug] Blender 2.34 2.35a 2.4 2.49b .blend File Command Injection, [seebug] Blender 2.34, 2.35a, 2.4, 2.49b .blend File Command Injection, [seebug] Blender 2.34 2.35a 2.4 2.49b .blend File Command Injection, [exploitdb] Blender 2.34/2.35a/2.4/2.49b - '.blend' Command Injection)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-3850 was patched at 2024-05-15

160. Remote Code Execution - Redis (CVE-2022-31144) - High [588]

Description: Redis is an in-memory database that persists on disk. A specially crafted `XAUTOCLAIM` command on a stream key in a specific state may result with heap overflow, and potentially remote code execution. This problem affects versions on the 7.x branch prior to 7.0.4. The patch is released in version 7.0.4.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Out-of-bounds Write in Redis)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Redis is an open-source in-memory storage, used as a distributed, in-memory key–value database, cache and message broker, with optional durability
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-31144 was patched at 2024-05-15

161. Remote Code Execution - Wireshark (CVE-2009-4376) - High [588]

Description: Buffer overflow in the daintree_sna_read function in the Daintree SNA file parser in Wireshark 1.2.0 through 1.2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Wireshark 1.2.5版本修复多个安全漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-4376 was patched at 2024-05-15

162. Remote Code Execution - Wireshark (CVE-2011-1591) - High [588]

Description: Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Wireshark 1.4.4 DECT Dissector Buffer Overflow, [packetstorm] Wireshark 1.4.4 packet-dect.c Stack Buffer Overflow, [packetstorm] Wireshark 1.4.4 Remote Stack Buffer Overflow, [packetstorm] Wireshark 1.4.4 Local Stack Buffer Overflow, [saint] Wireshark DECT Dissector PCAP File Processing Overflow, [saint] Wireshark DECT Dissector Remote Stack Buffer Overflow, [saint] Wireshark DECT Dissector Remote Stack Buffer Overflow, [saint] Wireshark DECT Dissector PCAP File Processing Overflow, [saint] Wireshark DECT Dissector Remote Stack Buffer Overflow, [saint] Wireshark DECT Dissector Remote Stack Buffer Overflow, [saint] Wireshark DECT Dissector PCAP File Processing Overflow, [saint] Wireshark DECT Dissector PCAP File Processing Overflow, [canvas] Immunity Canvas: WIRESHARK_DECT)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education
CVSS Base Score0.910CVSS Base Score is 9.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2011-1591 was patched at 2024-05-15

163. Authentication Bypass - Unknown Product (CVE-2023-22602) - High [585]

Description: {'vulners_cve_data_all': 'When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass.\n\nThe authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching.\nMitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`\n\n\n', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2023-22602 was patched at 2024-05-15

164. Denial of Service - Linux Kernel (CVE-2011-2189) - High [584]

Description: net/core/net_namespace.c in the Linux kernel 2.6.32 and earlier does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) via requests to a daemon that requires a separate namespace per connection, as demonstrated by vsftpd.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object) website
Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2011-2189 was patched at 2024-05-15

165. Security Feature Bypass - Linux Kernel (CVE-2021-4148) - High [584]

Description: {'vulners_cve_data_all': 'A vulnerability was found in the Linux kernel's block_invalidatepage in fs/buffer.c in the filesystem. A missing sanity check may allow a local attacker with user privilege to cause a denial of service (DOS) problem.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-4148 was patched at 2024-05-15

166. Code Injection - PHP (CVE-2022-23808) - High [580]

Description: An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Cross-site Scripting in Phpmyadmin)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.610CVSS Base Score is 6.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-23808 was patched at 2024-05-15

167. Remote Code Execution - BIND (CVE-2009-0317) - High [580]

Description: Untrusted search path vulnerability in the Python language bindings for Nautilus (nautilus-python) allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] XChat PySys_SetArgv函数命令执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714BIND is a suite of software for interacting with the Domain Name System
CVSS Base Score0.710CVSS Base Score is 6.9. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-0317 was patched at 2024-05-15

168. Remote Code Execution - FFmpeg (CVE-2010-3429) - High [580]

Description: flicvideo.c in libavcodec 0.6 and earlier in FFmpeg, as used in MPlayer and other products, allows remote attackers to execute arbitrary code via a crafted flic file, related to an "arbitrary offset dereference vulnerability."

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] FFmpeg libavcodec "vmd decode()"堆缓冲区溢出漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2010-3429 was patched at 2024-05-15

169. Remote Code Execution - FFmpeg (CVE-2010-3908) - High [580]

Description: FFmpeg before 0.5.4, as used in MPlayer and other products, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a malformed WMV file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] FFmpeg畸形".wmv"文件解析内存破坏远程代码执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2010-3908 was patched at 2024-05-15

170. Remote Code Execution - FFmpeg (CVE-2011-0722) - High [580]

Description: FFmpeg before 0.5.4, as used in MPlayer and other products, allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a malformed RealMedia file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] FFmpeg Real Media文件解析内存破坏远程代码执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2011-0722 was patched at 2024-05-15

171. Remote Code Execution - FFmpeg (CVE-2011-0723) - High [580]

Description: FFmpeg 0.5.x, as used in MPlayer and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed VC-1 file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] FFmpeg畸形"VC1"文件解析内存破坏远程代码执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2011-0723 was patched at 2024-05-15

172. Remote Code Execution - FFmpeg (CVE-2012-0859) - High [580]

Description: The render_line function in the vorbis codec (vorbis.c) in libavcodec in FFmpeg before 0.9.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted Vorbis file, related to a large multiplier. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3893.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Google Chrome 15.x MKV和Vorbis媒体处理漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2012-0859 was patched at 2024-05-15

173. Remote Code Execution - vim (CVE-2009-0316) - High [580]

Description: Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Vim PySys_SetArgv函数本地命令执行漏洞, [seebug] XChat PySys_SetArgv函数命令执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Vim is a free and open-source, screen-based text editor program
CVSS Base Score0.710CVSS Base Score is 6.9. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-0316 was patched at 2024-05-15

174. Security Feature Bypass - Google Chrome (CVE-2021-30531) - High [579]

Description: Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30531 was patched at 2024-05-15

175. Security Feature Bypass - Google Chrome (CVE-2021-30534) - High [579]

Description: Insufficient policy enforcement in iFrameSandbox in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30534 was patched at 2024-05-15

176. Security Feature Bypass - Google Chrome (CVE-2021-30540) - High [579]

Description: {'vulners_cve_data_all': 'Incorrect security UI in payments in Google Chrome on Android prior to 91.0.4472.77 allowed a remote attacker to perform domain spoofing via a crafted HTML page.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30540 was patched at 2024-05-15

177. Remote Code Execution - Perl (CVE-2004-1388) - High [576]

Description: Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Berlios GPSD Format String Vulnerability, [canvas] Immunity Canvas: GPSD)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2004-1388 was patched at 2024-05-15

178. Remote Code Execution - Perl (CVE-2008-2371) - High [576]

Description: Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] PCRE pcre_compile.c文件堆溢出漏洞, [seebug] PCRE 规则表达式堆缓冲区溢出漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-2371 was patched at 2024-05-15

179. Remote Code Execution - Perl (CVE-2013-0333) - High [576]

Description: lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Ruby on Rails JSON Processor YAML Deserialization Code Execution, [packetstorm] Ruby On Rails XML Processor YAML Deserialization Code Execution, [seebug] Ruby on Rails 'convert_json_to_yaml()'方法安全漏洞, [seebug] Ruby on Rails XML Processor YAML Deserialization Code Execution, [seebug] Ruby on Rails JSON Processor YAML Deserialization Code Execution, [metasploit] Ruby on Rails XML Processor YAML Deserialization Code Execution, [metasploit] Ruby on Rails JSON Processor YAML Deserialization Scanner, [metasploit] Ruby on Rails XML Processor YAML Deserialization Scanner, [metasploit] Ruby on Rails JSON Processor YAML Deserialization Code Execution, [saint] Ruby on Rails XML Processor YAML Deserialization, [saint] Ruby on Rails XML Processor YAML Deserialization, [saint] Ruby on Rails XML Processor YAML Deserialization, [saint] Ruby on Rails XML Processor YAML Deserialization, [zdt] Ruby On Rails XML Processor YAML Deserialization Code Execution, [zdt] Action Pack Multiple Vulnerabilities, [exploitdb] Ruby on Rails - XML Processor YAML Deserialization Code Execution (Metasploit), [exploitdb] Ruby on Rails - JSON Processor YAML Deserialization Code Execution (Metasploit))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2013-0333 was patched at 2024-05-15

180. Remote Code Execution - Perl (CVE-2013-1800) - High [576]

Description: The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([metasploit] Ruby on Rails XML Processor YAML Deserialization Code Execution, [metasploit] Ruby on Rails JSON Processor YAML Deserialization Scanner, [metasploit] Ruby on Rails XML Processor YAML Deserialization Scanner, [metasploit] Ruby on Rails JSON Processor YAML Deserialization Code Execution, [packetstorm] Ruby On Rails XML Processor YAML Deserialization Code Execution, [packetstorm] Ruby on Rails JSON Processor YAML Deserialization Code Execution, [seebug] Ruby on Rails XML Processor YAML Deserialization Code Execution, [seebug] Ruby on Rails JSON Processor YAML Deserialization Code Execution, [saint] Ruby on Rails XML Processor YAML Deserialization, [saint] Ruby on Rails XML Processor YAML Deserialization, [saint] Ruby on Rails XML Processor YAML Deserialization, [saint] Ruby on Rails XML Processor YAML Deserialization, [zdt] Ruby On Rails XML Processor YAML Deserialization Code Execution, [zdt] Action Pack Multiple Vulnerabilities, [exploitdb] Ruby on Rails - XML Processor YAML Deserialization Code Execution (Metasploit), [exploitdb] Ruby on Rails - JSON Processor YAML Deserialization Code Execution (Metasploit))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2013-1800 was patched at 2024-05-15

181. Remote Code Execution - Perl (CVE-2013-1802) - High [576]

Description: The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([metasploit] Ruby on Rails XML Processor YAML Deserialization Code Execution, [metasploit] Ruby on Rails JSON Processor YAML Deserialization Scanner, [metasploit] Ruby on Rails XML Processor YAML Deserialization Scanner, [metasploit] Ruby on Rails JSON Processor YAML Deserialization Code Execution, [packetstorm] Ruby On Rails XML Processor YAML Deserialization Code Execution, [packetstorm] Ruby on Rails JSON Processor YAML Deserialization Code Execution, [seebug] Ruby on Rails XML Processor YAML Deserialization Code Execution, [seebug] Ruby on Rails JSON Processor YAML Deserialization Code Execution, [saint] Ruby on Rails XML Processor YAML Deserialization, [saint] Ruby on Rails XML Processor YAML Deserialization, [saint] Ruby on Rails XML Processor YAML Deserialization, [saint] Ruby on Rails XML Processor YAML Deserialization, [zdt] Ruby On Rails XML Processor YAML Deserialization Code Execution, [zdt] Action Pack Multiple Vulnerabilities, [exploitdb] Ruby on Rails - XML Processor YAML Deserialization Code Execution (Metasploit), [exploitdb] Ruby on Rails - JSON Processor YAML Deserialization Code Execution (Metasploit))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2013-1802 was patched at 2024-05-15

182. Remote Code Execution - Roundcube (CVE-2016-9920) - High [576]

Description: steps/mail/sendmail.inc in Roundcube before 1.1.7 and 1.2.x before 1.2.3, when no SMTP server is configured and the sendmail program is enabled, does not properly restrict the use of custom envelope-from addresses on the sendmail command line, which allows remote authenticated users to execute arbitrary code via a modified HTTP request that sends a crafted e-mail message.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Roundcube 1.2.2: Command Execution via Email)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Roundcube is a web-based IMAP email client
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2016-9920 was patched at 2024-05-15

183. Unknown Vulnerability Type - Jetty (CVE-2021-34429) - High [576]

Description: {'vulners_cve_data_all': 'For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerability reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common0.614Jetty is a Java based web server and servlet engine
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-34429 was patched at 2024-05-15

184. Code Injection - QEMU (CVE-2017-8284) - High [575]

Description: {'vulners_cve_data_all': 'The disas_insn function in target/i386/translate.c in QEMU before 2.9.0, when TCG mode without hardware acceleration is used, does not limit the instruction size, which allows local users to gain privileges by creating a modified basic block that injects code into a setuid program, as demonstrated by procmail. NOTE: the vendor has stated "this bug does not violate any security guarantees QEMU makes.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.714QEMU is a generic and open source machine & userspace emulator and virtualizer
CVSS Base Score0.710CVSS Base Score is 7.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-8284 was patched at 2024-05-15

185. Security Feature Bypass - iOS (CVE-2014-2913) - High [575]

Description: {'vulners_cve_data_all': 'Incomplete blacklist vulnerability in nrpe.c in Nagios Remote Plugin Executor (NRPE) 2.15 and earlier allows remote attackers to execute arbitrary commands via a newline character in the -a option to libexec/check_nrpe. NOTE: this issue is disputed by multiple parties. It has been reported that the vendor allows newlines as "expected behavior." Also, this issue can only occur when the administrator enables the "dont_blame_nrpe" option in nrpe.conf despite the "HIGH security risk" warning within the comments', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] NRPE 2.15 Remote Command Execution, [seebug] NRPE 2.15 - Remote Code Execution Vulnerability, [exploitpack] NRPE 2.15 - Remote Code Execution, [zdt] NRPE 2.15 - Remote Code Execution Vulnerability, [exploitdb] NRPE 2.15 - Remote Code Execution)
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.714iOS is an operating system developed and marketed by Apple Inc
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2014-2913 was patched at 2024-05-15

186. Remote Code Execution - Mozilla Firefox (CVE-2006-0295) - High [573]

Description: Mozilla Firefox 1.5, Thunderbird 1.5 if Javascript is enabled in mail, and SeaMonkey before 1.0 might allow remote attackers to execute arbitrary code via the QueryInterface method of the built-in Location and Navigator objects, which leads to memory corruption.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Firefox location.QueryInterface() Code Execution, [packetstorm] firefox_queryinterface_mac.pm.txt, [packetstorm] firefox_queryinterface.pm.txt, [saint] Mozilla Firefox QueryInterface method memory corruption, [saint] Mozilla Firefox QueryInterface method memory corruption, [saint] Mozilla Firefox QueryInterface method memory corruption, [saint] Mozilla Firefox QueryInterface method memory corruption)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.510CVSS Base Score is 5.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2006-0295 was patched at 2024-05-15

187. Authentication Bypass - Apache ActiveMQ (CVE-2014-3612) - High [572]

Description: The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows remote attackers to bypass authentication by logging in with an empty password and valid username, which triggers an unauthenticated bind. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6524 for the use of wildcard operators in usernames.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] Apache ActiveMQ 5.0.0 - 5.10.0 JAAS LDAPLoginModule empty password authentication Vulnerability)
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.614Apache ActiveMQ is an open source message broker written in Java together with a full Java Message Service (JMS) client
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2014-3612 was patched at 2024-05-15

188. Authentication Bypass - Python (CVE-2013-1895) - High [572]

Description: The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Python 'py-bcrypt' 模块身份验证绕过漏洞(CVE-2013-1895))
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2013-1895 was patched at 2024-05-15

189. Denial of Service - Linux Kernel (CVE-2017-16996) - High [572]

Description: kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] Linux Kernel >= 4.9 eBPF memory corruption bugs Vulnerability)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-16996 was patched at 2024-05-15

190. Denial of Service - Linux Kernel (CVE-2017-5972) - High [572]

Description: The TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie protection mechanism for the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP SYN packets, as demonstrated by an attack against the kernel-3.10.0 package in CentOS Linux 7. NOTE: third parties have been unable to discern any relationship between the GitHub Engineering finding and the Trigemini.c attack code.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] Linux Kernel 3.10.0 (CentOS7) Denial Of Service Exploit, [packetstorm] CentOS7 Kernel Denial Of Service)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-5972 was patched at 2024-05-15

191. Information Disclosure - Linux Kernel (CVE-2018-7273) - High [572]

Description: {'vulners_cve_data_all': 'In the Linux kernel through 4.15.4, the floppy driver reveals the addresses of kernel functions and global variables using printk calls within the function show_floppy in drivers/block/floppy.c. An attacker can read this information from dmesg and use the addresses to find the locations of kernel code and data and bypass kernel security protections such as KASLR.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Linux Kernel show_floppy KASLR Address Leak, [zdt] Linux Kernel < 4.15.4 - show_floppy KASLR Address Leak Exploit)
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2018-7273 was patched at 2024-05-15

192. Information Disclosure - Linux Kernel (CVE-2022-4543) - High [572]

Description: {'vulners_cve_data_all': 'A flaw named "EntryBleed" was found in the Linux Kernel Page Table Isolation (KPTI). This issue could allow a local attacker to leak KASLR base via prefetch side-channels based on TLB timing for Intel systems.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Exposure of Sensitive Information to an Unauthorized Actor in Linux Linux Kernel)
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-4543 was patched at 2024-05-15

193. Remote Code Execution - Cacti (CVE-2023-39358) - High [571]

Description: Cacti is an open source operational monitoring and fault management framework. An authenticated SQL injection vulnerability was discovered which allows authenticated users to perform privilege escalation and remote code execution. The vulnerability resides in the `reports_user.php` file. In `ajax_get_branches`, the `tree_id` parameter is passed to the `reports_get_branch_select` function without any validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Cacti is an open source operational monitoring and fault management framework
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2023-39358 was patched at 2024-05-15

194. Remote Code Execution - Cacti (CVE-2024-31445) - High [571]

Description: Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, a SQL injection vulnerability in `automation_get_new_graphs_sql` function of `api_automation.php` allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation and remote code execution. In `api_automation.php` line 856, the `get_request_var('filter')` is being concatenated into the SQL statement without any sanitization. In `api_automation.php` line 717, The filter of `'filter'` is `FILTER_DEFAULT`, which means there is no filter for it. Version 1.2.27 contains a patch for the issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Cacti is an open source operational monitoring and fault management framework
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2024-31445 was patched at 2024-05-15

195. Remote Code Execution - TRIE (CVE-2022-2566) - High [571]

Description: A heap out-of-bounds memory write exists in FFMPEG since version 5.1. The size calculation in `build_open_gop_key_points()` goes through all entries in the loop and adds `sc->ctts_data[i].count` to `sc->sample_offsets_count`. This can lead to an integer overflow resulting in a small allocation with `av_calloc()`. An attacker can cause remote code execution via a malicious mp4 file. We recommend upgrading past commit c953baa084607dd1d84c3bfcce3cf6a87c3e6e05

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514TRIE
CVSS Base Score0.910CVSS Base Score is 9.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-2566 was patched at 2024-05-15

196. Code Injection - Perl (CVE-2011-2506) - High [570]

Description: setup/lib/ConfigGenerator.class.php in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 does not properly restrict the presence of comment closing delimiters, which allows remote attackers to conduct static code injection attacks by leveraging the ability to modify the SESSION superglobal array.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] phpMyAdmin3 (pma3) Remote Code Execution Exploit, [seebug] phpMyAdmin 3.x Swekey Remote Code Injection Exploit, [seebug] phpMyAdmin 3.x 多个安全漏洞, [seebug] phpMyAdmin 3.x Multiple Remote Code Executions, [packetstorm] phpMyAdmin 3.x Swekey Remote Code Injection, [packetstorm] phpMyAdmin3 Remote Code Execution, [packetstorm] phpMyAdmin 3.x Remote Code Execution, [exploitpack] phpMyAdmin 3.x - Swekey Remote Code Injection, [exploitpack] phpMyAdmin3 (pma3) - Remote Code Execution, [dsquare] Phpmyadmin 3.x RCE, [exploitdb] phpMyAdmin 3.x - Swekey Remote Code Injection, [exploitdb] phpMyAdmin3 (pma3) - Remote Code Execution)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2011-2506 was patched at 2024-05-15

197. Arbitrary File Reading - PHP (CVE-2014-2383) - High [567]

Description: dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([wpexploit] Multiple plugins - Unauthenticated Dompdf Local File Inclusion (LFI), [exploitpack] dompdf 0.6.0 - dompdf.php?read Arbitrary File Read, [zdt] dompdf 0.6.0 Arbitrary File Read Vulnerability, [packetstorm] dompdf 0.6.0 Arbitrary File Read, [seebug] dompdf 0.6.0 (dompdf.php, read param) - Arbitrary File Read, [exploitdb] dompdf 0.6.0 - 'dompdf.php?read' Arbitrary File Read)
Criticality of Vulnerability Type0.8315Arbitrary File Reading
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2014-2383 was patched at 2024-05-15

198. Information Disclosure - Safari (CVE-2009-1718) - High [567]

Description: WebKit in Apple Safari before 4.0 allows user-assisted remote attackers to obtain sensitive information via vectors involving drag events and the dragging of content over a crafted web page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Apple Safari 4.0多个安全漏洞)
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.710CVSS Base Score is 7.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-1718 was patched at 2024-05-15

199. Elevation of Privilege - BIND (CVE-2019-2025) - High [566]

Description: In binder_thread_read of binder.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-116855682References: Upstream kernel

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] Android - binder Use-After-Free via racy Initialization of ->allow_user_free Exploit)
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.714BIND is a suite of software for interacting with the Domain Name System
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2019-2025 was patched at 2024-05-15

200. Remote Code Execution - Perl (CVE-2012-4409) - High [564]

Description: Stack-based buffer overflow in the check_file_head function in extra.c in mcrypt 2.6.8 and earlier allows user-assisted remote attackers to execute arbitrary code via an encrypted file with a crafted header containing long salt data that is not properly handled during decryption.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] mcrypt 2.5.8 Stack Based Overflow, [exploitpack] mcrypt 2.5.8 - Local Stack Overflow, [seebug] mcrypt <= 2.5.8 Stack Based Overflow, [exploitdb] mcrypt 2.5.8 - Local Stack Overflow)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2012-4409 was patched at 2024-05-15

201. Remote Code Execution - Python (CVE-2008-5984) - High [564]

Description: Untrusted search path vulnerability in the Python plugin in Dia 0.96.1, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Dia Python插件使用不安全搜索路径漏洞, [seebug] XChat PySys_SetArgv函数命令执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score0.710CVSS Base Score is 6.9. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-5984 was patched at 2024-05-15

202. Remote Code Execution - Python (CVE-2008-5985) - High [564]

Description: Untrusted search path vulnerability in the Python interface in Epiphany 2.22.3, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Epiphany PySys_SetArgv函数命令执行漏, [seebug] XChat PySys_SetArgv函数命令执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score0.710CVSS Base Score is 6.9. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-5985 was patched at 2024-05-15

203. Remote Code Execution - Python (CVE-2008-5986) - High [564]

Description: Untrusted search path vulnerability in the (1) "VST plugin with Python scripting" and (2) "VST plugin for writing score generators in Python" in Csound 5.08.2, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] XChat PySys_SetArgv函数命令执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score0.710CVSS Base Score is 6.9. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-5986 was patched at 2024-05-15

204. Remote Code Execution - Python (CVE-2009-0314) - High [564]

Description: Untrusted search path vulnerability in the Python module in gedit allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] gedit PySys_SetArgv函数代码执行漏洞, [seebug] XChat PySys_SetArgv函数命令执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score0.710CVSS Base Score is 6.9. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-0314 was patched at 2024-05-15

205. Remote Code Execution - Python (CVE-2009-0315) - High [564]

Description: Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] XChat PySys_SetArgv函数命令执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score0.710CVSS Base Score is 6.9. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-0315 was patched at 2024-05-15

206. Remote Code Execution - Python (CVE-2009-0318) - High [564]

Description: Untrusted search path vulnerability in the GObject Python interpreter wrapper in Gnumeric allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] XChat PySys_SetArgv函数命令执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score0.710CVSS Base Score is 6.9. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-0318 was patched at 2024-05-15

207. Remote Code Execution - Python (CVE-2013-5093) - High [564]

Description: The renderLocalView function in render/views.py in graphite-web in Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Graphite Web Unsafe Pickle Handling, [zdt] Graphite Web Unsafe Pickle Handling Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2013-5093 was patched at 2024-05-15

208. Remote Code Execution - Python (CVE-2013-5942) - High [564]

Description: Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, and (4) whitelist/views.py, a different vulnerability than CVE-2013-5093.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Graphite Web Unsafe Pickle Handling, [zdt] Graphite Web Unsafe Pickle Handling Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2013-5942 was patched at 2024-05-15

209. Security Feature Bypass - iOS (CVE-2023-45857) - High [563]

Description: {'vulners_cve_data_all': 'An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.714iOS is an operating system developed and marketed by Apple Inc
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2023-45857 was patched at 2024-05-15

210. Information Disclosure - SQLite (CVE-2021-42523) - High [562]

Description: There are two Information Disclosure vulnerabilities in colord, and they lie in colord/src/cd-device-db.c and colord/src/cd-profile-db.c separately. They exist because the 'err_msg' of 'sqlite3_exec' is not releasing after use, while libxml2 emphasizes that the caller needs to release it.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.714SQLite is a database engine written in the C programming language
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-42523 was patched at 2024-05-15

211. Denial of Service - Windows Kernel (CVE-2008-4609) - High [560]

Description: The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Windows 2000 TCP/IP窗口大小拒绝服务漏洞(MS09-048))
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.710CVSS Base Score is 7.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-4609 was patched at 2024-05-15

212. Remote Code Execution - Cacti (CVE-2024-31459) - High [559]

Description: Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, there is a file inclusion issue in the `lib/plugin.php` file. Combined with SQL injection vulnerabilities, remote code execution can be implemented. There is a file inclusion issue with the `api_plugin_hook()` function in the `lib/plugin.php` file, which reads the plugin_hooks and plugin_config tables in database. The read data is directly used to concatenate the file path which is used for file inclusion. Version 1.2.27 contains a patch for the issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Cacti is an open source operational monitoring and fault management framework
CVSS Base Score0.810CVSS Base Score is 8.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2024-31459 was patched at 2024-05-15

213. Remote Code Execution - GDI (CVE-2006-0106) - High [559]

Description: gdi/driver.c and gdi/printdrv.c in Wine 20050930, and other versions, implement the SETABORTPROC GDI Escape function call for Windows Metafile (WMF) files, which allows attackers to execute arbitrary code, the same vulnerability as CVE-2005-4560 but in a different codebase.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([saint] Windows WMF handling vulnerability, [saint] Windows WMF handling vulnerability, [saint] Windows WMF handling vulnerability, [saint] Windows WMF handling vulnerability, [canvas] Immunity Canvas: WMF_SETABORT, [packetstorm] Windows XP/2003/Vista Metafile Escape() SetAbortProc Code Execution)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514GDI
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2006-0106 was patched at 2024-05-15

214. Remote Code Execution - Libarchive (CVE-2016-4301) - High [559]

Description: Stack-based buffer overflow in the parse_device function in archive_read_support_format_mtree.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a crafted mtree file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Libarchive mtree parse_device Code Execution Vulnerability(CVE-2016-4301))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Multi-format archive and compression library
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2016-4301 was patched at 2024-05-15

215. Remote Code Execution - NetBIOS (CVE-2014-9377) - High [559]

Description: Heap-based buffer overflow in the nbns_spoof function in plug-ins/nbns_spoof/nbns_spoof.c in Ettercap 0.8.1 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a large netbios packet.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Ettercap 0.8.0 / 0.8.1 Denial Of Service, [exploitpack] Ettercap 0.8.0 0.8.1 - Multiple Denial of Service Vulnerabilities, [exploitdb] Ettercap 0.8.0 < 0.8.1 - Multiple Denial of Service Vulnerabilities)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN)
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2014-9377 was patched at 2024-05-15

216. Remote Code Execution - TLS (CVE-2006-6170) - High [559]

Description: Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] vd_proftpd.pm.txt, [packetstorm] ProFTPD 1.2 - 1.3.0 sreplace Buffer Overflow (Linux))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514TLS
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2006-6170 was patched at 2024-05-15

217. Remote Code Execution - TLS (CVE-2017-2784) - High [559]

Description: An exploitable free of a stack pointer vulnerability exists in the x509 certificate parsing code of ARM mbed TLS before 1.3.19, 2.x before 2.1.7, and 2.4.x before 2.4.2. A specially crafted x509 certificate, when parsed by mbed TLS library, can cause an invalid free of a stack pointer leading to a potential remote code execution. In order to exploit this vulnerability, an attacker can act as either a client or a server on a network to deliver malicious x509 certificates to vulnerable applications.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] ARM Mbedtls x509 ECDSA invalid public key Remote Code Execution Vulnerability(CVE-2017-2784))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514TLS
CVSS Base Score0.810CVSS Base Score is 8.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-2784 was patched at 2024-05-15

218. Remote Code Execution - TLS (CVE-2021-21374) - High [559]

Description: Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, "nimble refresh" fetches a list of Nimble packages over HTTPS without full verification of the SSL/TLS certificate due to the default setting of httpClient. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514TLS
CVSS Base Score0.810CVSS Base Score is 8.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-21374 was patched at 2024-05-15

219. Remote Code Execution - nginx (CVE-2009-2629) - High [559]

Description: Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] nginx HTTP请求远程缓冲区溢出漏洞, [canvas] Immunity Canvas: NGINX)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Nginx is an open-source web server that can also be used as a reverse proxy, load balancer, mail proxy and HTTP cache
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-2629 was patched at 2024-05-15

220. Remote Code Execution - nginx (CVE-2014-0133) - High [559]

Description: Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Nginx SPDY缓冲区溢出漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Nginx is an open-source web server that can also be used as a reverse proxy, load balancer, mail proxy and HTTP cache
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2014-0133 was patched at 2024-05-15

221. Security Feature Bypass - Unknown Product (CVE-2023-24023) - High [559]

Description: {'vulners_cve_data_all': 'Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

almalinux: CVE-2023-24023 was patched at 2024-05-22

debian: CVE-2023-24023 was patched at 2024-05-15

oraclelinux: CVE-2023-24023 was patched at 2024-05-02, 2024-05-23

redhat: CVE-2023-24023 was patched at 2024-05-22

ubuntu: CVE-2023-24023 was patched at 2024-04-19, 2024-04-23

222. Command Injection - Python (CVE-2024-23829) - High [558]

Description: aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common0.614Python is a high-level, general-purpose programming language
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2024-23829 was patched at 2024-05-15

redos: CVE-2024-23829 was patched at 2024-04-23

223. Information Disclosure - Unknown Product (CVE-2021-40402) - High [558]

Description: {'vulners_cve_data_all': 'An out-of-bounds read vulnerability exists in the RS-274X aperture macro multiple outline primitives functionality of Gerbv 2.7.0 and dev (commit b5f1eacd), and Gerbv forked 2.7.1 and 2.8.0. A specially-crafted Gerber file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-40402 was patched at 2024-05-15

224. Security Feature Bypass - Perl (CVE-2018-6829) - High [558]

Description: {'vulners_cve_data_all': 'cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2018-6829 was patched at 2024-05-15

225. Security Feature Bypass - Perl (CVE-2024-1135) - High [558]

Description: {'vulners_cve_data_all': 'Gunicorn fails to properly validate Transfer-Encoding headers, leading to HTTP Request Smuggling (HRS) vulnerabilities. By crafting requests with conflicting Transfer-Encoding headers, attackers can bypass security restrictions and access restricted endpoints. This issue is due to Gunicorn's handling of Transfer-Encoding headers, where it incorrectly processes requests with multiple, conflicting Transfer-Encoding headers, treating them as chunked regardless of the final encoding specified. This vulnerability allows for a range of attacks including cache poisoning, session manipulation, and data exposure.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2024-1135 was patched at 2024-05-15

redhat: CVE-2024-1135 was patched at 2024-05-22

226. XXE Injection - Perl (CVE-2013-0340) - High [558]

Description: expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.9715XXE Injection
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2013-0340 was patched at 2024-05-15

227. XXE Injection - Perl (CVE-2024-23525) - High [558]

Description: The Spreadsheet::ParseXLSX package before 0.30 for Perl allows XXE attacks because it neglects to use the no_xxe option of XML::Twig.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.9715XXE Injection
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2024-23525 was patched at 2024-05-15

ubuntu: CVE-2024-23525 was patched at 2024-05-09

228. Denial of Service - Binutils (CVE-2017-16830) - High [555]

Description: The print_gnu_property_note function in readelf.c in GNU Binutils 2.29.1 does not have integer-overflow protection on 32-bit platforms, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-16830 was patched at 2024-05-15

229. Denial of Service - Binutils (CVE-2017-17126) - High [555]

Description: The load_debug_section function in readelf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via an ELF file that lacks section headers.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-17126 was patched at 2024-05-15

230. Denial of Service - Binutils (CVE-2022-47673) - High [555]

Description: An issue was discovered in Binutils addr2line before 2.39.3, function parse_module contains multiple out of bound reads which may cause a denial of service or other unspecified impacts.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-47673 was patched at 2024-05-15

231. Denial of Service - Binutils (CVE-2022-47696) - High [555]

Description: An issue was discovered Binutils objdump before 2.39.3 allows attackers to cause a denial of service or other unspecified impacts via function compare_symbols.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2022-47696 was patched at 2024-05-15

232. Denial of Service - GNOME desktop (CVE-2018-11396) - High [555]

Description: ephy-session.c in libephymain.so in GNOME Web (aka Epiphany) through 3.28.2.1 allows remote attackers to cause a denial of service (application crash) via JavaScript code that triggers access to a NULL URL, as demonstrated by a crafted window.open call.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([exploitpack] Epiphany 3.28.2.1 - Denial of Service, [exploitdb] Epiphany 3.28.2.1 - Denial of Service, [packetstorm] Epiphany 3.28.2.1 Denial Of Service)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814GNOME originally an acronym for GNU Network Object Model Environment, is a free and open-source desktop environment for Linux and other Unix-like operating systems
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2018-11396 was patched at 2024-05-15

233. Denial of Service - ICMP (CVE-2016-1879) - High [555]

Description: The Stream Control Transmission Protocol (SCTP) module in FreeBSD 9.3 before p33, 10.1 before p26, and 10.2 before p9, when the kernel is configured for IPv6, allows remote attackers to cause a denial of service (assertion failure or NULL pointer dereference and kernel panic) via a crafted ICMPv6 packet.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] FreeBSD SCTP ICMPv6 - Error Processing, [packetstorm] FreeBSD SCTP ICMPv6 Denial Of Service)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The Internet Control Message Protocol (ICMP) is a network layer protocol used by network devices to diagnose network communication issues
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2016-1879 was patched at 2024-05-15

234. Denial of Service - OpenSSL (CVE-2006-2937) - High [555]

Description: OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Apple Mac OS X 2006-007存在多个安全漏洞)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2006-2937 was patched at 2024-05-15

235. Denial of Service - OpenSSL (CVE-2006-2940) - High [555]

Description: OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Apple Mac OS X 2006-007存在多个安全漏洞)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2006-2940 was patched at 2024-05-15

236. Denial of Service - OpenSSL (CVE-2016-7052) - High [555]

Description: crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Orion Elite Hidden IP Browser Pro 7.9 OpenSSL / Tor / Man-In-The-Middle)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2016-7052 was patched at 2024-05-15

237. Denial of Service - OpenSSL (CVE-2017-3730) - High [555]

Description: In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814A software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-3730 was patched at 2024-05-15

238. Denial of Service - PHP (CVE-2018-6389) - High [555]

Description: In WordPress through 4.9.2, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] WordPress Core Denial Of Service, [packetstorm] WordPress Core load-scripts.php Denial Of Service, [zdt] WordPress Core - load-scripts.php Denial of Service Exploit, [seebug] WordPress Core - 'load-scripts.php' Denial of Service(CVE-2018-6389))
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2018-6389 was patched at 2024-05-15

239. Denial of Service - Samba (CVE-2008-4314) - High [555]

Description: smbd in Samba 3.0.29 through 3.2.4 might allow remote attackers to read arbitrary memory and cause a denial of service via crafted (1) trans, (2) trans2, and (3) nttrans requests, related to a "cut&paste error" that causes an improper bounds check to be performed.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Samba smbd远程信息泄露漏洞)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell
CVSS Base Score0.810CVSS Base Score is 8.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-4314 was patched at 2024-05-15

240. Denial of Service - Webkit (CVE-2018-11646) - High [555]

Description: webkitFaviconDatabaseSetIconForPageURL and webkitFaviconDatabaseSetIconURLForPageURL in UIProcess/API/glib/WebKitFaviconDatabase.cpp in WebKit, as used in WebKitGTK+ through 2.21.3, mishandle an unset pageURL, leading to an application crash.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([exploitpack] WebKitGTK+ 2.21.3 - Crash (PoC), [exploitpack] WebKitGTK+ 2.21.3 - WebKitFaviconDatabase Denial of Service (Metasploit), [packetstorm] WebKitGTK+ 2.21.3 pageURL Mishandling Denial Of Service, [packetstorm] WebKitGTK+ WebKitFaviconDatabase Denial Of Service, [zdt] WebKitGTK+ < 2.21.3 - pageURL Mishandling Crash (PoC) Exploit, [zdt] WebKitGTK+ < 2.21.3 - #WebKitFaviconDatabase DoS Exploit, [metasploit] WebKitGTK+ WebKitFaviconDatabase DoS, [exploitdb] WebKitGTK+ < 2.21.3 - 'WebKitFaviconDatabase' Denial of Service (Metasploit), [exploitdb] WebKitGTK+ < 2.21.3 - Crash (PoC))
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814WebKit is a browser engine developed by Apple and primarily used in its Safari web browser, as well as all web browsers on iOS and iPadOS
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2018-11646 was patched at 2024-05-15

241. Information Disclosure - OpenSSH (CVE-2018-15919) - High [555]

Description: {'vulners_cve_data_all': 'Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object) website
Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.814OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2018-15919 was patched at 2024-05-15

242. Security Feature Bypass - Google Chrome (CVE-2021-30539) - High [555]

Description: Insufficient policy enforcement in content security policy in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.510CVSS Base Score is 5.4. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30539 was patched at 2024-05-15

243. Denial of Service - Kerberos (CVE-2009-3295) - High [553]

Description: The prep_reprocess_req function in kdc/do_tgs_req.c in the cross-realm referral implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a ticket request.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] MIT Kerberos KDC跨域Referral空指针引用拒绝服务漏洞)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common114Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet
CVSS Base Score0.510CVSS Base Score is 5.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-3295 was patched at 2024-05-15

244. Remote Code Execution - Perl (CVE-2008-1333) - High [552]

Description: Format string vulnerability in Asterisk Open Source 1.6.x before 1.6.0-beta6 might allow remote attackers to execute arbitrary code via logging messages that are not properly handled by (1) the ast_verbose logging API call, or (2) the astman_append function.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Asterisk日志函数及管理器远程格式串处理漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score0.610CVSS Base Score is 5.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-1333 was patched at 2024-05-15

245. Cross Site Scripting - PHP (CVE-2017-5367) - High [550]

Description: Multiple reflected XSS vulnerabilities exist within form and link input parameters of ZoneMinder v1.30 and v1.29, an open-source CCTV server web application, which allows a remote attacker to execute malicious scripts within an authenticated client's browser. The URL is /zm/index.php and sample parameters could include action=login&view=postlogin[XSS] view=console[XSS] view=groups[XSS] view=events&filter[terms][1][cnj]=and[XSS] view=events&filter%5Bterms%5D%5B1%5D%5Bcnj%5D=and[XSS] view=events&filter%5Bterms%5D%5B1%5D%5Bcnj%5D=[XSS]and view=events&limit=1%22%3E%3C/a%3E[XSS] (among others).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] ZoneMinder - Multiple Vulnerabilities, [packetstorm] ZoneMinder XSS / CSRF / File Disclosure / Authentication Bypass)
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.610CVSS Base Score is 6.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-5367 was patched at 2024-05-15

246. Cross Site Scripting - PHP (CVE-2019-12094) - High [550]

Description: Horde Groupware Webmail Edition through 5.2.22 allows XSS via an admin/user.php?form=update_f&user_name= or admin/user.php?form=remove_f&user_name= or admin/config/diff.php?app= URI.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([exploitdb] Horde Webmail 5.2.22 - Multiple Vulnerabilities, [packetstorm] Horde Webmail 5.2.22 XSS / CSRF / SQL Injection / Code Execution, [zdt] Horde Webmail 5.2.22 - Multiple Vulnerabilities, [zdt] Horde Webmail 5.2.22 XSS / CSRF / SQL Injection / Code Execution Exploit, [exploitpack] Horde Webmail 5.2.22 - Multiple Vulnerabilities)
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.610CVSS Base Score is 6.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2019-12094 was patched at 2024-05-15

247. Cross Site Scripting - PHP (CVE-2019-8937) - High [550]

Description: HotelDruid 2.3.0 has XSS affecting the nsextt, cambia1, mese_fine, origine, and anno parameters in creaprezzi.php, tabella3.php, personalizza.php, and visualizza_tabelle.php.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] HotelDruid 2.3 - Cross-Site Scripting Vulnerability, [exploitpack] HotelDruid 2.3 - Cross-Site Scripting, [packetstorm] HotelDruid 2.3 Cross Site Scripting, [exploitdb] HotelDruid 2.3 - Cross-Site Scripting)
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.610CVSS Base Score is 6.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2019-8937 was patched at 2024-05-15

248. Cross Site Scripting - Safari (CVE-2017-2504) - High [550]

Description: An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. tvOS before 10.2.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that improperly interacts with WebKit Editor commands.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] WebKit Editor::Command::execute Universal Cross Site Scripting, [zdt] Apple WebKit / Safari 10.0.3(12602.4.8) - Editor::Command::execute Universal Cross-Site Scripting Ex, [seebug] WebKit: UXSS via Editor::Command::execute(CVE-2017-2504))
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.610CVSS Base Score is 6.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-2504 was patched at 2024-05-15

249. Cross Site Scripting - Safari (CVE-2017-2508) - High [550]

Description: An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that improperly interacts with container nodes.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] WebKit - ContainerNode::parserInsertBefore Universal Cross-Site Scripting Exploit, [seebug] WebKit: UXSS via ContainerNode::parserInsertBefore(CVE-2017-2508))
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.610CVSS Base Score is 6.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-2508 was patched at 2024-05-15

250. Cross Site Scripting - Safari (CVE-2017-2528) - High [550]

Description: An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that improperly interacts with cached frames.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] WebKit CachedFrame Universal Cross Site Scripting, [seebug] WebKit: UXSS: CachedFrame doesn't detach openers(CVE-2017-2528), [zdt] WebKit CachedFrame Universal Cross Site Scripting Vulnerability)
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.610CVSS Base Score is 6.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-2528 was patched at 2024-05-15

251. Remote Code Execution - Cacti (CVE-2024-31460) - High [547]

Description: Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `automation_tree_rules.php` is not thoroughly checked and is used to concatenate the SQL statement in `create_all_header_nodes()` function from `lib/api_automation.php` , finally resulting in SQL injection. Using SQL based secondary injection technology, attackers can modify the contents of the Cacti database, and based on the modified content, it may be possible to achieve further impact, such as arbitrary file reading, and even remote code execution through arbitrary file writing. Version 1.2.27 contains a patch for the issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Cacti is an open source operational monitoring and fault management framework
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2024-31460 was patched at 2024-05-15

252. Remote Code Execution - nginx (CVE-2012-2089) - High [547]

Description: Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] nginx 'ngx_http_mp4_module.c'缓冲区溢出漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Nginx is an open-source web server that can also be used as a reverse proxy, load balancer, mail proxy and HTTP cache
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2012-2089 was patched at 2024-05-15

253. Information Disclosure - Roundcube (CVE-2018-19205) - High [545]

Description: Roundcube before 1.3.7 mishandles GnuPG MDC integrity-protection warnings, which makes it easier for attackers to obtain sensitive information, a related issue to CVE-2017-17688. This is associated with plugins/enigma/lib/enigma_driver_gnupg.php.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] OpenPGP、S/MIME information disclosure (CVE-2017-17688,CVE-2017-17689))
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.614Roundcube is a web-based IMAP email client
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2018-19205 was patched at 2024-05-15

254. Remote Code Execution - FFmpeg (CVE-2009-4638) - High [545]

Description: Integer overflow in FFmpeg 0.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] FFmpeg多个媒体文件解析拒绝服务和代码执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.410CVSS Base Score is 4.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-4638 was patched at 2024-05-15

255. Remote Code Execution - FFmpeg (CVE-2009-4640) - High [545]

Description: Array index error in vorbis_dec.c in FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Vorbis file that triggers an out-of-bounds read.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] FFmpeg多个媒体文件解析拒绝服务和代码执行漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714FFmpeg is a free and open-source software project consisting of a suite of libraries and programs for handling video, audio, and other multimedia files and streams
CVSS Base Score0.410CVSS Base Score is 4.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-4640 was patched at 2024-05-15

256. Denial of Service - PHP (CVE-2016-6896) - High [544]

Description: Directory traversal vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-ajax.php, as demonstrated by /dev/random read operations that deplete the entropy pool.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([metasploit] WordPress Traversal Directory DoS, [exploitpack] WordPress 4.5.3 - Directory Traversal Denial of Service, [zdt] WordPress 4.5.3 - Directory Traversal / Denial of Service, [exploitdb] WordPress Core 4.5.3 - Directory Traversal / Denial of Service)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.710CVSS Base Score is 7.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2016-6896 was patched at 2024-05-15

257. Denial of Service - Safari (CVE-2009-1692) - High [544]

Description: WebKit before r41741, as used in Apple iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Safari, and other software, allows remote attackers to cause a denial of service (memory consumption or device reset) via a web page containing an HTMLSelectElement object with a large length attribute, related to the length property of a Select object.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] ECMAScript Denial Of Service, [seebug] Multiple Web Browsers Denial of Service Exploit (1 bug to rule them all), [exploitpack] Multiple Browsers - Denial of Service, [exploitdb] Multiple Browsers - Denial of Service)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.710CVSS Base Score is 7.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-1692 was patched at 2024-05-15

258. Denial of Service - Samba (CVE-2007-0452) - High [544]

Description: smbd in Samba 3.0.6 through 3.0.23d allows remote authenticated users to cause a denial of service (memory and CPU exhaustion) by renaming a file in a way that prevents a request from being removed from the deferred open queue, which triggers an infinite loop.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Samba延迟CIFS文件打开拒绝服务漏洞)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814Samba is a free software re-implementation of the SMB networking protocol, and was originally developed by Andrew Tridgell
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2007-0452 was patched at 2024-05-15

259. Memory Corruption - APT (CVE-2009-1177) - High [544]

Description: Multiple stack-based buffer overflows in maptemplate.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 have unknown impact and remote attack vectors.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] MapServer mapserv程序多个远程安全漏洞)
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814A free-software user interface that works with core libraries to handle the installation and removal of software on Debian
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-1177 was patched at 2024-05-15

260. Memory Corruption - Google Chrome (CVE-2019-5866) - High [544]

Description: Out of bounds memory access in JavaScript in Google Chrome prior to 75.0.3770.142 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2019-5866 was patched at 2024-05-15

261. Memory Corruption - Safari (CVE-2023-32409) - High [544]

Description: {'vulners_cve_data_all': 'The issue was addressed with improved bounds checks. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.8 and iPadOS 15.7.8, Safari 16.5, iOS 16.5 and iPadOS 16.5. A remote attacker may be able to break out of Web Content sandbox. Apple is aware of a report that this issue may have been actively exploited.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (cisa_kev object) website
Exploit Exists017The exploit's existence is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Safari is a web browser developed by Apple. It is built into Apple's operating systems, including macOS, iOS, iPadOS and their upcoming VisionOS, and uses Apple's open-source browser engine WebKit, which was derived from KHTML.
CVSS Base Score0.910CVSS Base Score is 8.6. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2023-32409 was patched at 2024-05-15

262. Path Traversal - PHP (CVE-2005-3347) - High [544]

Description: Multiple directory traversal vulnerabilities in index.php in phpSysInfo 2.4 and earlier, as used in phpgroupware 0.9.16 and earlier, and egrouwpware before 1.0.0.009, allow remote attackers to include arbitrary files via .. (dot dot) sequences in the (1) sensor_program parameter or the (2) _SERVER[HTTP_ACCEPT_LANGUAGE] parameter, which overwrites an internal variable, a variant of CVE-2003-0536. NOTE: due to a typo in an advisory, an issue in osh was inadvertently linked to this identifier; the proper identifier for the osh issue is CVE-2005-3346.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Hardened-PHP Project Security Advisory 2005-21.81)
Criticality of Vulnerability Type0.715Path Traversal
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.710CVSS Base Score is 6.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2005-3347 was patched at 2024-05-15

263. Path Traversal - PHP (CVE-2014-8959) - High [544]

Description: Directory traversal vulnerability in libraries/gis/GIS_Factory.class.php in the GIS editor in phpMyAdmin 4.0.x before 4.0.10.6, 4.1.x before 4.1.14.7, and 4.2.x before 4.2.12 allows remote authenticated users to include and execute arbitrary local files via a crafted geometry-type parameter.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] phpMyAdmin 4.2.12 /gis_data_editor.php 本地文件包含漏洞)
Criticality of Vulnerability Type0.715Path Traversal
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.710CVSS Base Score is 6.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2014-8959 was patched at 2024-05-15

264. Security Feature Bypass - Google Chrome (CVE-2021-30532) - High [544]

Description: Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.410CVSS Base Score is 4.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30532 was patched at 2024-05-15

265. Security Feature Bypass - Google Chrome (CVE-2021-30537) - High [544]

Description: Insufficient policy enforcement in cookies in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass cookie policy via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.410CVSS Base Score is 4.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30537 was patched at 2024-05-15

266. Security Feature Bypass - Google Chrome (CVE-2021-30538) - High [544]

Description: Insufficient policy enforcement in content security policy in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.410CVSS Base Score is 4.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30538 was patched at 2024-05-15

267. Security Feature Bypass - Google Chrome (CVE-2021-30596) - High [544]

Description: {'vulners_cve_data_all': 'Incorrect security UI in Navigation in Google Chrome on Android prior to 92.0.4515.131 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.410CVSS Base Score is 4.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30596 was patched at 2024-05-15

268. Arbitrary File Reading - PHP (CVE-2008-0196) - High [543]

Description: Multiple directory traversal vulnerabilities in WordPress 2.0.11 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in (1) the page parameter to certain PHP scripts under wp-admin/ or (2) the import parameter to wp-admin/admin.php, as demonstrated by discovering the full path via a request for the \..\..\wp-config pathname; and allow remote attackers to modify arbitrary files via a .. (dot dot) in the file parameter to wp-admin/templates.php.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([exploitpack] WordPress Core MU Plugins - admin.php Privileges Unchecked Multiple Information Disclosures, [packetstorm] Core Security Technologies Advisory 2009.0515, [seebug] WordPress Privileges Unchecked in admin.php and Multiple Information Disclosures, [seebug] WordPress Privileges Unchecked in admin.php and Multiple Information, [exploitdb] WordPress Core / MU / Plugins - '/admin.php' Privileges Unchecked / Multiple Information Disclosures)
Criticality of Vulnerability Type0.8315Arbitrary File Reading
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.510CVSS Base Score is 5.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2008-0196 was patched at 2024-05-15

269. Information Disclosure - Mozilla Firefox (CVE-2019-13075) - High [543]

Description: Tor Browser through 8.5.3 has an information exposure vulnerability. It allows remote attackers to detect the browser's language via vectors involving an IFRAME element, because text in that language is included in the title attribute of a LINK element for a non-HTML page. This is related to a behavior of Firefox before 68.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2019-13075 was patched at 2024-05-15

270. Information Disclosure - OpenSSH (CVE-2016-20012) - High [543]

Description: {'vulners_cve_data_all': 'OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.814OpenSSH is a suite of secure networking utilities based on the Secure Shell protocol, which provides a secure channel over an unsecured network in a client–server architecture
CVSS Base Score0.510CVSS Base Score is 5.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2016-20012 was patched at 2024-05-15

271. Information Disclosure - PHP (CVE-2009-2334) - High [543]

Description: wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] WordPress wp-admin/admin.php模块错误权限检查漏洞, [seebug] WordPress Privileges Unchecked in admin.php and Multiple Information Disclosures, [seebug] WordPress Privileges Unchecked in admin.php and Multiple Information, [exploitpack] WordPress Core MU Plugins - admin.php Privileges Unchecked Multiple Information Disclosures, [packetstorm] Core Security Technologies Advisory 2009.0515, [exploitdb] WordPress Core / MU / Plugins - '/admin.php' Privileges Unchecked / Multiple Information Disclosures)
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.510CVSS Base Score is 4.9. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-2334 was patched at 2024-05-15

272. Information Disclosure - PHP (CVE-2012-4219) - High [543]

Description: show_config_errors.php in phpMyAdmin 3.5.x before 3.5.2.1 allows remote attackers to obtain sensitive information via a direct request, which reveals the installation path in an error message, related to lack of inclusion of the common.inc.php library file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] phpMyAdmin 'show_config_errors.php'完整路径信息泄露漏洞)
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.510CVSS Base Score is 5.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2012-4219 was patched at 2024-05-15

273. Cross Site Scripting - Apache HTTP Server (CVE-2006-3918) - High [542]

Description: http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] ProCheckUp Security Advisory 2007.37, [packetstorm] Oracle HTTP Server Header Cross Site Scripting, [exploitpack] Oracle HTTP Server - Cross-Site Scripting Header Injection, [seebug] Oracle HTTP Server - XSS Header Injection, [exploitdb] Oracle HTTP Server - Cross-Site Scripting Header Injection)
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.914Apache HTTP Server is a free and open-source web server that delivers web content through the internet
CVSS Base Score0.410CVSS Base Score is 4.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2006-3918 was patched at 2024-05-15

274. Cross Site Scripting - Apache HTTP Server (CVE-2007-6203) - High [542]

Description: Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a "413 Request Entity Too Large" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] ProCheckUp Security Advisory 2007.37, [packetstorm] Oracle HTTP Server Header Cross Site Scripting, [exploitpack] Oracle HTTP Server - Cross-Site Scripting Header Injection, [seebug] Oracle HTTP Server - XSS Header Injection, [exploitdb] Oracle HTTP Server - Cross-Site Scripting Header Injection)
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.914Apache HTTP Server is a free and open-source web server that delivers web content through the internet
CVSS Base Score0.410CVSS Base Score is 4.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2007-6203 was patched at 2024-05-15

275. Remote Code Execution - Flatpak (CVE-2024-32462) - High [542]

Description: Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak require at least that version of bubblewrap. xdg-desktop-portal version 1.18.4 will mitigate this vulnerability by only allowing Flatpak apps to create .desktop files for commands that do not start with --. The vulnerability is patched in 1.15.8, 1.10.9, 1.12.9, and 1.14.6.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.414Flatpak is a utility for software deployment and package management for Linux
CVSS Base Score0.810CVSS Base Score is 8.4. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2024-32462 was patched at 2024-04-19, 2024-05-15

redos: CVE-2024-32462 was patched at 2024-05-07

276. Remote Code Execution - GPAC (CVE-2021-32136) - High [542]

Description: Heap buffer overflow in the print_udta function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.414GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity)
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-32136 was patched at 2024-05-15

277. Remote Code Execution - GPAC (CVE-2021-32268) - High [542]

Description: Buffer overflow vulnerability in function gf_fprintf in os_file.c in gpac before 1.0.1 allows attackers to execute arbitrary code. The fixed version is 1.0.1.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.414GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity)
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-32268 was patched at 2024-05-15

278. Remote Code Execution - GPAC (CVE-2021-32439) - High [542]

Description: Buffer overflow in the stbl_AppendSize function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.414GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity)
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-32439 was patched at 2024-05-15

279. Remote Code Execution - GPAC (CVE-2021-33362) - High [542]

Description: Stack buffer overflow in the hevc_parse_vps_extension function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.414GPAC is an Open Source multimedia framework for research and academic purposes; the project covers different aspects of multimedia, with a focus on presentation technologies (graphics, animation and interactivity)
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-33362 was patched at 2024-05-15

280. Denial of Service - Kerberos (CVE-2009-0847) - High [541]

Description: The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service (application crash) via a crafted length value that triggers an erroneous malloc call, related to incorrect calculations with pointer arithmetic.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] MIT Kerberos SPNEGO和ASN.1多个拒绝服务漏洞)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common114Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet
CVSS Base Score0.410CVSS Base Score is 4.3. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2009-0847 was patched at 2024-05-15

281. Security Feature Bypass - TLS (CVE-2021-29495) - High [541]

Description: {'vulners_cve_data_all': 'Nim is a statically typed compiled systems programming language. In Nim standard library before 1.4.2, httpClient SSL/TLS certificate verification was disabled by default. Users can upgrade to version 1.4.2 to receive a patch or, as a workaround, set "verifyMode = CVerifyPeer" as documented.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514TLS
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-29495 was patched at 2024-05-15

282. Security Feature Bypass - TLS (CVE-2021-34825) - High [541]

Description: {'vulners_cve_data_all': 'Quassel through 0.13.1, when --require-ssl is enabled, launches without SSL or TLS support if a usable X.509 certificate is not found on the local system.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514TLS
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-34825 was patched at 2024-05-15

283. Remote Code Execution - Perl (CVE-2005-3962) - High [540]

Description: Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Perl格式串处理整数溢出漏洞, [seebug] Apple Mac OS X 2006-007存在多个安全漏洞)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score0.510CVSS Base Score is 4.6. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2005-3962 was patched at 2024-05-15

284. Remote Code Execution - Perl (CVE-2011-4089) - High [540]

Description: The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] bzexe /tmp Race Condition)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages
CVSS Base Score0.510CVSS Base Score is 4.6. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2011-4089 was patched at 2024-05-15

285. Denial of Service - BIND (CVE-2006-4095) - High [539]

Description: BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via certain SIG queries, which cause an assertion failure when multiple RRsets are returned.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Apple Mac OS X 2007-005多个安全漏洞)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714BIND is a suite of software for interacting with the Domain Name System
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2006-4095 was patched at 2024-05-15

286. Denial of Service - Curl (CVE-2023-38039) - High [539]

Description: {'vulners_cve_data_all': 'When curl retrieves an HTTP response, it stores the incoming headers so that\nthey can be accessed later via the libcurl headers API.\n\nHowever, curl did not have a limit in how many or how large headers it would\naccept in a response, allowing a malicious server to stream an endless series\nof headers and eventually cause curl to run out of heap memory.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714Curl is a command-line tool for transferring data specified with URL syntax
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2023-38039 was patched at 2024-05-15

287. Denial of Service - Point-to-Point Tunneling Protocol (CVE-2003-0213) - High [539]

Description: ctrlpacket.c in PoPToP PPTP server before 1.1.4-b3 allows remote attackers to cause a denial of service via a length field of 0 or 1, which causes a negative value to be fed into a read operation, leading to a buffer overflow.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] Poptop Negative Read Overflow)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714The Point to Point Tunneling Protocol (PPTP) is a network protocol used to create VPN tunnels between public networks
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2003-0213 was patched at 2024-05-15

288. Denial of Service - QEMU (CVE-2019-20175) - High [539]

Description: An issue was discovered in ide_dma_cb() in hw/ide/core.c in QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion that implies that the size of successful DMA transfers there must be a multiple of 512 (the size of a sector). NOTE: a member of the QEMU security team disputes the significance of this issue because a "privileged guest user has many ways to cause similar DoS effect, without triggering this assert.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714QEMU is a generic and open source machine & userspace emulator and virtualizer
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2019-20175 was patched at 2024-05-15

289. Denial of Service - SQLite (CVE-2021-31239) - High [539]

Description: An issue found in SQLite SQLite3 v.3.35.4 that allows a remote attacker to cause a denial of service via the appendvfs.c function.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714SQLite is a database engine written in the C programming language
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-31239 was patched at 2024-05-15

290. Denial of Service - iOS (CVE-2019-10742) - High [539]

Description: Axios up to and including 0.18.0 allows attackers to cause a denial of service (application crash) by continuing to accepting content after maxContentLength is exceeded.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Improper Handling of Exceptional Conditions in Axios)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.714iOS is an operating system developed and marketed by Apple Inc
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2019-10742 was patched at 2024-05-15

291. Cross Site Scripting - PHP (CVE-2021-38603) - High [538]

Description: PluXML 5.8.7 allows core/admin/profil.php stored XSS via the Information field.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score0.510CVSS Base Score is 4.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-38603 was patched at 2024-05-15

292. Memory Corruption - Chromium (CVE-2024-3832) - High [538]

Description: {'vulners_cve_data_all': 'Object corruption in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS data is not available

debian: CVE-2024-3832 was patched at 2024-04-20, 2024-05-15

redos: CVE-2024-3832 was patched at 2024-05-07

293. Memory Corruption - Chromium (CVE-2024-3833) - High [538]

Description: {'vulners_cve_data_all': 'Object corruption in WebAssembly in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS data is not available

debian: CVE-2024-3833 was patched at 2024-04-20, 2024-05-15

redos: CVE-2024-3833 was patched at 2024-05-07

294. Memory Corruption - Chromium (CVE-2024-4331) - High [538]

Description: Use after free in Picture In Picture in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS data is not available

debian: CVE-2024-4331 was patched at 2024-05-02, 2024-05-15

295. Memory Corruption - Chromium (CVE-2024-4368) - High [538]

Description: Use after free in Dawn in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS data is not available

debian: CVE-2024-4368 was patched at 2024-05-02, 2024-05-15

296. Memory Corruption - Mozilla Firefox (CVE-2024-3855) - High [538]

Description: In certain cases the JIT incorrectly optimized MSubstr operations, which led to out-of-bounds reads. This vulnerability affects Firefox < 125.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS data is not available

ubuntu: CVE-2024-3855 was patched at 2024-04-24

297. Memory Corruption - Mozilla Firefox (CVE-2024-3856) - High [538]

Description: A use-after-free could occur during WASM execution if garbage collection ran during the creation of an array. This vulnerability affects Firefox < 125.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile010EPSS data is not available

ubuntu: CVE-2024-3856 was patched at 2024-04-24

298. Denial of Service - Apache HTTP Server (CVE-2013-2765) - High [536]

Description: The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] ModSecurity Remote Null Pointer Dereference Vulnerability, [packetstorm] ModSecurity Remote Null Pointer Dereference, [seebug] ModSecurity 空指针间接引用远程拒绝服务漏洞(CVE-2013-2765))
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914Apache HTTP Server is a free and open-source web server that delivers web content through the internet
CVSS Base Score0.510CVSS Base Score is 5.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2013-2765 was patched at 2024-05-15

299. Denial of Service - Linux Kernel (CVE-2014-0102) - High [536]

Description: The keyring_detect_cycle_iterator function in security/keys/keyring.c in the Linux kernel through 3.13.6 does not properly determine whether keyrings are identical, which allows local users to cause a denial of service (OOPS) via crafted keyctl commands.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Linux Kernel 'keyring_detect_cycle_iterator()'函数本地拒绝服务漏洞)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.510CVSS Base Score is 5.2. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2014-0102 was patched at 2024-05-15

300. Denial of Service - Linux Kernel (CVE-2019-20794) - High [536]

Description: {'vulners_cve_data_all': 'An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.510CVSS Base Score is 4.7. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2019-20794 was patched at 2024-05-15

301. Information Disclosure - Linux Kernel (CVE-2014-0131) - High [536]

Description: Use-after-free vulnerability in the skb_segment function in net/core/skbuff.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] Linux Kernel vhost-net分段内存泄露漏洞, [seebug] Linux kernel skb_segment函数释放后使用漏洞)
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.310CVSS Base Score is 2.9. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2014-0131 was patched at 2024-05-15

302. Memory Corruption - Linux Kernel (CVE-2019-19378) - High [536]

Description: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image can lead to slab-out-of-bounds write access in index_rbio_pages in fs/btrfs/raid56.c.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.914The Linux kernel is a free and open-source, monolithic, modular, multitasking, Unix-like operating system kernel
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2019-19378 was patched at 2024-05-15

303. Path Traversal - Apache HTTP Server (CVE-2007-1860) - High [536]

Description: mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([packetstorm] SA-20070314-0.txt, [seebug] Mac OS X 2007-007更新修复多个安全漏洞)
Criticality of Vulnerability Type0.715Path Traversal
Vulnerable Product is Common0.914Apache HTTP Server is a free and open-source web server that delivers web content through the internet
CVSS Base Score0.510CVSS Base Score is 5.0. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2007-1860 was patched at 2024-05-15

304. Denial of Service - Unknown Product (CVE-2020-36067) - High [535]

Description: {'vulners_cve_data_all': 'GJSON <=v1.6.5 allows attackers to cause a denial of service (panic: runtime error: slice bounds out of range) via a crafted GET call.', 'bdu_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2020-36067 was patched at 2024-05-15

305. Cross Site Scripting - MediaWiki (CVE-2012-4378) - High [533]

Description: Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki before 1.18.5 and 1.19.x before 1.19.2, when unspecified JavaScript gadgets are used, allow remote attackers to inject arbitrary web script or HTML via the userlang parameter to w/index.php.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([seebug] MediaWiki 1.x userlang参数跨站脚本漏洞)
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.714MediaWiki is a free server-based wiki software, licensed under the GNU General Public License (GPL)
CVSS Base Score0.610CVSS Base Score is 6.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2012-4378 was patched at 2024-05-15

306. Cross Site Scripting - MediaWiki (CVE-2020-35474) - High [533]

Description: In MediaWiki before 1.35.1, the combination of Html::rawElement and Message::text leads to XSS because the definition of MediaWiki:recentchanges-legend-watchlistexpiry can be changed onwiki so that the output is raw HTML.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.714MediaWiki is a free server-based wiki software, licensed under the GNU General Public License (GPL)
CVSS Base Score0.610CVSS Base Score is 6.1. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2020-35474 was patched at 2024-05-15

307. Denial of Service - Binutils (CVE-2020-16591) - High [532]

Description: A Denial of Service vulnerability exists in the Binary File Descriptor (BFD) in GNU Binutils 2.35 due to an invalid read in process_symbol_table, as demonstrated in readeif.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2020-16591 was patched at 2024-05-15

308. Denial of Service - Binutils (CVE-2020-16593) - High [532]

Description: A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in scan_unit_for_symbols, as demonstrated in addr2line, that can cause a denial of service via a crafted file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2020-16593 was patched at 2024-05-15

309. Denial of Service - Binutils (CVE-2020-16599) - High [532]

Description: A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in _bfd_elf_get_symbol_version_string, as demonstrated in nm-new, that can cause a denial of service via a crafted file.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814The GNU Binary Utilities, or binutils, are a set of programming tools for creating and managing binary programs, object files, libraries, profile data, and assembly source code
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2020-16599 was patched at 2024-05-15

310. Denial of Service - GNOME desktop (CVE-2017-14108) - High [532]

Description: libgedit.a in GNOME gedit through 3.22.1 allows remote attackers to cause a denial of service (CPU consumption) via a file that begins with many '\0' characters.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([zdt] libgedit.a 3.22.1 Denial Of Service Vulnerability, [packetstorm] libgedit.a 3.22.1 Denial Of Service)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.814GNOME originally an acronym for GNU Network Object Model Environment, is a free and open-source desktop environment for Linux and other Unix-like operating systems
CVSS Base Score0.610CVSS Base Score is 5.5. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2017-14108 was patched at 2024-05-15

311. Memory Corruption - Chromium (CVE-2021-30623) - High [532]

Description: Chromium: CVE-2021-30623 Use after free in Bookmarks

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners website ([githubexploit] Exploit for Out-of-bounds Write in Google Chrome)
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Chromium is a free and open-source web browser project, mainly developed and maintained by Google
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30623 was patched at 2024-05-15

312. Memory Corruption - Google Chrome (CVE-2021-30521) - High [532]

Description: Heap buffer overflow in Autofill in Google Chrome on Android prior to 91.0.4472.77 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30521 was patched at 2024-05-15

313. Memory Corruption - Google Chrome (CVE-2021-30522) - High [532]

Description: Use after free in WebAudio in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30522 was patched at 2024-05-15

314. Memory Corruption - Google Chrome (CVE-2021-30523) - High [532]

Description: Use after free in WebRTC in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30523 was patched at 2024-05-15

315. Memory Corruption - Google Chrome (CVE-2021-30524) - High [532]

Description: Use after free in TabStrip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30524 was patched at 2024-05-15

316. Memory Corruption - Google Chrome (CVE-2021-30525) - High [532]

Description: Use after free in TabGroups in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30525 was patched at 2024-05-15

317. Memory Corruption - Google Chrome (CVE-2021-30527) - High [532]

Description: Use after free in WebUI in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30527 was patched at 2024-05-15

318. Memory Corruption - Google Chrome (CVE-2021-30528) - High [532]

Description: Use after free in WebAuthentication in Google Chrome on Android prior to 91.0.4472.77 allowed a remote attacker who had compromised the renderer process of a user who had saved a credit card in their Google account to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30528 was patched at 2024-05-15

319. Memory Corruption - Google Chrome (CVE-2021-30529) - High [532]

Description: Use after free in Bookmarks in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30529 was patched at 2024-05-15

320. Memory Corruption - Google Chrome (CVE-2021-30530) - High [532]

Description: Out of bounds memory access in WebAudio in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30530 was patched at 2024-05-15

321. Memory Corruption - Google Chrome (CVE-2021-30544) - High [532]

Description: Use after free in BFCache in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30544 was patched at 2024-05-15

322. Memory Corruption - Google Chrome (CVE-2021-30545) - High [532]

Description: Use after free in Extensions in Google Chrome prior to 91.0.4472.101 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30545 was patched at 2024-05-15

323. Memory Corruption - Google Chrome (CVE-2021-30546) - High [532]

Description: Use after free in Autofill in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30546 was patched at 2024-05-15

324. Memory Corruption - Google Chrome (CVE-2021-30548) - High [532]

Description: Use after free in Loader in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30548 was patched at 2024-05-15

325. Memory Corruption - Google Chrome (CVE-2021-30550) - High [532]

Description: Use after free in Accessibility in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30550 was patched at 2024-05-15

326. Memory Corruption - Google Chrome (CVE-2021-30552) - High [532]

Description: Use after free in Extensions in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010EPSS data is not available

debian: CVE-2021-30552 was patched at 2024-05-15

327. Memory Corruption - Google Chrome (CVE-2021-30553) - High [532]

Description: Use after free in Network service in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.814Google Chrome is a popular, free web browser developed by Google. It was first released in 2008 and is available for various operating systems, including Microsoft Windows, Apple macOS, Linux, Android, and iOS.
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile010