Vulnerability Name |
CVE
CWE
|
CWE |
Severity |
AbanteCart Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2016-10755)
|
CVE-2016-10755
CWE-138
|
CWE-138
|
High
|
AbanteCart Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2022-26521)
|
CVE-2022-26521
CWE-434
|
CWE-434
|
High
|
Ampache Deserialization of Untrusted Data Vulnerability (CVE-2017-18375)
|
CVE-2017-18375
CWE-502
|
CWE-502
|
High
|
Ampache Improper Access Control Vulnerability (CVE-2021-21399)
|
CVE-2021-21399
CWE-284
|
CWE-284
|
High
|
Ampache Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2008-3929)
|
CVE-2008-3929
CWE-59
|
CWE-59
|
High
|
Ampache Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-12385)
|
CVE-2019-12385
CWE-138
|
CWE-138
|
High
|
Ampache Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2023-0771)
|
CVE-2023-0771
CWE-138
|
CWE-138
|
High
|
Ampache Other Vulnerability (CVE-2006-5668)
|
CVE-2006-5668
|
|
High
|
Ampache Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2022-4665)
|
CVE-2022-4665
CWE-434
|
CWE-434
|
High
|
AngularJS Improper Input Validation Vulnerability (CVE-2019-10768)
|
CVE-2019-10768
CWE-20
|
CWE-20
|
High
|
Apache HTTP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Server Vulnerability (CVE-2022-22720)
|
CVE-2022-22720
CWE-444
|
CWE-444
|
High
|
Apache HTTP Server Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-9517)
|
CVE-2019-9517
CWE-770
|
CWE-770
|
High
|
Apache HTTP Server Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2022-30522)
|
CVE-2022-30522
CWE-770
|
CWE-770
|
High
|
Apache HTTP Server Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2019-0217)
|
CVE-2019-0217
CWE-362
|
CWE-362
|
High
|
Apache HTTP Server Cryptographic Issues Vulnerability (CVE-2016-0736)
|
CVE-2016-0736
|
|
High
|
Apache HTTP Server CVE-2002-0392 Vulnerability (CVE-2002-0392)
|
CVE-2002-0392
|
|
High
|
Apache HTTP Server CVE-2002-0839 Vulnerability (CVE-2002-0839)
|
CVE-2002-0839
|
|
High
|
Apache HTTP Server CVE-2013-2249 Vulnerability (CVE-2013-2249)
|
CVE-2013-2249
|
|
High
|
Apache HTTP Server CVE-2016-5387 Vulnerability (CVE-2016-5387)
|
CVE-2016-5387
|
|
High
|
Apache HTTP Server CVE-2016-8743 Vulnerability (CVE-2016-8743)
|
CVE-2016-8743
|
|
High
|
Apache HTTP Server CVE-2019-0190 Vulnerability (CVE-2019-0190)
|
CVE-2019-0190
|
|
High
|
Apache HTTP Server CVE-2019-0215 Vulnerability (CVE-2019-0215)
|
CVE-2019-0215
|
|
High
|
Apache HTTP Server Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2022-30556)
|
CVE-2022-30556
CWE-200
|
CWE-200
|
High
|
Apache HTTP Server Improper Access Control Vulnerability (CVE-2016-4979)
|
CVE-2016-4979
CWE-284
|
CWE-284
|
High
|
Apache HTTP Server Improper Input Validation Vulnerability (CVE-2016-2161)
|
CVE-2016-2161
CWE-20
|
CWE-20
|
High
|
Apache HTTP Server Improper Input Validation Vulnerability (CVE-2017-15715)
|
CVE-2017-15715
CWE-20
|
CWE-20
|
High
|
Apache HTTP Server Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2002-2272)
|
CVE-2002-2272
CWE-119
|
CWE-119
|
High
|
Apache HTTP Server Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2003-0542)
|
CVE-2003-0542
CWE-119
|
CWE-119
|
High
|
Apache HTTP Server Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') Vulnerability (CVE-2023-27522)
|
CVE-2023-27522
|
|
High
|
Apache HTTP Server Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2020-9490)
|
CVE-2020-9490
CWE-444
|
CWE-444
|
High
|
Apache HTTP Server Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2020-11993)
|
CVE-2020-11993
CWE-444
|
CWE-444
|
High
|
Apache HTTP Server Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2022-26377)
|
CVE-2022-26377
CWE-444
|
CWE-444
|
High
|
Apache HTTP Server NULL Pointer Dereference Vulnerability (CVE-2017-7659)
|
CVE-2017-7659
CWE-476
|
CWE-476
|
High
|
Apache HTTP Server NULL Pointer Dereference Vulnerability (CVE-2018-8011)
|
CVE-2018-8011
CWE-476
|
CWE-476
|
High
|
Apache HTTP Server NULL Pointer Dereference Vulnerability (CVE-2020-13950)
|
CVE-2020-13950
CWE-476
|
CWE-476
|
High
|
Apache HTTP Server NULL Pointer Dereference Vulnerability (CVE-2021-26690)
|
CVE-2021-26690
CWE-476
|
CWE-476
|
High
|
Apache HTTP Server NULL Pointer Dereference Vulnerability (CVE-2021-31618)
|
CVE-2021-31618
CWE-476
|
CWE-476
|
High
|
Apache HTTP Server NULL Pointer Dereference Vulnerability (CVE-2021-34798)
|
CVE-2021-34798
CWE-476
|
CWE-476
|
High
|
Apache HTTP Server NULL Pointer Dereference Vulnerability (CVE-2021-41524)
|
CVE-2021-41524
CWE-476
|
CWE-476
|
High
|
Apache HTTP Server NULL Pointer Dereference Vulnerability (CVE-2021-44224)
|
CVE-2021-44224
CWE-476
|
CWE-476
|
High
|
Apache HTTP Server NULL Pointer Dereference Vulnerability (CVE-2023-28625)
|
CVE-2023-28625
CWE-476
|
CWE-476
|
High
|
Apache HTTP Server Numeric Errors Vulnerability (CVE-2006-3747)
|
CVE-2006-3747
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-1999-0045)
|
CVE-1999-0045
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-1999-0071)
|
CVE-1999-0071
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-1999-1053)
|
CVE-1999-1053
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2001-0766)
|
CVE-2001-0766
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2001-1449)
|
CVE-2001-1449
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2002-0061)
|
CVE-2002-0061
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2002-0257)
|
CVE-2002-0257
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2002-0661)
|
CVE-2002-0661
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2002-0843)
|
CVE-2002-0843
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2002-2029)
|
CVE-2002-2029
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2003-0016)
|
CVE-2003-0016
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2003-0987)
|
CVE-2003-0987
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2003-0993)
|
CVE-2003-0993
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2004-0811)
|
CVE-2004-0811
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2004-0885)
|
CVE-2004-0885
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2004-1082)
|
CVE-2004-1082
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2004-2343)
|
CVE-2004-2343
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2005-1344)
|
CVE-2005-1344
|
|
High
|
Apache HTTP Server Other Vulnerability (CVE-2021-33193)
|
CVE-2021-33193
|
|
High
|
Apache HTTP Server Out-of-bounds Read Vulnerability (CVE-2017-7668)
|
CVE-2017-7668
CWE-125
|
CWE-125
|
High
|
Apache HTTP Server Out-of-bounds Read Vulnerability (CVE-2018-1303)
|
CVE-2018-1303
CWE-125
|
CWE-125
|
High
|
Apache HTTP Server Out-of-bounds Read Vulnerability (CVE-2021-36160)
|
CVE-2021-36160
CWE-125
|
CWE-125
|
High
|
Apache HTTP Server Out-of-bounds Write Vulnerability (CVE-2004-0488)
|
CVE-2004-0488
CWE-787
|
CWE-787
|
High
|
Apache HTTP Server Out-of-bounds Write Vulnerability (CVE-2006-20001)
|
CVE-2006-20001
CWE-787
|
CWE-787
|
High
|
Apache HTTP Server Out-of-bounds Write Vulnerability (CVE-2017-15710)
|
CVE-2017-15710
CWE-787
|
CWE-787
|
High
|
Apache HTTP Server Out-of-bounds Write Vulnerability (CVE-2019-10081)
|
CVE-2019-10081
CWE-787
|
CWE-787
|
High
|
Apache HTTP Server Out-of-bounds Write Vulnerability (CVE-2019-10097)
|
CVE-2019-10097
CWE-787
|
CWE-787
|
High
|
Apache HTTP Server Out-of-bounds Write Vulnerability (CVE-2020-35452)
|
CVE-2020-35452
CWE-787
|
CWE-787
|
High
|
Apache HTTP Server Resource Management Errors Vulnerability (CVE-2007-6423)
|
CVE-2007-6423
|
|
High
|
Apache HTTP Server Resource Management Errors Vulnerability (CVE-2016-8740)
|
CVE-2016-8740
|
|
High
|
Apache HTTP Server Session Fixation Vulnerability (CVE-2018-17199)
|
CVE-2018-17199
CWE-384
|
CWE-384
|
High
|
Apache HTTP Server Uncontrolled Resource Consumption Vulnerability (CVE-2009-1890)
|
CVE-2009-1890
CWE-400
|
CWE-400
|
High
|
Apache HTTP Server Uncontrolled Resource Consumption Vulnerability (CVE-2009-1891)
|
CVE-2009-1891
CWE-400
|
CWE-400
|
High
|
Apache HTTP Server Uncontrolled Resource Consumption Vulnerability (CVE-2011-3192)
|
CVE-2011-3192
CWE-400
|
CWE-400
|
High
|
Apache HTTP Server Uncontrolled Resource Consumption Vulnerability (CVE-2018-1333)
|
CVE-2018-1333
CWE-400
|
CWE-400
|
High
|
Apache HTTP Server Use After Free Vulnerability (CVE-2017-9789)
|
CVE-2017-9789
CWE-416
|
CWE-416
|
High
|
Apache HTTP Server Use After Free Vulnerability (CVE-2017-9798)
|
CVE-2017-9798
CWE-416
|
CWE-416
|
High
|
Apache HTTP Server Use After Free Vulnerability (CVE-2019-0211)
|
CVE-2019-0211
CWE-416
|
CWE-416
|
High
|
Apache Struts2 Remote Command Execution (S2-048)
|
CVE-2017-9791
CWE-94
|
CWE-94
|
High
|
Apache Struts2 Remote Command Execution (S2-052)
|
CVE-2017-9805
CWE-94
|
CWE-94
|
High
|
Apache Tomcat 7PK - Errors Vulnerability (CVE-2016-8745)
|
CVE-2016-8745
|
|
High
|
Apache Tomcat 7PK - Security Features Vulnerability (CVE-2002-0493)
|
CVE-2002-0493
|
|
High
|
Apache Tomcat Credentials Management Errors Vulnerability (CVE-2009-3548)
|
CVE-2009-3548
|
|
High
|
Apache Tomcat Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5351)
|
CVE-2015-5351
CWE-352
|
CWE-352
|
High
|
Apache Tomcat CVE-2016-6796 Vulnerability (CVE-2016-6796)
|
CVE-2016-6796
|
|
High
|
Apache Tomcat CVE-2020-0822 Vulnerability (CVE-2020-0822)
|
CVE-2020-0822
|
|
High
|
Apache Tomcat CVE-2022-29885 Vulnerability (CVE-2022-29885)
|
CVE-2022-29885
|
|
High
|
Apache Tomcat CVE-2023-34981 Vulnerability (CVE-2023-34981)
|
CVE-2023-34981
|
|
High
|
Apache Tomcat Deserialization of Untrusted Data Vulnerability (CVE-2020-9484)
|
CVE-2020-9484
CWE-502
|
CWE-502
|
High
|
Apache Tomcat Deserialization of Untrusted Data Vulnerability (CVE-2021-25329)
|
CVE-2021-25329
CWE-502
|
CWE-502
|
High
|
Apache Tomcat Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2005-4836)
|
CVE-2005-4836
CWE-200
|
CWE-200
|
High
|
Apache Tomcat Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-8747)
|
CVE-2016-8747
CWE-200
|
CWE-200
|
High
|
Apache Tomcat Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-5647)
|
CVE-2017-5647
CWE-200
|
CWE-200
|
High
|
Apache Tomcat Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-12616)
|
CVE-2017-12616
CWE-200
|
CWE-200
|
High
|
Apache Tomcat Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2020-17527)
|
CVE-2020-17527
CWE-200
|
CWE-200
|
High
|
Apache Tomcat Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-25122)
|
CVE-2021-25122
CWE-200
|
CWE-200
|
High
|
Apache Tomcat Improper Access Control Vulnerability (CVE-2016-5388)
|
CVE-2016-5388
CWE-284
|
CWE-284
|
High
|
Apache Tomcat Improper Certificate Validation Vulnerability (CVE-2018-8034)
|
CVE-2018-8034
CWE-295
|
CWE-295
|
High
|
Apache Tomcat Improper Encoding or Escaping of Output Vulnerability (CVE-2022-45143)
|
CVE-2022-45143
CWE-116
|
CWE-116
|
High
|
Apache Tomcat Improper Handling of Exceptional Conditions Vulnerability (CVE-2017-5664)
|
CVE-2017-5664
CWE-755
|
CWE-755
|
High
|
Apache Tomcat Improper Handling of Exceptional Conditions Vulnerability (CVE-2021-30639)
|
CVE-2021-30639
CWE-755
|
CWE-755
|
High
|
Apache Tomcat Improper Input Validation Vulnerability (CVE-2013-2185)
|
CVE-2013-2185
CWE-20
|
CWE-20
|
High
|
Apache Tomcat Improper Input Validation Vulnerability (CVE-2016-1240)
|
CVE-2016-1240
CWE-20
|
CWE-20
|
High
|
Apache Tomcat Improper Input Validation Vulnerability (CVE-2016-3092)
|
CVE-2016-3092
CWE-20
|
CWE-20
|
High
|
Apache Tomcat Improper Input Validation Vulnerability (CVE-2016-6816)
|
CVE-2016-6816
CWE-20
|
CWE-20
|
High
|
Apache Tomcat Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2017-7675)
|
CVE-2017-7675
CWE-22
|
CWE-22
|
High
|
Apache Tomcat Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2016-9774)
|
CVE-2016-9774
CWE-59
|
CWE-59
|
High
|
Apache Tomcat Improper Locking Vulnerability (CVE-2019-10072)
|
CVE-2019-10072
CWE-667
|
CWE-667
|
High
|
Apache Tomcat Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2019-0232)
|
CVE-2019-0232
CWE-138
|
CWE-138
|
High
|
Apache Tomcat Improper Resource Shutdown or Release Vulnerability (CVE-2017-5650)
|
CVE-2017-5650
CWE-404
|
CWE-404
|
High
|
Apache Tomcat Improper Resource Shutdown or Release Vulnerability (CVE-2022-25762)
|
CVE-2022-25762
CWE-404
|
CWE-404
|
High
|
Apache Tomcat Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2002-2272)
|
CVE-2002-2272
CWE-119
|
CWE-119
|
High
|
Apache Tomcat Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-6817)
|
CVE-2016-6817
CWE-119
|
CWE-119
|
High
|
Apache Tomcat Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2020-13934)
|
CVE-2020-13934
CWE-119
|
CWE-119
|
High
|
Apache Tomcat Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') Vulnerability (CVE-2022-42252)
|
CVE-2022-42252
|
|
High
|
Apache Tomcat Incorrect Authorization Vulnerability (CVE-2016-6797)
|
CVE-2016-6797
CWE-863
|
CWE-863
|
High
|
Apache Tomcat Incorrect Default Permissions Vulnerability (CVE-2020-8022)
|
CVE-2020-8022
CWE-276
|
CWE-276
|
High
|
Apache Tomcat Insufficiently Protected Credentials Vulnerability (CVE-2019-12418)
|
CVE-2019-12418
CWE-522
|
CWE-522
|
High
|
Apache Tomcat Integer Overflow or Wraparound Vulnerability (CVE-2015-8751)
|
CVE-2015-8751
CWE-190
|
CWE-190
|
High
|
Apache Tomcat Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1336)
|
CVE-2018-1336
CWE-835
|
CWE-835
|
High
|
Apache Tomcat Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2020-13935)
|
CVE-2020-13935
CWE-835
|
CWE-835
|
High
|
Apache Tomcat Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2021-41079)
|
CVE-2021-41079
CWE-835
|
CWE-835
|
High
|
Apache Tomcat Missing Release of Resource after Effective Lifetime Vulnerability (CVE-2021-42340)
|
CVE-2021-42340
CWE-772
|
CWE-772
|
High
|
Apache Tomcat Off-by-one Error Vulnerability (CVE-2023-28709)
|
CVE-2023-28709
CWE-193
|
CWE-193
|
High
|
Apache Tomcat Other Vulnerability (CVE-2001-1563)
|
CVE-2001-1563
|
|
High
|
Apache Tomcat Other Vulnerability (CVE-2002-0682)
|
CVE-2002-0682
|
|
High
|
Apache Tomcat Other Vulnerability (CVE-2002-1394)
|
CVE-2002-1394
|
|
High
|
Apache Tomcat Other Vulnerability (CVE-2006-7197)
|
CVE-2006-7197
|
|
High
|
Apache Tomcat Other Vulnerability (CVE-2015-5346)
|
CVE-2015-5346
|
|
High
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-3190)
|
CVE-2011-3190
CWE-264
|
CWE-264
|
High
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0050)
|
CVE-2014-0050
CWE-264
|
CWE-264
|
High
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-0714)
|
CVE-2016-0714
CWE-264
|
CWE-264
|
High
|
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-9775)
|
CVE-2016-9775
CWE-264
|
CWE-264
|
High
|
Apache Tomcat Resource Management Errors Vulnerability (CVE-2014-0230)
|
CVE-2014-0230
|
|
High
|
Apache Tomcat Session Fixation Vulnerability (CVE-2019-17563)
|
CVE-2019-17563
CWE-384
|
CWE-384
|
High
|
Apache Tomcat Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability (CVE-2022-23181)
|
CVE-2022-23181
CWE-367
|
CWE-367
|
High
|
Apache Tomcat Uncontrolled Resource Consumption Vulnerability (CVE-2019-0199)
|
CVE-2019-0199
CWE-400
|
CWE-400
|
High
|
Apache Tomcat Uncontrolled Resource Consumption Vulnerability (CVE-2020-11996)
|
CVE-2020-11996
CWE-400
|
CWE-400
|
High
|
Apache Tomcat Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2017-12615)
|
CVE-2017-12615
CWE-434
|
CWE-434
|
High
|
Apache Tomcat Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2017-12617)
|
CVE-2017-12617
CWE-434
|
CWE-434
|
High
|
Apache Traffic Server Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-9511)
|
CVE-2019-9511
CWE-770
|
CWE-770
|
High
|
Apache Traffic Server Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-9514)
|
CVE-2019-9514
CWE-770
|
CWE-770
|
High
|
Apache Traffic Server Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-9515)
|
CVE-2019-9515
CWE-770
|
CWE-770
|
High
|
Apache Traffic Server Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-9517)
|
CVE-2019-9517
CWE-770
|
CWE-770
|
High
|
Apache Traffic Server Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-9518)
|
CVE-2019-9518
CWE-770
|
CWE-770
|
High
|
Apache Traffic Server CVE-2022-47184 Vulnerability (CVE-2022-47184)
|
CVE-2022-47184
|
|
High
|
Apache Traffic Server CVE-2022-47185 Vulnerability (CVE-2022-47185)
|
CVE-2022-47185
|
|
High
|
Apache Traffic Server CVE-2023-30631 Vulnerability (CVE-2023-30631)
|
CVE-2023-30631
|
|
High
|
Apache Traffic Server CVE-2023-33933 Vulnerability (CVE-2023-33933)
|
CVE-2023-33933
|
|
High
|
Apache Traffic Server Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-11783)
|
CVE-2018-11783
CWE-200
|
CWE-200
|
High
|
Apache Traffic Server HTTP Request Smuggling Vulnerability (CVE-2020-17509 )
|
CVE-2020-17509
|
|
High
|
Apache Traffic Server Improper Authentication Vulnerability (CVE-2021-38161)
|
CVE-2021-38161
CWE-287
|
CWE-287
|
High
|
Apache Traffic Server Improper Authentication Vulnerability (CVE-2021-44759)
|
CVE-2021-44759
CWE-287
|
CWE-287
|
High
|
Apache Traffic Server Improper Check for Unusual or Exceptional Conditions Vulnerability (CVE-2022-32749)
|
CVE-2022-32749
CWE-754
|
CWE-754
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2017-5659)
|
CVE-2017-5659
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2017-5660)
|
CVE-2017-5660
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2017-7671)
|
CVE-2017-7671
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2018-1318)
|
CVE-2018-1318
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2018-8022)
|
CVE-2018-8022
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2019-10079)
|
CVE-2019-10079
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2021-32566)
|
CVE-2021-32566
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2021-32567)
|
CVE-2021-32567
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2021-37147)
|
CVE-2021-37147
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2021-37148)
|
CVE-2021-37148
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2021-37149)
|
CVE-2021-37149
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2021-37150)
|
CVE-2021-37150
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2021-41585)
|
CVE-2021-41585
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2021-44040)
|
CVE-2021-44040
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2022-25763)
|
CVE-2022-25763
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2022-28129)
|
CVE-2022-28129
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2022-31778)
|
CVE-2022-31778
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2022-31779)
|
CVE-2022-31779
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Input Validation Vulnerability (CVE-2022-31780)
|
CVE-2022-31780
CWE-20
|
CWE-20
|
High
|
Apache Traffic Server Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2020-9494)
|
CVE-2020-9494
CWE-119
|
CWE-119
|
High
|
Apache Traffic Server Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2021-27577)
|
CVE-2021-27577
CWE-444
|
CWE-444
|
High
|
Apache Traffic Server Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2021-32565)
|
CVE-2021-32565
CWE-444
|
CWE-444
|
High
|
Apache Traffic Server Memory Disclosure Vulnerability (CVE-2020-17508)
|
CVE-2020-17508
|
|
High
|
Apache Traffic Server Other Vulnerability (CVE-2019-9513)
|
CVE-2019-9513
|
|
High
|
Apache Traffic Server Remote DOS Attack (CVE-2021-27737)
|
CVE-2021-27737
|
|
High
|
Apache Traffic Server Resource Management Errors Vulnerability (CVE-2016-5396)
|
CVE-2016-5396
|
|
High
|
Apache Traffic Server Uncontrolled Resource Consumption Vulnerability (CVE-2019-9512)
|
CVE-2019-9512
CWE-400
|
CWE-400
|
High
|
Apache Traffic Server Uncontrolled Resource Consumption Vulnerability (CVE-2020-9481)
|
CVE-2020-9481
CWE-400
|
CWE-400
|
High
|
Artifactory Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-1000206)
|
CVE-2018-1000206
CWE-352
|
CWE-352
|
High
|
Artifactory Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2021-23163)
|
CVE-2021-23163
CWE-352
|
CWE-352
|
High
|
Artifactory CVE-2020-7931 Vulnerability (CVE-2020-7931)
|
CVE-2020-7931
|
|
High
|
Artifactory Deserialization of Untrusted Data Vulnerability (CVE-2022-0573)
|
CVE-2022-0573
CWE-502
|
CWE-502
|
High
|
Artifactory Improper Input Validation Vulnerability (CVE-2019-19937)
|
CVE-2019-19937
CWE-20
|
CWE-20
|
High
|
Artifactory Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000623)
|
CVE-2018-1000623
CWE-22
|
CWE-22
|
High
|
Artifactory Insufficiently Protected Credentials Vulnerability (CVE-2018-1000424)
|
CVE-2018-1000424
CWE-522
|
CWE-522
|
High
|
Artifactory Insufficiently Protected Credentials Vulnerability (CVE-2020-2165)
|
CVE-2020-2165
CWE-522
|
CWE-522
|
High
|
ASP.NET MVC Improper Authentication Vulnerability (CVE-2018-8171)
|
CVE-2018-8171
CWE-287
|
CWE-287
|
High
|
ASP.NET MVC Improper Input Validation Vulnerability (CVE-2017-0247)
|
CVE-2017-0247
CWE-20
|
CWE-20
|
High
|
ASP.NET MVC Improper Input Validation Vulnerability (CVE-2017-0249)
|
CVE-2017-0249
CWE-20
|
CWE-20
|
High
|
Atlassian Confluence CVE-2023-22505 Vulnerability (CVE-2023-22505)
|
CVE-2023-22505
|
|
High
|
Atlassian Confluence CVE-2023-22508 Vulnerability (CVE-2023-22508)
|
CVE-2023-22508
|
|
High
|
Atlassian Confluence Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-6668)
|
CVE-2016-6668
CWE-200
|
CWE-200
|
High
|
Atlassian Confluence Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-7415)
|
CVE-2017-7415
CWE-200
|
CWE-200
|
High
|
Atlassian Confluence Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-3394)
|
CVE-2019-3394
CWE-22
|
CWE-22
|
High
|
Atlassian Confluence Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-3398)
|
CVE-2019-3398
CWE-22
|
CWE-22
|
High
|
Atlassian Confluence Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2021-39114)
|
CVE-2021-39114
CWE-138
|
CWE-138
|
High
|
Atlassian Confluence Uncontrolled Search Path Element Vulnerability (CVE-2019-20406)
|
CVE-2019-20406
CWE-427
|
CWE-427
|
High
|
Atlassian Confluence Uncontrolled Search Path Element Vulnerability (CVE-2021-43940)
|
CVE-2021-43940
CWE-427
|
CWE-427
|
High
|
Atlassian Jira Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2021-41305)
|
CVE-2021-41305
CWE-639
|
CWE-639
|
High
|
Atlassian Jira Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2021-41306)
|
CVE-2021-41306
CWE-639
|
CWE-639
|
High
|
Atlassian Jira Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2021-41307)
|
CVE-2021-41307
CWE-639
|
CWE-639
|
High
|
Atlassian Jira Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2016-4319)
|
CVE-2016-4319
CWE-352
|
CWE-352
|
High
|
Atlassian Jira Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2021-39124)
|
CVE-2021-39124
CWE-352
|
CWE-352
|
High
|
Atlassian Jira Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2021-39126)
|
CVE-2021-39126
CWE-352
|
CWE-352
|
High
|
Atlassian Jira CVE-2018-5231 Vulnerability (CVE-2018-5231)
|
CVE-2018-5231
|
|
High
|
Atlassian Jira CVE-2019-8442 Vulnerability (CVE-2019-8442)
|
CVE-2019-8442
|
|
High
|
Atlassian Jira CVE-2019-20413 Vulnerability (CVE-2019-20413)
|
CVE-2019-20413
|
|
High
|
Atlassian Jira CVE-2019-20898 Vulnerability (CVE-2019-20898)
|
CVE-2019-20898
|
|
High
|
Atlassian Jira CVE-2020-14167 Vulnerability (CVE-2020-14167)
|
CVE-2020-14167
|
|
High
|
Atlassian Jira CVE-2020-14178 Vulnerability (CVE-2020-14178)
|
CVE-2020-14178
|
|
High
|
Atlassian Jira CVE-2021-39123 Vulnerability (CVE-2021-39123)
|
CVE-2021-39123
|
|
High
|
Atlassian Jira CVE-2021-43947 Vulnerability (CVE-2021-43947)
|
CVE-2021-43947
|
|
High
|
Atlassian Jira Improper Authentication Vulnerability (CVE-2019-8443)
|
CVE-2019-8443
CWE-287
|
CWE-287
|
High
|
Atlassian Jira Improper Authentication Vulnerability (CVE-2021-26070)
|
CVE-2021-26070
CWE-287
|
CWE-287
|
High
|
Atlassian Jira Improper Authentication Vulnerability (CVE-2021-41312)
|
CVE-2021-41312
CWE-287
|
CWE-287
|
High
|
Atlassian Jira Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2017-18113)
|
CVE-2017-18113
CWE-94
|
CWE-94
|
High
|
Atlassian Jira Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-15001)
|
CVE-2019-15001
CWE-94
|
CWE-94
|
High
|
Atlassian Jira Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2021-43944)
|
CVE-2021-43944
CWE-94
|
CWE-94
|
High
|
Atlassian Jira Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2021-39128)
|
CVE-2021-39128
CWE-138
|
CWE-138
|
High
|
Atlassian Jira Insufficient Session Expiration Vulnerability (CVE-2021-39113)
|
CVE-2021-39113
CWE-613
|
CWE-613
|
High
|
Atlassian Jira Missing Authorization Vulnerability (CVE-2019-3399)
|
CVE-2019-3399
CWE-862
|
CWE-862
|
High
|
Atlassian Jira Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-6619)
|
CVE-2007-6619
CWE-264
|
CWE-264
|
High
|
Atlassian Jira Uncontrolled Search Path Element Vulnerability (CVE-2019-20400)
|
CVE-2019-20400
CWE-427
|
CWE-427
|
High
|
Atlassian Jira Uncontrolled Search Path Element Vulnerability (CVE-2019-20419)
|
CVE-2019-20419
CWE-427
|
CWE-427
|
High
|
ATutor Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-1583)
|
CVE-2015-1583
CWE-352
|
CWE-352
|
High
|
ATutor Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2016-2539)
|
CVE-2016-2539
CWE-352
|
CWE-352
|
High
|
ATutor Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2016-10400)
|
CVE-2016-10400
CWE-22
|
CWE-22
|
High
|
ATutor Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-11446)
|
CVE-2019-11446
CWE-434
|
CWE-434
|
High
|
ATutor Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-12169)
|
CVE-2019-12169
CWE-434
|
CWE-434
|
High
|
ATutor Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-12170)
|
CVE-2019-12170
CWE-434
|
CWE-434
|
High
|
ATutor Weak Password Recovery Mechanism for Forgotten Password Vulnerability (CVE-2021-43498)
|
CVE-2021-43498
CWE-640
|
CWE-640
|
High
|
Authentication bypass via MongoDB operator injection
|
CWE-943
|
CWE-943
|
High
|
axios Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2022-1214)
|
CVE-2022-1214
CWE-200
|
CWE-200
|
High
|
axios Improper Input Validation Vulnerability (CVE-2019-10742)
|
CVE-2019-10742
CWE-20
|
CWE-20
|
High
|
axios Uncontrolled Resource Consumption Vulnerability (CVE-2021-3749)
|
CVE-2021-3749
CWE-400
|
CWE-400
|
High
|
b2evolution Credentials Management Errors Vulnerability (CVE-2016-9479)
|
CVE-2016-9479
|
|
High
|
b2evolution Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2017-5480)
|
CVE-2017-5480
CWE-22
|
CWE-22
|
High
|
b2evolution Improper Neutralization of Special Elements used in a Command ('Command Injection') Vulnerability (CVE-2021-28242)
|
CVE-2021-28242
CWE-138
|
CWE-138
|
High
|
b2evolution Other Vulnerability (CVE-2006-6417)
|
CVE-2006-6417
|
|
High
|
b2evolution Other Vulnerability (CVE-2007-2358)
|
CVE-2007-2358
|
|
High
|
b2evolution Other Vulnerability (CVE-2007-2681)
|
CVE-2007-2681
|
|
High
|
Beego Framework Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2021-27116)
|
CVE-2021-27116
CWE-59
|
CWE-59
|
High
|
Beego Framework Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2021-27117)
|
CVE-2021-27117
CWE-59
|
CWE-59
|
High
|
Caddy Web Server Out-of-bounds Read Vulnerability (CVE-2022-34037)
|
CVE-2022-34037
CWE-125
|
CWE-125
|
High
|
CakePHP 1.3.5 / 1.2.8 unserialize() vulnerability
|
CVE-2010-4335
CWE-20
|
CWE-20
|
High
|
CakePHP Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-8379)
|
CVE-2015-8379
CWE-352
|
CWE-352
|
High
|
CakePHP Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-35239)
|
CVE-2020-35239
CWE-352
|
CWE-352
|
High
|
CakePHP Deserialization of Untrusted Data Vulnerability (CVE-2019-11458)
|
CVE-2019-11458
CWE-502
|
CWE-502
|
High
|
CakePHP Improper Input Validation Vulnerability (CVE-2010-4335)
|
CVE-2010-4335
CWE-20
|
CWE-20
|
High
|
CakePHP Improper Input Validation Vulnerability (CVE-2016-4793)
|
CVE-2016-4793
CWE-20
|
CWE-20
|
High
|
Chamilo Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-23127)
|
CVE-2020-23127
CWE-352
|
CWE-352
|
High
|
Chamilo Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2021-40662)
|
CVE-2021-40662
CWE-352
|
CWE-352
|
High
|
Chamilo Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2022-27427)
|
CVE-2022-27427
CWE-94
|
CWE-94
|
High
|
Chamilo Improper Input Validation Vulnerability (CVE-2012-4030)
|
CVE-2012-4030
CWE-20
|
CWE-20
|
High
|
Chamilo Improper Input Validation Vulnerability (CVE-2021-31933)
|
CVE-2021-31933
CWE-20
|
CWE-20
|
High
|
Chamilo Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2021-35413)
|
CVE-2021-35413
CWE-707
|
CWE-707
|
High
|
Chamilo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-20329)
|
CVE-2018-20329
CWE-138
|
CWE-138
|
High
|
Chamilo Improper Privilege Management Vulnerability (CVE-2022-27421)
|
CVE-2022-27421
CWE-269
|
CWE-269
|
High
|
Chamilo Other Vulnerability (CVE-2023-34962)
|
CVE-2023-34962
|
|
High
|
Chamilo Server-Side Request Forgery (SSRF) Vulnerability (CVE-2022-27426)
|
CVE-2022-27426
CWE-918
|
CWE-918
|
High
|
Chamilo Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2022-40407)
|
CVE-2022-40407
CWE-434
|
CWE-434
|
High
|
Chamilo Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2022-42029)
|
CVE-2022-42029
CWE-434
|
CWE-434
|
High
|
Chart.js Improper Input Validation Vulnerability (CVE-2020-7746)
|
CVE-2020-7746
CWE-20
|
CWE-20
|
High
|
Cherokee Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2019-20798)
|
CVE-2019-20798
CWE-707
|
CWE-707
|
High
|
Cherokee Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2019-20799)
|
CVE-2019-20799
CWE-119
|
CWE-119
|
High
|
Cherokee NULL Pointer Dereference Vulnerability (CVE-2020-12845)
|
CVE-2020-12845
CWE-476
|
CWE-476
|
High
|
CherryPy Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-0252)
|
CVE-2008-0252
CWE-22
|
CWE-22
|
High
|
CKEditor 4.0.1 cross-site scripting vulnerability
|
CWE-79
|
CWE-79
|
High
|
CKEditor Other Vulnerability (CVE-2022-24729)
|
CVE-2022-24729
|
|
High
|
Claroline Other Vulnerability (CVE-2005-1375)
|
CVE-2005-1375
|
|
High
|
Claroline Other Vulnerability (CVE-2005-1376)
|
CVE-2005-1376
|
|
High
|
Claroline Other Vulnerability (CVE-2005-1377)
|
CVE-2005-1377
|
|
High
|
Claroline Other Vulnerability (CVE-2006-1594)
|
CVE-2006-1594
|
|
High
|
Claroline Other Vulnerability (CVE-2006-1596)
|
CVE-2006-1596
|
|
High
|
Claroline Other Vulnerability (CVE-2006-5256)
|
CVE-2006-5256
|
|
High
|
Claroline Other Vulnerability (CVE-2006-7048)
|
CVE-2006-7048
|
|
High
|
ClipBucket Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-5849)
|
CVE-2012-5849
CWE-138
|
CWE-138
|
High
|
ClipBucket Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-6643)
|
CVE-2012-6643
CWE-138
|
CWE-138
|
High
|
ColdFusion CFC Deserialization RCE (CVE-2023-26359/CVE-2023-26360)
|
CVE-2023-26359
CWE-502
|
CWE-502
|
High
|
Collabtive Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2010-4269)
|
CVE-2010-4269
CWE-138
|
CWE-138
|
High
|
Collabtive Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2015-0258)
|
CVE-2015-0258
CWE-434
|
CWE-434
|
High
|
concrete5 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-4724)
|
CVE-2015-4724
CWE-138
|
CWE-138
|
High
|
concrete5 Server-Side Request Forgery (SSRF) Vulnerability (CVE-2018-13790)
|
CVE-2018-13790
CWE-918
|
CWE-918
|
High
|
concrete5 Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2020-11476)
|
CVE-2020-11476
CWE-434
|
CWE-434
|
High
|
concrete5 Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2020-24986)
|
CVE-2020-24986
CWE-434
|
CWE-434
|
High
|
Contao Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-10642)
|
CVE-2019-10642
CWE-352
|
CWE-352
|
High
|
Contao Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2021-37626)
|
CVE-2021-37626
CWE-94
|
CWE-94
|
High
|
Contao Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2017-10993)
|
CVE-2017-10993
CWE-22
|
CWE-22
|
High
|
Contao Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-4383)
|
CVE-2012-4383
CWE-138
|
CWE-138
|
High
|
Contao Improper Privilege Management Vulnerability (CVE-2021-37627)
|
CVE-2021-37627
CWE-269
|
CWE-269
|
High
|
Contao Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-19745)
|
CVE-2019-19745
CWE-434
|
CWE-434
|
High
|
Coppermine Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2008-3481)
|
CVE-2008-3481
CWE-94
|
CWE-94
|
High
|
Coppermine Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-3486)
|
CVE-2008-3486
CWE-22
|
CWE-22
|
High
|
Craft CMS Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2023-30130)
|
CVE-2023-30130
CWE-94
|
CWE-94
|
High
|
Craft CMS Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2023-30179)
|
CVE-2023-30179
CWE-94
|
CWE-94
|
High
|
Craft CMS Improper Neutralization of Formula Elements in a CSV File Vulnerability (CVE-2021-41824)
|
CVE-2021-41824
CWE-1236
|
CWE-1236
|
High
|
Craft CMS Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2020-9757)
|
CVE-2020-9757
CWE-138
|
CWE-138
|
High
|
Craft CMS Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2023-32679)
|
CVE-2023-32679
CWE-138
|
CWE-138
|
High
|
Craft CMS Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2023-40035)
|
CVE-2023-40035
CWE-138
|
CWE-138
|
High
|
Craft CMS Missing Encryption of Sensitive Data Vulnerability (CVE-2018-20465)
|
CVE-2018-20465
CWE-311
|
CWE-311
|
High
|
Craft CMS Missing Encryption of Sensitive Data Vulnerability (CVE-2022-37783)
|
CVE-2022-37783
CWE-311
|
CWE-311
|
High
|
Craft CMS Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2018-3814)
|
CVE-2018-3814
CWE-434
|
CWE-434
|
High
|
Craft CMS Weak Password Recovery Mechanism for Forgotten Password Vulnerability (CVE-2022-29933)
|
CVE-2022-29933
CWE-640
|
CWE-640
|
High
|
Cross-site scripting vulnerability in Google Web Toolkit (CVE-2012-5920)
|
CVE-2012-5920
CWE-80
|
CWE-80
|
High
|
CubeCart Improper Input Validation Vulnerability (CVE-2013-1465)
|
CVE-2013-1465
CWE-20
|
CWE-20
|
High
|
CubeCart Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2009-4060)
|
CVE-2009-4060
CWE-138
|
CWE-138
|
High
|
CubeCart Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2010-1931)
|
CVE-2010-1931
CWE-138
|
CWE-138
|
High
|
CubeCart Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2010-4903)
|
CVE-2010-4903
CWE-138
|
CWE-138
|
High
|
CubeCart Permissions, Privileges, and Access Controls Vulnerability (CVE-2009-3904)
|
CVE-2009-3904
CWE-264
|
CWE-264
|
High
|
D3.js Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-16044)
|
CVE-2017-16044
CWE-200
|
CWE-200
|
High
|
DataTables Prototype Pollution Vulnerability (CVE-2020-28458)
|
CVE-2020-28458
|
|
High
|
Django 7PK - Security Features Vulnerability (CVE-2016-7401)
|
CVE-2016-7401
|
|
High
|
Django Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-6975)
|
CVE-2019-6975
CWE-770
|
CWE-770
|
High
|
Django Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-23969)
|
CVE-2023-23969
CWE-770
|
CWE-770
|
High
|
Django Download of Code Without Integrity Check Vulnerability (CVE-2022-36359)
|
CVE-2022-36359
CWE-494
|
CWE-494
|
High
|
Django Exposure of Resource to Wrong Sphere Vulnerability (CVE-2021-45116)
|
CVE-2021-45116
CWE-668
|
CWE-668
|
High
|
Django Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-6188)
|
CVE-2018-6188
CWE-200
|
CWE-200
|
High
|
Django Improper Authentication Vulnerability (CVE-2021-44420)
|
CVE-2021-44420
CWE-287
|
CWE-287
|
High
|
Django Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2011-0698)
|
CVE-2011-0698
CWE-22
|
CWE-22
|
High
|
Django Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2021-33203)
|
CVE-2021-33203
CWE-22
|
CWE-22
|
High
|
Django Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2016-2512)
|
CVE-2016-2512
CWE-707
|
CWE-707
|
High
|
Django Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-9402)
|
CVE-2020-9402
CWE-138
|
CWE-138
|
High
|
Django Incorrect Default Permissions Vulnerability (CVE-2020-24583)
|
CVE-2020-24583
CWE-276
|
CWE-276
|
High
|
Django Incorrect Default Permissions Vulnerability (CVE-2020-24584)
|
CVE-2020-24584
CWE-276
|
CWE-276
|
High
|
Django Inefficient Regular Expression Complexity Vulnerability (CVE-2023-36053)
|
CVE-2023-36053
CWE-1333
|
CWE-1333
|
High
|
Django Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2022-23833)
|
CVE-2022-23833
CWE-835
|
CWE-835
|
High
|
Django Other Vulnerability (CVE-2022-41323)
|
CVE-2022-41323
|
|
High
|
Django Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-9014)
|
CVE-2016-9014
CWE-264
|
CWE-264
|
High
|
Django Resource Management Errors Vulnerability (CVE-2015-5143)
|
CVE-2015-5143
|
|
High
|
Django Resource Management Errors Vulnerability (CVE-2015-5145)
|
CVE-2015-5145
|
|
High
|
Django Server-Side Request Forgery (SSRF) Vulnerability (CVE-2021-33571)
|
CVE-2021-33571
CWE-918
|
CWE-918
|
High
|
Django Uncontrolled Recursion Vulnerability (CVE-2019-14235)
|
CVE-2019-14235
CWE-674
|
CWE-674
|
High
|
Django Uncontrolled Resource Consumption Vulnerability (CVE-2019-14232)
|
CVE-2019-14232
CWE-400
|
CWE-400
|
High
|
Django Uncontrolled Resource Consumption Vulnerability (CVE-2019-14233)
|
CVE-2019-14233
CWE-400
|
CWE-400
|
High
|
Django Uncontrolled Resource Consumption Vulnerability (CVE-2021-45115)
|
CVE-2021-45115
CWE-400
|
CWE-400
|
High
|
Django Uncontrolled Resource Consumption Vulnerability (CVE-2023-24580)
|
CVE-2023-24580
CWE-400
|
CWE-400
|
High
|
Django Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2021-31542)
|
CVE-2021-31542
CWE-434
|
CWE-434
|
High
|
Dolibarr Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-1010054)
|
CVE-2019-1010054
CWE-352
|
CWE-352
|
High
|
Dolibarr Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-11825)
|
CVE-2020-11825
CWE-352
|
CWE-352
|
High
|
Dolibarr CVE-2019-11200 Vulnerability (CVE-2019-11200)
|
CVE-2019-11200
|
|
High
|
Dolibarr Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-14240)
|
CVE-2017-14240
CWE-200
|
CWE-200
|
High
|
Dolibarr Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-17898)
|
CVE-2017-17898
CWE-200
|
CWE-200
|
High
|
Dolibarr Files or Directories Accessible to External Parties Vulnerability (CVE-2023-33568)
|
CVE-2023-33568
CWE-552
|
CWE-552
|
High
|
Dolibarr Improper Authentication Vulnerability (CVE-2021-25956)
|
CVE-2021-25956
CWE-287
|
CWE-287
|
High
|
Dolibarr Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-11201)
|
CVE-2019-11201
CWE-94
|
CWE-94
|
High
|
Dolibarr Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2022-0819)
|
CVE-2022-0819
CWE-94
|
CWE-94
|
High
|
Dolibarr Improper Neutralization of Special Elements used in a Command ('Command Injection') Vulnerability (CVE-2020-35136)
|
CVE-2020-35136
CWE-138
|
CWE-138
|
High
|
Dolibarr Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2023-30253)
|
CVE-2023-30253
CWE-138
|
CWE-138
|
High
|
Dolibarr Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-1225)
|
CVE-2012-1225
CWE-138
|
CWE-138
|
High
|
Dolibarr Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2017-9839)
|
CVE-2017-9839
CWE-138
|
CWE-138
|
High
|
Dolibarr Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2017-18260)
|
CVE-2017-18260
CWE-138
|
CWE-138
|
High
|
Dolibarr Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-19994)
|
CVE-2018-19994
CWE-138
|
CWE-138
|
High
|
Dolibarr Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-19998)
|
CVE-2018-19998
CWE-138
|
CWE-138
|
High
|
Dolibarr Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-19209)
|
CVE-2019-19209
CWE-138
|
CWE-138
|
High
|
Dolibarr Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-14443)
|
CVE-2020-14443
CWE-138
|
CWE-138
|
High
|
Dolibarr Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2021-36625)
|
CVE-2021-36625
CWE-138
|
CWE-138
|
High
|
Dolibarr Incorrect Authorization Vulnerability (CVE-2020-12669)
|
CVE-2020-12669
CWE-863
|
CWE-863
|
High
|
Dolibarr Incorrect Authorization Vulnerability (CVE-2021-37517)
|
CVE-2021-37517
CWE-863
|
CWE-863
|
High
|
Dolibarr Missing Authorization Vulnerability (CVE-2018-10092)
|
CVE-2018-10092
CWE-862
|
CWE-862
|
High
|
Dolibarr Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2017-9840)
|
CVE-2017-9840
CWE-434
|
CWE-434
|
High
|
Dolibarr Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2020-14209)
|
CVE-2020-14209
CWE-434
|
CWE-434
|
High
|
Dolibarr Weak Password Recovery Mechanism for Forgotten Password Vulnerability (CVE-2021-25957)
|
CVE-2021-25957
CWE-640
|
CWE-640
|
High
|
Dolphin Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-3638)
|
CVE-2013-3638
CWE-138
|
CWE-138
|
High
|
Dotclear Improper Access Control Vulnerability (CVE-2015-8832)
|
CVE-2015-8832
CWE-284
|
CWE-284
|
High
|
Dotclear Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2014-1613)
|
CVE-2014-1613
CWE-94
|
CWE-94
|
High
|
Dotclear Other Vulnerability (CVE-2005-3963)
|
CVE-2005-3963
|
|
High
|
Dotclear Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-5083)
|
CVE-2011-5083
CWE-264
|
CWE-264
|
High
|
Dotclear Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2016-7902)
|
CVE-2016-7902
CWE-434
|
CWE-434
|
High
|
Dotclear Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2016-9268)
|
CVE-2016-9268
CWE-434
|
CWE-434
|
High
|
DotNetNuke multiple vulnerabilities
|
CVE-2012-1030
CWE-79
|
CWE-79
|
High
|
Drupal 7 arbitrary PHP code execution and information disclosure
|
CVE-2012-4553
CVE-2012-4554
CWE-264
|
CWE-264
|
High
|
Drupal 7PK - Security Features Vulnerability (CVE-2016-3163)
|
CVE-2016-3163
|
|
High
|
Drupal Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-6379)
|
CVE-2017-6379
CWE-352
|
CWE-352
|
High
|
Drupal Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-13663)
|
CVE-2020-13663
CWE-352
|
CWE-352
|
High
|
Drupal CVE-2008-4793 Vulnerability (CVE-2008-4793)
|
CVE-2008-4793
|
|
High
|
Drupal CVE-2014-1475 Vulnerability (CVE-2014-1475)
|
CVE-2014-1475
|
|
High
|
Drupal CVE-2017-6919 Vulnerability (CVE-2017-6919)
|
CVE-2017-6919
|
|
High
|
Drupal CVE-2017-6930 Vulnerability (CVE-2017-6930)
|
CVE-2017-6930
|
|
High
|
Drupal Data Processing Errors Vulnerability (CVE-2016-3171)
|
CVE-2016-3171
|
|
High
|
Drupal Deserialization of Untrusted Data Vulnerability (CVE-2019-6338)
|
CVE-2019-6338
CWE-502
|
CWE-502
|
High
|
Drupal Deserialization of Untrusted Data Vulnerability (CVE-2019-6340)
|
CVE-2019-6340
CWE-502
|
CWE-502
|
High
|
Drupal Deserialization of Untrusted Data Vulnerability (CVE-2020-28948)
|
CVE-2020-28948
CWE-502
|
CWE-502
|
High
|
Drupal Exposure of Resource to Wrong Sphere Vulnerability (CVE-2020-13670)
|
CVE-2020-13670
CWE-668
|
CWE-668
|
High
|
Drupal Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-6926)
|
CVE-2017-6926
CWE-200
|
CWE-200
|
High
|
Drupal Improper Access Control Vulnerability (CVE-2016-3162)
|
CVE-2016-3162
CWE-284
|
CWE-284
|
High
|
Drupal Improper Access Control Vulnerability (CVE-2016-3165)
|
CVE-2016-3165
CWE-284
|
CWE-284
|
High
|
Drupal Improper Access Control Vulnerability (CVE-2016-5385)
|
CVE-2016-5385
CWE-284
|
CWE-284
|
High
|
Drupal Improper Access Control Vulnerability (CVE-2020-13677)
|
CVE-2020-13677
CWE-284
|
CWE-284
|
High
|
Drupal Improper Authentication Vulnerability (CVE-2019-10911)
|
CVE-2019-10911
CWE-287
|
CWE-287
|
High
|
Drupal Improper Input Validation Vulnerability (CVE-2007-6299)
|
CVE-2007-6299
CWE-20
|
CWE-20
|
High
|
Drupal Improper Input Validation Vulnerability (CVE-2022-24775)
|
CVE-2022-24775
CWE-20
|
CWE-20
|
High
|
Drupal Improper Input Validation Vulnerability (CVE-2022-25271)
|
CVE-2022-25271
CWE-20
|
CWE-20
|
High
|
Drupal Improper Input Validation Vulnerability (CVE-2022-25273)
|
CVE-2022-25273
CWE-20
|
CWE-20
|
High
|
Drupal Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2020-36193)
|
CVE-2020-36193
CWE-22
|
CWE-22
|
High
|
Drupal Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2022-39261)
|
CVE-2022-39261
CWE-22
|
CWE-22
|
High
|
Drupal Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2020-28949)
|
CVE-2020-28949
CWE-138
|
CWE-138
|
High
|
Drupal Improper Neutralization of Special Elements used in a Command ('Command Injection') Vulnerability (CVE-2020-13664)
|
CVE-2020-13664
CWE-138
|
CWE-138
|
High
|
Drupal Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-2999)
|
CVE-2008-2999
CWE-138
|
CWE-138
|
High
|
Drupal Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-3223)
|
CVE-2008-3223
CWE-138
|
CWE-138
|
High
|
Drupal Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2014-3704)
|
CVE-2014-3704
CWE-138
|
CWE-138
|
High
|
Drupal Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-6659)
|
CVE-2015-6659
CWE-138
|
CWE-138
|
High
|
Drupal Improper Privilege Management Vulnerability (CVE-2017-6924)
|
CVE-2017-6924
CWE-269
|
CWE-269
|
High
|
Drupal Inclusion of Functionality from Untrusted Control Sphere Vulnerability (CVE-2017-6381)
|
CVE-2017-6381
CWE-829
|
CWE-829
|
High
|
Drupal Incorrect Authorization Vulnerability (CVE-2011-2726)
|
CVE-2011-2726
CWE-863
|
CWE-863
|
High
|
Drupal Incorrect Authorization Vulnerability (CVE-2017-6377)
|
CVE-2017-6377
CWE-863
|
CWE-863
|
High
|
Drupal Inefficient Regular Expression Complexity Vulnerability (CVE-2022-24729)
|
CVE-2022-24729
CWE-1333
|
CWE-1333
|
High
|
Drupal Insufficient Verification of Data Authenticity Vulnerability (CVE-2016-9450)
|
CVE-2016-9450
CWE-345
|
CWE-345
|
High
|
Drupal Other Vulnerability (CVE-2005-1871)
|
CVE-2005-1871
|
|
High
|
Drupal Other Vulnerability (CVE-2006-2742)
|
CVE-2006-2742
|
|
High
|
Drupal Other Vulnerability (CVE-2006-2831)
|
CVE-2006-2831
|
|
High
|
Drupal Other Vulnerability (CVE-2006-5476)
|
CVE-2006-5476
|
|
High
|
Drupal Other Vulnerability (CVE-2016-3164)
|
CVE-2016-3164
|
|
High
|
Drupal Other Vulnerability (CVE-2016-3167)
|
CVE-2016-3167
|
|
High
|
Drupal Other Vulnerability (CVE-2022-25275)
|
CVE-2022-25275
|
|
High
|
Drupal Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-2687)
|
CVE-2011-2687
CWE-264
|
CWE-264
|
High
|
Drupal Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-3169)
|
CVE-2016-3169
CWE-264
|
CWE-264
|
High
|
Drupal Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-6211)
|
CVE-2016-6211
CWE-264
|
CWE-264
|
High
|
Drupal Reliance on Cookies without Validation and Integrity Checking Vulnerability (CVE-2022-29248)
|
CVE-2022-29248
CWE-565
|
CWE-565
|
High
|
Drupal Remote Code Execution Vulnerability (CVE-2020-13671)
|
CVE-2020-13671
|
|
High
|
Drupal Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2022-25277)
|
CVE-2022-25277
CWE-434
|
CWE-434
|
High
|
e107 Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-15901)
|
CVE-2018-15901
CWE-352
|
CWE-352
|
High
|
e107 Deserialization of Untrusted Data Vulnerability (CVE-2016-10753)
|
CVE-2016-10753
CWE-502
|
CWE-502
|
High
|
e107 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2011-1513)
|
CVE-2011-1513
CWE-138
|
CWE-138
|
High
|
e107 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2009-4084)
|
CVE-2009-4084
CWE-138
|
CWE-138
|
High
|
e107 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2016-10378)
|
CVE-2016-10378
CWE-138
|
CWE-138
|
High
|
e107 Inadequate Encryption Strength Vulnerability (CVE-2021-27885)
|
CVE-2021-27885
CWE-326
|
CWE-326
|
High
|
e107 Other Vulnerability (CVE-2004-2042)
|
CVE-2004-2042
|
|
High
|
e107 Other Vulnerability (CVE-2005-1949)
|
CVE-2005-1949
|
|
High
|
e107 Other Vulnerability (CVE-2005-1966)
|
CVE-2005-1966
|
|
High
|
e107 Other Vulnerability (CVE-2005-2559)
|
CVE-2005-2559
|
|
High
|
e107 Other Vulnerability (CVE-2005-3521)
|
CVE-2005-3521
|
|
High
|
e107 Other Vulnerability (CVE-2005-4224)
|
CVE-2005-4224
|
|
High
|
e107 Other Vulnerability (CVE-2006-4548)
|
CVE-2006-4548
|
|
High
|
e107 Other Vulnerability (CVE-2006-5786)
|
CVE-2006-5786
|
|
High
|
e107 Other Vulnerability (CVE-2010-2098)
|
CVE-2010-2098
|
|
High
|
e107 Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-2099)
|
CVE-2010-2099
CWE-264
|
CWE-264
|
High
|
e107 Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2018-16388)
|
CVE-2018-16388
CWE-434
|
CWE-434
|
High
|
Ektron CMS400.NET ContentRatingGraph.aspx SQL injection
|
CVE-2008-5122
CWE-89
|
CWE-89
|
High
|
Ektron CMS multiple vulnerabilities
|
CWE-434
|
CWE-434
|
High
|
Ektron CMS unauthenticated code execution and Local File Read
|
CVE-2012-5357
CVE-2012-5358
CWE-20
|
CWE-20
|
High
|
Elgg Exposure of Private Personal Information to an Unauthorized Actor Vulnerability (CVE-2021-3980)
|
CVE-2021-3980
CWE-359
|
CWE-359
|
High
|
Envoy mishandles dropped and truncated datagrams Issue (CVE-2020-35471)
|
CVE-2020-35471
|
|
High
|
Envoy Proxy Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-15225)
|
CVE-2019-15225
CWE-770
|
CWE-770
|
High
|
Envoy Proxy Always-Incorrect Control Flow Implementation Vulnerability (CVE-2022-21655)
|
CVE-2022-21655
CWE-670
|
CWE-670
|
High
|
Envoy Proxy CVE-2020-25018 Vulnerability (CVE-2020-25018)
|
CVE-2020-25018
|
|
High
|
Envoy Proxy CVE-2023-27496 Vulnerability (CVE-2023-27496)
|
CVE-2023-27496
|
|
High
|
Envoy Proxy Excessive Iteration Vulnerability (CVE-2021-32778)
|
CVE-2021-32778
CWE-834
|
CWE-834
|
High
|
Envoy Proxy Excessive Iteration Vulnerability (CVE-2021-39204)
|
CVE-2021-39204
CWE-834
|
CWE-834
|
High
|
Envoy Proxy Improper Authentication Vulnerability (CVE-2021-21378)
|
CVE-2021-21378
CWE-287
|
CWE-287
|
High
|
Envoy Proxy Improper Check for Unusual or Exceptional Conditions Vulnerability (CVE-2021-32780)
|
CVE-2021-32780
CWE-754
|
CWE-754
|
High
|
Envoy Proxy Improper Check for Unusual or Exceptional Conditions Vulnerability (CVE-2021-39162)
|
CVE-2021-39162
CWE-754
|
CWE-754
|
High
|
Envoy Proxy Improper Handling of Highly Compressed Data (Data Amplification) Vulnerability (CVE-2022-29225)
|
CVE-2022-29225
CWE-409
|
CWE-409
|
High
|
Envoy Proxy Improper Input Validation Vulnerability (CVE-2019-9900)
|
CVE-2019-9900
CWE-20
|
CWE-20
|
High
|
Envoy Proxy Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2020-12604)
|
CVE-2020-12604
CWE-119
|
CWE-119
|
High
|
Envoy Proxy Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2021-32781)
|
CVE-2021-32781
CWE-119
|
CWE-119
|
High
|
Envoy Proxy Incomplete Cleanup Vulnerability (CVE-2023-35945)
|
CVE-2023-35945
CWE-459
|
CWE-459
|
High
|
Envoy Proxy Incorrect Authorization Vulnerability (CVE-2021-32777)
|
CVE-2021-32777
CWE-863
|
CWE-863
|
High
|
Envoy Proxy Incorrect Authorization Vulnerability (CVE-2021-32779)
|
CVE-2021-32779
CWE-863
|
CWE-863
|
High
|
Envoy Proxy Incorrect Authorization Vulnerability (CVE-2021-39206)
|
CVE-2021-39206
CWE-863
|
CWE-863
|
High
|
Envoy Proxy Integer Overflow or Wraparound Vulnerability (CVE-2021-28682)
|
CVE-2021-28682
CWE-190
|
CWE-190
|
High
|
Envoy Proxy Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2019-18836)
|
CVE-2019-18836
CWE-835
|
CWE-835
|
High
|
Envoy Proxy NULL Pointer Dereference Vulnerability (CVE-2019-18838)
|
CVE-2019-18838
CWE-476
|
CWE-476
|
High
|
Envoy Proxy NULL Pointer Dereference Vulnerability (CVE-2021-28683)
|
CVE-2021-28683
CWE-476
|
CWE-476
|
High
|
Envoy Proxy NULL Pointer Dereference Vulnerability (CVE-2021-43824)
|
CVE-2021-43824
CWE-476
|
CWE-476
|
High
|
Envoy Proxy Other Vulnerability (CVE-2020-25017)
|
CVE-2020-25017
|
|
High
|
Envoy Proxy Reachable Assertion Vulnerability (CVE-2021-29258)
|
CVE-2021-29258
CWE-617
|
CWE-617
|
High
|
Envoy Proxy Reachable Assertion Vulnerability (CVE-2022-29228)
|
CVE-2022-29228
CWE-617
|
CWE-617
|
High
|
Envoy Proxy Uncontrolled Resource Consumption Vulnerability (CVE-2019-15226)
|
CVE-2019-15226
CWE-400
|
CWE-400
|
High
|
Envoy Proxy Uncontrolled Resource Consumption Vulnerability (CVE-2020-8663)
|
CVE-2020-8663
CWE-400
|
CWE-400
|
High
|
Envoy Proxy Uncontrolled Resource Consumption Vulnerability (CVE-2020-12603)
|
CVE-2020-12603
CWE-400
|
CWE-400
|
High
|
Envoy Proxy Uncontrolled Resource Consumption Vulnerability (CVE-2020-12605)
|
CVE-2020-12605
CWE-400
|
CWE-400
|
High
|
Envoy Proxy Use After Free Vulnerability (CVE-2021-43825)
|
CVE-2021-43825
CWE-416
|
CWE-416
|
High
|
Envoy Proxy Use After Free Vulnerability (CVE-2021-43826)
|
CVE-2021-43826
CWE-416
|
CWE-416
|
High
|
Envoy Proxy Use After Free Vulnerability (CVE-2022-29227)
|
CVE-2022-29227
CWE-416
|
CWE-416
|
High
|
Envoy Proxy Use After Free Vulnerability (CVE-2023-35943)
|
CVE-2023-35943
CWE-416
|
CWE-416
|
High
|
Envoy Wrong DOWNSTREAM_REMOTE_ADDRESS logged Issue (CVE-2020-35470)
|
CVE-2020-35470
|
|
High
|
EspoCRM Improper Neutralization of Formula Elements in a CSV File Vulnerability (CVE-2022-38844)
|
CVE-2022-38844
CWE-1236
|
CWE-1236
|
High
|
EspoCRM Improper Restriction of Excessive Authentication Attempts Vulnerability (CVE-2019-14351)
|
CVE-2019-14351
CWE-307
|
CWE-307
|
High
|
EspoCRM Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2022-38843)
|
CVE-2022-38843
CWE-434
|
CWE-434
|
High
|
Ext JS Server-Side Request Forgery (SSRF) Vulnerability (CVE-2007-6758)
|
CVE-2007-6758
CWE-918
|
CWE-918
|
High
|
Family Connections Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2012-0699)
|
CVE-2012-0699
CWE-352
|
CWE-352
|
High
|
Family Connections Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2010-3419)
|
CVE-2010-3419
CWE-94
|
CWE-94
|
High
|
FCKeditor spellchecker.php cross site scripting vulnerability
|
CVE-2012-4000
CWE-79
|
CWE-79
|
High
|
FluxBB Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2014-10029)
|
CVE-2014-10029
CWE-138
|
CWE-138
|
High
|
FluxBB Use of Password Hash With Insufficient Computational Effort Vulnerability (CVE-2020-28873)
|
CVE-2020-28873
CWE-916
|
CWE-916
|
High
|
FrontAccounting Cross-site Request Forgery (CSRF) Vulnerability (CVE-2018-7176)
|
CVE-2018-7176
|
|
High
|
Frontaccounting Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2009-4037)
|
CVE-2009-4037
CWE-138
|
CWE-138
|
High
|
Frontaccounting Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2009-4045)
|
CVE-2009-4045
CWE-138
|
CWE-138
|
High
|
Frontaccounting Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-1000890)
|
CVE-2018-1000890
CWE-138
|
CWE-138
|
High
|
FrontAccounting Multiple SQL Injection Vulnerabilities (CVE-2014-3973)
|
CVE-2014-3973
|
|
High
|
Frontaccounting Other Vulnerability (CVE-2007-4279)
|
CVE-2007-4279
|
|
High
|
Gallery 3.0.4 remote code execution
|
CWE-20
|
CWE-20
|
High
|
GibbonEdu Session Fixation Vulnerability (CVE-2022-27305)
|
CVE-2022-27305
CWE-384
|
CWE-384
|
High
|
GlassFish CVE-2011-3559 Vulnerability (CVE-2011-3559)
|
CVE-2011-3559
|
|
High
|
GlassFish CVE-2016-5519 Vulnerability (CVE-2016-5519)
|
CVE-2016-5519
|
|
High
|
GlassFish CVE-2017-3249 Vulnerability (CVE-2017-3249)
|
CVE-2017-3249
|
|
High
|
GlassFish CVE-2017-10391 Vulnerability (CVE-2017-10391)
|
CVE-2017-10391
|
|
High
|
GlassFish CVE-2018-2911 Vulnerability (CVE-2018-2911)
|
CVE-2018-2911
|
|
High
|
GlassFish CVE-2018-3152 Vulnerability (CVE-2018-3152)
|
CVE-2018-3152
|
|
High
|
GlassFish Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-3250)
|
CVE-2017-3250
CWE-200
|
CWE-200
|
High
|
GlassFish Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-1000029)
|
CVE-2017-1000029
CWE-200
|
CWE-200
|
High
|
GlassFish Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2017-1000028)
|
CVE-2017-1000028
CWE-22
|
CWE-22
|
High
|
GlassFish Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-1950)
|
CVE-2016-1950
CWE-119
|
CWE-119
|
High
|
Grafana Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2022-39328)
|
CVE-2022-39328
CWE-362
|
CWE-362
|
High
|
Grafana Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2022-21703)
|
CVE-2022-21703
CWE-352
|
CWE-352
|
High
|
Grafana CVE-2021-27358 Vulnerability (CVE-2021-27358)
|
CVE-2021-27358
|
|
High
|
Grafana CVE-2022-39201 Vulnerability (CVE-2022-39201)
|
CVE-2022-39201
|
|
High
|
Grafana CVE-2023-1387 Vulnerability (CVE-2023-1387)
|
CVE-2023-1387
|
|
High
|
Grafana Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2022-23498)
|
CVE-2022-23498
CWE-200
|
CWE-200
|
High
|
Grafana Improper Authentication Vulnerability (CVE-2021-28148)
|
CVE-2021-28148
CWE-287
|
CWE-287
|
High
|
Grafana Improper Authentication Vulnerability (CVE-2021-39226)
|
CVE-2021-39226
CWE-287
|
CWE-287
|
High
|
Grafana Improper Authentication Vulnerability (CVE-2022-32276)
|
CVE-2022-32276
CWE-287
|
CWE-287
|
High
|
Grafana Improper Input Validation Vulnerability (CVE-2022-39306)
|
CVE-2022-39306
CWE-20
|
CWE-20
|
High
|
Grafana Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2021-43798)
|
CVE-2021-43798
CWE-22
|
CWE-22
|
High
|
Grafana Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2022-32275)
|
CVE-2022-32275
CWE-22
|
CWE-22
|
High
|
Grafana Improper Verification of Cryptographic Signature Vulnerability (CVE-2022-31123)
|
CVE-2022-31123
CWE-347
|
CWE-347
|
High
|
Grafana Incorrect Authorization Vulnerability (CVE-2022-31107)
|
CVE-2022-31107
CWE-863
|
CWE-863
|
High
|
Grafana Incorrect Permission Assignment for Critical Resource Vulnerability (CVE-2021-27962)
|
CVE-2021-27962
CWE-732
|
CWE-732
|
High
|
Grafana Insufficiently Protected Credentials Vulnerability (CVE-2022-31130)
|
CVE-2022-31130
CWE-522
|
CWE-522
|
High
|
Grafana Missing Authentication for Critical Function Vulnerability (CVE-2019-15043)
|
CVE-2019-15043
CWE-306
|
CWE-306
|
High
|
Grafana Server-Side Request Forgery (SSRF) Vulnerability (CVE-2020-13379)
|
CVE-2020-13379
CWE-918
|
CWE-918
|
High
|
Grafana URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2022-29170)
|
CVE-2022-29170
CWE-601
|
CWE-601
|
High
|
GSAP CVE-2020-28478 Vulnerability (CVE-2020-28478)
|
CVE-2020-28478
|
|
High
|
Gunicorn Improper Neutralization of CRLF Sequences ('CRLF Injection') Vulnerability (CVE-2018-1000164)
|
CVE-2018-1000164
CWE-707
|
CWE-707
|
High
|
Handlebars Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-20920)
|
CVE-2019-20920
CWE-94
|
CWE-94
|
High
|
Handlebars Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2019-20922)
|
CVE-2019-20922
CWE-835
|
CWE-835
|
High
|
Hiawatha Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-8358)
|
CVE-2019-8358
CWE-22
|
CWE-22
|
High
|
Highcharts JS Incorrect Regular Expression Vulnerability (CVE-2018-20801)
|
CVE-2018-20801
CWE-185
|
CWE-185
|
High
|
Horde/IMP Plesk webmail exploit
|
CWE-20
|
CWE-20
|
High
|
IBMHttpServer Improper Input Validation Vulnerability (CVE-2023-26281)
|
CVE-2023-26281
CWE-20
|
CWE-20
|
High
|
IBMHttpServer Observable Discrepancy Vulnerability (CVE-2023-32342)
|
CVE-2023-32342
CWE-203
|
CWE-203
|
High
|
IBMHttpServer Other Vulnerability (CVE-2000-1168)
|
CVE-2000-1168
|
|
High
|
IBMHttpServer Other Vulnerability (CVE-2004-1082)
|
CVE-2004-1082
|
|
High
|
IBM Lotus Domino web server Cross-Site Scripting vulnerabilities
|
CVE-2012-3301
CVE-2012-3302
CWE-79
|
CWE-79
|
High
|
IBM RTC Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-4252)
|
CVE-2019-4252
CWE-22
|
CWE-22
|
High
|
IBM RTC Improper Privilege Management Vulnerability (CVE-2021-29774)
|
CVE-2021-29774
CWE-269
|
CWE-269
|
High
|
IBM RTC Improper Restriction of XML External Entity Reference Vulnerability (CVE-2016-9707)
|
CVE-2016-9707
CWE-611
|
CWE-611
|
High
|
IBM RTC Improper Restriction of XML External Entity Reference Vulnerability (CVE-2017-1103)
|
CVE-2017-1103
CWE-611
|
CWE-611
|
High
|
IBM RTC Improper Restriction of XML External Entity Reference Vulnerability (CVE-2021-20502)
|
CVE-2021-20502
CWE-611
|
CWE-611
|
High
|
IBM RTC Inadequate Encryption Strength Vulnerability (CVE-2017-1701)
|
CVE-2017-1701
CWE-326
|
CWE-326
|
High
|
IBM RTC Inadequate Encryption Strength Vulnerability (CVE-2020-4965)
|
CVE-2020-4965
CWE-326
|
CWE-326
|
High
|
IBM RTC Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-7440)
|
CVE-2015-7440
CWE-264
|
CWE-264
|
High
|
IBM RTC Server-Side Request Forgery (SSRF) Vulnerability (CVE-2021-29844)
|
CVE-2021-29844
CWE-918
|
CWE-918
|
High
|
IBM Tivoli Access Manager directory traversal
|
CVE-2010-4622
CVE-2011-0494
CWE-22
|
CWE-22
|
High
|
IBM WebSEAL 7PK - Security Features Vulnerability (CVE-2016-3025)
|
CVE-2016-3025
|
|
High
|
IBM WebSEAL CVE-2018-1850 Vulnerability (CVE-2018-1850)
|
CVE-2018-1850
|
|
High
|
IBM WebSEAL CVE-2019-4135 Vulnerability (CVE-2019-4135)
|
CVE-2019-4135
|
|
High
|
IBM WebSEAL CVE-2019-4145 Vulnerability (CVE-2019-4145)
|
CVE-2019-4145
|
|
High
|
IBM WebSEAL Improper Input Validation Vulnerability (CVE-2019-4036)
|
CVE-2019-4036
CWE-20
|
CWE-20
|
High
|
IBM WebSEAL Improper Restriction of XML External Entity Reference Vulnerability (CVE-2019-4707)
|
CVE-2019-4707
CWE-611
|
CWE-611
|
High
|
IBM WebSEAL Inadequate Encryption Strength Vulnerability (CVE-2018-1814)
|
CVE-2018-1814
CWE-326
|
CWE-326
|
High
|
IBM WebSEAL Insufficiently Protected Credentials Vulnerability (CVE-2021-20439)
|
CVE-2021-20439
CWE-522
|
CWE-522
|
High
|
IBM WebSEAL Use of Hard-coded Credentials Vulnerability (CVE-2018-1887)
|
CVE-2018-1887
CWE-798
|
CWE-798
|
High
|
Internet Information Services Configuration Vulnerability (CVE-1999-0725)
|
CVE-1999-0725
|
|
High
|
Internet Information Services CVE-2006-6578 Vulnerability (CVE-2006-6578)
|
CVE-2006-6578
|
|
High
|
Internet Information Services CVE-2008-0074 Vulnerability (CVE-2008-0074)
|
CVE-2008-0074
|
|
High
|
Internet Information Services Improper Authentication Vulnerability (CVE-2009-1122)
|
CVE-2009-1122
CWE-287
|
CWE-287
|
High
|
Internet Information Services Improper Authentication Vulnerability (CVE-2009-1535)
|
CVE-2009-1535
CWE-287
|
CWE-287
|
High
|
Internet Information Services Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2010-1256)
|
CVE-2010-1256
CWE-94
|
CWE-94
|
High
|
Internet Information Services Improper Input Validation Vulnerability (CVE-2000-0258)
|
CVE-2000-0258
CWE-20
|
CWE-20
|
High
|
Internet Information Services Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-1999-0349)
|
CVE-1999-0349
CWE-119
|
CWE-119
|
High
|
Internet Information Services Other Vulnerability (CVE-1999-0253)
|
CVE-1999-0253
|
|
High
|
Internet Information Services Other Vulnerability (CVE-1999-0412)
|
CVE-1999-0412
|
|
High
|
Internet Information Services Other Vulnerability (CVE-1999-0449)
|
CVE-1999-0449
|
|
High
|
Internet Information Services Other Vulnerability (CVE-1999-0450)
|
CVE-1999-0450
|
|
High
|
Internet Information Services Other Vulnerability (CVE-1999-1233)
|
CVE-1999-1233
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2000-0457)
|
CVE-2000-0457
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2000-0746)
|
CVE-2000-0746
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2000-0884)
|
CVE-2000-0884
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2000-0886)
|
CVE-2000-0886
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2000-0970)
|
CVE-2000-0970
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2000-1104)
|
CVE-2000-1104
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2001-0333)
|
CVE-2001-0333
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2001-0506)
|
CVE-2001-0506
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2001-0507)
|
CVE-2001-0507
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2001-0902)
|
CVE-2001-0902
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2002-0071)
|
CVE-2002-0071
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2002-0074)
|
CVE-2002-0074
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2002-0075)
|
CVE-2002-0075
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2002-0079)
|
CVE-2002-0079
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2002-0147)
|
CVE-2002-0147
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2002-0148)
|
CVE-2002-0148
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2002-0149)
|
CVE-2002-0149
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2002-0150)
|
CVE-2002-0150
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2002-0364)
|
CVE-2002-0364
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2002-0862)
|
CVE-2002-0862
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2002-0869)
|
CVE-2002-0869
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2002-1180)
|
CVE-2002-1180
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2004-0205)
|
CVE-2004-0205
|
|
High
|
Internet Information Services Other Vulnerability (CVE-2007-2897)
|
CVE-2007-2897
|
|
High
|
Internet Information Services Permissions, Privileges, and Access Controls Vulnerability (CVE-1999-0777)
|
CVE-1999-0777
CWE-264
|
CWE-264
|
High
|
Internet Information Services Unchecked Return Value Vulnerability (CVE-2005-4360)
|
CVE-2005-4360
CWE-252
|
CWE-252
|
High
|
Invision Power Board version 3.3.4 unserialize PHP code execution
|
CVE-2012-5692
CWE-20
|
CWE-20
|
High
|
Java Unspesificed Vulnerability (CVE-2018-2941)
|
CVE-2018-2941
|
|
High
|
Java Unspesificed Vulnerability (CVE-2018-2964)
|
CVE-2018-2964
|
|
High
|
Java Unspesificed Vulnerability (CVE-2018-3149)
|
CVE-2018-3149
|
|
High
|
Java Unspesificed Vulnerability (CVE-2018-3169)
|
CVE-2018-3169
|
|
High
|
Java Unspesificed Vulnerability (CVE-2019-2602)
|
CVE-2019-2602
|
|
High
|
JBoss Application Server Directory Traversal Vulnerability (CVE-2006-5750)
|
CVE-2006-5750
|
|
High
|
JBoss Application Server Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2012-1094)
|
CVE-2012-1094
CWE-200
|
CWE-200
|
High
|
JBoss Application Server Improper Privilege Management Vulnerability (CVE-2012-2312)
|
CVE-2012-2312
CWE-269
|
CWE-269
|
High
|
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-9511)
|
CVE-2019-9511
CWE-770
|
CWE-770
|
High
|
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-9514)
|
CVE-2019-9514
CWE-770
|
CWE-770
|
High
|
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-9515)
|
CVE-2019-9515
CWE-770
|
CWE-770
|
High
|
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-9517)
|
CVE-2019-9517
CWE-770
|
CWE-770
|
High
|
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-9518)
|
CVE-2019-9518
CWE-770
|
CWE-770
|
High
|
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2020-10705)
|
CVE-2020-10705
CWE-770
|
CWE-770
|
High
|
Jboss EAP CVE-2012-5626 Vulnerability (CVE-2012-5626)
|
CVE-2012-5626
|
|
High
|
Jboss EAP CVE-2016-6796 Vulnerability (CVE-2016-6796)
|
CVE-2016-6796
|
|
High
|
Jboss EAP CVE-2017-12189 Vulnerability (CVE-2017-12189)
|
CVE-2017-12189
|
|
High
|
Jboss EAP CVE-2022-1259 Vulnerability (CVE-2022-1259)
|
CVE-2022-1259
|
|
High
|
Jboss EAP Deserialization of Untrusted Data Vulnerability (CVE-2016-4978)
|
CVE-2016-4978
CWE-502
|
CWE-502
|
High
|
Jboss EAP Deserialization of Untrusted Data Vulnerability (CVE-2016-7065)
|
CVE-2016-7065
CWE-502
|
CWE-502
|
High
|
Jboss EAP Deserialization of Untrusted Data Vulnerability (CVE-2018-12022)
|
CVE-2018-12022
CWE-502
|
CWE-502
|
High
|
Jboss EAP Deserialization of Untrusted Data Vulnerability (CVE-2018-12023)
|
CVE-2018-12023
CWE-502
|
CWE-502
|
High
|
Jboss EAP Deserialization of Untrusted Data Vulnerability (CVE-2019-10086)
|
CVE-2019-10086
CWE-502
|
CWE-502
|
High
|
Jboss EAP Deserialization of Untrusted Data Vulnerability (CVE-2021-4104)
|
CVE-2021-4104
CWE-502
|
CWE-502
|
High
|
Jboss EAP Exposure of Resource to Wrong Sphere Vulnerability (CVE-2021-3859)
|
CVE-2021-3859
CWE-668
|
CWE-668
|
High
|
Jboss EAP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-3530)
|
CVE-2014-3530
CWE-200
|
CWE-200
|
High
|
Jboss EAP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-2183)
|
CVE-2016-2183
CWE-200
|
CWE-200
|
High
|
Jboss EAP Files or Directories Accessible to External Parties Vulnerability (CVE-2021-3717)
|
CVE-2021-3717
CWE-552
|
CWE-552
|
High
|
Jboss EAP Improper Handling of Exceptional Conditions Vulnerability (CVE-2018-8039)
|
CVE-2018-8039
CWE-755
|
CWE-755
|
High
|
Jboss EAP Improper Input Validation Vulnerability (CVE-2010-3708)
|
CVE-2010-3708
CWE-20
|
CWE-20
|
High
|
Jboss EAP Improper Input Validation Vulnerability (CVE-2013-2185)
|
CVE-2013-2185
CWE-20
|
CWE-20
|
High
|
Jboss EAP Improper Input Validation Vulnerability (CVE-2016-3110)
|
CVE-2016-3110
CWE-20
|
CWE-20
|
High
|
Jboss EAP Improper Input Validation Vulnerability (CVE-2020-1757)
|
CVE-2020-1757
CWE-20
|
CWE-20
|
High
|
Jboss EAP Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1048)
|
CVE-2018-1048
CWE-22
|
CWE-22
|
High
|
Jboss EAP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2021-32027)
|
CVE-2021-32027
CWE-119
|
CWE-119
|
High
|
Jboss EAP Improper Restriction of XML External Entity Reference Vulnerability (CVE-2019-10172)
|
CVE-2019-10172
CWE-611
|
CWE-611
|
High
|
Jboss EAP Inadequate Encryption Strength Vulnerability (CVE-2014-0224)
|
CVE-2014-0224
CWE-326
|
CWE-326
|
High
|
Jboss EAP Incomplete List of Disallowed Inputs Vulnerability (CVE-2018-5968)
|
CVE-2018-5968
CWE-184
|
CWE-184
|
High
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2017-7561)
|
CVE-2017-7561
CWE-444
|
CWE-444
|
High
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2017-12165)
|
CVE-2017-12165
CWE-444
|
CWE-444
|
High
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2019-16869)
|
CVE-2019-16869
CWE-444
|
CWE-444
|
High
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2020-7238)
|
CVE-2020-7238
CWE-444
|
CWE-444
|
High
|
Jboss EAP Incorrect Authorization Vulnerability (CVE-2019-14843)
|
CVE-2019-14843
CWE-863
|
CWE-863
|
High
|
Jboss EAP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2017-2670)
|
CVE-2017-2670
CWE-835
|
CWE-835
|
High
|
Jboss EAP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1041)
|
CVE-2018-1041
CWE-835
|
CWE-835
|
High
|
Jboss EAP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1336)
|
CVE-2018-1336
CWE-835
|
CWE-835
|
High
|
Jboss EAP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2019-0205)
|
CVE-2019-0205
CWE-835
|
CWE-835
|
High
|
Jboss EAP Missing Authorization Vulnerability (CVE-2019-10184)
|
CVE-2019-10184
CWE-862
|
CWE-862
|
High
|
Jboss EAP Missing Release of Memory after Effective Lifetime Vulnerability (CVE-2022-0853)
|
CVE-2022-0853
CWE-401
|
CWE-401
|
High
|
Jboss EAP Observable Discrepancy Vulnerability (CVE-2022-3143)
|
CVE-2022-3143
CWE-203
|
CWE-203
|
High
|
Jboss EAP Other Vulnerability (CVE-2014-3490)
|
CVE-2014-3490
|
|
High
|
Jboss EAP Other Vulnerability (CVE-2019-9513)
|
CVE-2019-9513
|
|
High
|
Jboss EAP Out-of-bounds Read Vulnerability (CVE-2019-0210)
|
CVE-2019-0210
CWE-125
|
CWE-125
|
High
|
Jboss EAP Permission Issues Vulnerability (CVE-2016-7066)
|
CVE-2016-7066
|
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-4605)
|
CVE-2011-4605
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-4608)
|
CVE-2011-4608
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-5629)
|
CVE-2012-5629
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-2165)
|
CVE-2013-2165
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-5406)
|
CVE-2016-5406
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-8656)
|
CVE-2016-8656
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-8657)
|
CVE-2016-8657
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2019-3894)
|
CVE-2019-3894
CWE-264
|
CWE-264
|
High
|
Jboss EAP Reachable Assertion Vulnerability (CVE-2020-25710)
|
CVE-2020-25710
CWE-617
|
CWE-617
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2016-8610)
|
CVE-2016-8610
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2017-12174)
|
CVE-2017-12174
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2019-14888)
|
CVE-2019-14888
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2019-19343)
|
CVE-2019-19343
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-14384)
|
CVE-2020-14384
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-25644)
|
CVE-2020-25644
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2021-3629)
|
CVE-2021-3629
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2021-3690)
|
CVE-2021-3690
CWE-400
|
CWE-400
|
High
|
Jboss EAP Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2018-1000180)
|
CVE-2018-1000180
CWE-327
|
CWE-327
|
High
|
Jboss EAP Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Vulnerability (CVE-2017-7536)
|
CVE-2017-7536
CWE-470
|
CWE-470
|
High
|
Jboss EAP Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Vulnerability (CVE-2019-10174)
|
CVE-2019-10174
CWE-470
|
CWE-470
|
High
|
Jboss EAP XML Injection (aka Blind XPath Injection) Vulnerability (CVE-2018-1000632)
|
CVE-2018-1000632
CWE-91
|
CWE-91
|
High
|
Jenkins Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-27900)
|
CVE-2023-27900
CWE-770
|
CWE-770
|
High
|
Jenkins Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-27901)
|
CVE-2023-27901
CWE-770
|
CWE-770
|
High
|
Jenkins Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2017-1000503)
|
CVE-2017-1000503
CWE-362
|
CWE-362
|
High
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-7537)
|
CVE-2015-7537
CWE-352
|
CWE-352
|
High
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-1000356)
|
CVE-2017-1000356
CWE-352
|
CWE-352
|
High
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-1000504)
|
CVE-2017-1000504
CWE-352
|
CWE-352
|
High
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-10353)
|
CVE-2019-10353
CWE-352
|
CWE-352
|
High
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-10384)
|
CVE-2019-10384
CWE-352
|
CWE-352
|
High
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-2160)
|
CVE-2020-2160
CWE-352
|
CWE-352
|
High
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2023-35141)
|
CVE-2023-35141
CWE-352
|
CWE-352
|
High
|
Jenkins CVE-2013-0329 Vulnerability (CVE-2013-0329)
|
CVE-2013-0329
|
|
High
|
Jenkins CVE-2014-2063 Vulnerability (CVE-2014-2063)
|
CVE-2014-2063
|
|
High
|
Jenkins CVE-2015-7538 Vulnerability (CVE-2015-7538)
|
CVE-2015-7538
|
|
High
|
Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2017-2608)
|
CVE-2017-2608
CWE-502
|
CWE-502
|
High
|
Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2021-21604)
|
CVE-2021-21604
CWE-502
|
CWE-502
|
High
|
Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2022-0538)
|
CVE-2022-0538
CWE-502
|
CWE-502
|
High
|
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-1000410)
|
CVE-2018-1000410
CWE-200
|
CWE-200
|
High
|
Jenkins Improper Access Control Vulnerability (CVE-2015-5325)
|
CVE-2015-5325
CWE-284
|
CWE-284
|
High
|
Jenkins Improper Authentication Vulnerability (CVE-2017-1000354)
|
CVE-2017-1000354
CWE-287
|
CWE-287
|
High
|
Jenkins Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2014-3666)
|
CVE-2014-3666
CWE-94
|
CWE-94
|
High
|
Jenkins Improper Input Validation Vulnerability (CVE-2012-4438)
|
CVE-2012-4438
CWE-20
|
CWE-20
|
High
|
Jenkins Improper Input Validation Vulnerability (CVE-2016-0792)
|
CVE-2016-0792
CWE-20
|
CWE-20
|
High
|
Jenkins Improper Input Validation Vulnerability (CVE-2017-1000391)
|
CVE-2017-1000391
CWE-20
|
CWE-20
|
High
|
Jenkins Improper Input Validation Vulnerability (CVE-2017-1000394)
|
CVE-2017-1000394
CWE-20
|
CWE-20
|
High
|
Jenkins Improper Input Validation Vulnerability (CVE-2018-1999001)
|
CVE-2018-1999001
CWE-20
|
CWE-20
|
High
|
Jenkins Improper Input Validation Vulnerability (CVE-2018-1999002)
|
CVE-2018-1999002
CWE-20
|
CWE-20
|
High
|
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000194)
|
CVE-2018-1000194
CWE-22
|
CWE-22
|
High
|
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000863)
|
CVE-2018-1000863
CWE-22
|
CWE-22
|
High
|
Jenkins Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2021-21605)
|
CVE-2021-21605
CWE-22
|
CWE-22
|
High
|
Jenkins Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2021-21686)
|
CVE-2021-21686
CWE-59
|
CWE-59
|
High
|
Jenkins Improper Neutralization of Special Elements used in a Command ('Command Injection') Vulnerability (CVE-2015-8103)
|
CVE-2015-8103
CWE-138
|
CWE-138
|
High
|
Jenkins Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2017-1000393)
|
CVE-2017-1000393
CWE-138
|
CWE-138
|
High
|
Jenkins Incorrect Authorization Vulnerability (CVE-2022-34175)
|
CVE-2022-34175
CWE-863
|
CWE-863
|
High
|
Jenkins Incorrect Authorization Vulnerability (CVE-2023-27899)
|
CVE-2023-27899
CWE-863
|
CWE-863
|
High
|
Jenkins Insufficient Session Expiration Vulnerability (CVE-2019-1003003)
|
CVE-2019-1003003
CWE-613
|
CWE-613
|
High
|
Jenkins Insufficient Session Expiration Vulnerability (CVE-2019-1003004)
|
CVE-2019-1003004
CWE-613
|
CWE-613
|
High
|
Jenkins Insufficient Session Expiration Vulnerability (CVE-2019-1003049)
|
CVE-2019-1003049
CWE-613
|
CWE-613
|
High
|
Jenkins Insufficient Verification of Data Authenticity Vulnerability (CVE-2015-7539)
|
CVE-2015-7539
CWE-345
|
CWE-345
|
High
|
Jenkins Missing Authorization Vulnerability (CVE-2021-21688)
|
CVE-2021-21688
CWE-862
|
CWE-862
|
High
|
Jenkins Missing Authorization Vulnerability (CVE-2021-21695)
|
CVE-2021-21695
CWE-862
|
CWE-862
|
High
|
Jenkins Missing Release of Resource after Effective Lifetime Vulnerability (CVE-2018-1999043)
|
CVE-2018-1999043
CWE-772
|
CWE-772
|
High
|
Jenkins Observable Discrepancy Vulnerability (CVE-2022-34174)
|
CVE-2022-34174
CWE-203
|
CWE-203
|
High
|
Jenkins Other Vulnerability (CVE-2016-3726)
|
CVE-2016-3726
|
|
High
|
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-1814)
|
CVE-2015-1814
CWE-264
|
CWE-264
|
High
|
Jenkins Session Fixation Vulnerability (CVE-2021-21671)
|
CVE-2021-21671
CWE-384
|
CWE-384
|
High
|
Jenkins Uncontrolled Resource Consumption Vulnerability (CVE-2012-0785)
|
CVE-2012-0785
CWE-400
|
CWE-400
|
High
|
Jenkins Uncontrolled Resource Consumption Vulnerability (CVE-2021-28165)
|
CVE-2021-28165
CWE-400
|
CWE-400
|
High
|
Jenkins Use of Insufficiently Random Values Vulnerability (CVE-2020-2099)
|
CVE-2020-2099
CWE-330
|
CWE-330
|
High
|
Jetty CVE-2017-7656 Vulnerability (CVE-2017-7656)
|
CVE-2017-7656
|
|
High
|
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2009-5045)
|
CVE-2009-5045
CWE-200
|
CWE-200
|
High
|
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-2080)
|
CVE-2015-2080
CWE-200
|
CWE-200
|
High
|
Jetty Improper Resource Shutdown or Release Vulnerability (CVE-2022-2191)
|
CVE-2022-2191
CWE-404
|
CWE-404
|
High
|
Jetty Observable Discrepancy Vulnerability (CVE-2017-9735)
|
CVE-2017-9735
CWE-203
|
CWE-203
|
High
|
Jetty Other Vulnerability (CVE-2020-27216)
|
CVE-2020-27216
|
|
High
|
Jetty Session Fixation Vulnerability (CVE-2018-12538)
|
CVE-2018-12538
CWE-384
|
CWE-384
|
High
|
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2020-27223)
|
CVE-2020-27223
CWE-400
|
CWE-400
|
High
|
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2021-28165)
|
CVE-2021-28165
CWE-400
|
CWE-400
|
High
|
Jetty Uncontrolled Resource Consumption Vulnerability (CVE-2022-2048)
|
CVE-2022-2048
CWE-400
|
CWE-400
|
High
|
Jolokia Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-10899)
|
CVE-2018-10899
CWE-352
|
CWE-352
|
High
|
Joomla! 1.6.0 SQL injection vulnerability
|
CVE-2011-1151
CWE-89
|
CWE-89
|
High
|
Joomla! 1.7/2.5 SQL injection vulnerability
|
CVE-2012-1116
CWE-89
|
CWE-89
|
High
|
Joomla Configuration Vulnerability (CVE-2008-3228)
|
CVE-2008-3228
|
|
High
|
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-17858)
|
CVE-2018-17858
CWE-352
|
CWE-352
|
High
|
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-18650)
|
CVE-2019-18650
CWE-352
|
CWE-352
|
High
|
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-8419)
|
CVE-2020-8419
CWE-352
|
CWE-352
|
High
|
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-8420)
|
CVE-2020-8420
CWE-352
|
CWE-352
|
High
|
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-10241)
|
CVE-2020-10241
CWE-352
|
CWE-352
|
High
|
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-13760)
|
CVE-2020-13760
CWE-352
|
CWE-352
|
High
|
Joomla Cryptographic Issues Vulnerability (CVE-2014-7228)
|
CVE-2014-7228
|
|
High
|
Joomla CVE-2006-4469 Vulnerability (CVE-2006-4469)
|
CVE-2006-4469
|
|
High
|
Joomla CVE-2006-4470 Vulnerability (CVE-2006-4470)
|
CVE-2006-4470
|
|
High
|
Joomla CVE-2006-4472 Vulnerability (CVE-2006-4472)
|
CVE-2006-4472
|
|
High
|
Joomla CVE-2012-2747 Vulnerability (CVE-2012-2747)
|
CVE-2012-2747
|
|
High
|
Joomla CVE-2018-15881 Vulnerability (CVE-2018-15881)
|
CVE-2018-15881
|
|
High
|
Joomla CVE-2018-17856 Vulnerability (CVE-2018-17856)
|
CVE-2018-17856
|
|
High
|
Joomla CVE-2019-14654 Vulnerability (CVE-2019-14654)
|
CVE-2019-14654
|
|
High
|
Joomla CVE-2020-35610 Vulnerability (CVE-2020-35610)
|
CVE-2020-35610
|
|
High
|
Joomla CVE-2021-23132 Vulnerability (CVE-2021-23132)
|
CVE-2021-23132
|
|
High
|
Joomla Exposure of Resource to Wrong Sphere Vulnerability (CVE-2020-10238)
|
CVE-2020-10238
CWE-668
|
CWE-668
|
High
|
Joomla Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2010-1432)
|
CVE-2010-1432
CWE-200
|
CWE-200
|
High
|
Joomla Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2011-4937)
|
CVE-2011-4937
CWE-200
|
CWE-200
|
High
|
Joomla Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-9933)
|
CVE-2017-9933
CWE-200
|
CWE-200
|
High
|
Joomla Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2020-35611)
|
CVE-2020-35611
CWE-200
|
CWE-200
|
High
|
Joomla Improper Access Control Vulnerability (CVE-2016-9838)
|
CVE-2016-9838
CWE-284
|
CWE-284
|
High
|
Joomla Improper Authentication Vulnerability (CVE-2014-6632)
|
CVE-2014-6632
CWE-287
|
CWE-287
|
High
|
Joomla Improper Certificate Validation Vulnerability (CVE-2017-11364)
|
CVE-2017-11364
CWE-295
|
CWE-295
|
High
|
Joomla Improper Check for Unusual or Exceptional Conditions Vulnerability (CVE-2021-26038)
|
CVE-2021-26038
CWE-754
|
CWE-754
|
High
|
Joomla Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2008-5671)
|
CVE-2008-5671
CWE-94
|
CWE-94
|
High
|
Joomla Improper Input Validation Vulnerability (CVE-2008-4105)
|
CVE-2008-4105
CWE-20
|
CWE-20
|
High
|
Joomla Improper Input Validation Vulnerability (CVE-2015-8562)
|
CVE-2015-8562
CWE-20
|
CWE-20
|
High
|
Joomla Improper Input Validation Vulnerability (CVE-2015-8564)
|
CVE-2015-8564
CWE-20
|
CWE-20
|
High
|
Joomla Improper Input Validation Vulnerability (CVE-2015-8565)
|
CVE-2015-8565
CWE-20
|
CWE-20
|
High
|
Joomla Improper Input Validation Vulnerability (CVE-2016-8870)
|
CVE-2016-8870
CWE-20
|
CWE-20
|
High
|
Joomla Improper Input Validation Vulnerability (CVE-2018-12712)
|
CVE-2018-12712
CWE-20
|
CWE-20
|
High
|
Joomla Improper Input Validation Vulnerability (CVE-2020-35616)
|
CVE-2020-35616
CWE-20
|
CWE-20
|
High
|
Joomla Improper Input Validation Vulnerability (CVE-2021-23131)
|
CVE-2021-23131
CWE-20
|
CWE-20
|
High
|
Joomla Improper Input Validation Vulnerability (CVE-2021-26036)
|
CVE-2021-26036
CWE-20
|
CWE-20
|
High
|
Joomla Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2020-35612)
|
CVE-2020-35612
CWE-22
|
CWE-22
|
High
|
Joomla Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2022-23793)
|
CVE-2022-23793
CWE-22
|
CWE-22
|
High
|
Joomla Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2008-3227)
|
CVE-2008-3227
CWE-59
|
CWE-59
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2006-1049)
|
CVE-2006-1049
CWE-138
|
CWE-138
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-0795)
|
CVE-2008-0795
CWE-138
|
CWE-138
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-1935)
|
CVE-2008-1935
CWE-138
|
CWE-138
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-6852)
|
CVE-2008-6852
CWE-138
|
CWE-138
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2009-1499)
|
CVE-2009-1499
CWE-138
|
CWE-138
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2010-2679)
|
CVE-2010-2679
CWE-138
|
CWE-138
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2010-4166)
|
CVE-2010-4166
CWE-138
|
CWE-138
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2010-4696)
|
CVE-2010-4696
CWE-138
|
CWE-138
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-1116)
|
CVE-2012-1116
CWE-138
|
CWE-138
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2014-7981)
|
CVE-2014-7981
CWE-138
|
CWE-138
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-4654)
|
CVE-2015-4654
CWE-138
|
CWE-138
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-7297)
|
CVE-2015-7297
CWE-138
|
CWE-138
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-7857)
|
CVE-2015-7857
CWE-138
|
CWE-138
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-7858)
|
CVE-2015-7858
CWE-138
|
CWE-138
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-8769)
|
CVE-2015-8769
CWE-138
|
CWE-138
|
High
|
Joomla Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-8045)
|
CVE-2018-8045
CWE-138
|
CWE-138
|
High
|
Joomla Improper Preservation of Permissions Vulnerability (CVE-2020-13763)
|
CVE-2020-13763
CWE-281
|
CWE-281
|
High
|
Joomla Improper Privilege Management Vulnerability (CVE-2012-1563)
|
CVE-2012-1563
CWE-269
|
CWE-269
|
High
|
Joomla Improper Privilege Management Vulnerability (CVE-2018-11323)
|
CVE-2018-11323
CWE-269
|
CWE-269
|
High
|
Joomla Improper Privilege Management Vulnerability (CVE-2018-17855)
|
CVE-2018-17855
CWE-269
|
CWE-269
|
High
|
Joomla Improper Restriction of Excessive Authentication Attempts Vulnerability (CVE-2023-23755)
|
CVE-2023-23755
CWE-307
|
CWE-307
|
High
|
Joomla Inadequate Encryption Strength Vulnerability (CVE-2011-3629)
|
CVE-2011-3629
CWE-326
|
CWE-326
|
High
|
Joomla Missing Authentication for Critical Function Vulnerability (CVE-2019-10946)
|
CVE-2019-10946
CWE-306
|
CWE-306
|
High
|
Joomla Missing Authorization Vulnerability (CVE-2019-9713)
|
CVE-2019-9713
CWE-862
|
CWE-862
|
High
|
Joomla Missing Authorization Vulnerability (CVE-2020-10239)
|
CVE-2020-10239
CWE-862
|
CWE-862
|
High
|
Joomla Numeric Errors Vulnerability (CVE-2008-4102)
|
CVE-2008-4102
|
|
High
|
Joomla Other Vulnerability (CVE-2005-3772)
|
CVE-2005-3772
|
|
High
|
Joomla Other Vulnerability (CVE-2006-1028)
|
CVE-2006-1028
|
|
High
|
Joomla Other Vulnerability (CVE-2006-2960)
|
CVE-2006-2960
|
|
High
|
Joomla Other Vulnerability (CVE-2006-3481)
|
CVE-2006-3481
|
|
High
|
Joomla Other Vulnerability (CVE-2006-6833)
|
CVE-2006-6833
|
|
High
|
Joomla Other Vulnerability (CVE-2006-7008)
|
CVE-2006-7008
|
|
High
|
Joomla Other Vulnerability (CVE-2006-7009)
|
CVE-2006-7009
|
|
High
|
Joomla Other Vulnerability (CVE-2006-7010)
|
CVE-2006-7010
|
|
High
|
Joomla Other Vulnerability (CVE-2007-0374)
|
CVE-2007-0374
|
|
High
|
Joomla Other Vulnerability (CVE-2007-4184)
|
CVE-2007-4184
|
|
High
|
Joomla Other Vulnerability (CVE-2013-1453)
|
CVE-2013-1453
|
|
High
|
Joomla Permissions, Privileges, and Access Controls Vulnerability (CVE-2006-4475)
|
CVE-2006-4475
CWE-264
|
CWE-264
|
High
|
Joomla Permissions, Privileges, and Access Controls Vulnerability (CVE-2006-4476)
|
CVE-2006-4476
CWE-264
|
CWE-264
|
High
|
Joomla Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-1598)
|
CVE-2012-1598
CWE-264
|
CWE-264
|
High
|
Joomla Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-7984)
|
CVE-2014-7984
CWE-264
|
CWE-264
|
High
|
Joomla Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-9837)
|
CVE-2016-9837
CWE-264
|
CWE-264
|
High
|
Joomla Session Fixation Vulnerability (CVE-2010-1434)
|
CVE-2010-1434
CWE-384
|
CWE-384
|
High
|
Joomla Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2018-11322)
|
CVE-2018-11322
CWE-434
|
CWE-434
|
High
|
Joomla Use of Insufficiently Random Values Vulnerability (CVE-2012-1562)
|
CVE-2012-1562
CWE-330
|
CWE-330
|
High
|
jQuery Validation Other Vulnerability (CVE-2021-43306)
|
CVE-2021-43306
|
|
High
|
jQuery Validation Other Vulnerability (CVE-2022-31147)
|
CVE-2022-31147
|
|
High
|
jQuery Validation Uncontrolled Resource Consumption Vulnerability (CVE-2021-21252)
|
CVE-2021-21252
CWE-400
|
CWE-400
|
High
|
Kayako Fusion v4.51.1891 - multiple web vulnerabilities
|
CWE-79
|
CWE-79
|
High
|
Kong Server Incorrect Authorization Vulnerability (CVE-2021-27306)
|
CVE-2021-27306
CWE-863
|
CWE-863
|
High
|
Liferay DXP Cleartext Storage of Sensitive Information Vulnerability (CVE-2021-33323)
|
CVE-2021-33323
CWE-312
|
CWE-312
|
High
|
Liferay DXP Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2021-33338)
|
CVE-2021-33338
CWE-352
|
CWE-352
|
High
|
Liferay DXP CVE-2021-38266 Vulnerability (CVE-2021-38266)
|
CVE-2021-38266
|
|
High
|
Liferay DXP Deserialization of Untrusted Data Vulnerability (CVE-2020-15842)
|
CVE-2020-15842
CWE-502
|
CWE-502
|
High
|
Liferay DXP Improper Authentication Vulnerability (CVE-2021-29047)
|
CVE-2021-29047
CWE-287
|
CWE-287
|
High
|
Liferay DXP Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2022-42123)
|
CVE-2022-42123
CWE-22
|
CWE-22
|
High
|
Liferay DXP Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2021-29053)
|
CVE-2021-29053
CWE-138
|
CWE-138
|
High
|
Liferay DXP Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2022-42121)
|
CVE-2022-42121
CWE-138
|
CWE-138
|
High
|
Liferay DXP Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2023-33945)
|
CVE-2023-33945
CWE-138
|
CWE-138
|
High
|
Liferay DXP Incorrect Authorization Vulnerability (CVE-2021-33335)
|
CVE-2021-33335
CWE-863
|
CWE-863
|
High
|
Liferay DXP Inefficient Regular Expression Complexity Vulnerability (CVE-2022-42124)
|
CVE-2022-42124
CWE-1333
|
CWE-1333
|
High
|
Liferay DXP Insecure Default Initialization of Resource Vulnerability (CVE-2023-33949)
|
CVE-2023-33949
CWE-1188
|
CWE-1188
|
High
|
Liferay DXP Insufficiently Protected Credentials Vulnerability (CVE-2020-15841)
|
CVE-2020-15841
CWE-522
|
CWE-522
|
High
|
Liferay DXP Insufficient Session Expiration Vulnerability (CVE-2021-33322)
|
CVE-2021-33322
CWE-613
|
CWE-613
|
High
|
Liferay DXP Weak Password Recovery Mechanism for Forgotten Password Vulnerability (CVE-2021-33321)
|
CVE-2021-33321
CWE-640
|
CWE-640
|
High
|
Liferay Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2020-13445)
|
CVE-2020-13445
CWE-138
|
CWE-138
|
High
|
Liferay Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2019-11444)
|
CVE-2019-11444
CWE-138
|
CWE-138
|
High
|
Liferay Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2020-28884)
|
CVE-2020-28884
CWE-138
|
CWE-138
|
High
|
Liferay Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2020-28885)
|
CVE-2020-28885
CWE-138
|
CWE-138
|
High
|
Liferay JSON service API authentication vulnerability
|
CWE-287
|
CWE-287
|
High
|
Liferay Portal Cleartext Storage of Sensitive Information Vulnerability (CVE-2021-33323)
|
CVE-2021-33323
CWE-312
|
CWE-312
|
High
|
Liferay Portal Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2021-33338)
|
CVE-2021-33338
CWE-352
|
CWE-352
|
High
|
Liferay Portal Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2023-35030)
|
CVE-2023-35030
CWE-352
|
CWE-352
|
High
|
Liferay Portal CVE-2021-38266 Vulnerability (CVE-2021-38266)
|
CVE-2021-38266
|
|
High
|
Liferay Portal Deserialization of Untrusted Data Vulnerability (CVE-2019-16891)
|
CVE-2019-16891
CWE-502
|
CWE-502
|
High
|
Liferay Portal Deserialization of Untrusted Data Vulnerability (CVE-2020-15842)
|
CVE-2020-15842
CWE-502
|
CWE-502
|
High
|
Liferay Portal Improper Authentication Vulnerability (CVE-2021-29047)
|
CVE-2021-29047
CWE-287
|
CWE-287
|
High
|
Liferay Portal Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2022-28981)
|
CVE-2022-28981
CWE-22
|
CWE-22
|
High
|
Liferay Portal Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2022-42123)
|
CVE-2022-42123
CWE-22
|
CWE-22
|
High
|
Liferay Portal Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2022-42125)
|
CVE-2022-42125
CWE-22
|
CWE-22
|
High
|
Liferay Portal Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2021-29053)
|
CVE-2021-29053
CWE-138
|
CWE-138
|
High
|
Liferay Portal Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2022-42121)
|
CVE-2022-42121
CWE-138
|
CWE-138
|
High
|
Liferay Portal Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2023-33945)
|
CVE-2023-33945
CWE-138
|
CWE-138
|
High
|
Liferay Portal Incorrect Authorization Vulnerability (CVE-2021-33335)
|
CVE-2021-33335
CWE-863
|
CWE-863
|
High
|
Liferay Portal Inefficient Regular Expression Complexity Vulnerability (CVE-2022-42124)
|
CVE-2022-42124
CWE-1333
|
CWE-1333
|
High
|
Liferay Portal Inefficient Regular Expression Complexity Vulnerability (CVE-2023-33950)
|
CVE-2023-33950
CWE-1333
|
CWE-1333
|
High
|
Liferay Portal Insecure Default Initialization of Resource Vulnerability (CVE-2023-33949)
|
CVE-2023-33949
CWE-1188
|
CWE-1188
|
High
|
Liferay Portal Insufficiently Protected Credentials Vulnerability (CVE-2020-15841)
|
CVE-2020-15841
CWE-522
|
CWE-522
|
High
|
Liferay Portal Insufficient Session Expiration Vulnerability (CVE-2021-33322)
|
CVE-2021-33322
CWE-613
|
CWE-613
|
High
|
Liferay Portal Missing Authorization Vulnerability (CVE-2023-33948)
|
CVE-2023-33948
CWE-862
|
CWE-862
|
High
|
Liferay Portal Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-5327)
|
CVE-2010-5327
CWE-264
|
CWE-264
|
High
|
Liferay Portal Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2018-10795)
|
CVE-2018-10795
CWE-434
|
CWE-434
|
High
|
Liferay Portal URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2020-24554)
|
CVE-2020-24554
CWE-601
|
CWE-601
|
High
|
Liferay Portal Weak Password Recovery Mechanism for Forgotten Password Vulnerability (CVE-2021-33321)
|
CVE-2021-33321
CWE-640
|
CWE-640
|
High
|
Lighttpd Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2008-4359)
|
CVE-2008-4359
CWE-200
|
CWE-200
|
High
|
Lighttpd Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2008-4360)
|
CVE-2008-4360
CWE-200
|
CWE-200
|
High
|
Lighttpd Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-19052)
|
CVE-2018-19052
CWE-22
|
CWE-22
|
High
|
Lighttpd Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2015-3200)
|
CVE-2015-3200
CWE-138
|
CWE-138
|
High
|
Lighttpd Inadequate Encryption Strength Vulnerability (CVE-2013-4508)
|
CVE-2013-4508
CWE-326
|
CWE-326
|
High
|
Lighttpd Missing Release of Memory after Effective Lifetime Vulnerability (CVE-2022-41556)
|
CVE-2022-41556
CWE-401
|
CWE-401
|
High
|
Lighttpd NULL Pointer Dereference Vulnerability (CVE-2022-37797)
|
CVE-2022-37797
CWE-476
|
CWE-476
|
High
|
Lighttpd Other Vulnerability (CVE-2007-1870)
|
CVE-2007-1870
|
|
High
|
Lighttpd Other Vulnerability (CVE-2007-3949)
|
CVE-2007-3949
|
|
High
|
Lighttpd Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-4559)
|
CVE-2013-4559
CWE-264
|
CWE-264
|
High
|
Lighttpd Uncontrolled Resource Consumption Vulnerability (CVE-2022-30780)
|
CVE-2022-30780
CWE-400
|
CWE-400
|
High
|
LimeSurvey CVE-2009-1604 Vulnerability (CVE-2009-1604)
|
CVE-2009-1604
|
|
High
|
LimeSurvey Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2019-16177)
|
CVE-2019-16177
CWE-200
|
CWE-200
|
High
|
LimeSurvey Improper Input Validation Vulnerability (CVE-2019-15640)
|
CVE-2019-15640
CWE-20
|
CWE-20
|
High
|
LimeSurvey Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000659)
|
CVE-2018-1000659
CWE-22
|
CWE-22
|
High
|
LimeSurvey Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-4927)
|
CVE-2012-4927
CWE-138
|
CWE-138
|
High
|
LimeSurvey Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2014-5017)
|
CVE-2014-5017
CWE-138
|
CWE-138
|
High
|
LimeSurvey Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2022-43279)
|
CVE-2022-43279
CWE-138
|
CWE-138
|
High
|
LimeSurvey Improper Restriction of XML External Entity Reference Vulnerability (CVE-2019-16174)
|
CVE-2019-16174
CWE-611
|
CWE-611
|
High
|
LimeSurvey Incorrect Default Permissions Vulnerability (CVE-2019-16185)
|
CVE-2019-16185
CWE-276
|
CWE-276
|
High
|
LimeSurvey Incorrect Default Permissions Vulnerability (CVE-2019-16186)
|
CVE-2019-16186
CWE-276
|
CWE-276
|
High
|
LimeSurvey Incorrect Permission Assignment for Critical Resource Vulnerability (CVE-2019-16187)
|
CVE-2019-16187
CWE-732
|
CWE-732
|
High
|
LimeSurvey Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2018-1000658)
|
CVE-2018-1000658
CWE-434
|
CWE-434
|
High
|
LimeSurvey Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2021-44967)
|
CVE-2021-44967
CWE-434
|
CWE-434
|
High
|
Lodash Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') Vulnerability (CVE-2020-8203)
|
CVE-2020-8203
CWE-1321
|
CWE-1321
|
High
|
Lodash Improper Neutralization of Special Elements used in a Command ('Command Injection') Vulnerability (CVE-2021-23337)
|
CVE-2021-23337
CWE-138
|
CWE-138
|
High
|
Magento Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2019-7854)
|
CVE-2019-7854
CWE-639
|
CWE-639
|
High
|
Magento Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2019-7890)
|
CVE-2019-7890
CWE-639
|
CWE-639
|
High
|
Magento Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2019-7950)
|
CVE-2019-7950
CWE-639
|
CWE-639
|
High
|
Magento Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-7865)
|
CVE-2019-7865
CWE-352
|
CWE-352
|
High
|
Magento Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-8109)
|
CVE-2019-8109
CWE-352
|
CWE-352
|
High
|
Magento Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-8155)
|
CVE-2019-8155
CWE-352
|
CWE-352
|
High
|
Magento Cryptographic Issues Vulnerability (CVE-2019-7858)
|
CVE-2019-7858
|
|
High
|
Magento Cryptographic Issues Vulnerability (CVE-2019-7860)
|
CVE-2019-7860
|
|
High
|
Magento Cryptographic Issues Vulnerability (CVE-2019-7886)
|
CVE-2019-7886
|
|
High
|
Magento CVE-2019-7876 Vulnerability (CVE-2019-7876)
|
CVE-2019-7876
|
|
High
|
Magento CVE-2019-7895 Vulnerability (CVE-2019-7895)
|
CVE-2019-7895
|
|
High
|
Magento CVE-2019-7896 Vulnerability (CVE-2019-7896)
|
CVE-2019-7896
|
|
High
|
Magento CVE-2019-7915 Vulnerability (CVE-2019-7915)
|
CVE-2019-7915
|
|
High
|
Magento CVE-2019-7928 Vulnerability (CVE-2019-7928)
|
CVE-2019-7928
|
|
High
|
Magento CVE-2019-8091 Vulnerability (CVE-2019-8091)
|
CVE-2019-8091
|
|
High
|
Magento CVE-2019-8110 Vulnerability (CVE-2019-8110)
|
CVE-2019-8110
|
|
High
|
Magento CVE-2019-8111 Vulnerability (CVE-2019-8111)
|
CVE-2019-8111
|
|
High
|
Magento CVE-2019-8119 Vulnerability (CVE-2019-8119)
|
CVE-2019-8119
|
|
High
|
Magento CVE-2019-8122 Vulnerability (CVE-2019-8122)
|
CVE-2019-8122
|
|
High
|
Magento CVE-2019-8125 Vulnerability (CVE-2019-8125)
|
CVE-2019-8125
|
|
High
|
Magento CVE-2019-8137 Vulnerability (CVE-2019-8137)
|
CVE-2019-8137
|
|
High
|
Magento CVE-2019-8150 Vulnerability (CVE-2019-8150)
|
CVE-2019-8150
|
|
High
|
Magento CVE-2019-8229 Vulnerability (CVE-2019-8229)
|
CVE-2019-8229
|
|
High
|
Magento CVE-2019-8230 Vulnerability (CVE-2019-8230)
|
CVE-2019-8230
|
|
High
|
Magento CVE-2019-8231 Vulnerability (CVE-2019-8231)
|
CVE-2019-8231
|
|
High
|
Magento Deserialization of Untrusted Data Vulnerability (CVE-2019-8141)
|
CVE-2019-8141
CWE-502
|
CWE-502
|
High
|
Magento Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2019-7951)
|
CVE-2019-7951
CWE-200
|
CWE-200
|
High
|
Magento Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2020-9591)
|
CVE-2020-9591
CWE-200
|
CWE-200
|
High
|
Magento Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-7871)
|
CVE-2019-7871
CWE-94
|
CWE-94
|
High
|
Magento Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-7903)
|
CVE-2019-7903
CWE-94
|
CWE-94
|
High
|
Magento Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-7932)
|
CVE-2019-7932
CWE-94
|
CWE-94
|
High
|
Magento Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-7942)
|
CVE-2019-7942
CWE-94
|
CWE-94
|
High
|
Magento Improper Input Validation Vulnerability (CVE-2015-6497)
|
CVE-2015-6497
CWE-20
|
CWE-20
|
High
|
Magento Improper Input Validation Vulnerability (CVE-2019-7885)
|
CVE-2019-7885
CWE-20
|
CWE-20
|
High
|
Magento Improper Input Validation Vulnerability (CVE-2022-42344)
|
CVE-2022-42344
CWE-20
|
CWE-20
|
High
|
Magento Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-7859)
|
CVE-2019-7859
CWE-22
|
CWE-22
|
High
|
Magento Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2021-28584)
|
CVE-2021-28584
CWE-22
|
CWE-22
|
High
|
Magento Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2022-34254)
|
CVE-2022-34254
CWE-22
|
CWE-22
|
High
|
Magento Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2021-21030)
|
CVE-2021-21030
CWE-707
|
CWE-707
|
High
|
Magento Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2019-8159)
|
CVE-2019-8159
CWE-138
|
CWE-138
|
High
|
Magento Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2021-21015)
|
CVE-2021-21015
CWE-138
|
CWE-138
|
High
|
Magento Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-8127)
|
CVE-2019-8127
CWE-138
|
CWE-138
|
High
|
Magento Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-8130)
|
CVE-2019-8130
CWE-138
|
CWE-138
|
High
|
Magento Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-8134)
|
CVE-2019-8134
CWE-138
|
CWE-138
|
High
|
Magento Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-3719)
|
CVE-2020-3719
CWE-138
|
CWE-138
|
High
|
Magento Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-24400)
|
CVE-2020-24400
CWE-138
|
CWE-138
|
High
|
Magento Inclusion of Functionality from Untrusted Control Sphere Vulnerability (CVE-2019-8154)
|
CVE-2019-8154
CWE-829
|
CWE-829
|
High
|
Magento Incorrect Authorization Vulnerability (CVE-2020-9587)
|
CVE-2020-9587
CWE-863
|
CWE-863
|
High
|
Magento Incorrect Authorization Vulnerability (CVE-2022-34255)
|
CVE-2022-34255
CWE-863
|
CWE-863
|
High
|
Magento Insufficient Verification of Data Authenticity Vulnerability (CVE-2019-8112)
|
CVE-2019-8112
CWE-345
|
CWE-345
|
High
|
Magento Insufficient Verification of Data Authenticity Vulnerability (CVE-2019-8124)
|
CVE-2019-8124
CWE-345
|
CWE-345
|
High
|
Magento Observable Differences in Behavior to Error Inputs Vulnerability (CVE-2020-9588)
|
CVE-2020-9588
|
|
High
|
Magento Observable Differences in Behavior to Error Inputs Vulnerability (CVE-2020-15151)
|
CVE-2020-15151
|
|
High
|
Magento Server-Side Request Forgery (SSRF) Vulnerability (CVE-2019-7892)
|
CVE-2019-7892
CWE-918
|
CWE-918
|
High
|
Magento Server-Side Request Forgery (SSRF) Vulnerability (CVE-2019-7911)
|
CVE-2019-7911
CWE-918
|
CWE-918
|
High
|
Magento Server-Side Request Forgery (SSRF) Vulnerability (CVE-2019-7913)
|
CVE-2019-7913
CWE-918
|
CWE-918
|
High
|
Magento Server-Side Request Forgery (SSRF) Vulnerability (CVE-2019-7923)
|
CVE-2019-7923
CWE-918
|
CWE-918
|
High
|
Magento Server-Side Request Forgery (SSRF) Vulnerability (CVE-2019-8151)
|
CVE-2019-8151
CWE-918
|
CWE-918
|
High
|
Magento Server-Side Request Forgery (SSRF) Vulnerability (CVE-2019-8156)
|
CVE-2019-8156
CWE-918
|
CWE-918
|
High
|
Magento Session Fixation Vulnerability (CVE-2019-7849)
|
CVE-2019-7849
CWE-384
|
CWE-384
|
High
|
Magento Session Fixation Vulnerability (CVE-2019-8116)
|
CVE-2019-8116
CWE-384
|
CWE-384
|
High
|
Magento Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-7861)
|
CVE-2019-7861
CWE-434
|
CWE-434
|
High
|
Magento Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-7912)
|
CVE-2019-7912
CWE-434
|
CWE-434
|
High
|
Magento Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-7930)
|
CVE-2019-7930
CWE-434
|
CWE-434
|
High
|
Magento Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-8093)
|
CVE-2019-8093
CWE-434
|
CWE-434
|
High
|
Magento Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-8114)
|
CVE-2019-8114
CWE-434
|
CWE-434
|
High
|
Magento XML Injection (aka Blind XPath Injection) Vulnerability (CVE-2022-34253)
|
CVE-2022-34253
CWE-91
|
CWE-91
|
High
|
math.js Improperly Controlled Modification of Dynamically-Determined Object Attributes Vulnerability (CVE-2020-7743)
|
CVE-2020-7743
CWE-915
|
CWE-915
|
High
|
MathJax Inefficient Regular Expression Complexity Vulnerability (CVE-2023-39663)
|
CVE-2023-39663
CWE-1333
|
CWE-1333
|
High
|
MediaWiki Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2021-41799)
|
CVE-2021-41799
CWE-770
|
CWE-770
|
High
|
MediaWiki Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2022-34750)
|
CVE-2022-34750
CWE-770
|
CWE-770
|
High
|
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-6728)
|
CVE-2015-6728
CWE-352
|
CWE-352
|
High
|
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-8623)
|
CVE-2015-8623
CWE-352
|
CWE-352
|
High
|
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-8624)
|
CVE-2015-8624
CWE-352
|
CWE-352
|
High
|
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-0362)
|
CVE-2017-0362
CWE-352
|
CWE-352
|
High
|
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-12466)
|
CVE-2019-12466
CWE-352
|
CWE-352
|
High
|
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-29004)
|
CVE-2020-29004
CWE-352
|
CWE-352
|
High
|
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-35626)
|
CVE-2020-35626
CWE-352
|
CWE-352
|
High
|
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2021-46147)
|
CVE-2021-46147
CWE-352
|
CWE-352
|
High
|
MediaWiki CVE-2017-0371 Vulnerability (CVE-2017-0371)
|
CVE-2017-0371
|
|
High
|
MediaWiki CVE-2019-12472 Vulnerability (CVE-2019-12472)
|
CVE-2019-12472
|
|
High
|
MediaWiki CVE-2019-12473 Vulnerability (CVE-2019-12473)
|
CVE-2019-12473
|
|
High
|
MediaWiki CVE-2019-12474 Vulnerability (CVE-2019-12474)
|
CVE-2019-12474
|
|
High
|
MediaWiki CVE-2022-28204 Vulnerability (CVE-2022-28204)
|
CVE-2022-28204
|
|
High
|
MediaWiki CVE-2022-28323 Vulnerability (CVE-2022-28323)
|
CVE-2022-28323
|
|
High
|
MediaWiki Exposure of Resource to Wrong Sphere Vulnerability (CVE-2017-0367)
|
CVE-2017-0367
CWE-668
|
CWE-668
|
High
|
MediaWiki Exposure of Resource to Wrong Sphere Vulnerability (CVE-2021-35197)
|
CVE-2021-35197
CWE-668
|
CWE-668
|
High
|
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2012-0046)
|
CVE-2012-0046
CWE-200
|
CWE-200
|
High
|
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2013-1817)
|
CVE-2013-1817
CWE-200
|
CWE-200
|
High
|
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-8625)
|
CVE-2015-8625
CWE-200
|
CWE-200
|
High
|
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-6332)
|
CVE-2016-6332
CWE-200
|
CWE-200
|
High
|
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-6335)
|
CVE-2016-6335
CWE-200
|
CWE-200
|
High
|
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-0361)
|
CVE-2017-0361
CWE-200
|
CWE-200
|
High
|
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-8810)
|
CVE-2017-8810
CWE-200
|
CWE-200
|
High
|
MediaWiki Improper Access Control Vulnerability (CVE-2012-4380)
|
CVE-2012-4380
CWE-284
|
CWE-284
|
High
|
MediaWiki Improper Access Control Vulnerability (CVE-2015-8008)
|
CVE-2015-8008
CWE-284
|
CWE-284
|
High
|
MediaWiki Improper Access Control Vulnerability (CVE-2016-6331)
|
CVE-2016-6331
CWE-284
|
CWE-284
|
High
|
MediaWiki Improper Access Control Vulnerability (CVE-2016-6337)
|
CVE-2016-6337
CWE-284
|
CWE-284
|
High
|
MediaWiki Improper Authentication Vulnerability (CVE-2013-4304)
|
CVE-2013-4304
CWE-287
|
CWE-287
|
High
|
MediaWiki Improper Encoding or Escaping of Output Vulnerability (CVE-2020-35475)
|
CVE-2020-35475
CWE-116
|
CWE-116
|
High
|
MediaWiki Improper Handling of Exceptional Conditions Vulnerability (CVE-2020-25869)
|
CVE-2020-25869
CWE-755
|
CWE-755
|
High
|
MediaWiki Improper Input Validation Vulnerability (CVE-2013-1816)
|
CVE-2013-1816
CWE-20
|
CWE-20
|
High
|
MediaWiki Improper Input Validation Vulnerability (CVE-2013-6453)
|
CVE-2013-6453
CWE-20
|
CWE-20
|
High
|
MediaWiki Improper Input Validation Vulnerability (CVE-2017-8814)
|
CVE-2017-8814
CWE-20
|
CWE-20
|
High
|
MediaWiki Improper Input Validation Vulnerability (CVE-2017-8815)
|
CVE-2017-8815
CWE-20
|
CWE-20
|
High
|
MediaWiki Improper Input Validation Vulnerability (CVE-2021-31555)
|
CVE-2021-31555
CWE-20
|
CWE-20
|
High
|
MediaWiki Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2011-0537)
|
CVE-2011-0537
CWE-22
|
CWE-22
|
High
|
MediaWiki Improper Neutralization of Special Elements used in a Command ('Command Injection') Vulnerability (CVE-2014-9277)
|
CVE-2014-9277
CWE-138
|
CWE-138
|
High
|
MediaWiki Improper Restriction of Excessive Authentication Attempts Vulnerability (CVE-2020-25827)
|
CVE-2020-25827
CWE-307
|
CWE-307
|
High
|
MediaWiki Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2013-4571)
|
CVE-2013-4571
CWE-119
|
CWE-119
|
High
|
MediaWiki Incorrect Authorization Vulnerability (CVE-2020-26121)
|
CVE-2020-26121
CWE-863
|
CWE-863
|
High
|
MediaWiki Incorrect Authorization Vulnerability (CVE-2021-36132)
|
CVE-2021-36132
CWE-863
|
CWE-863
|
High
|
MediaWiki Incorrect Authorization Vulnerability (CVE-2021-41801)
|
CVE-2021-41801
CWE-863
|
CWE-863
|
High
|
MediaWiki Incorrect Default Permissions Vulnerability (CVE-2021-44858)
|
CVE-2021-44858
CWE-276
|
CWE-276
|
High
|
MediaWiki Incorrect Permission Assignment for Critical Resource Vulnerability (CVE-2020-35625)
|
CVE-2020-35625
CWE-732
|
CWE-732
|
High
|
MediaWiki Insufficiently Protected Credentials Vulnerability (CVE-2020-29005)
|
CVE-2020-29005
CWE-522
|
CWE-522
|
High
|
MediaWiki Insufficiently Protected Credentials Vulnerability (CVE-2020-35623)
|
CVE-2020-35623
CWE-522
|
CWE-522
|
High
|
MediaWiki Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2021-36125)
|
CVE-2021-36125
CWE-835
|
CWE-835
|
High
|
MediaWiki Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2021-42040)
|
CVE-2021-42040
CWE-835
|
CWE-835
|
High
|
MediaWiki multiple remote vulnerabilities
|
CVE-2012-4377
CVE-2012-4378
CWE-79
|
CWE-79
|
High
|
MediaWiki Other Vulnerability (CVE-2004-1405)
|
CVE-2004-1405
|
|
High
|
MediaWiki Other Vulnerability (CVE-2004-2186)
|
CVE-2004-2186
|
|
High
|
MediaWiki Other Vulnerability (CVE-2005-0535)
|
CVE-2005-0535
|
|
High
|
MediaWiki Other Vulnerability (CVE-2005-4031)
|
CVE-2005-4031
|
|
High
|
MediaWiki Release of Invalid Pointer or Reference Vulnerability (CVE-2022-28203)
|
CVE-2022-28203
CWE-763
|
CWE-763
|
High
|
MediaWiki Resource Management Errors Vulnerability (CVE-2015-2936)
|
CVE-2015-2936
|
|
High
|
MediaWiki Resource Management Errors Vulnerability (CVE-2015-2937)
|
CVE-2015-2937
|
|
High
|
MediaWiki Resource Management Errors Vulnerability (CVE-2015-2942)
|
CVE-2015-2942
|
|
High
|
MediaWiki Session Fixation Vulnerability (CVE-2013-4572)
|
CVE-2013-4572
CWE-384
|
CWE-384
|
High
|
MediaWiki Uncontrolled Resource Consumption Vulnerability (CVE-2021-46149)
|
CVE-2021-46149
CWE-400
|
CWE-400
|
High
|
MediaWiki Use of Hard-coded Credentials Vulnerability (CVE-2012-4381)
|
CVE-2012-4381
CWE-798
|
CWE-798
|
High
|
Microsoft SQL Server CVE-2023-21528 Vulnerability (CVE-2023-21528)
|
CVE-2023-21528
|
|
High
|
Microsoft SQL Server CVE-2023-21704 Vulnerability (CVE-2023-21704)
|
CVE-2023-21704
|
|
High
|
Microsoft SQL Server CVE-2023-21705 Vulnerability (CVE-2023-21705)
|
CVE-2023-21705
|
|
High
|
Microsoft SQL Server CVE-2023-21713 Vulnerability (CVE-2023-21713)
|
CVE-2023-21713
|
|
High
|
Microsoft SQL Server CVE-2023-21718 Vulnerability (CVE-2023-21718)
|
CVE-2023-21718
|
|
High
|
Microsoft SQL Server CVE-2023-29349 Vulnerability (CVE-2023-29349)
|
CVE-2023-29349
|
|
High
|
Microsoft SQL Server CVE-2023-29356 Vulnerability (CVE-2023-29356)
|
CVE-2023-29356
|
|
High
|
Microsoft SQL Server CVE-2023-32025 Vulnerability (CVE-2023-32025)
|
CVE-2023-32025
|
|
High
|
Microsoft SQL Server CVE-2023-32026 Vulnerability (CVE-2023-32026)
|
CVE-2023-32026
|
|
High
|
Microsoft SQL Server CVE-2023-32027 Vulnerability (CVE-2023-32027)
|
CVE-2023-32027
|
|
High
|
Microsoft SQL Server CVE-2023-32028 Vulnerability (CVE-2023-32028)
|
CVE-2023-32028
|
|
High
|
Microsoft SQL Server CVE-2023-38169 Vulnerability (CVE-2023-38169)
|
CVE-2023-38169
|
|
High
|
Microsoft SQL Server Elevation of Privilege Vulnerability (CVE-2021-1636)
|
CVE-2021-1636
|
|
High
|
Microsoft SQL Server Other Vulnerability (CVE-1999-1556)
|
CVE-1999-1556
|
|
High
|
Microsoft SQL Server Other Vulnerability (CVE-2000-0199)
|
CVE-2000-0199
|
|
High
|
Microsoft SQL Server Other Vulnerability (CVE-2000-0202)
|
CVE-2000-0202
|
|
High
|
Microsoft SQL Server Other Vulnerability (CVE-2001-0344)
|
CVE-2001-0344
|
|
High
|
Microsoft SQL Server Other Vulnerability (CVE-2001-0542)
|
CVE-2001-0542
|
|
High
|
Microsoft SQL Server Other Vulnerability (CVE-2002-0056)
|
CVE-2002-0056
|
|
High
|
Microsoft SQL Server Other Vulnerability (CVE-2002-0154)
|
CVE-2002-0154
|
|
High
|
Microsoft SQL Server Other Vulnerability (CVE-2002-1137)
|
CVE-2002-1137
|
|
High
|
Microsoft SQL Server Other Vulnerability (CVE-2002-1138)
|
CVE-2002-1138
|
|
High
|
Microsoft SQL Server Other Vulnerability (CVE-2003-0232)
|
CVE-2003-0232
|
|
High
|
Microsoft SQL Server Permissions, Privileges, and Access Controls Vulnerability (CVE-2003-0230)
|
CVE-2003-0230
CWE-264
|
CWE-264
|
High
|
Microsoft SQL Server Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-5090)
|
CVE-2007-5090
CWE-264
|
CWE-264
|
High
|
Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2019-1068)
|
CVE-2019-1068
|
|
High
|
Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2020-0618)
|
CVE-2020-0618
|
|
High
|
MODX CVE-2017-7323 Vulnerability (CVE-2017-7323)
|
CVE-2017-7323
|
|
High
|
MODX Improper Certificate Validation Vulnerability (CVE-2017-7322)
|
CVE-2017-7322
CWE-295
|
CWE-295
|
High
|
MODX Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2016-10037)
|
CVE-2016-10037
CWE-22
|
CWE-22
|
High
|
MODX Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2016-10038)
|
CVE-2016-10038
CWE-22
|
CWE-22
|
High
|
MODX Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2016-10039)
|
CVE-2016-10039
CWE-22
|
CWE-22
|
High
|
MODX Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2017-9067)
|
CVE-2017-9067
CWE-22
|
CWE-22
|
High
|
MODX Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000208)
|
CVE-2018-1000208
CWE-22
|
CWE-22
|
High
|
MODX Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2014-2311)
|
CVE-2014-2311
CWE-138
|
CWE-138
|
High
|
MODX Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2014-2736)
|
CVE-2014-2736
CWE-138
|
CWE-138
|
High
|
MODX Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2017-1000067)
|
CVE-2017-1000067
CWE-138
|
CWE-138
|
High
|
MODX Incorrect Permission Assignment for Critical Resource Vulnerability (CVE-2018-1000207)
|
CVE-2018-1000207
CWE-732
|
CWE-732
|
High
|
MODX Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2017-9069)
|
CVE-2017-9069
CWE-434
|
CWE-434
|
High
|
MODX Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-1010123)
|
CVE-2019-1010123
CWE-434
|
CWE-434
|
High
|
MODX Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2022-26149)
|
CVE-2022-26149
CWE-434
|
CWE-434
|
High
|
mod_ssl Other Vulnerability (CVE-2002-0082)
|
CVE-2002-0082
|
|
High
|
mod_ssl Other Vulnerability (CVE-2004-0700)
|
CVE-2004-0700
|
|
High
|
MoinMoin CVE-2012-6081 multiple arbitrary code execution vulnerabilities
|
CVE-2012-6081
CWE-434
|
CWE-434
|
High
|
Moment.js Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2022-24785)
|
CVE-2022-24785
CWE-22
|
CWE-22
|
High
|
Moment.js Other Vulnerability (CVE-2022-31129)
|
CVE-2022-31129
|
|
High
|
Moment.js Uncontrolled Resource Consumption Vulnerability (CVE-2017-18214)
|
CVE-2017-18214
CWE-400
|
CWE-400
|
High
|
MongoDB $where operator JavaScript injection
|
CWE-943
|
CWE-943
|
High
|
MongoDB injection
|
CWE-943
|
CWE-943
|
High
|
Moodle 7PK - Security Features Vulnerability (CVE-2015-5267)
|
CVE-2015-5267
|
|
High
|
Moodle Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2020-14322)
|
CVE-2020-14322
CWE-770
|
CWE-770
|
High
|
Moodle Credentials Management Errors Vulnerability (CVE-2009-4304)
|
CVE-2009-4304
|
|
High
|
Moodle Credentials Management Errors Vulnerability (CVE-2014-7845)
|
CVE-2014-7845
|
|
High
|
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5338)
|
CVE-2015-5338
CWE-352
|
CWE-352
|
High
|
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2016-2157)
|
CVE-2016-2157
CWE-352
|
CWE-352
|
High
|
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2016-3734)
|
CVE-2016-3734
CWE-352
|
CWE-352
|
High
|
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-16854)
|
CVE-2018-16854
CWE-352
|
CWE-352
|
High
|
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-10186)
|
CVE-2019-10186
CWE-352
|
CWE-352
|
High
|
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2021-43559)
|
CVE-2021-43559
CWE-352
|
CWE-352
|
High
|
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2022-0335)
|
CVE-2022-0335
CWE-352
|
CWE-352
|
High
|
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2022-2986)
|
CVE-2022-2986
CWE-352
|
CWE-352
|
High
|
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2023-28335)
|
CVE-2023-28335
CWE-352
|
CWE-352
|
High
|
Moodle CVE-2018-10891 Vulnerability (CVE-2018-10891)
|
CVE-2018-10891
|
|
High
|
Moodle CVE-2020-25698 Vulnerability (CVE-2020-25698)
|
CVE-2020-25698
|
|
High
|
Moodle CVE-2023-23923 Vulnerability (CVE-2023-23923)
|
CVE-2023-23923
|
|
High
|
Moodle Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2012-1155)
|
CVE-2012-1155
CWE-200
|
CWE-200
|
High
|
Moodle Improper Access Control Vulnerability (CVE-2020-25629)
|
CVE-2020-25629
CWE-284
|
CWE-284
|
High
|
Moodle Improper Authentication Vulnerability (CVE-2018-1082)
|
CVE-2018-1082
CWE-287
|
CWE-287
|
High
|
Moodle Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2013-5674)
|
CVE-2013-5674
CWE-94
|
CWE-94
|
High
|
Moodle Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2014-3541)
|
CVE-2014-3541
CWE-94
|
CWE-94
|
High
|
Moodle Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2018-1133)
|
CVE-2018-1133
CWE-94
|
CWE-94
|
High
|
Moodle Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2018-14630)
|
CVE-2018-14630
CWE-94
|
CWE-94
|
High
|
Moodle Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2021-20187)
|
CVE-2021-20187
CWE-94
|
CWE-94
|
High
|
Moodle Improper Input Validation Vulnerability (CVE-2012-0801)
|
CVE-2012-0801
CWE-20
|
CWE-20
|
High
|
Moodle Improper Input Validation Vulnerability (CVE-2012-1168)
|
CVE-2012-1168
CWE-20
|
CWE-20
|
High
|
Moodle Improper Input Validation Vulnerability (CVE-2018-1137)
|
CVE-2018-1137
CWE-20
|
CWE-20
|
High
|
Moodle Improper Input Validation Vulnerability (CVE-2019-3847)
|
CVE-2019-3847
CWE-20
|
CWE-20
|
High
|
Moodle Improper Input Validation Vulnerability (CVE-2020-1756)
|
CVE-2020-1756
CWE-20
|
CWE-20
|
High
|
Moodle Improper Input Validation Vulnerability (CVE-2020-10738)
|
CVE-2020-10738
CWE-20
|
CWE-20
|
High
|
Moodle Improper Input Validation Vulnerability (CVE-2022-35650)
|
CVE-2022-35650
CWE-20
|
CWE-20
|
High
|
Moodle Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2022-40313)
|
CVE-2022-40313
CWE-707
|
CWE-707
|
High
|
Moodle Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2006-0146)
|
CVE-2006-0146
CWE-138
|
CWE-138
|
High
|
Moodle Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2006-4785)
|
CVE-2006-4785
CWE-138
|
CWE-138
|
High
|
Moodle Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-6124)
|
CVE-2008-6124
CWE-138
|
CWE-138
|
High
|
Moodle Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2010-1615)
|
CVE-2010-1615
CWE-138
|
CWE-138
|
High
|
Moodle Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-4313)
|
CVE-2013-4313
CWE-138
|
CWE-138
|
High
|
Moodle Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2016-7919)
|
CVE-2016-7919
CWE-138
|
CWE-138
|
High
|
Moodle Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2021-32474)
|
CVE-2021-32474
CWE-138
|
CWE-138
|
High
|
Moodle Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2022-0983)
|
CVE-2022-0983
CWE-138
|
CWE-138
|
High
|
Moodle Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2023-28329)
|
CVE-2023-28329
CWE-138
|
CWE-138
|
High
|
Moodle Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2023-30944)
|
CVE-2023-30944
CWE-138
|
CWE-138
|
High
|
Moodle Improper Privilege Management Vulnerability (CVE-2019-3849)
|
CVE-2019-3849
CWE-269
|
CWE-269
|
High
|
Moodle Improper Privilege Management Vulnerability (CVE-2020-25699)
|
CVE-2020-25699
CWE-269
|
CWE-269
|
High
|
Moodle Improper Validation of Integrity Check Value Vulnerability (CVE-2012-1170)
|
CVE-2012-1170
CWE-354
|
CWE-354
|
High
|
Moodle Incorrect Authorization Vulnerability (CVE-2020-14321)
|
CVE-2020-14321
CWE-863
|
CWE-863
|
High
|
Moodle Insertion of Sensitive Information into Log File Vulnerability (CVE-2012-1156)
|
CVE-2012-1156
CWE-532
|
CWE-532
|
High
|
Moodle Other Vulnerability (CVE-2004-2232)
|
CVE-2004-2232
|
|
High
|
Moodle Other Vulnerability (CVE-2005-3648)
|
CVE-2005-3648
|
|
High
|
Moodle Other Vulnerability (CVE-2006-0147)
|
CVE-2006-0147
|
|
High
|
Moodle Other Vulnerability (CVE-2007-1429)
|
CVE-2007-1429
|
|
High
|
Moodle Other Vulnerability (CVE-2007-1647)
|
CVE-2007-1647
|
|
High
|
Moodle Other Vulnerability (CVE-2015-3272)
|
CVE-2015-3272
|
|
High
|
Moodle Other Vulnerability (CVE-2019-10154)
|
CVE-2019-10154
|
|
High
|
Moodle Server-Side Request Forgery (SSRF) Vulnerability (CVE-2019-6970)
|
CVE-2019-6970
CWE-918
|
CWE-918
|
High
|
Moodle Server-Side Request Forgery (SSRF) Vulnerability (CVE-2021-36396)
|
CVE-2021-36396
CWE-918
|
CWE-918
|
High
|
Moodle Server-Side Request Forgery (SSRF) Vulnerability (CVE-2023-35133)
|
CVE-2023-35133
CWE-918
|
CWE-918
|
High
|
Moodle Uncontrolled Recursion Vulnerability (CVE-2021-36395)
|
CVE-2021-36395
CWE-674
|
CWE-674
|
High
|
Moodle Uncontrolled Resource Consumption Vulnerability (CVE-2020-25630)
|
CVE-2020-25630
CWE-400
|
CWE-400
|
High
|
Moodle Uncontrolled Resource Consumption Vulnerability (CVE-2021-32476)
|
CVE-2021-32476
CWE-400
|
CWE-400
|
High
|
Moodle Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2016-9186)
|
CVE-2016-9186
CWE-434
|
CWE-434
|
High
|
Moodle Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2016-9187)
|
CVE-2016-9187
CWE-434
|
CWE-434
|
High
|
Moodle Weak Password Recovery Mechanism for Forgotten Password Vulnerability (CVE-2016-7038)
|
CVE-2016-7038
CWE-640
|
CWE-640
|
High
|
Moveable Type 4.x unauthenticated remote command execution
|
CVE-2013-0209
CWE-287
|
CWE-287
|
High
|
Multiple critical vulnerabilities in Apache Struts2
|
CVE-2012-0393
CWE-264
|
CWE-264
|
High
|
Multiple SugarCRM Products Remote Code Execution Vulnerability (CVE-2023-22952)
|
CVE-2023-22952
|
|
High
|
MyBB CVE-2008-3070 Vulnerability (CVE-2008-3070)
|
CVE-2008-3070
|
|
High
|
MyBB CVE-2015-2352 Vulnerability (CVE-2015-2352)
|
CVE-2015-2352
|
|
High
|
MyBB Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-9410)
|
CVE-2016-9410
CWE-200
|
CWE-200
|
High
|
MyBB Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-9414)
|
CVE-2016-9414
CWE-200
|
CWE-200
|
High
|
MyBB Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-9418)
|
CVE-2016-9418
CWE-200
|
CWE-200
|
High
|
MyBB Improper Access Control Vulnerability (CVE-2015-8973)
|
CVE-2015-8973
CWE-284
|
CWE-284
|
High
|
MyBB Improper Access Control Vulnerability (CVE-2016-9415)
|
CVE-2016-9415
CWE-284
|
CWE-284
|
High
|
MyBB Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2021-43281)
|
CVE-2021-43281
CWE-94
|
CWE-94
|
High
|
MyBB Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2022-24734)
|
CVE-2022-24734
CWE-94
|
CWE-94
|
High
|
MyBB Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2023-41362)
|
CVE-2023-41362
CWE-94
|
CWE-94
|
High
|
MyBB Improper Input Validation Vulnerability (CVE-2019-12831)
|
CVE-2019-12831
CWE-20
|
CWE-20
|
High
|
MyBB Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-3071)
|
CVE-2008-3071
CWE-22
|
CWE-22
|
High
|
MyBB Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2022-45867)
|
CVE-2022-45867
CWE-22
|
CWE-22
|
High
|
MyBB Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2019-12830)
|
CVE-2019-12830
CWE-707
|
CWE-707
|
High
|
MyBB Improper Neutralization of Special Elements used in a Command ('Command Injection') Vulnerability (CVE-2022-39265)
|
CVE-2022-39265
CWE-138
|
CWE-138
|
High
|
MyBB Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-0383)
|
CVE-2008-0383
CWE-138
|
CWE-138
|
High
|
MyBB Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-3965)
|
CVE-2008-3965
CWE-138
|
CWE-138
|
High
|
MyBB Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2010-5096)
|
CVE-2010-5096
CWE-138
|
CWE-138
|
High
|
MyBB Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-2324)
|
CVE-2012-2324
CWE-138
|
CWE-138
|
High
|
MyBB Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-2325)
|
CVE-2012-2325
CWE-138
|
CWE-138
|
High
|
MyBB Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-5909)
|
CVE-2012-5909
CWE-138
|
CWE-138
|
High
|
MyBB Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2014-9240)
|
CVE-2014-9240
CWE-138
|
CWE-138
|
High
|
MyBB Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2021-27890)
|
CVE-2021-27890
CWE-138
|
CWE-138
|
High
|
MyBB Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2021-27946)
|
CVE-2021-27946
CWE-138
|
CWE-138
|
High
|
MyBB Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2021-27947)
|
CVE-2021-27947
CWE-138
|
CWE-138
|
High
|
MyBB Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2021-27948)
|
CVE-2021-27948
CWE-138
|
CWE-138
|
High
|
MyBB Inclusion of Functionality from Untrusted Control Sphere Vulnerability (CVE-2018-1000502)
|
CVE-2018-1000502
CWE-829
|
CWE-829
|
High
|
MyBB Insertion of Sensitive Information into Log File Vulnerability (CVE-2015-8977)
|
CVE-2015-8977
CWE-532
|
CWE-532
|
High
|
MyBB Other Vulnerability (CVE-2007-1963)
|
CVE-2007-1963
|
|
High
|
MyBB Other Vulnerability (CVE-2007-2212)
|
CVE-2007-2212
|
|
High
|
MyBB Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-3967)
|
CVE-2008-3967
CWE-264
|
CWE-264
|
High
|
MyBB Server-Side Request Forgery (SSRF) Vulnerability (CVE-2016-9417)
|
CVE-2016-9417
CWE-918
|
CWE-918
|
High
|
MyBB Server-Side Request Forgery (SSRF) Vulnerability (CVE-2017-7566)
|
CVE-2017-7566
CWE-918
|
CWE-918
|
High
|
MySQL Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2016-6663)
|
CVE-2016-6663
CWE-362
|
CWE-362
|
High
|
MySQL CVE-2012-3158 Vulnerability (CVE-2012-3158)
|
CVE-2012-3158
|
|
High
|
MySQL CVE-2014-6491 Vulnerability (CVE-2014-6491)
|
CVE-2014-6491
|
|
High
|
MySQL CVE-2014-6500 Vulnerability (CVE-2014-6500)
|
CVE-2014-6500
|
|
High
|
MySQL CVE-2015-0411 Vulnerability (CVE-2015-0411)
|
CVE-2015-0411
|
|
High
|
MySQL CVE-2015-4819 Vulnerability (CVE-2015-4819)
|
CVE-2015-4819
|
|
High
|
MySQL CVE-2016-0546 Vulnerability (CVE-2016-0546)
|
CVE-2016-0546
|
|
High
|
MySQL CVE-2016-3440 Vulnerability (CVE-2016-3440)
|
CVE-2016-3440
|
|
High
|
MySQL CVE-2016-3471 Vulnerability (CVE-2016-3471)
|
CVE-2016-3471
|
|
High
|
MySQL CVE-2016-3477 Vulnerability (CVE-2016-3477)
|
CVE-2016-3477
|
|
High
|
MySQL CVE-2016-5625 Vulnerability (CVE-2016-5625)
|
CVE-2016-5625
|
|
High
|
MySQL CVE-2016-9840 Vulnerability (CVE-2016-9840)
|
CVE-2016-9840
|
|
High
|
MySQL CVE-2016-9842 Vulnerability (CVE-2016-9842)
|
CVE-2016-9842
|
|
High
|
MySQL CVE-2017-3308 Vulnerability (CVE-2017-3308)
|
CVE-2017-3308
|
|
High
|
MySQL CVE-2017-3309 Vulnerability (CVE-2017-3309)
|
CVE-2017-3309
|
|
High
|
MySQL CVE-2017-3329 Vulnerability (CVE-2017-3329)
|
CVE-2017-3329
|
|
High
|
MySQL CVE-2017-3450 Vulnerability (CVE-2017-3450)
|
CVE-2017-3450
|
|
High
|
MySQL CVE-2017-10155 Vulnerability (CVE-2017-10155)
|
CVE-2017-10155
|
|
High
|
MySQL CVE-2018-2562 Vulnerability (CVE-2018-2562)
|
CVE-2018-2562
|
|
High
|
MySQL CVE-2018-2696 Vulnerability (CVE-2018-2696)
|
CVE-2018-2696
|
|
High
|
MySQL CVE-2018-2755 Vulnerability (CVE-2018-2755)
|
CVE-2018-2755
|
|
High
|
MySQL CVE-2018-3064 Vulnerability (CVE-2018-3064)
|
CVE-2018-3064
|
|
High
|
MySQL CVE-2018-3155 Vulnerability (CVE-2018-3155)
|
CVE-2018-3155
|
|
High
|
MySQL CVE-2019-2534 Vulnerability (CVE-2019-2534)
|
CVE-2019-2534
|
|
High
|
MySQL CVE-2019-2632 Vulnerability (CVE-2019-2632)
|
CVE-2019-2632
|
|
High
|
MySQL CVE-2019-2800 Vulnerability (CVE-2019-2800)
|
CVE-2019-2800
|
|
High
|
MySQL CVE-2019-2822 Vulnerability (CVE-2019-2822)
|
CVE-2019-2822
|
|
High
|
MySQL CVE-2020-14663 Vulnerability (CVE-2020-14663)
|
CVE-2020-14663
|
|
High
|
MySQL CVE-2020-14678 Vulnerability (CVE-2020-14678)
|
CVE-2020-14678
|
|
High
|
MySQL CVE-2020-14697 Vulnerability (CVE-2020-14697)
|
CVE-2020-14697
|
|
High
|
MySQL CVE-2020-14828 Vulnerability (CVE-2020-14828)
|
CVE-2020-14828
|
|
High
|
MySQL CVE-2020-14878 Vulnerability (CVE-2020-14878)
|
CVE-2020-14878
|
|
High
|
MySQL CVE-2021-2144 Vulnerability (CVE-2021-2144)
|
CVE-2021-2144
|
|
High
|
MySQL CVE-2021-35610 Vulnerability (CVE-2021-35610)
|
CVE-2021-35610
|
|
High
|
MySQL CVE-2022-21278 Vulnerability (CVE-2022-21278)
|
CVE-2022-21278
|
|
High
|
MySQL CVE-2022-21351 Vulnerability (CVE-2022-21351)
|
CVE-2022-21351
|
|
High
|
MySQL CVE-2022-21600 Vulnerability (CVE-2022-21600)
|
CVE-2022-21600
|
|
High
|
MySQL CVE-2023-21980 Vulnerability (CVE-2023-21980)
|
CVE-2023-21980
|
|
High
|
MySQL Improper Initialization Vulnerability (CVE-2020-11655)
|
CVE-2020-11655
CWE-665
|
CWE-665
|
High
|
MySQL Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2016-6664)
|
CVE-2016-6664
CWE-59
|
CWE-59
|
High
|
MySQL Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5398)
|
CVE-2020-5398
CWE-707
|
CWE-707
|
High
|
MySQL Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')Vulnerability (CVE-2020-5258)
|
CVE-2020-5258
CWE-138
|
CWE-138
|
High
|
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2008-0226)
|
CVE-2008-0226
CWE-119
|
CWE-119
|
High
|
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2012-0553)
|
CVE-2012-0553
CWE-119
|
CWE-119
|
High
|
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2012-0882)
|
CVE-2012-0882
CWE-119
|
CWE-119
|
High
|
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2013-1492)
|
CVE-2013-1492
CWE-119
|
CWE-119
|
High
|
MySQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2014-0001)
|
CVE-2014-0001
CWE-119
|
CWE-119
|
High
|
MySQL Integer Overflow or Wraparound Vulnerability (CVE-2017-3599)
|
CVE-2017-3599
CWE-190
|
CWE-190
|
High
|
MySQL NULL Pointer Dereference Vulnerability (CVE-2020-1967)
|
CVE-2020-1967
CWE-476
|
CWE-476
|
High
|
MySQL Numeric Errors Vulnerability (CVE-2016-2105)
|
CVE-2016-2105
|
|
High
|
MySQL Other Vulnerability (CVE-2000-0148)
|
CVE-2000-0148
|
|
High
|
MySQL Other Vulnerability (CVE-2000-0981)
|
CVE-2000-0981
|
|
High
|
MySQL Other Vulnerability (CVE-2001-1274)
|
CVE-2001-1274
|
|
High
|
MySQL Other Vulnerability (CVE-2001-1275)
|
CVE-2001-1275
|
|
High
|
MySQL Other Vulnerability (CVE-2001-1453)
|
CVE-2001-1453
|
|
High
|
MySQL Other Vulnerability (CVE-2001-1454)
|
CVE-2001-1454
|
|
High
|
MySQL Other Vulnerability (CVE-2002-1374)
|
CVE-2002-1374
|
|
High
|
MySQL Other Vulnerability (CVE-2002-1375)
|
CVE-2002-1375
|
|
High
|
MySQL Other Vulnerability (CVE-2002-1376)
|
CVE-2002-1376
|
|
High
|
MySQL Other Vulnerability (CVE-2002-1809)
|
CVE-2002-1809
|
|
High
|
MySQL Other Vulnerability (CVE-2002-1921)
|
CVE-2002-1921
|
|
High
|
MySQL Other Vulnerability (CVE-2002-1923)
|
CVE-2002-1923
|
|
High
|
MySQL Other Vulnerability (CVE-2004-0835)
|
CVE-2004-0835
|
|
High
|
MySQL Other Vulnerability (CVE-2005-2572)
|
CVE-2005-2572
|
|
High
|
MySQL Other Vulnerability (CVE-2006-2753)
|
CVE-2006-2753
|
|
High
|
MySQL Out-of-bounds Write Vulnerability (CVE-2009-4484)
|
CVE-2009-4484
CWE-787
|
CWE-787
|
High
|
MySQL Uncontrolled Resource Consumption Vulnerability (CVE-2020-11080)
|
CVE-2020-11080
CWE-400
|
CWE-400
|
High
|
MySQL Use After Free Vulnerability (CVE-2017-3302)
|
CVE-2017-3302
CWE-416
|
CWE-416
|
High
|
MySQL Use of Externally-Controlled Format String Vulnerability (CVE-2009-2446)
|
CVE-2009-2446
CWE-134
|
CWE-134
|
High
|
Next.js CVE-2021-43803 Vulnerability (CVE-2021-43803)
|
CVE-2021-43803
|
|
High
|
Next.js Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2017-16877)
|
CVE-2017-16877
CWE-22
|
CWE-22
|
High
|
Next.js Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-6184)
|
CVE-2018-6184
CWE-22
|
CWE-22
|
High
|
Next.js User Interface (UI) Misrepresentation of Critical Information Vulnerability (CVE-2022-23646)
|
CVE-2022-23646
CWE-451
|
CWE-451
|
High
|
Nexus Repository Manager CVE-2019-15893 Vulnerability (CVE-2019-15893)
|
CVE-2019-15893
|
|
High
|
Nexus Repository Manager Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2020-15012)
|
CVE-2020-15012
CWE-22
|
CWE-22
|
High
|
Nexus Repository Manager Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') Vulnerability (CVE-2018-16621)
|
CVE-2018-16621
CWE-138
|
CWE-138
|
High
|
Nexus Repository Manager Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2019-5475)
|
CVE-2019-5475
CWE-138
|
CWE-138
|
High
|
Nexus Repository Manager Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2019-15588)
|
CVE-2019-15588
CWE-138
|
CWE-138
|
High
|
Nexus Repository Manager Incorrect Authorization Vulnerability (CVE-2018-16620)
|
CVE-2018-16620
CWE-863
|
CWE-863
|
High
|
Nexus Repository Manager Incorrect Default Permissions Vulnerability (CVE-2019-9630)
|
CVE-2019-9630
CWE-276
|
CWE-276
|
High
|
Nexus Repository Manager Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-16530)
|
CVE-2019-16530
CWE-434
|
CWE-434
|
High
|
Nginx Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-9511)
|
CVE-2019-9511
CWE-770
|
CWE-770
|
High
|
Nginx CVE-2023-27729 Vulnerability (CVE-2023-27729)
|
CVE-2023-27729
|
|
High
|
Nginx Improper Certificate Validation Vulnerability (CVE-2021-3618)
|
CVE-2021-3618
CWE-295
|
CWE-295
|
High
|
Nginx Improper Encoding or Escaping of Output Vulnerability (CVE-2013-4547)
|
CVE-2013-4547
CWE-116
|
CWE-116
|
High
|
Nginx Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2016-1247)
|
CVE-2016-1247
CWE-59
|
CWE-59
|
High
|
Nginx Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2014-0088)
|
CVE-2014-0088
CWE-119
|
CWE-119
|
High
|
Nginx Integer Overflow or Wraparound Vulnerability (CVE-2017-7529)
|
CVE-2017-7529
CWE-190
|
CWE-190
|
High
|
Nginx Off-by-one Error Vulnerability (CVE-2021-23017)
|
CVE-2021-23017
CWE-193
|
CWE-193
|
High
|
Nginx Other Vulnerability (CVE-2016-0742)
|
CVE-2016-0742
|
|
High
|
Nginx Other Vulnerability (CVE-2016-4450)
|
CVE-2016-4450
|
|
High
|
Nginx Other Vulnerability (CVE-2019-9513)
|
CVE-2019-9513
|
|
High
|
Nginx Out-of-bounds Read Vulnerability (CVE-2022-38890)
|
CVE-2022-38890
CWE-125
|
CWE-125
|
High
|
Nginx Out-of-bounds Read Vulnerability (CVE-2023-27727)
|
CVE-2023-27727
CWE-125
|
CWE-125
|
High
|
Nginx Out-of-bounds Read Vulnerability (CVE-2023-27728)
|
CVE-2023-27728
CWE-125
|
CWE-125
|
High
|
Nginx Out-of-bounds Read Vulnerability (CVE-2023-27730)
|
CVE-2023-27730
CWE-125
|
CWE-125
|
High
|
Nginx Out-of-bounds Write Vulnerability (CVE-2009-2629)
|
CVE-2009-2629
CWE-787
|
CWE-787
|
High
|
Nginx Out-of-bounds Write Vulnerability (CVE-2013-2028)
|
CVE-2013-2028
CWE-787
|
CWE-787
|
High
|
Nginx Out-of-bounds Write Vulnerability (CVE-2014-0133)
|
CVE-2014-0133
CWE-787
|
CWE-787
|
High
|
Nginx Out-of-bounds Write Vulnerability (CVE-2022-41741)
|
CVE-2022-41741
CWE-787
|
CWE-787
|
High
|
Nginx Out-of-bounds Write Vulnerability (CVE-2022-41742)
|
CVE-2022-41742
CWE-787
|
CWE-787
|
High
|
Nginx Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-0337)
|
CVE-2013-0337
CWE-264
|
CWE-264
|
High
|
Nginx PHP code execution via FastCGI
|
CWE-94
|
CWE-94
|
High
|
Nginx stack-based buffer overflow
|
CVE-2013-2028
CWE-189
|
CWE-189
|
High
|
Nginx Uncontrolled Resource Consumption Vulnerability (CVE-2018-16843)
|
CVE-2018-16843
CWE-400
|
CWE-400
|
High
|
Nginx Uncontrolled Resource Consumption Vulnerability (CVE-2018-16844)
|
CVE-2018-16844
CWE-400
|
CWE-400
|
High
|
NuSOAP Improper Certificate Validation Vulnerability (CVE-2012-6071)
|
CVE-2012-6071
CWE-295
|
CWE-295
|
High
|
Opencart Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-13067)
|
CVE-2018-13067
CWE-352
|
CWE-352
|
High
|
Opencart Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-11494)
|
CVE-2018-11494
CWE-22
|
CWE-22
|
High
|
Opencart Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2009-1027)
|
CVE-2009-1027
CWE-138
|
CWE-138
|
High
|
Opencart Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2010-0956)
|
CVE-2010-0956
CWE-138
|
CWE-138
|
High
|
Opencart Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-20491)
|
CVE-2020-20491
CWE-138
|
CWE-138
|
High
|
Open Resty Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2020-11724)
|
CVE-2020-11724
CWE-444
|
CWE-444
|
High
|
Open Resty Off-by-one Error Vulnerability (CVE-2021-23017)
|
CVE-2021-23017
CWE-193
|
CWE-193
|
High
|
OpenSSL Access of Resource Using Incompatible Type ('Type Confusion') Vulnerability (CVE-2023-0286)
|
CVE-2023-0286
CWE-843
|
CWE-843
|
High
|
OpenSSL Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-2650)
|
CVE-2023-2650
CWE-770
|
CWE-770
|
High
|
OpenSSL Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2022-3786)
|
CVE-2022-3786
CWE-120
|
CWE-120
|
High
|
OpenSSL Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2010-3864)
|
CVE-2010-3864
CWE-362
|
CWE-362
|
High
|
OpenSSL Cryptographic Issues Vulnerability (CVE-2000-1254)
|
CVE-2000-1254
|
|
High
|
OpenSSL Cryptographic Issues Vulnerability (CVE-2008-0166)
|
CVE-2008-0166
|
|
High
|
OpenSSL Cryptographic Issues Vulnerability (CVE-2010-0742)
|
CVE-2010-0742
|
|
High
|
OpenSSL Cryptographic Issues Vulnerability (CVE-2019-1543)
|
CVE-2019-1543
|
|
High
|
OpenSSL Double Free Vulnerability (CVE-2022-4450)
|
CVE-2022-4450
CWE-415
|
CWE-415
|
High
|
OpenSSL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-3193)
|
CVE-2015-3193
CWE-200
|
CWE-200
|
High
|
OpenSSL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-2183)
|
CVE-2016-2183
CWE-200
|
CWE-200
|
High
|
OpenSSL Improper Access Control Vulnerability (CVE-2016-7054)
|
CVE-2016-7054
CWE-284
|
CWE-284
|
High
|
OpenSSL Improper Authentication Vulnerability (CVE-2009-0653)
|
CVE-2009-0653
CWE-287
|
CWE-287
|
High
|
OpenSSL Improper Authentication Vulnerability (CVE-2010-4252)
|
CVE-2010-4252
CWE-287
|
CWE-287
|
High
|
OpenSSL Improper Certificate Validation Vulnerability (CVE-2021-3450)
|
CVE-2021-3450
CWE-295
|
CWE-295
|
High
|
OpenSSL Improper Certificate Validation Vulnerability (CVE-2023-0464)
|
CVE-2023-0464
CWE-295
|
CWE-295
|
High
|
OpenSSL Improper Input Validation Vulnerability (CVE-2014-3513)
|
CVE-2014-3513
CWE-20
|
CWE-20
|
High
|
OpenSSL Improper Input Validation Vulnerability (CVE-2014-3567)
|
CVE-2014-3567
CWE-20
|
CWE-20
|
High
|
OpenSSL Improper Input Validation Vulnerability (CVE-2016-6302)
|
CVE-2016-6302
CWE-20
|
CWE-20
|
High
|
OpenSSL Improper Input Validation Vulnerability (CVE-2016-6305)
|
CVE-2016-6305
CWE-20
|
CWE-20
|
High
|
OpenSSL Improper Input Validation Vulnerability (CVE-2017-3733)
|
CVE-2017-3733
CWE-20
|
CWE-20
|
High
|
OpenSSL Improper Locking Vulnerability (CVE-2022-3996)
|
CVE-2022-3996
CWE-667
|
CWE-667
|
High
|
OpenSSL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2012-2110)
|
CVE-2012-2110
CWE-119
|
CWE-119
|
High
|
OpenSSL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2014-3512)
|
CVE-2014-3512
CWE-119
|
CWE-119
|
High
|
OpenSSL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2014-8176)
|
CVE-2014-8176
CWE-119
|
CWE-119
|
High
|
OpenSSL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-0292)
|
CVE-2015-0292
CWE-119
|
CWE-119
|
High
|
OpenSSL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-1789)
|
CVE-2015-1789
CWE-119
|
CWE-119
|
High
|
OpenSSL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-2176)
|
CVE-2016-2176
CWE-119
|
CWE-119
|
High
|
OpenSSL Inadequate Encryption Strength Vulnerability (CVE-2014-0224)
|
CVE-2014-0224
CWE-326
|
CWE-326
|
High
|
OpenSSL Incomplete Cleanup Vulnerability (CVE-2022-1473)
|
CVE-2022-1473
CWE-459
|
CWE-459
|
High
|
OpenSSL Integer Overflow or Wraparound Vulnerability (CVE-2021-23840)
|
CVE-2021-23840
CWE-190
|
CWE-190
|
High
|
OpenSSL Key Management Errors Vulnerability (CVE-2018-0732)
|
CVE-2018-0732
|
|
High
|
OpenSSL Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2021-4044)
|
CVE-2021-4044
CWE-835
|
CWE-835
|
High
|
OpenSSL Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2022-0778)
|
CVE-2022-0778
CWE-835
|
CWE-835
|
High
|
OpenSSL NULL Pointer Dereference Vulnerability (CVE-2016-7052)
|
CVE-2016-7052
CWE-476
|
CWE-476
|
High
|
OpenSSL NULL Pointer Dereference Vulnerability (CVE-2016-7053)
|
CVE-2016-7053
CWE-476
|
CWE-476
|
High
|
OpenSSL NULL Pointer Dereference Vulnerability (CVE-2017-3730)
|
CVE-2017-3730
CWE-476
|
CWE-476
|
High
|
OpenSSL NULL Pointer Dereference Vulnerability (CVE-2020-1967)
|
CVE-2020-1967
CWE-476
|
CWE-476
|
High
|
OpenSSL NULL Pointer Dereference Vulnerability (CVE-2022-3358)
|
CVE-2022-3358
CWE-476
|
CWE-476
|
High
|
OpenSSL NULL Pointer Dereference Vulnerability (CVE-2023-0216)
|
CVE-2023-0216
CWE-476
|
CWE-476
|
High
|
OpenSSL NULL Pointer Dereference Vulnerability (CVE-2023-0217)
|
CVE-2023-0217
CWE-476
|
CWE-476
|
High
|
OpenSSL NULL Pointer Dereference Vulnerability (CVE-2023-0401)
|
CVE-2023-0401
CWE-476
|
CWE-476
|
High
|
OpenSSL Numeric Errors Vulnerability (CVE-2012-2131)
|
CVE-2012-2131
|
|
High
|
OpenSSL Numeric Errors Vulnerability (CVE-2016-2105)
|
CVE-2016-2105
|
|
High
|
OpenSSL Numeric Errors Vulnerability (CVE-2016-2106)
|
CVE-2016-2106
|
|
High
|
OpenSSL Numeric Errors Vulnerability (CVE-2016-2181)
|
CVE-2016-2181
|
|
High
|
OpenSSL Other Vulnerability (CVE-2002-0655)
|
CVE-2002-0655
|
|
High
|
OpenSSL Other Vulnerability (CVE-2002-0656)
|
CVE-2002-0656
|
|
High
|
OpenSSL Other Vulnerability (CVE-2003-0131)
|
CVE-2003-0131
|
|
High
|
OpenSSL Other Vulnerability (CVE-2015-3194)
|
CVE-2015-3194
|
|
High
|
OpenSSL Other Vulnerability (CVE-2016-0797)
|
CVE-2016-0797
|
|
High
|
OpenSSL Out-of-bounds Read Vulnerability (CVE-2014-0160)
|
CVE-2014-0160
CWE-125
|
CWE-125
|
High
|
OpenSSL Out-of-bounds Read Vulnerability (CVE-2016-2180)
|
CVE-2016-2180
CWE-125
|
CWE-125
|
High
|
OpenSSL Out-of-bounds Read Vulnerability (CVE-2017-3731)
|
CVE-2017-3731
CWE-125
|
CWE-125
|
High
|
OpenSSL Out-of-bounds Read Vulnerability (CVE-2021-3712)
|
CVE-2021-3712
CWE-125
|
CWE-125
|
High
|
OpenSSL Out-of-bounds Write Vulnerability (CVE-2022-3602)
|
CVE-2022-3602
CWE-787
|
CWE-787
|
High
|
OpenSSL Resource Management Errors Vulnerability (CVE-2006-2937)
|
CVE-2006-2937
|
|
High
|
OpenSSL Resource Management Errors Vulnerability (CVE-2006-2940)
|
CVE-2006-2940
|
|
High
|
OpenSSL Resource Management Errors Vulnerability (CVE-2016-0798)
|
CVE-2016-0798
|
|
High
|
OpenSSL Resource Management Errors Vulnerability (CVE-2016-2109)
|
CVE-2016-2109
|
|
High
|
OpenSSL Resource Management Errors Vulnerability (CVE-2016-2179)
|
CVE-2016-2179
|
|
High
|
OpenSSL Resource Management Errors Vulnerability (CVE-2016-6304)
|
CVE-2016-6304
|
|
High
|
OpenSSL Session Fixation Vulnerability (CVE-1999-0428)
|
CVE-1999-0428
CWE-384
|
CWE-384
|
High
|
OpenSSL Uncontrolled Resource Consumption Vulnerability (CVE-2016-8610)
|
CVE-2016-8610
CWE-400
|
CWE-400
|
High
|
OpenSSL Use After Free Vulnerability (CVE-2023-0215)
|
CVE-2023-0215
CWE-416
|
CWE-416
|
High
|
OpenVPN AS Improper Check for Unusual or Exceptional Conditions Vulnerability (CVE-2020-36382)
|
CVE-2020-36382
CWE-754
|
CWE-754
|
High
|
OpenVPN AS Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') Vulnerability (CVE-2020-11462)
|
CVE-2020-11462
CWE-776
|
CWE-776
|
High
|
OpenVPN AS Insertion of Sensitive Information into Log File Vulnerability (CVE-2022-33737)
|
CVE-2022-33737
CWE-532
|
CWE-532
|
High
|
OpenVPN AS Insufficient Session Expiration Vulnerability (CVE-2020-15074)
|
CVE-2020-15074
CWE-613
|
CWE-613
|
High
|
OpenVPN AS Other Vulnerability (CVE-2005-3393)
|
CVE-2005-3393
|
|
High
|
OpenVPN AS Other Vulnerability (CVE-2021-4234)
|
CVE-2021-4234
|
|
High
|
OpenVPN AS Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) Vulnerability (CVE-2022-33738)
|
CVE-2022-33738
CWE-338
|
CWE-338
|
High
|
OpenX arbitrary file upload
|
CVE-2009-4140
CWE-434
|
CWE-434
|
High
|
OpenX xajaxargs SQL injection vulnerability
|
CWE-89
|
CWE-89
|
High
|
Oracle Application Server Credentials Management Errors Vulnerability (CVE-2002-2345)
|
CVE-2002-2345
|
|
High
|
Oracle Application Server CVE-2004-1368 Vulnerability (CVE-2004-1368)
|
CVE-2004-1368
|
|
High
|
Oracle Application Server CVE-2006-0435 Vulnerability (CVE-2006-0435)
|
CVE-2006-0435
|
|
High
|
Oracle Application Server CVE-2007-0280 Vulnerability (CVE-2007-0280)
|
CVE-2007-0280
|
|
High
|
Oracle Application Server CVE-2007-5516 Vulnerability (CVE-2007-5516)
|
CVE-2007-5516
|
|
High
|
Oracle Application Server CVE-2007-5517 Vulnerability (CVE-2007-5517)
|
CVE-2007-5517
|
|
High
|
Oracle Application Server CVE-2007-5518 Vulnerability (CVE-2007-5518)
|
CVE-2007-5518
|
|
High
|
Oracle Application Server CVE-2007-5519 Vulnerability (CVE-2007-5519)
|
CVE-2007-5519
|
|
High
|
Oracle Application Server CVE-2007-5520 Vulnerability (CVE-2007-5520)
|
CVE-2007-5520
|
|
High
|
Oracle Application Server CVE-2007-5521 Vulnerability (CVE-2007-5521)
|
CVE-2007-5521
|
|
High
|
Oracle Application Server CVE-2007-5523 Vulnerability (CVE-2007-5523)
|
CVE-2007-5523
|
|
High
|
Oracle Application Server CVE-2007-5524 Vulnerability (CVE-2007-5524)
|
CVE-2007-5524
|
|
High
|
Oracle Application Server CVE-2007-5525 Vulnerability (CVE-2007-5525)
|
CVE-2007-5525
|
|
High
|
Oracle Application Server CVE-2009-0993 Vulnerability (CVE-2009-0993)
|
CVE-2009-0993
|
|
High
|
Oracle Application Server Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2004-1364)
|
CVE-2004-1364
CWE-22
|
CWE-22
|
High
|
Oracle Application Server Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2006-0586)
|
CVE-2006-0586
CWE-138
|
CWE-138
|
High
|
Oracle Application Server Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2004-1363)
|
CVE-2004-1363
CWE-119
|
CWE-119
|
High
|
Oracle Application Server Other Vulnerability (CVE-2000-0169)
|
CVE-2000-0169
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2000-1236)
|
CVE-2000-1236
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2001-0419)
|
CVE-2001-0419
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2001-0591)
|
CVE-2001-0591
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2001-1216)
|
CVE-2001-1216
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2002-0559)
|
CVE-2002-0559
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2002-0561)
|
CVE-2002-0561
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2002-0564)
|
CVE-2002-0564
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2002-0569)
|
CVE-2002-0569
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2002-0655)
|
CVE-2002-0655
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2002-0656)
|
CVE-2002-0656
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2002-0842)
|
CVE-2002-0842
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2002-0843)
|
CVE-2002-0843
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2002-0947)
|
CVE-2002-0947
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2002-1630)
|
CVE-2002-1630
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2002-1631)
|
CVE-2002-1631
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2002-2153)
|
CVE-2002-2153
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2004-1362)
|
CVE-2004-1362
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2004-1370)
|
CVE-2004-1370
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2004-1707)
|
CVE-2004-1707
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2004-1774)
|
CVE-2004-1774
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2005-1383)
|
CVE-2005-1383
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2005-1495)
|
CVE-2005-1495
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2006-0552)
|
CVE-2006-0552
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2007-3859)
|
CVE-2007-3859
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2007-3861)
|
CVE-2007-3861
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2007-3862)
|
CVE-2007-3862
|
|
High
|
Oracle Application Server Other Vulnerability (CVE-2007-3863)
|
CVE-2007-3863
|
|
High
|
Oracle Application Server Permissions, Privileges, and Access Controls Vulnerability (CVE-2001-1371)
|
CVE-2001-1371
CWE-264
|
CWE-264
|
High
|
Oracle Application Server Resource Management Errors Vulnerability (CVE-2007-2120)
|
CVE-2007-2120
|
|
High
|
Oracle Database Server CVE-2006-1874 Vulnerability (CVE-2006-1874)
|
CVE-2006-1874
|
|
High
|
Oracle Database Server CVE-2006-1877 Vulnerability (CVE-2006-1877)
|
CVE-2006-1877
|
|
High
|
Oracle Database Server CVE-2006-5333 Vulnerability (CVE-2006-5333)
|
CVE-2006-5333
|
|
High
|
Oracle Database Server CVE-2006-5334 Vulnerability (CVE-2006-5334)
|
CVE-2006-5334
|
|
High
|
Oracle Database Server CVE-2006-5340 Vulnerability (CVE-2006-5340)
|
CVE-2006-5340
|
|
High
|
Oracle Database Server CVE-2006-5342 Vulnerability (CVE-2006-5342)
|
CVE-2006-5342
|
|
High
|
Oracle Database Server CVE-2007-2118 Vulnerability (CVE-2007-2118)
|
CVE-2007-2118
|
|
High
|
Oracle Database Server CVE-2007-3858 Vulnerability (CVE-2007-3858)
|
CVE-2007-3858
|
|
High
|
Oracle Database Server CVE-2007-5505 Vulnerability (CVE-2007-5505)
|
CVE-2007-5505
|
|
High
|
Oracle Database Server CVE-2007-5512 Vulnerability (CVE-2007-5512)
|
CVE-2007-5512
|
|
High
|
Oracle Database Server CVE-2007-5520 Vulnerability (CVE-2007-5520)
|
CVE-2007-5520
|
|
High
|
Oracle Database Server CVE-2008-1819 Vulnerability (CVE-2008-1819)
|
CVE-2008-1819
|
|
High
|
Oracle Database Server CVE-2009-1019 Vulnerability (CVE-2009-1019)
|
CVE-2009-1019
|
|
High
|
Oracle Database Server CVE-2009-1963 Vulnerability (CVE-2009-1963)
|
CVE-2009-1963
|
|
High
|
Oracle Database Server CVE-2010-0853 Vulnerability (CVE-2010-0853)
|
CVE-2010-0853
|
|
High
|
Oracle Database Server CVE-2010-0860 Vulnerability (CVE-2010-0860)
|
CVE-2010-0860
|
|
High
|
Oracle Database Server CVE-2010-0903 Vulnerability (CVE-2010-0903)
|
CVE-2010-0903
|
|
High
|
Oracle Database Server CVE-2010-0911 Vulnerability (CVE-2010-0911)
|
CVE-2010-0911
|
|
High
|
Oracle Database Server CVE-2010-2390 Vulnerability (CVE-2010-2390)
|
CVE-2010-2390
|
|
High
|
Oracle Database Server CVE-2010-3600 Vulnerability (CVE-2010-3600)
|
CVE-2010-3600
|
|
High
|
Oracle Database Server CVE-2011-2239 Vulnerability (CVE-2011-2239)
|
CVE-2011-2239
|
|
High
|
Oracle Database Server CVE-2011-2253 Vulnerability (CVE-2011-2253)
|
CVE-2011-2253
|
|
High
|
Oracle Database Server CVE-2011-2301 Vulnerability (CVE-2011-2301)
|
CVE-2011-2301
|
|
High
|
Oracle Database Server CVE-2012-0519 Vulnerability (CVE-2012-0519)
|
CVE-2012-0519
|
|
High
|
Oracle Database Server CVE-2013-3760 Vulnerability (CVE-2013-3760)
|
CVE-2013-3760
|
|
High
|
Oracle Database Server CVE-2013-3771 Vulnerability (CVE-2013-3771)
|
CVE-2013-3771
|
|
High
|
Oracle Database Server CVE-2013-3774 Vulnerability (CVE-2013-3774)
|
CVE-2013-3774
|
|
High
|
Oracle Database Server CVE-2014-2406 Vulnerability (CVE-2014-2406)
|
CVE-2014-2406
|
|
High
|
Oracle Database Server CVE-2015-4873 Vulnerability (CVE-2015-4873)
|
CVE-2015-4873
|
|
High
|
Oracle Database Server CVE-2018-2680 Vulnerability (CVE-2018-2680)
|
CVE-2018-2680
|
|
High
|
Oracle Database Server CVE-2018-2841 Vulnerability (CVE-2018-2841)
|
CVE-2018-2841
|
|
High
|
Oracle Database Server CVE-2018-2939 Vulnerability (CVE-2018-2939)
|
CVE-2018-2939
|
|
High
|
Oracle Database Server CVE-2019-2516 Vulnerability (CVE-2019-2516)
|
CVE-2019-2516
|
|
High
|
Oracle Database Server CVE-2019-2518 Vulnerability (CVE-2019-2518)
|
CVE-2019-2518
|
|
High
|
Oracle Database Server CVE-2019-2776 Vulnerability (CVE-2019-2776)
|
CVE-2019-2776
|
|
High
|
Oracle Database Server CVE-2019-2799 Vulnerability (CVE-2019-2799)
|
CVE-2019-2799
|
|
High
|
Oracle Database Server CVE-2020-2510 Vulnerability (CVE-2020-2510)
|
CVE-2020-2510
|
|
High
|
Oracle Database Server CVE-2020-2511 Vulnerability (CVE-2020-2511)
|
CVE-2020-2511
|
|
High
|
Oracle Database Server CVE-2020-2518 Vulnerability (CVE-2020-2518)
|
CVE-2020-2518
|
|
High
|
Oracle Database Server CVE-2020-2735 Vulnerability (CVE-2020-2735)
|
CVE-2020-2735
|
|
High
|
Oracle Database Server CVE-2020-2968 Vulnerability (CVE-2020-2968)
|
CVE-2020-2968
|
|
High
|
Oracle Database Server Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2007-5554)
|
CVE-2007-5554
CWE-200
|
CWE-200
|
High
|
Oracle Database Server Improper Input Validation Vulnerability (CVE-2016-2381)
|
CVE-2016-2381
CWE-20
|
CWE-20
|
High
|
Oracle Database Server Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2007-2113)
|
CVE-2007-2113
CWE-138
|
CWE-138
|
High
|
Oracle Database Server Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2006-1868)
|
CVE-2006-1868
CWE-119
|
CWE-119
|
High
|
Oracle Database Server Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2007-0272)
|
CVE-2007-0272
CWE-119
|
CWE-119
|
High
|
Oracle Database Server Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2007-5897)
|
CVE-2007-5897
CWE-119
|
CWE-119
|
High
|
Oracle Database Server Other Vulnerability (CVE-2001-0833)
|
CVE-2001-0833
|
|
High
|
Oracle Database Server Other Vulnerability (CVE-2001-0943)
|
CVE-2001-0943
|
|
High
|
Oracle Database Server Other Vulnerability (CVE-2002-0567)
|
CVE-2002-0567
|
|
High
|
Oracle Database Server Other Vulnerability (CVE-2002-0843)
|
CVE-2002-0843
|
|
High
|
Oracle Database Server Other Vulnerability (CVE-2002-0857)
|
CVE-2002-0857
|
|
High
|
Oracle Database Server Other Vulnerability (CVE-2002-1767)
|
CVE-2002-1767
|
|
High
|
Oracle Database Server Other Vulnerability (CVE-2005-0297)
|
CVE-2005-0297
|
|
High
|
Oracle Database Server Other Vulnerability (CVE-2005-1197)
|
CVE-2005-1197
|
|
High
|
Oracle Database Server Other Vulnerability (CVE-2005-3641)
|
CVE-2005-3641
|
|
High
|
Oracle Database Server Other Vulnerability (CVE-2006-0551)
|
CVE-2006-0551
|
|
High
|
Oracle Database Server Other Vulnerability (CVE-2006-0552)
|
CVE-2006-0552
|
|
High
|
Oracle Database Server Other Vulnerability (CVE-2006-1872)
|
CVE-2006-1872
|
|
High
|
Oracle Database Server Other Vulnerability (CVE-2007-1442)
|
CVE-2007-1442
|
|
High
|
Oracle Database Server Other Vulnerability (CVE-2007-3859)
|
CVE-2007-3859
|
|
High
|
Oracle Database Server Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-1675)
|
CVE-2012-1675
CWE-264
|
CWE-264
|
High
|
Oracle Database Server Resource Management Errors Vulnerability (CVE-2007-5506)
|
CVE-2007-5506
|
|
High
|
Oracle HTTP Server Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2022-21716)
|
CVE-2022-21716
CWE-120
|
CWE-120
|
High
|
Oracle HTTP Server Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2019-0217)
|
CVE-2019-0217
CWE-362
|
CWE-362
|
High
|
Oracle HTTP Server CVE-2006-0435 Vulnerability (CVE-2006-0435)
|
CVE-2006-0435
|
|
High
|
Oracle HTTP Server CVE-2007-0280 Vulnerability (CVE-2007-0280)
|
CVE-2007-0280
|
|
High
|
Oracle HTTP Server CVE-2019-2414 Vulnerability (CVE-2019-2414)
|
CVE-2019-2414
|
|
High
|
Oracle HTTP Server CVE-2022-21593 Vulnerability (CVE-2022-21593)
|
CVE-2022-21593
|
|
High
|
Oracle HTTP Server Improper Certificate Validation Vulnerability (CVE-2020-26184)
|
CVE-2020-26184
CWE-295
|
CWE-295
|
High
|
Oracle HTTP Server Improper Initialization Vulnerability (CVE-2022-22719)
|
CVE-2022-22719
CWE-665
|
CWE-665
|
High
|
Oracle HTTP Server Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2021-43818)
|
CVE-2021-43818
CWE-707
|
CWE-707
|
High
|
Oracle HTTP Server Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2021-4181)
|
CVE-2021-4181
CWE-138
|
CWE-138
|
High
|
Oracle HTTP Server Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2022-0391)
|
CVE-2022-0391
CWE-138
|
CWE-138
|
High
|
Oracle HTTP Server Improper Restriction of XML External Entity Reference Vulnerability (CVE-2018-20843)
|
CVE-2018-20843
CWE-611
|
CWE-611
|
High
|
Oracle HTTP Server Integer Overflow or Wraparound Vulnerability (CVE-2022-25314)
|
CVE-2022-25314
CWE-190
|
CWE-190
|
High
|
Oracle HTTP Server Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2021-4182)
|
CVE-2021-4182
CWE-835
|
CWE-835
|
High
|
Oracle HTTP Server Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2021-4184)
|
CVE-2021-4184
CWE-835
|
CWE-835
|
High
|
Oracle HTTP Server Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2021-4185)
|
CVE-2021-4185
CWE-835
|
CWE-835
|
High
|
Oracle HTTP Server NULL Pointer Dereference Vulnerability (CVE-2019-10097)
|
CVE-2019-10097
CWE-476
|
CWE-476
|
High
|
Oracle HTTP Server NULL Pointer Dereference Vulnerability (CVE-2020-1967)
|
CVE-2020-1967
CWE-476
|
CWE-476
|
High
|
Oracle HTTP Server NULL Pointer Dereference Vulnerability (CVE-2021-34798)
|
CVE-2021-34798
CWE-476
|
CWE-476
|
High
|
Oracle HTTP Server NULL Pointer Dereference Vulnerability (CVE-2021-44224)
|
CVE-2021-44224
CWE-476
|
CWE-476
|
High
|
Oracle HTTP Server Other Vulnerability (CVE-2002-0655)
|
CVE-2002-0655
|
|
High
|
Oracle HTTP Server Other Vulnerability (CVE-2002-0656)
|
CVE-2002-0656
|
|
High
|
Oracle HTTP Server Other Vulnerability (CVE-2006-5346)
|
CVE-2006-5346
|
|
High
|
Oracle HTTP Server Other Vulnerability (CVE-2006-5350)
|
CVE-2006-5350
|
|
High
|
Oracle HTTP Server Other Vulnerability (CVE-2007-0279)
|
CVE-2007-0279
|
|
High
|
Oracle HTTP Server Other Vulnerability (CVE-2020-35164)
|
CVE-2020-35164
|
|
High
|
Oracle HTTP Server Other Vulnerability (CVE-2021-41617)
|
CVE-2021-41617
|
|
High
|
Oracle HTTP Server Out-of-bounds Read Vulnerability (CVE-2018-16890)
|
CVE-2018-16890
CWE-125
|
CWE-125
|
High
|
Oracle HTTP Server Out-of-bounds Read Vulnerability (CVE-2019-3823)
|
CVE-2019-3823
CWE-125
|
CWE-125
|
High
|
Oracle HTTP Server Out-of-bounds Read Vulnerability (CVE-2020-5360)
|
CVE-2020-5360
CWE-125
|
CWE-125
|
High
|
Oracle HTTP Server Out-of-bounds Read Vulnerability (CVE-2020-26185)
|
CVE-2020-26185
CWE-125
|
CWE-125
|
High
|
Oracle HTTP Server Out-of-bounds Read Vulnerability (CVE-2021-35940)
|
CVE-2021-35940
CWE-125
|
CWE-125
|
High
|
Oracle HTTP Server Out-of-bounds Read Vulnerability (CVE-2021-36160)
|
CVE-2021-36160
CWE-125
|
CWE-125
|
High
|
Oracle HTTP Server Out-of-bounds Write Vulnerability (CVE-2021-4034)
|
CVE-2021-4034
CWE-787
|
CWE-787
|
High
|
Oracle HTTP Server Uncontrolled Recursion Vulnerability (CVE-2021-42717)
|
CVE-2021-42717
CWE-674
|
CWE-674
|
High
|
Oracle HTTP Server Uncontrolled Search Path Element Vulnerability (CVE-2019-5443)
|
CVE-2019-5443
CWE-427
|
CWE-427
|
High
|
Oracle JRE CVE-2012-0503 Vulnerability (CVE-2012-0503)
|
CVE-2012-0503
|
|
High
|
Oracle JRE CVE-2012-0505 Vulnerability (CVE-2012-0505)
|
CVE-2012-0505
|
|
High
|
Oracle JRE CVE-2012-3159 Vulnerability (CVE-2012-3159)
|
CVE-2012-3159
|
|
High
|
Oracle JRE CVE-2012-5068 Vulnerability (CVE-2012-5068)
|
CVE-2012-5068
|
|
High
|
Oracle JRE CVE-2012-5084 Vulnerability (CVE-2012-5084)
|
CVE-2012-5084
|
|
High
|
Oracle JRE CVE-2012-5089 Vulnerability (CVE-2012-5089)
|
CVE-2012-5089
|
|
High
|
Oracle JRE CVE-2013-0351 Vulnerability (CVE-2013-0351)
|
CVE-2013-0351
|
|
High
|
Oracle JRE CVE-2013-0419 Vulnerability (CVE-2013-0419)
|
CVE-2013-0419
|
|
High
|
Oracle JRE CVE-2013-0423 Vulnerability (CVE-2013-0423)
|
CVE-2013-0423
|
|
High
|
Oracle JRE CVE-2013-0429 Vulnerability (CVE-2013-0429)
|
CVE-2013-0429
|
|
High
|
Oracle JRE CVE-2013-0444 Vulnerability (CVE-2013-0444)
|
CVE-2013-0444
|
|
High
|
Oracle JRE CVE-2013-1563 Vulnerability (CVE-2013-1563)
|
CVE-2013-1563
|
|
High
|
Oracle JRE CVE-2013-2394 Vulnerability (CVE-2013-2394)
|
CVE-2013-2394
|
|
High
|
Oracle JRE CVE-2013-2429 Vulnerability (CVE-2013-2429)
|
CVE-2013-2429
|
|
High
|
Oracle JRE CVE-2013-2430 Vulnerability (CVE-2013-2430)
|
CVE-2013-2430
|
|
High
|
Oracle JRE CVE-2013-2442 Vulnerability (CVE-2013-2442)
|
CVE-2013-2442
|
|
High
|
Oracle JRE CVE-2013-2445 Vulnerability (CVE-2013-2445)
|
CVE-2013-2445
|
|
High
|
Oracle JRE CVE-2013-2448 Vulnerability (CVE-2013-2448)
|
CVE-2013-2448
|
|
High
|
Oracle JRE CVE-2013-2461 Vulnerability (CVE-2013-2461)
|
CVE-2013-2461
|
|
High
|
Oracle JRE CVE-2013-5775 Vulnerability (CVE-2013-5775)
|
CVE-2013-5775
|
|
High
|
Oracle JRE CVE-2013-5802 Vulnerability (CVE-2013-5802)
|
CVE-2013-5802
|
|
High
|
Oracle JRE CVE-2013-5852 Vulnerability (CVE-2013-5852)
|
CVE-2013-5852
|
|
High
|
Oracle JRE CVE-2014-0446 Vulnerability (CVE-2014-0446)
|
CVE-2014-0446
|
|
High
|
Oracle JRE CVE-2014-0448 Vulnerability (CVE-2014-0448)
|
CVE-2014-0448
|
|
High
|
Oracle JRE CVE-2014-0451 Vulnerability (CVE-2014-0451)
|
CVE-2014-0451
|
|
High
|
Oracle JRE CVE-2014-0452 Vulnerability (CVE-2014-0452)
|
CVE-2014-0452
|
|
High
|
Oracle JRE CVE-2014-0454 Vulnerability (CVE-2014-0454)
|
CVE-2014-0454
|
|
High
|
Oracle JRE CVE-2014-0458 Vulnerability (CVE-2014-0458)
|
CVE-2014-0458
|
|
High
|
Oracle JRE CVE-2014-2402 Vulnerability (CVE-2014-2402)
|
CVE-2014-2402
|
|
High
|
Oracle JRE CVE-2014-2412 Vulnerability (CVE-2014-2412)
|
CVE-2014-2412
|
|
High
|
Oracle JRE CVE-2014-2414 Vulnerability (CVE-2014-2414)
|
CVE-2014-2414
|
|
High
|
Oracle JRE CVE-2014-2423 Vulnerability (CVE-2014-2423)
|
CVE-2014-2423
|
|
High
|
Oracle JRE CVE-2014-2427 Vulnerability (CVE-2014-2427)
|
CVE-2014-2427
|
|
High
|
Oracle JRE CVE-2014-2428 Vulnerability (CVE-2014-2428)
|
CVE-2014-2428
|
|
High
|
Oracle JRE CVE-2017-10309 Vulnerability (CVE-2017-10309)
|
CVE-2017-10309
|
|
High
|
Oracle JRE CVE-2017-10388 Vulnerability (CVE-2017-10388)
|
CVE-2017-10388
|
|
High
|
Oracle JRE CVE-2018-2627 Vulnerability (CVE-2018-2627)
|
CVE-2018-2627
|
|
High
|
Oracle JRE CVE-2018-2633 Vulnerability (CVE-2018-2633)
|
CVE-2018-2633
|
|
High
|
Oracle JRE CVE-2018-2637 Vulnerability (CVE-2018-2637)
|
CVE-2018-2637
|
|
High
|
Oracle JRE CVE-2018-2638 Vulnerability (CVE-2018-2638)
|
CVE-2018-2638
|
|
High
|
Oracle JRE CVE-2018-2639 Vulnerability (CVE-2018-2639)
|
CVE-2018-2639
|
|
High
|
Oracle JRE CVE-2018-2794 Vulnerability (CVE-2018-2794)
|
CVE-2018-2794
|
|
High
|
Oracle JRE CVE-2018-2811 Vulnerability (CVE-2018-2811)
|
CVE-2018-2811
|
|
High
|
Oracle JRE CVE-2018-2814 Vulnerability (CVE-2018-2814)
|
CVE-2018-2814
|
|
High
|
Oracle JRE CVE-2018-2825 Vulnerability (CVE-2018-2825)
|
CVE-2018-2825
|
|
High
|
Oracle JRE CVE-2018-2826 Vulnerability (CVE-2018-2826)
|
CVE-2018-2826
|
|
High
|
Oracle JRE CVE-2020-2803 Vulnerability (CVE-2020-2803)
|
CVE-2020-2803
|
|
High
|
Oracle JRE CVE-2020-2805 Vulnerability (CVE-2020-2805)
|
CVE-2020-2805
|
|
High
|
Oracle JRE CVE-2020-2816 Vulnerability (CVE-2020-2816)
|
CVE-2020-2816
|
|
High
|
Oracle JRE CVE-2023-21930 Vulnerability (CVE-2023-21930)
|
CVE-2023-21930
|
|
High
|
Oracle JRE Incorrect Conversion between Numeric Types Vulnerability (CVE-2022-34169)
|
CVE-2022-34169
CWE-681
|
CWE-681
|
High
|
Oracle Sun GlassFish/Java System Application Server Remote Authentication Bypass Vulnerability
|
CVE-2011-0807
CWE-287
|
CWE-287
|
High
|
Osclass Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2014-8084)
|
CVE-2014-8084
CWE-22
|
CWE-22
|
High
|
Osclass Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2016-10751)
|
CVE-2016-10751
CWE-22
|
CWE-22
|
High
|
Osclass Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-0973)
|
CVE-2012-0973
CWE-138
|
CWE-138
|
High
|
Osclass Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2014-8083)
|
CVE-2014-8083
CWE-138
|
CWE-138
|
High
|
osCommerce Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-27975)
|
CVE-2020-27975
CWE-352
|
CWE-352
|
High
|
osCommerce Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2002-1991)
|
CVE-2002-1991
CWE-94
|
CWE-94
|
High
|
osCommerce Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2002-2019)
|
CVE-2002-2019
CWE-94
|
CWE-94
|
High
|
osCommerce Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2018-18573)
|
CVE-2018-18573
CWE-94
|
CWE-94
|
High
|
osCommerce Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-0719)
|
CVE-2008-0719
CWE-138
|
CWE-138
|
High
|
osCommerce Other Vulnerability (CVE-2004-2638)
|
CVE-2004-2638
|
|
High
|
osCommerce Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2018-18572)
|
CVE-2018-18572
CWE-434
|
CWE-434
|
High
|
osTicket CVE-2018-7195 Vulnerability (CVE-2018-7195)
|
CVE-2018-7195
|
|
High
|
osTicket Improper Neutralization of Formula Elements in a CSV File Vulnerability (CVE-2019-14749)
|
CVE-2019-14749
CWE-1236
|
CWE-1236
|
High
|
osTicket Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2010-0605)
|
CVE-2010-0605
CWE-138
|
CWE-138
|
High
|
osTicket Improper Validation of Specified Quantity in Input Vulnerability (CVE-2023-30082)
|
CVE-2023-30082
CWE-1284
|
CWE-1284
|
High
|
osTicket Other Vulnerability (CVE-2005-1438)
|
CVE-2005-1438
|
|
High
|
osTicket Other Vulnerability (CVE-2005-1439)
|
CVE-2005-1439
|
|
High
|
osTicket Other Vulnerability (CVE-2006-5407)
|
CVE-2006-5407
|
|
High
|
osTicket Session Fixation Vulnerability (CVE-2022-31888)
|
CVE-2022-31888
CWE-384
|
CWE-384
|
High
|
ownCloud Exposure of Resource to Wrong Sphere Vulnerability (CVE-2022-31649)
|
CVE-2022-31649
CWE-668
|
CWE-668
|
High
|
ownCloud Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-1499)
|
CVE-2016-1499
CWE-200
|
CWE-200
|
High
|
ownCloud Improper Authentication Vulnerability (CVE-2012-4392)
|
CVE-2012-4392
CWE-287
|
CWE-287
|
High
|
ownCloud Improper Authentication Vulnerability (CVE-2016-9463)
|
CVE-2016-9463
CWE-287
|
CWE-287
|
High
|
ownCloud Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2014-2044)
|
CVE-2014-2044
CWE-94
|
CWE-94
|
High
|
ownCloud Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2014-2051)
|
CVE-2014-2051
CWE-94
|
CWE-94
|
High
|
ownCloud Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2021-44537)
|
CVE-2021-44537
CWE-138
|
CWE-138
|
High
|
ownCloud Other Vulnerability (CVE-2014-2053)
|
CVE-2014-2053
|
|
High
|
ownCloud Other Vulnerability (CVE-2014-2054)
|
CVE-2014-2054
|
|
High
|
ownCloud Other Vulnerability (CVE-2014-2055)
|
CVE-2014-2055
|
|
High
|
ownCloud Other Vulnerability (CVE-2014-2056)
|
CVE-2014-2056
|
|
High
|
ownCloud Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3834)
|
CVE-2014-3834
CWE-264
|
CWE-264
|
High
|
ownCloud Resource Management Errors Vulnerability (CVE-2015-4717)
|
CVE-2015-4717
|
|
High
|
ownCloud Resource Management Errors Vulnerability (CVE-2015-6500)
|
CVE-2015-6500
|
|
High
|
ownCloud Server-Side Request Forgery (SSRF) Vulnerability (CVE-2020-10252)
|
CVE-2020-10252
CWE-918
|
CWE-918
|
High
|
Parallels Plesk SQL injection vulnerability
|
CVE-2012-1557
CWE-89
|
CWE-89
|
High
|
Perl Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2020-12723)
|
CVE-2020-12723
CWE-120
|
CWE-120
|
High
|
Perl CVE-2016-6185 Vulnerability (CVE-2016-6185)
|
CVE-2016-6185
|
|
High
|
Perl Improper Certificate Validation Vulnerability (CVE-2023-31484)
|
CVE-2023-31484
CWE-295
|
CWE-295
|
High
|
Perl Improper Certificate Validation Vulnerability (CVE-2023-31486)
|
CVE-2023-31486
CWE-295
|
CWE-295
|
High
|
Perl Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2012-6329)
|
CVE-2012-6329
CWE-94
|
CWE-94
|
High
|
Perl Improper Input Validation Vulnerability (CVE-2015-8853)
|
CVE-2015-8853
CWE-20
|
CWE-20
|
High
|
Perl Improper Input Validation Vulnerability (CVE-2016-2381)
|
CVE-2016-2381
CWE-20
|
CWE-20
|
High
|
Perl Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2018-12015)
|
CVE-2018-12015
CWE-59
|
CWE-59
|
High
|
Perl Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2012-5195)
|
CVE-2012-5195
CWE-119
|
CWE-119
|
High
|
Perl Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2017-12837)
|
CVE-2017-12837
CWE-119
|
CWE-119
|
High
|
Perl Integer Overflow or Wraparound Vulnerability (CVE-2020-10878)
|
CVE-2020-10878
CWE-190
|
CWE-190
|
High
|
Perl Numeric Errors Vulnerability (CVE-2013-7422)
|
CVE-2013-7422
|
|
High
|
Perl Out-of-bounds Read Vulnerability (CVE-2018-6798)
|
CVE-2018-6798
CWE-125
|
CWE-125
|
High
|
Perl Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-1238)
|
CVE-2016-1238
CWE-264
|
CWE-264
|
High
|
Perl Resource Management Errors Vulnerability (CVE-2013-1667)
|
CVE-2013-1667
|
|
High
|
PHP-CGI remote code execution
|
CVE-2012-1823
CVE-2012-2311
CWE-20
|
CWE-20
|
High
|
PHP-Fusion Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-5946)
|
CVE-2008-5946
CWE-138
|
CWE-138
|
High
|
PHP-Fusion Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-1803)
|
CVE-2013-1803
CWE-138
|
CWE-138
|
High
|
PHP-Fusion Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-7375)
|
CVE-2013-7375
CWE-138
|
CWE-138
|
High
|
PHP-Fusion Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-12461)
|
CVE-2020-12461
CWE-138
|
CWE-138
|
High
|
PHP-Fusion Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-14960)
|
CVE-2020-14960
CWE-138
|
CWE-138
|
High
|
PHP-Fusion Improper Privilege Management Vulnerability (CVE-2020-24949)
|
CVE-2020-24949
CWE-269
|
CWE-269
|
High
|
PHP-Fusion Incorrect Permission Assignment for Critical Resource Vulnerability (CVE-2021-3172)
|
CVE-2021-3172
CWE-732
|
CWE-732
|
High
|
PHP Address Book Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2013-2778)
|
CVE-2013-2778
CWE-352
|
CWE-352
|
High
|
PHP Address Book Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-1911)
|
CVE-2012-1911
CWE-138
|
CWE-138
|
High
|
PHP Address Book Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-0135)
|
CVE-2013-0135
CWE-138
|
CWE-138
|
High
|
PHP Address Book Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-1748)
|
CVE-2013-1748
CWE-138
|
CWE-138
|
High
|
PHP Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2017-7963)
|
CVE-2017-7963
CWE-770
|
CWE-770
|
High
|
PHP Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-0568)
|
CVE-2023-0568
CWE-770
|
CWE-770
|
High
|
phpBB Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-16993)
|
CVE-2019-16993
CWE-352
|
CWE-352
|
High
|
phpBB CVE-2010-1630 Vulnerability (CVE-2010-1630)
|
CVE-2010-1630
|
|
High
|
phpBB Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-16108)
|
CVE-2019-16108
CWE-94
|
CWE-94
|
High
|
phpBB Improper Input Validation Vulnerability (CVE-2019-9826)
|
CVE-2019-9826
CWE-20
|
CWE-20
|
High
|
phpBB Improperly Controlled Modification of Dynamically-Determined Object Attributes Vulnerability (CVE-2018-19274)
|
CVE-2018-19274
CWE-915
|
CWE-915
|
High
|
phpBB Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2003-1530)
|
CVE-2003-1530
CWE-138
|
CWE-138
|
High
|
phpBB Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2007-5688)
|
CVE-2007-5688
CWE-138
|
CWE-138
|
High
|
phpBB Server-Side Request Forgery (SSRF) Vulnerability (CVE-2017-1000419)
|
CVE-2017-1000419
CWE-918
|
CWE-918
|
High
|
PHP Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2007-0455)
|
CVE-2007-0455
CWE-120
|
CWE-120
|
High
|
PHP Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2022-31626)
|
CVE-2022-31626
CWE-120
|
CWE-120
|
High
|
PHP Configuration Vulnerability (CVE-2008-5844)
|
CVE-2008-5844
|
|
High
|
PHP Cryptographic Issues Vulnerability (CVE-2015-8867)
|
CVE-2015-8867
|
|
High
|
PHP CVE-2006-5706 Vulnerability (CVE-2006-5706)
|
CVE-2006-5706
|
|
High
|
PHP CVE-2009-3292 Vulnerability (CVE-2009-3292)
|
CVE-2009-3292
|
|
High
|
PHP CVE-2009-3293 Vulnerability (CVE-2009-3293)
|
CVE-2009-3293
|
|
High
|
PHP CVE-2009-3559 Vulnerability (CVE-2009-3559)
|
CVE-2009-3559
|
|
High
|
PHP CVE-2014-3515 Vulnerability (CVE-2014-3515)
|
CVE-2014-3515
|
|
High
|
PHP CVE-2016-6174 Vulnerability (CVE-2016-6174)
|
CVE-2016-6174
|
|
High
|
PHP Data Processing Errors Vulnerability (CVE-2015-4025)
|
CVE-2015-4025
|
|
High
|
PHP Data Processing Errors Vulnerability (CVE-2015-4026)
|
CVE-2015-4026
|
|
High
|
PHP Data Processing Errors Vulnerability (CVE-2015-4147)
|
CVE-2015-4147
|
|
High
|
PHP DEPRECATED: Code Vulnerability (CVE-2014-9426)
|
CVE-2014-9426
|
|
High
|
PHP Deserialization of Untrusted Data Vulnerability (CVE-2017-11143)
|
CVE-2017-11143
CWE-502
|
CWE-502
|
High
|
PHP Deserialization of Untrusted Data Vulnerability (CVE-2018-19396)
|
CVE-2018-19396
CWE-502
|
CWE-502
|
High
|
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-8393)
|
CVE-2015-8393
CWE-200
|
CWE-200
|
High
|
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-11145)
|
CVE-2017-11145
CWE-200
|
CWE-200
|
High
|
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-15132)
|
CVE-2018-15132
CWE-200
|
CWE-200
|
High
|
PHPFusion Code Execution Vulnerability (CVE-2019-12099)
|
CVE-2019-12099
|
|
High
|
PHPFusion Multiple SQL Injection Vulnerabilities (CVE-2014-8596)
|
CVE-2014-8596
|
|
High
|
PHP Improper Access Control Vulnerability (CVE-2016-5385)
|
CVE-2016-5385
CWE-284
|
CWE-284
|
High
|
PHP Improper Check for Unusual or Exceptional Conditions Vulnerability (CVE-2017-11144)
|
CVE-2017-11144
CWE-754
|
CWE-754
|
High
|
PHP Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2010-1868)
|
CVE-2010-1868
CWE-94
|
CWE-94
|
High
|
PHP Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2011-3379)
|
CVE-2011-3379
CWE-94
|
CWE-94
|
High
|
PHP Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2018-19520)
|
CVE-2018-19520
CWE-94
|
CWE-94
|
High
|
PHP Improper Input Validation Vulnerability (CVE-2009-3291)
|
CVE-2009-3291
CWE-20
|
CWE-20
|
High
|
PHP Improper Input Validation Vulnerability (CVE-2010-1129)
|
CVE-2010-1129
CWE-20
|
CWE-20
|
High
|
PHP Improper Input Validation Vulnerability (CVE-2012-1823)
|
CVE-2012-1823
CWE-20
|
CWE-20
|
High
|
PHP Improper Input Validation Vulnerability (CVE-2014-9653)
|
CVE-2014-9653
CWE-20
|
CWE-20
|
High
|
PHP Improper Input Validation Vulnerability (CVE-2015-4604)
|
CVE-2015-4604
CWE-20
|
CWE-20
|
High
|
PHP Improper Input Validation Vulnerability (CVE-2015-4605)
|
CVE-2015-4605
CWE-20
|
CWE-20
|
High
|
PHP Improper Input Validation Vulnerability (CVE-2015-8873)
|
CVE-2015-8873
CWE-20
|
CWE-20
|
High
|
PHP Improper Input Validation Vulnerability (CVE-2015-8879)
|
CVE-2015-8879
CWE-20
|
CWE-20
|
High
|
PHP Improper Input Validation Vulnerability (CVE-2016-3185)
|
CVE-2016-3185
CWE-20
|
CWE-20
|
High
|
PHP Improper Input Validation Vulnerability (CVE-2016-10397)
|
CVE-2016-10397
CWE-20
|
CWE-20
|
High
|
PHP Improper Input Validation Vulnerability (CVE-2016-10712)
|
CVE-2016-10712
CWE-20
|
CWE-20
|
High
|
PHP Improper Input Validation Vulnerability (CVE-2017-7189)
|
CVE-2017-7189
CWE-20
|
CWE-20
|
High
|
PHP Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2007-4663)
|
CVE-2007-4663
CWE-22
|
CWE-22
|
High
|
PHP Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2007-4825)
|
CVE-2007-4825
CWE-22
|
CWE-22
|
High
|
PHP Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-5658)
|
CVE-2008-5658
CWE-22
|
CWE-22
|
High
|
PHP Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2015-6833)
|
CVE-2015-6833
CWE-22
|
CWE-22
|
High
|
PHP Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2017-9067)
|
CVE-2017-9067
CWE-22
|
CWE-22
|
High
|
PHP Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') Vulnerability (CVE-2018-19518)
|
CVE-2018-19518
CWE-707
|
CWE-707
|
High
|
PHP Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2016-7125)
|
CVE-2016-7125
CWE-138
|
CWE-138
|
High
|
PHP Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-2311)
|
CVE-2012-2311
CWE-138
|
CWE-138
|
High
|
PHP Improper Resource Shutdown or Release Vulnerability (CVE-2015-3415)
|
CVE-2015-3415
CWE-404
|
CWE-404
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2006-0097)
|
CVE-2006-0097
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2007-0906)
|
CVE-2007-0906
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2007-1381)
|
CVE-2007-1381
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2007-1413)
|
CVE-2007-1413
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2007-1864)
|
CVE-2007-1864
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2007-3294)
|
CVE-2007-3294
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2007-4033)
|
CVE-2007-4033
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2007-4586)
|
CVE-2007-4586
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2007-4661)
|
CVE-2007-4661
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2007-4662)
|
CVE-2007-4662
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2008-3658)
|
CVE-2008-3658
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2011-1938)
|
CVE-2011-1938
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2013-6420)
|
CVE-2013-6420
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2014-8626)
|
CVE-2014-8626
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2014-9427)
|
CVE-2014-9427
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2014-9705)
|
CVE-2014-9705
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-3307)
|
CVE-2015-3307
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-3329)
|
CVE-2015-3329
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-5590)
|
CVE-2015-5590
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-8865)
|
CVE-2015-8865
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2015-8874)
|
CVE-2015-8874
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-3142)
|
CVE-2016-3142
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-4342)
|
CVE-2016-4342
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-6297)
|
CVE-2016-6297
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-7412)
|
CVE-2016-7412
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-7416)
|
CVE-2016-7416
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-7418)
|
CVE-2016-7418
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2017-11628)
|
CVE-2017-11628
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2019-9638)
|
CVE-2019-9638
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2019-9639)
|
CVE-2019-9639
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2019-9640)
|
CVE-2019-9640
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2019-9675)
|
CVE-2019-9675
CWE-119
|
CWE-119
|
High
|
PHP Improper Restriction of XML External Entity Reference Vulnerability (CVE-2023-3823)
|
CVE-2023-3823
CWE-611
|
CWE-611
|
High
|
PHP Integer Overflow or Wraparound Vulnerability (CVE-2015-3416)
|
CVE-2015-3416
CWE-190
|
CWE-190
|
High
|
PHP Integer Overflow or Wraparound Vulnerability (CVE-2015-8387)
|
CVE-2015-8387
CWE-190
|
CWE-190
|
High
|
PHP Integer Overflow or Wraparound Vulnerability (CVE-2016-5094)
|
CVE-2016-5094
CWE-190
|
CWE-190
|
High
|
PHP Integer Overflow or Wraparound Vulnerability (CVE-2016-5095)
|
CVE-2016-5095
CWE-190
|
CWE-190
|
High
|
PHP Integer Overflow or Wraparound Vulnerability (CVE-2016-5096)
|
CVE-2016-5096
CWE-190
|
CWE-190
|
High
|
PHP Integer Overflow or Wraparound Vulnerability (CVE-2016-6289)
|
CVE-2016-6289
CWE-190
|
CWE-190
|
High
|
PHP Integer Overflow or Wraparound Vulnerability (CVE-2016-7133)
|
CVE-2016-7133
CWE-190
|
CWE-190
|
High
|
PHP Integer Overflow or Wraparound Vulnerability (CVE-2016-10159)
|
CVE-2016-10159
CWE-190
|
CWE-190
|
High
|
PHP Integer Overflow or Wraparound Vulnerability (CVE-2018-14883)
|
CVE-2018-14883
CWE-190
|
CWE-190
|
High
|
phpList Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2008-6178)
|
CVE-2008-6178
CWE-94
|
CWE-94
|
High
|
phpList Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-2740)
|
CVE-2012-2740
CWE-138
|
CWE-138
|
High
|
phpList Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-3953)
|
CVE-2012-3953
CWE-138
|
CWE-138
|
High
|
phpList Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2017-20030)
|
CVE-2017-20030
CWE-138
|
CWE-138
|
High
|
phpList Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-15072)
|
CVE-2020-15072
CWE-138
|
CWE-138
|
High
|
phpList Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-35708)
|
CVE-2020-35708
CWE-138
|
CWE-138
|
High
|
PHP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-10546)
|
CVE-2018-10546
CWE-835
|
CWE-835
|
High
|
PHP Missing Release of Resource after Effective Lifetime Vulnerability (CVE-2010-4657)
|
CVE-2010-4657
CWE-772
|
CWE-772
|
High
|
phpMyFAQ Cleartext Transmission of Sensitive Information Vulnerability (CVE-2022-4409)
|
CVE-2022-4409
CWE-319
|
CWE-319
|
High
|
phpMyFAQ Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2014-6046)
|
CVE-2014-6046
CWE-352
|
CWE-352
|
High
|
phpMyFAQ Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-15729)
|
CVE-2017-15729
CWE-352
|
CWE-352
|
High
|
phpMyFAQ Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-15730)
|
CVE-2017-15730
CWE-352
|
CWE-352
|
High
|
phpMyFAQ Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-15731)
|
CVE-2017-15731
CWE-352
|
CWE-352
|
High
|
phpMyFAQ Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-15732)
|
CVE-2017-15732
CWE-352
|
CWE-352
|
High
|
phpMyFAQ Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-15733)
|
CVE-2017-15733
CWE-352
|
CWE-352
|
High
|
phpMyFAQ Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-15734)
|
CVE-2017-15734
CWE-352
|
CWE-352
|
High
|
phpMyFAQ Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-15735)
|
CVE-2017-15735
CWE-352
|
CWE-352
|
High
|
phpMyFAQ Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-15808)
|
CVE-2017-15808
CWE-352
|
CWE-352
|
High
|
phpMyFAQ Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-16650)
|
CVE-2018-16650
CWE-352
|
CWE-352
|
High
|
phpMyFAQ Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2010-4558)
|
CVE-2010-4558
CWE-94
|
CWE-94
|
High
|
phpMyFAQ Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2011-4825)
|
CVE-2011-4825
CWE-94
|
CWE-94
|
High
|
phpMyFAQ Improper Neutralization of Formula Elements in a CSV File Vulnerability (CVE-2018-16651)
|
CVE-2018-16651
CWE-1236
|
CWE-1236
|
High
|
phpMyFAQ Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2022-3608)
|
CVE-2022-3608
CWE-707
|
CWE-707
|
High
|
phpMyFAQ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2006-6912)
|
CVE-2006-6912
CWE-138
|
CWE-138
|
High
|
phpMyFAQ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2014-6045)
|
CVE-2014-6045
CWE-138
|
CWE-138
|
High
|
phpMyFAQ Improper Privilege Management Vulnerability (CVE-2023-1762)
|
CVE-2023-1762
CWE-269
|
CWE-269
|
High
|
phpMyFAQ Other Vulnerability (CVE-2006-6913)
|
CVE-2006-6913
|
|
High
|
phpMyFAQ Uncaught Exception Vulnerability (CVE-2023-0790)
|
CVE-2023-0790
CWE-248
|
CWE-248
|
High
|
phpMyFAQ Weak Password Requirements Vulnerability (CVE-2023-0793)
|
CVE-2023-0793
CWE-521
|
CWE-521
|
High
|
PHP NULL Pointer Dereference Vulnerability (CVE-2016-7130)
|
CVE-2016-7130
CWE-476
|
CWE-476
|
High
|
PHP NULL Pointer Dereference Vulnerability (CVE-2016-7131)
|
CVE-2016-7131
CWE-476
|
CWE-476
|
High
|
PHP NULL Pointer Dereference Vulnerability (CVE-2016-7132)
|
CVE-2016-7132
CWE-476
|
CWE-476
|
High
|
PHP NULL Pointer Dereference Vulnerability (CVE-2016-9934)
|
CVE-2016-9934
CWE-476
|
CWE-476
|
High
|
PHP NULL Pointer Dereference Vulnerability (CVE-2016-10162)
|
CVE-2016-10162
CWE-476
|
CWE-476
|
High
|
PHP NULL Pointer Dereference Vulnerability (CVE-2017-6441)
|
CVE-2017-6441
CWE-476
|
CWE-476
|
High
|
PHP NULL Pointer Dereference Vulnerability (CVE-2017-9229)
|
CVE-2017-9229
CWE-476
|
CWE-476
|
High
|
PHP NULL Pointer Dereference Vulnerability (CVE-2018-10548)
|
CVE-2018-10548
CWE-476
|
CWE-476
|
High
|
PHP NULL Pointer Dereference Vulnerability (CVE-2018-14884)
|
CVE-2018-14884
CWE-476
|
CWE-476
|
High
|
PHP NULL Pointer Dereference Vulnerability (CVE-2018-19395)
|
CVE-2018-19395
CWE-476
|
CWE-476
|
High
|
PHP NULL Pointer Dereference Vulnerability (CVE-2018-19935)
|
CVE-2018-19935
CWE-476
|
CWE-476
|
High
|
PHP NULL Pointer Dereference Vulnerability (CVE-2020-7062)
|
CVE-2020-7062
CWE-476
|
CWE-476
|
High
|
PHP NULL Pointer Dereference Vulnerability (CVE-2021-21702)
|
CVE-2021-21702
CWE-476
|
CWE-476
|
High
|
PHP Numeric Errors Vulnerability (CVE-2007-4657)
|
CVE-2007-4657
|
|
High
|
PHP Numeric Errors Vulnerability (CVE-2008-2107)
|
CVE-2008-2107
|
|
High
|
PHP Numeric Errors Vulnerability (CVE-2008-2108)
|
CVE-2008-2108
|
|
High
|
PHP Numeric Errors Vulnerability (CVE-2010-1866)
|
CVE-2010-1866
|
|
High
|
PHP Numeric Errors Vulnerability (CVE-2011-1092)
|
CVE-2011-1092
|
|
High
|
PHP Numeric Errors Vulnerability (CVE-2012-2386)
|
CVE-2012-2386
|
|
High
|
PHP Numeric Errors Vulnerability (CVE-2014-3669)
|
CVE-2014-3669
|
|
High
|
PHP Numeric Errors Vulnerability (CVE-2015-2331)
|
CVE-2015-2331
|
|
High
|
PHP Numeric Errors Vulnerability (CVE-2015-4022)
|
CVE-2015-4022
|
|
High
|
PHP Numeric Errors Vulnerability (CVE-2016-1904)
|
CVE-2016-1904
|
|
High
|
PHP Numeric Errors Vulnerability (CVE-2016-4070)
|
CVE-2016-4070
|
|
High
|
PHP Numeric Errors Vulnerability (CVE-2016-10158)
|
CVE-2016-10158
|
|
High
|
PHP Other Vulnerability (CVE-1999-0058)
|
CVE-1999-0058
|
|
High
|
PHP Other Vulnerability (CVE-1999-0068)
|
CVE-1999-0068
|
|
High
|
PHP Other Vulnerability (CVE-2001-1246)
|
CVE-2001-1246
|
|
High
|
PHP Other Vulnerability (CVE-2002-0081)
|
CVE-2002-0081
|
|
High
|
PHP Other Vulnerability (CVE-2002-0229)
|
CVE-2002-0229
|
|
High
|
PHP Other Vulnerability (CVE-2002-0717)
|
CVE-2002-0717
|
|
High
|
PHP Other Vulnerability (CVE-2002-0985)
|
CVE-2002-0985
|
|
High
|
PHP Other Vulnerability (CVE-2002-1396)
|
CVE-2002-1396
|
|
High
|
PHP Other Vulnerability (CVE-2003-0097)
|
CVE-2003-0097
|
|
High
|
PHP Other Vulnerability (CVE-2003-0166)
|
CVE-2003-0166
|
|
High
|
PHP Other Vulnerability (CVE-2003-0172)
|
CVE-2003-0172
|
|
High
|
PHP Other Vulnerability (CVE-2003-0249)
|
CVE-2003-0249
|
|
High
|
PHP Other Vulnerability (CVE-2003-0863)
|
CVE-2003-0863
|
|
High
|
PHP Other Vulnerability (CVE-2005-1042)
|
CVE-2005-1042
|
|
High
|
PHP Other Vulnerability (CVE-2005-3390)
|
CVE-2005-3390
|
|
High
|
PHP Other Vulnerability (CVE-2005-3391)
|
CVE-2005-3391
|
|
High
|
PHP Other Vulnerability (CVE-2005-3392)
|
CVE-2005-3392
|
|
High
|
PHP Other Vulnerability (CVE-2006-4433)
|
CVE-2006-4433
|
|
High
|
PHP Other Vulnerability (CVE-2006-4481)
|
CVE-2006-4481
|
|
High
|
PHP Other Vulnerability (CVE-2006-5465)
|
CVE-2006-5465
|
|
High
|
PHP Other Vulnerability (CVE-2007-0905)
|
CVE-2007-0905
|
|
High
|
PHP Other Vulnerability (CVE-2007-0909)
|
CVE-2007-0909
|
|
High
|
PHP Other Vulnerability (CVE-2007-0911)
|
CVE-2007-0911
|
|
High
|
PHP Other Vulnerability (CVE-2007-1376)
|
CVE-2007-1376
|
|
High
|
PHP Other Vulnerability (CVE-2007-1412)
|
CVE-2007-1412
|
|
High
|
PHP Other Vulnerability (CVE-2007-1453)
|
CVE-2007-1453
|
|
High
|
PHP Other Vulnerability (CVE-2007-1649)
|
CVE-2007-1649
|
|
High
|
PHP Other Vulnerability (CVE-2007-1700)
|
CVE-2007-1700
|
|
High
|
PHP Other Vulnerability (CVE-2007-1718)
|
CVE-2007-1718
|
|
High
|
PHP Other Vulnerability (CVE-2007-1777)
|
CVE-2007-1777
|
|
High
|
PHP Other Vulnerability (CVE-2007-1825)
|
CVE-2007-1825
|
|
High
|
PHP Other Vulnerability (CVE-2007-1883)
|
CVE-2007-1883
|
|
High
|
PHP Other Vulnerability (CVE-2007-1885)
|
CVE-2007-1885
|
|
High
|
PHP Other Vulnerability (CVE-2007-1887)
|
CVE-2007-1887
|
|
High
|
PHP Other Vulnerability (CVE-2007-1888)
|
CVE-2007-1888
|
|
High
|
PHP Other Vulnerability (CVE-2007-1889)
|
CVE-2007-1889
|
|
High
|
PHP Other Vulnerability (CVE-2007-1890)
|
CVE-2007-1890
|
|
High
|
PHP Other Vulnerability (CVE-2007-2511)
|
CVE-2007-2511
|
|
High
|
PHP Other Vulnerability (CVE-2007-4255)
|
CVE-2007-4255
|
|
High
|
PHP Other Vulnerability (CVE-2007-4658)
|
CVE-2007-4658
|
|
High
|
PHP Other Vulnerability (CVE-2007-4659)
|
CVE-2007-4659
|
|
High
|
PHP Other Vulnerability (CVE-2007-5424)
|
CVE-2007-5424
|
|
High
|
PHP Other Vulnerability (CVE-2014-0236)
|
CVE-2014-0236
|
|
High
|
PHP Other Vulnerability (CVE-2014-8142)
|
CVE-2014-8142
|
|
High
|
PHP Other Vulnerability (CVE-2014-9425)
|
CVE-2014-9425
|
|
High
|
PHP Other Vulnerability (CVE-2015-0231)
|
CVE-2015-0231
|
|
High
|
PHP Other Vulnerability (CVE-2015-0273)
|
CVE-2015-0273
|
|
High
|
PHP Other Vulnerability (CVE-2015-2301)
|
CVE-2015-2301
|
|
High
|
PHP Other Vulnerability (CVE-2015-2787)
|
CVE-2015-2787
|
|
High
|
PHP Other Vulnerability (CVE-2015-4644)
|
CVE-2015-4644
|
|
High
|
PHP Other Vulnerability (CVE-2015-6832)
|
CVE-2015-6832
|
|
High
|
PHP Other Vulnerability (CVE-2015-6836)
|
CVE-2015-6836
|
|
High
|
PHP Other Vulnerability (CVE-2015-6837)
|
CVE-2015-6837
|
|
High
|
PHP Other Vulnerability (CVE-2015-6838)
|
CVE-2015-6838
|
|
High
|
PHP Other Vulnerability (CVE-2015-8616)
|
CVE-2015-8616
|
|
High
|
PHP Other Vulnerability (CVE-2016-4343)
|
CVE-2016-4343
|
|
High
|
PHP Other Vulnerability (CVE-2016-7478)
|
CVE-2016-7478
|
|
High
|
PHP Other Vulnerability (CVE-2019-11044)
|
CVE-2019-11044
|
|
High
|
PHP Out-of-bounds Read Vulnerability (CVE-2015-2325)
|
CVE-2015-2325
CWE-125
|
CWE-125
|
High
|
PHP Out-of-bounds Read Vulnerability (CVE-2016-5093)
|
CVE-2016-5093
CWE-125
|
CWE-125
|
High
|
PHP Out-of-bounds Read Vulnerability (CVE-2016-10161)
|
CVE-2016-10161
CWE-125
|
CWE-125
|
High
|
PHP Out-of-bounds Read Vulnerability (CVE-2017-9118)
|
CVE-2017-9118
CWE-125
|
CWE-125
|
High
|
PHP Out-of-bounds Read Vulnerability (CVE-2017-16642)
|
CVE-2017-16642
CWE-125
|
CWE-125
|
High
|
PHP Out-of-bounds Read Vulnerability (CVE-2018-10549)
|
CVE-2018-10549
CWE-125
|
CWE-125
|
High
|
PHP Out-of-bounds Read Vulnerability (CVE-2018-20783)
|
CVE-2018-20783
CWE-125
|
CWE-125
|
High
|
PHP Out-of-bounds Read Vulnerability (CVE-2019-9022)
|
CVE-2019-9022
CWE-125
|
CWE-125
|
High
|
PHP Out-of-bounds Read Vulnerability (CVE-2019-9024)
|
CVE-2019-9024
CWE-125
|
CWE-125
|
High
|
PHP Out-of-bounds Read Vulnerability (CVE-2019-11041)
|
CVE-2019-11041
CWE-125
|
CWE-125
|
High
|
PHP Out-of-bounds Read Vulnerability (CVE-2019-11042)
|
CVE-2019-11042
CWE-125
|
CWE-125
|
High
|
PHP Out-of-bounds Read Vulnerability (CVE-2019-11046)
|
CVE-2019-11046
CWE-125
|
CWE-125
|
High
|
PHP Out-of-bounds Read Vulnerability (CVE-2019-19246)
|
CVE-2019-19246
CWE-125
|
CWE-125
|
High
|
PHP Out-of-bounds Read Vulnerability (CVE-2020-7067)
|
CVE-2020-7067
CWE-125
|
CWE-125
|
High
|
PHP Out-of-bounds Read Vulnerability (CVE-2022-31630)
|
CVE-2022-31630
CWE-125
|
CWE-125
|
High
|
PHP Out-of-bounds Write Vulnerability (CVE-2008-2371)
|
CVE-2008-2371
CWE-787
|
CWE-787
|
High
|
PHP Out-of-bounds Write Vulnerability (CVE-2016-5399)
|
CVE-2016-5399
CWE-787
|
CWE-787
|
High
|
PHP Out-of-bounds Write Vulnerability (CVE-2019-6977)
|
CVE-2019-6977
CWE-787
|
CWE-787
|
High
|
PHP Out-of-bounds Write Vulnerability (CVE-2020-7065)
|
CVE-2020-7065
CWE-787
|
CWE-787
|
High
|
PHP Out-of-bounds Write Vulnerability (CVE-2021-21703)
|
CVE-2021-21703
CWE-787
|
CWE-787
|
High
|
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-1461)
|
CVE-2007-1461
CWE-264
|
CWE-264
|
High
|
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-3997)
|
CVE-2007-3997
CWE-264
|
CWE-264
|
High
|
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-0145)
|
CVE-2008-0145
CWE-264
|
CWE-264
|
High
|
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-5624)
|
CVE-2008-5624
CWE-264
|
CWE-264
|
High
|
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-5625)
|
CVE-2008-5625
CWE-264
|
CWE-264
|
High
|
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-7002)
|
CVE-2008-7002
CWE-264
|
CWE-264
|
High
|
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2009-4018)
|
CVE-2009-4018
CWE-264
|
CWE-264
|
High
|
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-2335)
|
CVE-2012-2335
CWE-264
|
CWE-264
|
High
|
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-1635)
|
CVE-2013-1635
CWE-264
|
CWE-264
|
High
|
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0185)
|
CVE-2014-0185
CWE-264
|
CWE-264
|
High
|
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-8994)
|
CVE-2015-8994
CWE-264
|
CWE-264
|
High
|
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2019-9637)
|
CVE-2019-9637
CWE-264
|
CWE-264
|
High
|
PHP Release of Invalid Pointer or Reference Vulnerability (CVE-2022-31625)
|
CVE-2022-31625
CWE-763
|
CWE-763
|
High
|
PHP Resource Management Errors Vulnerability (CVE-2002-2309)
|
CVE-2002-2309
|
|
High
|
PHP Resource Management Errors Vulnerability (CVE-2007-4660)
|
CVE-2007-4660
|
|
High
|
PHP Resource Management Errors Vulnerability (CVE-2010-2225)
|
CVE-2010-2225
|
|
High
|
PHP Resource Management Errors Vulnerability (CVE-2011-1148)
|
CVE-2011-1148
|
|
High
|
PHP Resource Management Errors Vulnerability (CVE-2012-0830)
|
CVE-2012-0830
|
|
High
|
PHP Resource Management Errors Vulnerability (CVE-2015-8877)
|
CVE-2015-8877
|
|
High
|
PHP Server-Side Request Forgery (SSRF) Vulnerability (CVE-2017-7272)
|
CVE-2017-7272
CWE-918
|
CWE-918
|
High
|
phpThumb() fltr[] parameter command injection vulnerability
|
CVE-2010-1598
CWE-20
|
CWE-20
|
High
|
PHP Uncontrolled Resource Consumption Vulnerability (CVE-2011-3336)
|
CVE-2011-3336
CWE-400
|
CWE-400
|
High
|
PHP Uncontrolled Resource Consumption Vulnerability (CVE-2017-11142)
|
CVE-2017-11142
CWE-400
|
CWE-400
|
High
|
PHP Uncontrolled Resource Consumption Vulnerability (CVE-2023-0662)
|
CVE-2023-0662
CWE-400
|
CWE-400
|
High
|
PHP Use After Free Vulnerability (CVE-2015-1351)
|
CVE-2015-1351
CWE-416
|
CWE-416
|
High
|
PHP Use After Free Vulnerability (CVE-2015-6831)
|
CVE-2015-6831
CWE-416
|
CWE-416
|
High
|
PHP Use After Free Vulnerability (CVE-2017-12934)
|
CVE-2017-12934
CWE-416
|
CWE-416
|
High
|
PHP Use of Externally-Controlled Format String Vulnerability (CVE-2011-1153)
|
CVE-2011-1153
CWE-134
|
CWE-134
|
High
|
PHP Use of Uninitialized Resource Vulnerability (CVE-2015-3414)
|
CVE-2015-3414
CWE-908
|
CWE-908
|
High
|
Phusion Passenger Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2018-12029)
|
CVE-2018-12029
CWE-362
|
CWE-362
|
High
|
Phusion Passenger Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-12027)
|
CVE-2018-12027
CWE-200
|
CWE-200
|
High
|
Phusion Passenger Incorrect Permission Assignment for Critical Resource Vulnerability (CVE-2018-12028)
|
CVE-2018-12028
CWE-732
|
CWE-732
|
High
|
Phusion Passenger Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-10345)
|
CVE-2016-10345
CWE-264
|
CWE-264
|
High
|
Piwigo Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2013-1468)
|
CVE-2013-1468
CWE-352
|
CWE-352
|
High
|
Piwigo Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-10678)
|
CVE-2017-10678
CWE-352
|
CWE-352
|
High
|
Piwigo Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-10680)
|
CVE-2017-10680
CWE-352
|
CWE-352
|
High
|
Piwigo Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-10681)
|
CVE-2017-10681
CWE-352
|
CWE-352
|
High
|
Piwigo Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-17774)
|
CVE-2017-17774
CWE-352
|
CWE-352
|
High
|
Piwigo Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-17827)
|
CVE-2017-17827
CWE-352
|
CWE-352
|
High
|
Piwigo Exposure of Resource to Wrong Sphere Vulnerability (CVE-2022-26267)
|
CVE-2022-26267
CWE-668
|
CWE-668
|
High
|
Piwigo Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-10679)
|
CVE-2017-10679
CWE-200
|
CWE-200
|
High
|
Piwigo Improper Access Control Vulnerability (CVE-2016-10084)
|
CVE-2016-10084
CWE-284
|
CWE-284
|
High
|
Piwigo Improper Access Control Vulnerability (CVE-2016-10085)
|
CVE-2016-10085
CWE-284
|
CWE-284
|
High
|
Piwigo Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2012-2208)
|
CVE-2012-2208
CWE-22
|
CWE-22
|
High
|
Piwigo Improper Neutralization of Special Elements used in a Command ('Command Injection') Vulnerability (CVE-2021-40553)
|
CVE-2021-40553
CWE-138
|
CWE-138
|
High
|
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2009-2933)
|
CVE-2009-2933
CWE-138
|
CWE-138
|
High
|
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2014-9115)
|
CVE-2014-9115
CWE-138
|
CWE-138
|
High
|
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-1441)
|
CVE-2015-1441
CWE-138
|
CWE-138
|
High
|
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-19215)
|
CVE-2020-19215
CWE-138
|
CWE-138
|
High
|
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-19216)
|
CVE-2020-19216
CWE-138
|
CWE-138
|
High
|
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-19217)
|
CVE-2020-19217
CWE-138
|
CWE-138
|
High
|
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2021-27973)
|
CVE-2021-27973
CWE-138
|
CWE-138
|
High
|
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2021-40313)
|
CVE-2021-40313
CWE-138
|
CWE-138
|
High
|
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2021-40317)
|
CVE-2021-40317
CWE-138
|
CWE-138
|
High
|
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2022-26266)
|
CVE-2022-26266
CWE-138
|
CWE-138
|
High
|
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2022-32297)
|
CVE-2022-32297
CWE-138
|
CWE-138
|
High
|
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2023-26876)
|
CVE-2023-26876
CWE-138
|
CWE-138
|
High
|
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2023-27233)
|
CVE-2023-27233
CWE-138
|
CWE-138
|
High
|
Piwigo Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2023-37270)
|
CVE-2023-37270
CWE-138
|
CWE-138
|
High
|
Piwigo Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) Vulnerability (CVE-2016-3735)
|
CVE-2016-3735
CWE-335
|
CWE-335
|
High
|
Play Framework Generation of Error Message Containing Sensitive Information Vulnerability (CVE-2022-31023)
|
CVE-2022-31023
CWE-209
|
CWE-209
|
High
|
Play Framework Improper Input Validation Vulnerability (CVE-2015-2156)
|
CVE-2015-2156
CWE-20
|
CWE-20
|
High
|
Play Framework Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-13864)
|
CVE-2018-13864
CWE-22
|
CWE-22
|
High
|
Play Framework Inadequate Encryption Strength Vulnerability (CVE-2019-17598)
|
CVE-2019-17598
CWE-326
|
CWE-326
|
High
|
Play Framework Out-of-bounds Write Vulnerability (CVE-2020-27196)
|
CVE-2020-27196
CWE-787
|
CWE-787
|
High
|
Play Framework Uncontrolled Recursion Vulnerability (CVE-2020-26882)
|
CVE-2020-26882
CWE-674
|
CWE-674
|
High
|
Play Framework Uncontrolled Recursion Vulnerability (CVE-2020-26883)
|
CVE-2020-26883
CWE-674
|
CWE-674
|
High
|
Play Framework Uncontrolled Resource Consumption Vulnerability (CVE-2022-31018)
|
CVE-2022-31018
CWE-400
|
CWE-400
|
High
|
PleskLin Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-1557)
|
CVE-2012-1557
CWE-138
|
CWE-138
|
High
|
PleskLin Other Vulnerability (CVE-2013-0133)
|
CVE-2013-0133
|
|
High
|
PleskLin Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-4878)
|
CVE-2013-4878
CWE-264
|
CWE-264
|
High
|
PleskWin Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-1557)
|
CVE-2012-1557
CWE-138
|
CWE-138
|
High
|
PleskWin Other Vulnerability (CVE-2013-0133)
|
CVE-2013-0133
|
|
High
|
PleskWin Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-4878)
|
CVE-2013-4878
CWE-264
|
CWE-264
|
High
|
Plone CMS Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-7293)
|
CVE-2015-7293
CWE-352
|
CWE-352
|
High
|
Plone CMS CVE-2011-0720 Vulnerability (CVE-2011-0720)
|
CVE-2011-0720
|
|
High
|
Plone CMS CVE-2011-2528 Vulnerability (CVE-2011-2528)
|
CVE-2011-2528
|
|
High
|
Plone CMS Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2007-5741)
|
CVE-2007-5741
CWE-94
|
CWE-94
|
High
|
Plone CMS Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2012-5493)
|
CVE-2012-5493
CWE-94
|
CWE-94
|
High
|
Plone CMS Improper Input Validation Vulnerability (CVE-2015-7318)
|
CVE-2015-7318
CWE-20
|
CWE-20
|
High
|
Plone CMS Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2021-32633)
|
CVE-2021-32633
CWE-22
|
CWE-22
|
High
|
Plone CMS Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-7939)
|
CVE-2020-7939
CWE-138
|
CWE-138
|
High
|
Plone CMS Improper Privilege Management Vulnerability (CVE-2020-7938)
|
CVE-2020-7938
CWE-269
|
CWE-269
|
High
|
Plone CMS Improper Restriction of XML External Entity Reference Vulnerability (CVE-2020-28734)
|
CVE-2020-28734
CWE-611
|
CWE-611
|
High
|
Plone CMS Improper Restriction of XML External Entity Reference Vulnerability (CVE-2020-28736)
|
CVE-2020-28736
CWE-611
|
CWE-611
|
High
|
Plone CMS Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-5487)
|
CVE-2012-5487
CWE-264
|
CWE-264
|
High
|
Plone CMS Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-4041)
|
CVE-2016-4041
CWE-264
|
CWE-264
|
High
|
Plone CMS Server-Side Request Forgery (SSRF) Vulnerability (CVE-2020-28735)
|
CVE-2020-28735
CWE-918
|
CWE-918
|
High
|
Plone CMS Server-Side Request Forgery (SSRF) Vulnerability (CVE-2021-33511)
|
CVE-2021-33511
CWE-918
|
CWE-918
|
High
|
Plone CMS Server-Side Request Forgery (SSRF) Vulnerability (CVE-2021-33926)
|
CVE-2021-33926
CWE-918
|
CWE-918
|
High
|
Plone CMS Weak Password Requirements Vulnerability (CVE-2020-7940)
|
CVE-2020-7940
CWE-521
|
CWE-521
|
High
|
PmWiki Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2011-4453)
|
CVE-2011-4453
CWE-94
|
CWE-94
|
High
|
PostgreSQL 7PK - Security Features Vulnerability (CVE-2016-2193)
|
CVE-2016-2193
|
|
High
|
PostgreSQL Arbitrary Code Execution Vulnerbality (CVE-2020-25696)
|
CVE-2020-25696
|
|
High
|
PostgreSQL Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2015-0241)
|
CVE-2015-0241
CWE-120
|
CWE-120
|
High
|
PostgreSQL Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2015-0243)
|
CVE-2015-0243
CWE-120
|
CWE-120
|
High
|
PostgreSQL Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2020-21469)
|
CVE-2020-21469
CWE-120
|
CWE-120
|
High
|
PostgreSQL Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2017-14798)
|
CVE-2017-14798
CWE-362
|
CWE-362
|
High
|
PostgreSQL CVE-2017-7547 Vulnerability (CVE-2017-7547)
|
CVE-2017-7547
|
|
High
|
PostgreSQL CVE-2017-7548 Vulnerability (CVE-2017-7548)
|
CVE-2017-7548
|
|
High
|
PostgreSQL CVE-2018-1058 Vulnerability (CVE-2018-1058)
|
CVE-2018-1058
|
|
High
|
PostgreSQL CVE-2023-2454 Vulnerability (CVE-2023-2454)
|
CVE-2023-2454
|
|
High
|
PostgreSQL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-3167)
|
CVE-2015-3167
CWE-200
|
CWE-200
|
High
|
PostgreSQL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-7484)
|
CVE-2017-7484
CWE-200
|
CWE-200
|
High
|
PostgreSQL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-7486)
|
CVE-2017-7486
CWE-200
|
CWE-200
|
High
|
PostgreSQL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-15098)
|
CVE-2017-15098
CWE-200
|
CWE-200
|
High
|
PostgreSQL Improper Access Control Vulnerability (CVE-2016-0768)
|
CVE-2016-0768
CWE-284
|
CWE-284
|
High
|
PostgreSQL Improper Access Control Vulnerability (CVE-2016-7048)
|
CVE-2016-7048
CWE-284
|
CWE-284
|
High
|
PostgreSQL Improper Access Control Vulnerability (CVE-2019-10127)
|
CVE-2019-10127
CWE-284
|
CWE-284
|
High
|
PostgreSQL Improper Access Control Vulnerability (CVE-2019-10128)
|
CVE-2019-10128
CWE-284
|
CWE-284
|
High
|
PostgreSQL Improper Authentication Vulnerability (CVE-2007-6601)
|
CVE-2007-6601
CWE-287
|
CWE-287
|
High
|
PostgreSQL Improper Certificate Validation Vulnerability (CVE-2021-43766)
|
CVE-2021-43766
CWE-295
|
CWE-295
|
High
|
PostgreSQL Improper Control of Dynamically-Managed Code Resources Vulnerability (CVE-2022-2625)
|
CVE-2022-2625
CWE-913
|
CWE-913
|
High
|
PostgreSQL Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2010-1169)
|
CVE-2010-1169
CWE-94
|
CWE-94
|
High
|
PostgreSQL Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2016-5424)
|
CVE-2016-5424
CWE-94
|
CWE-94
|
High
|
PostgreSQL Improper Input Validation Vulnerability (CVE-2019-10210)
|
CVE-2019-10210
CWE-20
|
CWE-20
|
High
|
PostgreSQL Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2019-9193)
|
CVE-2019-9193
CWE-138
|
CWE-138
|
High
|
PostgreSQL Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-10915)
|
CVE-2018-10915
CWE-138
|
CWE-138
|
High
|
PostgreSQL Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-10208)
|
CVE-2019-10208
CWE-138
|
CWE-138
|
High
|
PostgreSQL Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-25695)
|
CVE-2020-25695
CWE-138
|
CWE-138
|
High
|
PostgreSQL Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2021-23214)
|
CVE-2021-23214
CWE-138
|
CWE-138
|
High
|
PostgreSQL Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2022-1552)
|
CVE-2022-1552
CWE-138
|
CWE-138
|
High
|
PostgreSQL Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2023-39417)
|
CVE-2023-39417
CWE-138
|
CWE-138
|
High
|
PostgreSQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-0773)
|
CVE-2016-0773
CWE-119
|
CWE-119
|
High
|
PostgreSQL Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2021-32027)
|
CVE-2021-32027
CWE-119
|
CWE-119
|
High
|
PostgreSQL Incorrect Authorization Vulnerability (CVE-2018-10925)
|
CVE-2018-10925
CWE-863
|
CWE-863
|
High
|
PostgreSQL Incorrect Permission Assignment for Critical Resource Vulnerability (CVE-2018-1053)
|
CVE-2018-1053
CWE-732
|
CWE-732
|
High
|
PostgreSQL NULL Pointer Dereference Vulnerability (CVE-2016-5423)
|
CVE-2016-5423
CWE-476
|
CWE-476
|
High
|
PostgreSQL Numeric Errors Vulnerability (CVE-2013-1900)
|
CVE-2013-1900
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2002-0802)
|
CVE-2002-0802
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2002-1397)
|
CVE-2002-1397
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2002-1400)
|
CVE-2002-1400
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2002-1642)
|
CVE-2002-1642
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2003-0901)
|
CVE-2003-0901
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2005-0245)
|
CVE-2005-0245
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2005-1409)
|
CVE-2005-1409
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2006-2313)
|
CVE-2006-2313
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2006-2314)
|
CVE-2006-2314
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2007-0555)
|
CVE-2007-0555
|
|
High
|
PostgreSQL Other Vulnerability (CVE-2012-1618)
|
CVE-2012-1618
|
|
High
|
PostgreSQL Out-of-bounds Write Vulnerability (CVE-2015-0242)
|
CVE-2015-0242
CWE-787
|
CWE-787
|
High
|
PostgreSQL Out-of-bounds Write Vulnerability (CVE-2019-10164)
|
CVE-2019-10164
CWE-787
|
CWE-787
|
High
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1447)
|
CVE-2010-1447
CWE-264
|
CWE-264
|
High
|
PostgreSQL Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-0766)
|
CVE-2016-0766
CWE-264
|
CWE-264
|
High
|
PostgreSQL Uncontrolled Search Path Element Vulnerability (CVE-2020-14349)
|
CVE-2020-14349
CWE-427
|
CWE-427
|
High
|
PostgreSQL Untrusted Search Path Vulnerability (CVE-2020-10733)
|
CVE-2020-10733
CWE-426
|
CWE-426
|
High
|
PostgreSQL Untrusted Search Path Vulnerability (CVE-2020-14350)
|
CVE-2020-14350
CWE-426
|
CWE-426
|
High
|
PostgreSQL Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2020-25694)
|
CVE-2020-25694
CWE-327
|
CWE-327
|
High
|
PrestaShop Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2019-13461)
|
CVE-2019-13461
CWE-639
|
CWE-639
|
High
|
PrestaShop Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2023-25170)
|
CVE-2023-25170
CWE-352
|
CWE-352
|
High
|
PrestaShop CVE-2018-19125 Vulnerability (CVE-2018-19125)
|
CVE-2018-19125
|
|
High
|
PrestaShop CVE-2020-26224 Vulnerability (CVE-2020-26224)
|
CVE-2020-26224
|
|
High
|
PrestaShop Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2018-20717)
|
CVE-2018-20717
CWE-94
|
CWE-94
|
High
|
PrestaShop Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-19124)
|
CVE-2018-19124
CWE-22
|
CWE-22
|
High
|
PrestaShop Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2023-39528)
|
CVE-2023-39528
CWE-22
|
CWE-22
|
High
|
PrestaShop Improper Neutralization of Formula Elements in a CSV File Vulnerability (CVE-2021-21302)
|
CVE-2021-21302
CWE-1236
|
CWE-1236
|
High
|
PrestaShop Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2023-30151)
|
CVE-2023-30151
CWE-138
|
CWE-138
|
High
|
PrestaShop Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2023-30839)
|
CVE-2023-30839
CWE-138
|
CWE-138
|
High
|
PrestaShop Improper Restriction of Rendered UI Layers or Frames Vulnerability (CVE-2018-7491)
|
CVE-2018-7491
CWE-1021
|
CWE-1021
|
High
|
PrestaShop Other Vulnerability (CVE-2020-15082)
|
CVE-2020-15082
|
|
High
|
PrestaShop Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2013-6358)
|
CVE-2013-6358
CWE-434
|
CWE-434
|
High
|
ProjectSend Improper Neutralization of Formula Elements in a CSV File Vulnerability (CVE-2018-7201)
|
CVE-2018-7201
CWE-1236
|
CWE-1236
|
High
|
ProjectSend Improper Privilege Management Vulnerability (CVE-2020-28874)
|
CVE-2020-28874
CWE-269
|
CWE-269
|
High
|
ProjectSend Incorrect Authorization Vulnerability (CVE-2021-40884)
|
CVE-2021-40884
CWE-863
|
CWE-863
|
High
|
ProjectSend Insertion of Sensitive Information into Log File Vulnerability (CVE-2019-11492)
|
CVE-2019-11492
CWE-532
|
CWE-532
|
High
|
ProjectSend Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-11378)
|
CVE-2019-11378
CWE-434
|
CWE-434
|
High
|
Prototype CVE-2008-7220 Vulnerability (CVE-2008-7220)
|
CVE-2008-7220
|
|
High
|
Prototype CVE-2020-27511 Vulnerability (CVE-2020-27511)
|
CVE-2020-27511
|
|
High
|
Python Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2004-0150)
|
CVE-2004-0150
CWE-120
|
CWE-120
|
High
|
Python Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2008-3142)
|
CVE-2008-3142
CWE-120
|
CWE-120
|
High
|
Python Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2010-1450)
|
CVE-2010-1450
CWE-120
|
CWE-120
|
High
|
Python Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2022-48566)
|
CVE-2022-48566
CWE-362
|
CWE-362
|
High
|
Python CVE-2013-1753 Vulnerability (CVE-2013-1753)
|
CVE-2013-1753
|
|
High
|
Python CVE-2018-1060 Vulnerability (CVE-2018-1060)
|
CVE-2018-1060
|
|
High
|
Python CVE-2018-1061 Vulnerability (CVE-2018-1061)
|
CVE-2018-1061
|
|
High
|
Python CVE-2019-16056 Vulnerability (CVE-2019-16056)
|
CVE-2019-16056
|
|
High
|
Python CVE-2019-17514 Vulnerability (CVE-2019-17514)
|
CVE-2019-17514
|
|
High
|
Python CVE-2022-42919 Vulnerability (CVE-2022-42919)
|
CVE-2022-42919
|
|
High
|
Python Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-2183)
|
CVE-2016-2183
CWE-200
|
CWE-200
|
High
|
Python Files or Directories Accessible to External Parties Vulnerability (CVE-2019-13404)
|
CVE-2019-13404
CWE-552
|
CWE-552
|
High
|
Python Improper Encoding or Escaping of Output Vulnerability (CVE-2020-26116)
|
CVE-2020-26116
CWE-116
|
CWE-116
|
High
|
Python Improper Input Validation Vulnerability (CVE-2013-7338)
|
CVE-2013-7338
CWE-20
|
CWE-20
|
High
|
Python Improper Input Validation Vulnerability (CVE-2023-24329)
|
CVE-2023-24329
CWE-20
|
CWE-20
|
High
|
Python Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2017-17522)
|
CVE-2017-17522
CWE-138
|
CWE-138
|
High
|
Python Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2022-0391)
|
CVE-2022-0391
CWE-138
|
CWE-138
|
High
|
Python Improper Privilege Management Vulnerability (CVE-2020-29396)
|
CVE-2020-29396
CWE-269
|
CWE-269
|
High
|
Python Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2014-1912)
|
CVE-2014-1912
CWE-119
|
CWE-119
|
High
|
Python Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-4472)
|
CVE-2016-4472
CWE-119
|
CWE-119
|
High
|
Python Improper Restriction of XML External Entity Reference Vulnerability (CVE-2017-9233)
|
CVE-2017-9233
CWE-611
|
CWE-611
|
High
|
Python Inadequate Encryption Strength Vulnerability (CVE-2014-0224)
|
CVE-2014-0224
CWE-326
|
CWE-326
|
High
|
Python Incorrect Conversion between Numeric Types Vulnerability (CVE-2008-1721)
|
CVE-2008-1721
CWE-681
|
CWE-681
|
High
|
Python Incorrect Type Conversion or Cast Vulnerability (CVE-2020-10735)
|
CVE-2020-10735
CWE-704
|
CWE-704
|
High
|
Python Integer Overflow or Wraparound Vulnerability (CVE-2008-2315)
|
CVE-2008-2315
CWE-190
|
CWE-190
|
High
|
Python Integer Overflow or Wraparound Vulnerability (CVE-2008-3143)
|
CVE-2008-3143
CWE-190
|
CWE-190
|
High
|
Python Integer Overflow or Wraparound Vulnerability (CVE-2008-4864)
|
CVE-2008-4864
CWE-190
|
CWE-190
|
High
|
Python Integer Overflow or Wraparound Vulnerability (CVE-2010-1449)
|
CVE-2010-1449
CWE-190
|
CWE-190
|
High
|
Python Integer Overflow or Wraparound Vulnerability (CVE-2018-20406)
|
CVE-2018-20406
CWE-190
|
CWE-190
|
High
|
Python Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2019-20907)
|
CVE-2019-20907
CWE-835
|
CWE-835
|
High
|
Python Missing Initialization of Resource Vulnerability (CVE-2018-14647)
|
CVE-2018-14647
CWE-909
|
CWE-909
|
High
|
Python NULL Pointer Dereference Vulnerability (CVE-2019-5010)
|
CVE-2019-5010
CWE-476
|
CWE-476
|
High
|
Python Numeric Errors Vulnerability (CVE-2008-2316)
|
CVE-2008-2316
|
|
High
|
Python Other Vulnerability (CVE-2005-0089)
|
CVE-2005-0089
|
|
High
|
Python Other Vulnerability (CVE-2006-4980)
|
CVE-2006-4980
|
|
High
|
Python Other Vulnerability (CVE-2015-5652)
|
CVE-2015-5652
|
|
High
|
Python Out-of-bounds Read Vulnerability (CVE-2019-15903)
|
CVE-2019-15903
CWE-125
|
CWE-125
|
High
|
Python Out-of-bounds Write Vulnerability (CVE-2018-25032)
|
CVE-2018-25032
CWE-787
|
CWE-787
|
High
|
Python Uncontrolled Recursion Vulnerability (CVE-2023-36632)
|
CVE-2023-36632
CWE-674
|
CWE-674
|
High
|
Python Uncontrolled Resource Consumption Vulnerability (CVE-2019-9674)
|
CVE-2019-9674
CWE-400
|
CWE-400
|
High
|
Python Uncontrolled Resource Consumption Vulnerability (CVE-2021-3737)
|
CVE-2021-3737
CWE-400
|
CWE-400
|
High
|
Python Uncontrolled Resource Consumption Vulnerability (CVE-2022-45061)
|
CVE-2022-45061
CWE-400
|
CWE-400
|
High
|
Python Uncontrolled Search Path Element Vulnerability (CVE-2017-20052)
|
CVE-2017-20052
CWE-427
|
CWE-427
|
High
|
Python Uncontrolled Search Path Element Vulnerability (CVE-2020-15523)
|
CVE-2020-15523
CWE-427
|
CWE-427
|
High
|
Python Untrusted Search Path Vulnerability (CVE-2022-26488)
|
CVE-2022-26488
CWE-426
|
CWE-426
|
High
|
Python Untrusted Search Path Vulnerability (CVE-2023-41105)
|
CVE-2023-41105
CWE-426
|
CWE-426
|
High
|
Python URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2021-28861)
|
CVE-2021-28861
CWE-601
|
CWE-601
|
High
|
Python Use After Free Vulnerability (CVE-2022-48560)
|
CVE-2022-48560
CWE-416
|
CWE-416
|
High
|
qdPM Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2022-26180)
|
CVE-2022-26180
CWE-352
|
CWE-352
|
High
|
qdPM Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2020-26165)
|
CVE-2020-26165
CWE-94
|
CWE-94
|
High
|
qdPM Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2020-7246)
|
CVE-2020-7246
CWE-22
|
CWE-22
|
High
|
qdPM Sensitive Information Disclosure Vulnerability (CVE-2015-3881)
|
CVE-2015-3881
|
|
High
|
Question2Answer Improper Input Validation Vulnerability (CVE-2017-12775)
|
CVE-2017-12775
CWE-20
|
CWE-20
|
High
|
Rails mass assignment
|
CWE-915
|
CWE-915
|
High
|
Resin Application Server Improper Input Validation Vulnerability (CVE-2012-2965)
|
CVE-2012-2965
CWE-20
|
CWE-20
|
High
|
Resin Application Server Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2021-44138)
|
CVE-2021-44138
CWE-22
|
CWE-22
|
High
|
Resin Application Server Other Vulnerability (CVE-2012-2966)
|
CVE-2012-2966
|
|
High
|
Resin Application Server Other Vulnerability (CVE-2012-2967)
|
CVE-2012-2967
|
|
High
|
Restlet Framework Deserialization of Untrusted Data Vulnerability (CVE-2013-4271)
|
CVE-2013-4271
CWE-502
|
CWE-502
|
High
|
Restlet Framework Improper Restriction of XML External Entity Reference Vulnerability (CVE-2017-14868)
|
CVE-2017-14868
CWE-611
|
CWE-611
|
High
|
Restlet Framework Improper Restriction of XML External Entity Reference Vulnerability (CVE-2017-14949)
|
CVE-2017-14949
CWE-611
|
CWE-611
|
High
|
Restlet Framework XML Injection (aka Blind XPath Injection) Vulnerability (CVE-2013-4221)
|
CVE-2013-4221
CWE-91
|
CWE-91
|
High
|
ReviveAdserver Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2016-9127)
|
CVE-2016-9127
CWE-352
|
CWE-352
|
High
|
ReviveAdserver Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2016-9455)
|
CVE-2016-9455
CWE-352
|
CWE-352
|
High
|
ReviveAdserver Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2016-9456)
|
CVE-2016-9456
CWE-352
|
CWE-352
|
High
|
ReviveAdserver Improper Access Control Vulnerability (CVE-2015-7367)
|
CVE-2015-7367
CWE-284
|
CWE-284
|
High
|
ReviveAdserver Improper Access Control Vulnerability (CVE-2015-7369)
|
CVE-2015-7369
CWE-284
|
CWE-284
|
High
|
ReviveAdserver Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2015-7372)
|
CVE-2015-7372
CWE-22
|
CWE-22
|
High
|
ReviveAdserver Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-7149)
|
CVE-2013-7149
CWE-138
|
CWE-138
|
High
|
ReviveAdserver Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2021-22948)
|
CVE-2021-22948
CWE-327
|
CWE-327
|
High
|
ReviveAdserver Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) Vulnerability (CVE-2019-5440)
|
CVE-2019-5440
CWE-338
|
CWE-338
|
High
|
Riot.js Resource Management Errors Vulnerability (CVE-2016-10527)
|
CVE-2016-10527
|
|
High
|
Roundcube Cross-site Request Forgery (CSRF) Vulnerability (CVE-2016-4069)
|
CVE-2016-4069
|
|
High
|
Roundcube Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5383)
|
CVE-2015-5383
CWE-200
|
CWE-200
|
High
|
Roundcube Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-19205)
|
CVE-2018-19205
CWE-200
|
CWE-200
|
High
|
Roundcube Files or Directories Accessible to External Parties Vulnerability (CVE-2017-16651)
|
CVE-2017-16651
CWE-552
|
CWE-552
|
High
|
Roundcube Improper Access Control Vulnerability (CVE-2016-9920)
|
CVE-2016-9920
CWE-284
|
CWE-284
|
High
|
Roundcube Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-6172)
|
CVE-2013-6172
CWE-138
|
CWE-138
|
High
|
Roundcube Improper Privilege Management Vulnerability (CVE-2017-8114)
|
CVE-2017-8114
CWE-269
|
CWE-269
|
High
|
Roundcube Multiple Buffer Overflow Vulnerabilities (CVE-2015-2181)
|
CVE-2015-2181
|
|
High
|
Roundcube Resource Management Errors Vulnerability (CVE-2008-5620)
|
CVE-2008-5620
|
|
High
|
Roundcube security updates 0.8.6 and 0.7.3
|
CVE-2013-1904
CWE-22
|
CWE-22
|
High
|
Roundcube Unspesificed Vulnerability (CVE-2018-9846)
|
CVE-2018-9846
|
|
High
|
Roundcube Unspesificed Vulnerability (CVE-2018-1000071)
|
CVE-2018-1000071
|
|
High
|
Roundcube Unspesificed Vulnerability (CVE-2019-15237)
|
CVE-2019-15237
|
|
High
|
Ruby CVE-2018-16396 Vulnerability (CVE-2018-16396)
|
CVE-2018-16396
|
|
High
|
Ruby CVE-2021-41819 Vulnerability (CVE-2021-41819)
|
CVE-2021-41819
|
|
High
|
RubyGems Deserialization of Untrusted Data Vulnerability (CVE-2018-1000074)
|
CVE-2018-1000074
CWE-502
|
CWE-502
|
High
|
RubyGems Improper Authentication Vulnerability (CVE-2022-36073)
|
CVE-2022-36073
CWE-287
|
CWE-287
|
High
|
RubyGems Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-8324)
|
CVE-2019-8324
CWE-94
|
CWE-94
|
High
|
RubyGems Improper Input Validation Vulnerability (CVE-2017-0900)
|
CVE-2017-0900
CWE-20
|
CWE-20
|
High
|
RubyGems Improper Input Validation Vulnerability (CVE-2017-0901)
|
CVE-2017-0901
CWE-20
|
CWE-20
|
High
|
RubyGems Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-8320)
|
CVE-2019-8320
CWE-22
|
CWE-22
|
High
|
RubyGems Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2018-1000073)
|
CVE-2018-1000073
CWE-59
|
CWE-59
|
High
|
RubyGems Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') Vulnerability (CVE-2019-8321)
|
CVE-2019-8321
CWE-707
|
CWE-707
|
High
|
RubyGems Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2019-8322)
|
CVE-2019-8322
CWE-138
|
CWE-138
|
High
|
RubyGems Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2019-8323)
|
CVE-2019-8323
CWE-138
|
CWE-138
|
High
|
RubyGems Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2019-8325)
|
CVE-2019-8325
CWE-138
|
CWE-138
|
High
|
RubyGems Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1000075)
|
CVE-2018-1000075
CWE-835
|
CWE-835
|
High
|
RubyGems Origin Validation Error Vulnerability (CVE-2017-0902)
|
CVE-2017-0902
CWE-346
|
CWE-346
|
High
|
Ruby Improper Authentication Vulnerability (CVE-2017-10784)
|
CVE-2017-10784
CWE-287
|
CWE-287
|
High
|
Ruby Improper Authentication Vulnerability (CVE-2019-16201)
|
CVE-2019-16201
CWE-287
|
CWE-287
|
High
|
Ruby Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-16255)
|
CVE-2019-16255
CWE-94
|
CWE-94
|
High
|
Ruby Improper Input Validation Vulnerability (CVE-2008-3657)
|
CVE-2008-3657
CWE-20
|
CWE-20
|
High
|
Ruby Improper Input Validation Vulnerability (CVE-2009-5147)
|
CVE-2009-5147
CWE-20
|
CWE-20
|
High
|
Ruby Improper Input Validation Vulnerability (CVE-2011-4815)
|
CVE-2011-4815
CWE-20
|
CWE-20
|
High
|
Ruby Improper Input Validation Vulnerability (CVE-2015-7551)
|
CVE-2015-7551
CWE-20
|
CWE-20
|
High
|
Ruby Improper Input Validation Vulnerability (CVE-2017-6181)
|
CVE-2017-6181
CWE-20
|
CWE-20
|
High
|
Ruby Improper Input Validation Vulnerability (CVE-2018-8779)
|
CVE-2018-8779
CWE-20
|
CWE-20
|
High
|
Ruby Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-6914)
|
CVE-2018-6914
CWE-22
|
CWE-22
|
High
|
Ruby Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2021-28966)
|
CVE-2021-28966
CWE-22
|
CWE-22
|
High
|
Ruby Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2020-5247)
|
CVE-2020-5247
CWE-138
|
CWE-138
|
High
|
Ruby Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2017-17405)
|
CVE-2017-17405
CWE-138
|
CWE-138
|
High
|
Ruby Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2010-2489)
|
CVE-2010-2489
CWE-119
|
CWE-119
|
High
|
Ruby Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2017-14033)
|
CVE-2017-14033
CWE-119
|
CWE-119
|
High
|
Ruby Improper Restriction of XML External Entity Reference Vulnerability (CVE-2021-28965)
|
CVE-2021-28965
CWE-611
|
CWE-611
|
High
|
Ruby Inadequate Encryption Strength Vulnerability (CVE-2021-32066)
|
CVE-2021-32066
CWE-326
|
CWE-326
|
High
|
Ruby Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2020-25613)
|
CVE-2020-25613
CWE-444
|
CWE-444
|
High
|
Ruby Inefficient Regular Expression Complexity Vulnerability (CVE-2023-22795)
|
CVE-2023-22795
CWE-1333
|
CWE-1333
|
High
|
Ruby Inefficient Regular Expression Complexity Vulnerability (CVE-2023-28756)
|
CVE-2023-28756
CWE-1333
|
CWE-1333
|
High
|
Ruby Interpretation Conflict Vulnerability (CVE-2021-33621)
|
CVE-2021-33621
CWE-436
|
CWE-436
|
High
|
Ruby Numeric Errors Vulnerability (CVE-2008-2376)
|
CVE-2008-2376
|
|
High
|
Ruby Numeric Errors Vulnerability (CVE-2008-2725)
|
CVE-2008-2725
|
|
High
|
Ruby Numeric Errors Vulnerability (CVE-2008-2726)
|
CVE-2008-2726
|
|
High
|
Ruby on Rails Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-5419)
|
CVE-2019-5419
CWE-770
|
CWE-770
|
High
|
Ruby on Rails CVE-2006-4112 Vulnerability (CVE-2006-4112)
|
CVE-2006-4112
|
|
High
|
Ruby on Rails CVE-2019-5418 Vulnerability (CVE-2019-5418)
|
CVE-2019-5418
|
|
High
|
Ruby on Rails CVE-2021-22902 Vulnerability (CVE-2021-22902)
|
CVE-2021-22902
|
|
High
|
Ruby on Rails Deserialization of Untrusted Data Vulnerability (CVE-2018-16476)
|
CVE-2018-16476
CWE-502
|
CWE-502
|
High
|
Ruby on Rails Deserialization of Untrusted Data Vulnerability (CVE-2020-8164)
|
CVE-2020-8164
CWE-502
|
CWE-502
|
High
|
Ruby on Rails Generation of Error Message Containing Sensitive Information Vulnerability (CVE-2021-22885)
|
CVE-2021-22885
CWE-209
|
CWE-209
|
High
|
Ruby on Rails Improper Access Control Vulnerability (CVE-2016-6317)
|
CVE-2016-6317
CWE-284
|
CWE-284
|
High
|
Ruby on Rails Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2006-4111)
|
CVE-2006-4111
CWE-94
|
CWE-94
|
High
|
Ruby on Rails Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2020-8163)
|
CVE-2020-8163
CWE-94
|
CWE-94
|
High
|
Ruby on Rails Improper Input Validation Vulnerability (CVE-2013-0156)
|
CVE-2013-0156
CWE-20
|
CWE-20
|
High
|
Ruby on Rails Improper Input Validation Vulnerability (CVE-2016-2098)
|
CVE-2016-2098
CWE-20
|
CWE-20
|
High
|
Ruby on Rails Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2016-0752)
|
CVE-2016-0752
CWE-22
|
CWE-22
|
High
|
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-4094)
|
CVE-2008-4094
CWE-138
|
CWE-138
|
High
|
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2011-0448)
|
CVE-2011-0448
CWE-138
|
CWE-138
|
High
|
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2011-2930)
|
CVE-2011-2930
CWE-138
|
CWE-138
|
High
|
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-2695)
|
CVE-2012-2695
CWE-138
|
CWE-138
|
High
|
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-6496)
|
CVE-2012-6496
CWE-138
|
CWE-138
|
High
|
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2014-3482)
|
CVE-2014-3482
CWE-138
|
CWE-138
|
High
|
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2014-3483)
|
CVE-2014-3483
CWE-138
|
CWE-138
|
High
|
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2017-17916)
|
CVE-2017-17916
CWE-138
|
CWE-138
|
High
|
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2017-17917)
|
CVE-2017-17917
CWE-138
|
CWE-138
|
High
|
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2017-17919)
|
CVE-2017-17919
CWE-138
|
CWE-138
|
High
|
Ruby on Rails Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2017-17920)
|
CVE-2017-17920
CWE-138
|
CWE-138
|
High
|
Ruby on Rails Inefficient Regular Expression Complexity Vulnerability (CVE-2023-22792)
|
CVE-2023-22792
CWE-1333
|
CWE-1333
|
High
|
Ruby on Rails Inefficient Regular Expression Complexity Vulnerability (CVE-2023-22795)
|
CVE-2023-22795
CWE-1333
|
CWE-1333
|
High
|
Ruby on Rails Other Vulnerability (CVE-2013-0333)
|
CVE-2013-0333
|
|
High
|
Ruby on Rails Other Vulnerability (CVE-2021-22904)
|
CVE-2021-22904
|
|
High
|
Ruby on Rails Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-0449)
|
CVE-2011-0449
CWE-264
|
CWE-264
|
High
|
Ruby on Rails Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3514)
|
CVE-2014-3514
CWE-264
|
CWE-264
|
High
|
Ruby on Rails Resource Management Errors Vulnerability (CVE-2015-7581)
|
CVE-2015-7581
|
|
High
|
Ruby on Rails Resource Management Errors Vulnerability (CVE-2016-0751)
|
CVE-2016-0751
|
|
High
|
Ruby on Rails SQL injection
|
CVE-2012-2695
CWE-89
|
CWE-89
|
High
|
Ruby on Rails Uncontrolled Resource Consumption Vulnerability (CVE-2021-22880)
|
CVE-2021-22880
CWE-400
|
CWE-400
|
High
|
Ruby on Rails Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2020-8162)
|
CVE-2020-8162
CWE-434
|
CWE-434
|
High
|
Ruby Other Vulnerability (CVE-2021-41817)
|
CVE-2021-41817
|
|
High
|
Ruby Out-of-bounds Read Vulnerability (CVE-2022-28739)
|
CVE-2022-28739
CWE-125
|
CWE-125
|
High
|
Ruby Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-3655)
|
CVE-2008-3655
CWE-264
|
CWE-264
|
High
|
Ruby Resource Management Errors Vulnerability (CVE-2008-2664)
|
CVE-2008-2664
|
|
High
|
Ruby Resource Management Errors Vulnerability (CVE-2008-3656)
|
CVE-2008-3656
|
|
High
|
Ruby Resource Management Errors Vulnerability (CVE-2008-4310)
|
CVE-2008-4310
|
|
High
|
Ruby Resource Management Errors Vulnerability (CVE-2014-6438)
|
CVE-2014-6438
|
|
High
|
Ruby Uncontrolled Resource Consumption Vulnerability (CVE-2018-8777)
|
CVE-2018-8777
CWE-400
|
CWE-400
|
High
|
Ruby Use of Externally-Controlled Format String Vulnerability (CVE-2018-8778)
|
CVE-2018-8778
CWE-134
|
CWE-134
|
High
|
Rukovoditel Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-11818)
|
CVE-2020-11818
CWE-352
|
CWE-352
|
High
|
Rukovoditel Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2021-30224)
|
CVE-2021-30224
CWE-352
|
CWE-352
|
High
|
Rukovoditel Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2022-45020)
|
CVE-2022-45020
CWE-707
|
CWE-707
|
High
|
Rukovoditel Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-13587)
|
CVE-2020-13587
CWE-138
|
CWE-138
|
High
|
Rukovoditel Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-13588)
|
CVE-2020-13588
CWE-138
|
CWE-138
|
High
|
Rukovoditel Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-13589)
|
CVE-2020-13589
CWE-138
|
CWE-138
|
High
|
Rukovoditel Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-13590)
|
CVE-2020-13590
CWE-138
|
CWE-138
|
High
|
Rukovoditel Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-13591)
|
CVE-2020-13591
CWE-138
|
CWE-138
|
High
|
Rukovoditel Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2020-13592)
|
CVE-2020-13592
CWE-138
|
CWE-138
|
High
|
Rukovoditel Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2022-43288)
|
CVE-2022-43288
CWE-138
|
CWE-138
|
High
|
Rukovoditel Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2018-20166)
|
CVE-2018-20166
CWE-434
|
CWE-434
|
High
|
Security update: Hotfix available for ColdFusion
|
CVE-2013-0625
CVE-2013-0629
CVE-2013-0631
CVE-2013-0632
CWE-255
|
CWE-255
|
High
|
Seo Panel Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2017-10839)
|
CVE-2017-10839
CWE-138
|
CWE-138
|
High
|
Seo Panel Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2021-28419)
|
CVE-2021-28419
CWE-138
|
CWE-138
|
High
|
Seo Panel Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2021-34117)
|
CVE-2021-34117
CWE-138
|
CWE-138
|
High
|
Serendipity Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-5475)
|
CVE-2017-5475
CWE-352
|
CWE-352
|
High
|
Serendipity Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-5476)
|
CVE-2017-5476
CWE-352
|
CWE-352
|
High
|
Serendipity Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-8101)
|
CVE-2017-8101
CWE-352
|
CWE-352
|
High
|
Serendipity Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-2332)
|
CVE-2012-2332
CWE-138
|
CWE-138
|
High
|
Serendipity Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2012-2762)
|
CVE-2012-2762
CWE-138
|
CWE-138
|
High
|
Serendipity Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2017-5609)
|
CVE-2017-5609
CWE-138
|
CWE-138
|
High
|
Serendipity Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2017-1000129)
|
CVE-2017-1000129
CWE-138
|
CWE-138
|
High
|
Serendipity Other Vulnerability (CVE-2005-1134)
|
CVE-2005-1134
|
|
High
|
Serendipity Other Vulnerability (CVE-2005-1450)
|
CVE-2005-1450
|
|
High
|
Serendipity Other Vulnerability (CVE-2005-1451)
|
CVE-2005-1451
|
|
High
|
Serendipity Other Vulnerability (CVE-2006-2495)
|
CVE-2006-2495
|
|
High
|
Serendipity Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1916)
|
CVE-2010-1916
CWE-264
|
CWE-264
|
High
|
Serendipity Server-Side Request Forgery (SSRF) Vulnerability (CVE-2016-9752)
|
CVE-2016-9752
CWE-918
|
CWE-918
|
High
|
Skipper Incorrect Authorization Vulnerability (CVE-2022-34296)
|
CVE-2022-34296
CWE-863
|
CWE-863
|
High
|
SQL Injection in Symphony
|
CVE-2013-2559
CWE-89
|
CWE-89
|
High
|
Sqlite Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2015-3717)
|
CVE-2015-3717
CWE-120
|
CWE-120
|
High
|
Sqlite CVE-2019-19244 Vulnerability (CVE-2019-19244)
|
CVE-2019-19244
|
|
High
|
Sqlite CVE-2019-19603 Vulnerability (CVE-2019-19603)
|
CVE-2019-19603
|
|
High
|
Sqlite CVE-2021-36690 Vulnerability (CVE-2021-36690)
|
CVE-2021-36690
|
|
High
|
Sqlite Improper Initialization Vulnerability (CVE-2020-11655)
|
CVE-2020-11655
CWE-665
|
CWE-665
|
High
|
Sqlite Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-6592)
|
CVE-2008-6592
CWE-22
|
CWE-22
|
High
|
Sqlite Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-6593)
|
CVE-2008-6593
CWE-138
|
CWE-138
|
High
|
Sqlite Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-20505)
|
CVE-2018-20505
CWE-138
|
CWE-138
|
High
|
Sqlite Improper Resource Shutdown or Release Vulnerability (CVE-2015-3415)
|
CVE-2015-3415
CWE-404
|
CWE-404
|
High
|
Sqlite Improper Validation of Array Index Vulnerability (CVE-2022-35737)
|
CVE-2022-35737
CWE-129
|
CWE-129
|
High
|
Sqlite Integer Overflow or Wraparound Vulnerability (CVE-2015-3416)
|
CVE-2015-3416
CWE-190
|
CWE-190
|
High
|
Sqlite Integer Overflow or Wraparound Vulnerability (CVE-2018-20346)
|
CVE-2018-20346
CWE-190
|
CWE-190
|
High
|
Sqlite Integer Overflow or Wraparound Vulnerability (CVE-2018-20506)
|
CVE-2018-20506
CWE-190
|
CWE-190
|
High
|
Sqlite NULL Pointer Dereference Vulnerability (CVE-2017-15286)
|
CVE-2017-15286
CWE-476
|
CWE-476
|
High
|
Sqlite NULL Pointer Dereference Vulnerability (CVE-2018-8740)
|
CVE-2018-8740
CWE-476
|
CWE-476
|
High
|
Sqlite NULL Pointer Dereference Vulnerability (CVE-2019-9937)
|
CVE-2019-9937
CWE-476
|
CWE-476
|
High
|
Sqlite NULL Pointer Dereference Vulnerability (CVE-2019-19880)
|
CVE-2019-19880
CWE-476
|
CWE-476
|
High
|
Sqlite NULL Pointer Dereference Vulnerability (CVE-2019-19923)
|
CVE-2019-19923
CWE-476
|
CWE-476
|
High
|
Sqlite NULL Pointer Dereference Vulnerability (CVE-2019-19926)
|
CVE-2019-19926
CWE-476
|
CWE-476
|
High
|
Sqlite NULL Pointer Dereference Vulnerability (CVE-2020-9327)
|
CVE-2020-9327
CWE-476
|
CWE-476
|
High
|
Sqlite NULL Pointer Dereference Vulnerability (CVE-2020-35525)
|
CVE-2020-35525
CWE-476
|
CWE-476
|
High
|
Sqlite Other Vulnerability (CVE-2019-19959)
|
CVE-2019-19959
|
|
High
|
Sqlite Other Vulnerability (CVE-2019-20218)
|
CVE-2019-20218
|
|
High
|
Sqlite Out-of-bounds Read Vulnerability (CVE-2019-9936)
|
CVE-2019-9936
CWE-125
|
CWE-125
|
High
|
Sqlite Out-of-bounds Read Vulnerability (CVE-2021-31239)
|
CVE-2021-31239
CWE-125
|
CWE-125
|
High
|
Sqlite Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-19925)
|
CVE-2019-19925
CWE-434
|
CWE-434
|
High
|
Sqlite Use After Free Vulnerability (CVE-2019-5018)
|
CVE-2019-5018
CWE-416
|
CWE-416
|
High
|
Sqlite Use After Free Vulnerability (CVE-2020-13630)
|
CVE-2020-13630
CWE-416
|
CWE-416
|
High
|
Sqlite Use After Free Vulnerability (CVE-2020-13871)
|
CVE-2020-13871
CWE-416
|
CWE-416
|
High
|
Sqlite Use of Uninitialized Resource Vulnerability (CVE-2015-3414)
|
CVE-2015-3414
CWE-908
|
CWE-908
|
High
|
Squid CVE-2018-1000024 Vulnerability (CVE-2018-1000024)
|
CVE-2018-1000024
|
|
High
|
Squid Exposure of Resource to Wrong Sphere Vulnerability (CVE-2020-8449)
|
CVE-2020-8449
CWE-668
|
CWE-668
|
High
|
Squid Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-10002)
|
CVE-2016-10002
CWE-200
|
CWE-200
|
High
|
Squid Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-10003)
|
CVE-2016-10003
CWE-200
|
CWE-200
|
High
|
Squid Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2019-12528)
|
CVE-2019-12528
CWE-200
|
CWE-200
|
High
|
Squid Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2019-18679)
|
CVE-2019-18679
CWE-200
|
CWE-200
|
High
|
Squid Improper Certificate Validation Vulnerability (CVE-2021-41611)
|
CVE-2021-41611
CWE-295
|
CWE-295
|
High
|
Squid Improper Input Validation Vulnerability (CVE-2013-1839)
|
CVE-2013-1839
CWE-20
|
CWE-20
|
High
|
Squid Improper Input Validation Vulnerability (CVE-2016-2569)
|
CVE-2016-2569
CWE-20
|
CWE-20
|
High
|
Squid Improper Input Validation Vulnerability (CVE-2016-2570)
|
CVE-2016-2570
CWE-20
|
CWE-20
|
High
|
Squid Improper Input Validation Vulnerability (CVE-2016-2571)
|
CVE-2016-2571
CWE-20
|
CWE-20
|
High
|
Squid Improper Input Validation Vulnerability (CVE-2016-2572)
|
CVE-2016-2572
CWE-20
|
CWE-20
|
High
|
Squid Improper Input Validation Vulnerability (CVE-2016-4555)
|
CVE-2016-4555
CWE-20
|
CWE-20
|
High
|
Squid Improper Input Validation Vulnerability (CVE-2019-12520)
|
CVE-2019-12520
CWE-20
|
CWE-20
|
High
|
Squid Improper Input Validation Vulnerability (CVE-2020-8517)
|
CVE-2020-8517
CWE-20
|
CWE-20
|
High
|
Squid Improper Input Validation Vulnerability (CVE-2020-24606)
|
CVE-2020-24606
CWE-20
|
CWE-20
|
High
|
Squid Improper Input Validation Vulnerability (CVE-2020-25097)
|
CVE-2020-25097
CWE-20
|
CWE-20
|
High
|
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2005-0211)
|
CVE-2005-0211
CWE-119
|
CWE-119
|
High
|
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2013-4115)
|
CVE-2013-4115
CWE-119
|
CWE-119
|
High
|
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-3947)
|
CVE-2016-3947
CWE-119
|
CWE-119
|
High
|
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-3948)
|
CVE-2016-3948
CWE-119
|
CWE-119
|
High
|
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-4051)
|
CVE-2016-4051
CWE-119
|
CWE-119
|
High
|
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-4052)
|
CVE-2016-4052
CWE-119
|
CWE-119
|
High
|
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2016-4054)
|
CVE-2016-4054
CWE-119
|
CWE-119
|
High
|
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2019-12854)
|
CVE-2019-12854
CWE-119
|
CWE-119
|
High
|
Squid Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2020-8450)
|
CVE-2020-8450
CWE-119
|
CWE-119
|
High
|
Squid Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2020-15049)
|
CVE-2020-15049
CWE-444
|
CWE-444
|
High
|
Squid Insufficient Verification of Data Authenticity Vulnerability (CVE-2016-4553)
|
CVE-2016-4553
CWE-345
|
CWE-345
|
High
|
Squid Insufficient Verification of Data Authenticity Vulnerability (CVE-2016-4554)
|
CVE-2016-4554
CWE-345
|
CWE-345
|
High
|
Squid NULL Pointer Dereference Vulnerability (CVE-2018-1000027)
|
CVE-2018-1000027
CWE-476
|
CWE-476
|
High
|
Squid NULL Pointer Dereference Vulnerability (CVE-2020-14058)
|
CVE-2020-14058
CWE-476
|
CWE-476
|
High
|
Squid Other Vulnerability (CVE-2016-4556)
|
CVE-2016-4556
|
|
High
|
Squid Out-of-bounds Read Vulnerability (CVE-2022-41318)
|
CVE-2022-41318
CWE-125
|
CWE-125
|
High
|
Squid Out-of-bounds Write Vulnerability (CVE-2019-12527)
|
CVE-2019-12527
CWE-787
|
CWE-787
|
High
|
Squid Out-of-bounds Write Vulnerability (CVE-2019-18676)
|
CVE-2019-18676
CWE-787
|
CWE-787
|
High
|
Squid Uncontrolled Resource Consumption Vulnerability (CVE-2021-28651)
|
CVE-2021-28651
CWE-400
|
CWE-400
|
High
|
Struts2/XWork remote command execution (S2-014)
|
CVE-2013-1966
CVE-2013-2115
CWE-94
|
CWE-94
|
High
|
SugarCRM CVE-2023-35809 Vulnerability (CVE-2023-35809)
|
CVE-2023-35809
|
|
High
|
SugarCRM Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-17299)
|
CVE-2019-17299
CWE-94
|
CWE-94
|
High
|
SugarCRM Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-17300)
|
CVE-2019-17300
CWE-94
|
CWE-94
|
High
|
SugarCRM Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-17301)
|
CVE-2019-17301
CWE-94
|
CWE-94
|
High
|
SugarCRM Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-17302)
|
CVE-2019-17302
CWE-94
|
CWE-94
|
High
|
SugarCRM Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-17303)
|
CVE-2019-17303
CWE-94
|
CWE-94
|
High
|
SugarCRM Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-17304)
|
CVE-2019-17304
CWE-94
|
CWE-94
|
High
|
SugarCRM Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-17305)
|
CVE-2019-17305
CWE-94
|
CWE-94
|
High
|
SugarCRM Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-17306)
|
CVE-2019-17306
CWE-94
|
CWE-94
|
High
|
SugarCRM Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-17307)
|
CVE-2019-17307
CWE-94
|
CWE-94
|
High
|
SugarCRM Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-17308)
|
CVE-2019-17308
CWE-94
|
CWE-94
|
High
|
SugarCRM Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-17309)
|
CVE-2019-17309
CWE-94
|
CWE-94
|
High
|
SugarCRM Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-17310)
|
CVE-2019-17310
CWE-94
|
CWE-94
|
High
|
SugarCRM Improper Input Validation Vulnerability (CVE-2017-14509)
|
CVE-2017-14509
CWE-20
|
CWE-20
|
High
|
SugarCRM Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-17311)
|
CVE-2019-17311
CWE-22
|
CWE-22
|
High
|
SugarCRM Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-17312)
|
CVE-2019-17312
CWE-22
|
CWE-22
|
High
|
SugarCRM Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-17313)
|
CVE-2019-17313
CWE-22
|
CWE-22
|
High
|
SugarCRM Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-17314)
|
CVE-2019-17314
CWE-22
|
CWE-22
|
High
|
SugarCRM Improperly Controlled Modification of Dynamically-Determined Object Attributes Vulnerability (CVE-2019-17315)
|
CVE-2019-17315
CWE-915
|
CWE-915
|
High
|
SugarCRM Improperly Controlled Modification of Dynamically-Determined Object Attributes Vulnerability (CVE-2019-17316)
|
CVE-2019-17316
CWE-915
|
CWE-915
|
High
|
SugarCRM Improperly Controlled Modification of Dynamically-Determined Object Attributes Vulnerability (CVE-2019-17317)
|
CVE-2019-17317
CWE-915
|
CWE-915
|
High
|
SugarCRM Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2023-35810)
|
CVE-2023-35810
CWE-138
|
CWE-138
|
High
|
SugarCRM Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2009-2978)
|
CVE-2009-2978
CWE-138
|
CWE-138
|
High
|
SugarCRM Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2011-4833)
|
CVE-2011-4833
CWE-138
|
CWE-138
|
High
|
SugarCRM Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2017-14508)
|
CVE-2017-14508
CWE-138
|
CWE-138
|
High
|
SugarCRM Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-17292)
|
CVE-2019-17292
CWE-138
|
CWE-138
|
High
|
SugarCRM Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-17293)
|
CVE-2019-17293
CWE-138
|
CWE-138
|
High
|
SugarCRM Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-17294)
|
CVE-2019-17294
CWE-138
|
CWE-138
|
High
|
SugarCRM Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-17295)
|
CVE-2019-17295
CWE-138
|
CWE-138
|
High
|
SugarCRM Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-17296)
|
CVE-2019-17296
CWE-138
|
CWE-138
|
High
|
SugarCRM Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-17297)
|
CVE-2019-17297
CWE-138
|
CWE-138
|
High
|
SugarCRM Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-17298)
|
CVE-2019-17298
CWE-138
|
CWE-138
|
High
|
SugarCRM Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-17318)
|
CVE-2019-17318
CWE-138
|
CWE-138
|
High
|
SugarCRM Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-17319)
|
CVE-2019-17319
CWE-138
|
CWE-138
|
High
|
SugarCRM Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2023-35811)
|
CVE-2023-35811
CWE-138
|
CWE-138
|
High
|
SugarCRM Incomplete List of Disallowed Inputs Vulnerability (CVE-2015-5946)
|
CVE-2015-5946
CWE-184
|
CWE-184
|
High
|
SugarCRM Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2023-35808)
|
CVE-2023-35808
CWE-434
|
CWE-434
|
High
|
TCExam Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-20114)
|
CVE-2021-20114
CWE-200
|
CWE-200
|
High
|
TCExam Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2020-5745)
|
CVE-2020-5745
CWE-707
|
CWE-707
|
High
|
Telerik Web UI Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2014-2217)
|
CVE-2014-2217
CWE-22
|
CWE-22
|
High
|
Three.js Uncontrolled Resource Consumption Vulnerability (CVE-2020-28496)
|
CVE-2020-28496
CWE-400
|
CWE-400
|
High
|
timthumb.php remote code execution
|
CVE-2011-4106
CWE-20
|
CWE-20
|
High
|
TinyMCE ajax_create_folder remote code execution vulnerability
|
CWE-94
|
CWE-94
|
High
|
Tornado Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2020-28476)
|
CVE-2020-28476
CWE-444
|
CWE-444
|
High
|
Trac CVE-2009-4405 Vulnerability (CVE-2009-4405)
|
CVE-2009-4405
|
|
High
|
Trac Incorrect Default Permissions Vulnerability (CVE-2010-5108)
|
CVE-2010-5108
CWE-276
|
CWE-276
|
High
|
Twisted Web HTTP Server Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Vulnerability (CVE-2022-21716)
|
CVE-2022-21716
CWE-120
|
CWE-120
|
High
|
Twisted Web HTTP Server Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2022-21712)
|
CVE-2022-21712
CWE-200
|
CWE-200
|
High
|
Twisted Web HTTP Server Improper Certificate Validation Vulnerability (CVE-2014-7143)
|
CVE-2014-7143
CWE-295
|
CWE-295
|
High
|
Twisted Web HTTP Server Improper Certificate Validation Vulnerability (CVE-2019-12855)
|
CVE-2019-12855
CWE-295
|
CWE-295
|
High
|
Twisted Web HTTP Server Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2022-24801)
|
CVE-2022-24801
CWE-444
|
CWE-444
|
High
|
TYPO3 7PK - Security Features Vulnerability (CVE-2016-5091)
|
CVE-2016-5091
|
|
High
|
TYPO3 Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2022-36104)
|
CVE-2022-36104
CWE-770
|
CWE-770
|
High
|
TYPO3 Cleartext Storage of Sensitive Information Vulnerability (CVE-2020-26228)
|
CVE-2020-26228
CWE-312
|
CWE-312
|
High
|
TYPO3 Cleartext Storage of Sensitive Information Vulnerability (CVE-2021-21339)
|
CVE-2021-21339
CWE-312
|
CWE-312
|
High
|
TYPO3 Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-11069)
|
CVE-2020-11069
CWE-352
|
CWE-352
|
High
|
TYPO3 Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2021-41113)
|
CVE-2021-41113
CWE-352
|
CWE-352
|
High
|
TYPO3 Deserialization of Untrusted Data Vulnerability (CVE-2019-19849)
|
CVE-2019-19849
CWE-502
|
CWE-502
|
High
|
TYPO3 Deserialization of Untrusted Data Vulnerability (CVE-2020-11067)
|
CVE-2020-11067
CWE-502
|
CWE-502
|
High
|
TYPO3 Deserialization of Untrusted Data Vulnerability (CVE-2020-15098)
|
CVE-2020-15098
CWE-502
|
CWE-502
|
High
|
TYPO3 Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2005-4875)
|
CVE-2005-4875
CWE-200
|
CWE-200
|
High
|
TYPO3 Files or Directories Accessible to External Parties Vulnerability (CVE-2021-21355)
|
CVE-2021-21355
CWE-552
|
CWE-552
|
High
|
TYPO3 Improper Authentication Vulnerability (CVE-2009-0256)
|
CVE-2009-0256
CWE-287
|
CWE-287
|
High
|
TYPO3 Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2009-3631)
|
CVE-2009-3631
CWE-94
|
CWE-94
|
High
|
TYPO3 Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2022-23503)
|
CVE-2022-23503
CWE-94
|
CWE-94
|
High
|
TYPO3 Improper Input Validation Vulnerability (CVE-2014-9509)
|
CVE-2014-9509
CWE-20
|
CWE-20
|
High
|
TYPO3 Improper Input Validation Vulnerability (CVE-2019-11832)
|
CVE-2019-11832
CWE-20
|
CWE-20
|
High
|
TYPO3 Improper Input Validation Vulnerability (CVE-2020-15099)
|
CVE-2020-15099
CWE-20
|
CWE-20
|
High
|
TYPO3 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-19848)
|
CVE-2019-19848
CWE-22
|
CWE-22
|
High
|
TYPO3 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2010-3668)
|
CVE-2010-3668
CWE-138
|
CWE-138
|
High
|
TYPO3 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2009-4855)
|
CVE-2009-4855
CWE-138
|
CWE-138
|
High
|
TYPO3 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2010-3662)
|
CVE-2010-3662
CWE-138
|
CWE-138
|
High
|
TYPO3 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-1842)
|
CVE-2013-1842
CWE-138
|
CWE-138
|
High
|
TYPO3 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-19850)
|
CVE-2019-19850
CWE-138
|
CWE-138
|
High
|
TYPO3 Insufficient Session Expiration Vulnerability (CVE-2022-31050)
|
CVE-2022-31050
CWE-613
|
CWE-613
|
High
|
TYPO3 Other Vulnerability (CVE-2006-6690)
|
CVE-2006-6690
|
|
High
|
TYPO3 Other Vulnerability (CVE-2007-1081)
|
CVE-2007-1081
|
|
High
|
TYPO3 Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-3714)
|
CVE-2010-3714
CWE-264
|
CWE-264
|
High
|
TYPO3 Uncontrolled Recursion Vulnerability (CVE-2021-21359)
|
CVE-2021-21359
CWE-674
|
CWE-674
|
High
|
TYPO3 Uncontrolled Recursion Vulnerability (CVE-2022-23500)
|
CVE-2022-23500
CWE-674
|
CWE-674
|
High
|
TYPO3 Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2010-3663)
|
CVE-2010-3663
CWE-434
|
CWE-434
|
High
|
TYPO3 Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2017-14251)
|
CVE-2017-14251
CWE-434
|
CWE-434
|
High
|
TYPO3 Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2021-21357)
|
CVE-2021-21357
CWE-434
|
CWE-434
|
High
|
Umbraco CMS remote code execution
|
CWE-94
|
CWE-94
|
High
|
Underscore.js Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2021-23358)
|
CVE-2021-23358
CWE-94
|
CWE-94
|
High
|
Undertow CVE-2022-1259 Vulnerability (CVE-2022-1259)
|
CVE-2022-1259
|
|
High
|
Undertow Exposure of Resource to Wrong Sphere Vulnerability (CVE-2021-3859)
|
CVE-2021-3859
CWE-668
|
CWE-668
|
High
|
Undertow Improper Input Validation Vulnerability (CVE-2020-1757)
|
CVE-2020-1757
CWE-20
|
CWE-20
|
High
|
Undertow Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2020-10705)
|
CVE-2020-10705
CWE-119
|
CWE-119
|
High
|
Undertow Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2017-12165)
|
CVE-2017-12165
CWE-444
|
CWE-444
|
High
|
Undertow Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2017-2670)
|
CVE-2017-2670
CWE-835
|
CWE-835
|
High
|
Undertow Missing Authorization Vulnerability (CVE-2019-10184)
|
CVE-2019-10184
CWE-862
|
CWE-862
|
High
|
Undertow Unchecked Return Value Vulnerability (CVE-2022-1319)
|
CVE-2022-1319
CWE-252
|
CWE-252
|
High
|
Undertow Uncontrolled Resource Consumption Vulnerability (CVE-2019-14888)
|
CVE-2019-14888
CWE-400
|
CWE-400
|
High
|
Undertow Uncontrolled Resource Consumption Vulnerability (CVE-2019-19343)
|
CVE-2019-19343
CWE-400
|
CWE-400
|
High
|
Undertow Uncontrolled Resource Consumption Vulnerability (CVE-2021-3629)
|
CVE-2021-3629
CWE-400
|
CWE-400
|
High
|
Undertow Uncontrolled Resource Consumption Vulnerability (CVE-2021-3690)
|
CVE-2021-3690
CWE-400
|
CWE-400
|
High
|
Undertow Uncontrolled Resource Consumption Vulnerability (CVE-2022-2053)
|
CVE-2022-2053
CWE-400
|
CWE-400
|
High
|
Uploadify arbitrary file upload
|
CWE-434
|
CWE-434
|
High
|
Vanilla Forums Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-1000432)
|
CVE-2017-1000432
CWE-352
|
CWE-352
|
High
|
Vanilla Forums CVE-2013-3528 Vulnerability (CVE-2013-3528)
|
CVE-2013-3528
|
|
High
|
Vanilla Forums Deserialization of Untrusted Data Vulnerability (CVE-2018-19499)
|
CVE-2018-19499
CWE-502
|
CWE-502
|
High
|
Vanilla Forums Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2011-3613)
|
CVE-2011-3613
CWE-200
|
CWE-200
|
High
|
Vanilla Forums Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-10073)
|
CVE-2016-10073
CWE-200
|
CWE-200
|
High
|
Vanilla Forums Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2013-3527)
|
CVE-2013-3527
CWE-138
|
CWE-138
|
High
|
Varnish Cache Integer Overflow or Wraparound Vulnerability (CVE-2017-12425)
|
CVE-2017-12425
CWE-190
|
CWE-190
|
High
|
Varnish Cache Other Vulnerability (CVE-2013-4090)
|
CVE-2013-4090
|
|
High
|
Varnish Cache Other Vulnerability (CVE-2015-8852)
|
CVE-2015-8852
|
|
High
|
Varnish Cache Reachable Assertion Vulnerability (CVE-2019-15892)
|
CVE-2019-15892
CWE-617
|
CWE-617
|
High
|
vBSEO 3.6.0 PHP code injection
|
CVE-2012-5223
CWE-94
|
CWE-94
|
High
|
vBulletin 4 (up to 4.1.2) search.php SQL injection
|
CWE-89
|
CWE-89
|
High
|
VirtueMart access control bypass
|
CWE-287
|
CWE-287
|
High
|
VMware directory traversal and privilege escalation vulnerabilities
|
CVE-2009-2267
CVE-2009-3733
CWE-22
|
CWE-22
|
High
|
Vulnerable package dependencies [high]
|
CWE-1104
|
CWE-1104
|
High
|
W3 Total Cache CVE-2019-6715 Vulnerability (CVE-2019-6715)
|
CVE-2019-6715
|
|
High
|
WebERP Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-19434)
|
CVE-2018-19434
CWE-138
|
CWE-138
|
High
|
WebERP Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-19435)
|
CVE-2018-19435
CWE-138
|
CWE-138
|
High
|
WebERP Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-19436)
|
CVE-2018-19436
CWE-138
|
CWE-138
|
High
|
WebERP Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2019-7755)
|
CVE-2019-7755
CWE-138
|
CWE-138
|
High
|
WeBid Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1000882)
|
CVE-2018-1000882
CWE-22
|
CWE-22
|
High
|
WeBid Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-7116)
|
CVE-2008-7116
CWE-138
|
CWE-138
|
High
|
WeBid Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-7119)
|
CVE-2008-7119
CWE-138
|
CWE-138
|
High
|
WeBid Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2018-1000867)
|
CVE-2018-1000867
CWE-138
|
CWE-138
|
High
|
WeBid Other Vulnerability (CVE-2014-5114)
|
CVE-2014-5114
|
|
High
|
WebLogic Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-17359)
|
CVE-2019-17359
CWE-770
|
CWE-770
|
High
|
WebLogic Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2020-7226)
|
CVE-2020-7226
CWE-770
|
CWE-770
|
High
|
WebLogic Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2020-28491)
|
CVE-2020-28491
CWE-770
|
CWE-770
|
High
|
WebLogic CVE-2008-2579 Vulnerability (CVE-2008-2579)
|
CVE-2008-2579
|
|
High
|
WebLogic CVE-2016-0572 Vulnerability (CVE-2016-0572)
|
CVE-2016-0572
|
|
High
|
WebLogic CVE-2016-0573 Vulnerability (CVE-2016-0573)
|
CVE-2016-0573
|
|
High
|
WebLogic CVE-2016-0574 Vulnerability (CVE-2016-0574)
|
CVE-2016-0574
|
|
High
|
WebLogic CVE-2016-0577 Vulnerability (CVE-2016-0577)
|
CVE-2016-0577
|
|
High
|
WebLogic CVE-2016-3505 Vulnerability (CVE-2016-3505)
|
CVE-2016-3505
|
|
High
|
WebLogic CVE-2017-3506 Vulnerability (CVE-2017-3506)
|
CVE-2017-3506
|
|
High
|
WebLogic CVE-2017-3531 Vulnerability (CVE-2017-3531)
|
CVE-2017-3531
|
|
High
|
WebLogic CVE-2017-10147 Vulnerability (CVE-2017-10147)
|
CVE-2017-10147
|
|
High
|
WebLogic CVE-2017-10271 Vulnerability (CVE-2017-10271)
|
CVE-2017-10271
|
|
High
|
WebLogic CVE-2018-2935 Vulnerability (CVE-2018-2935)
|
CVE-2018-2935
|
|
High
|
WebLogic CVE-2018-3213 Vulnerability (CVE-2018-3213)
|
CVE-2018-3213
|
|
High
|
WebLogic CVE-2018-3246 Vulnerability (CVE-2018-3246)
|
CVE-2018-3246
|
|
High
|
WebLogic CVE-2018-15756 Vulnerability (CVE-2018-15756)
|
CVE-2018-15756
|
|
High
|
WebLogic CVE-2019-2647 Vulnerability (CVE-2019-2647)
|
CVE-2019-2647
|
|
High
|
WebLogic CVE-2019-2648 Vulnerability (CVE-2019-2648)
|
CVE-2019-2648
|
|
High
|
WebLogic CVE-2019-2649 Vulnerability (CVE-2019-2649)
|
CVE-2019-2649
|
|
High
|
WebLogic CVE-2019-2650 Vulnerability (CVE-2019-2650)
|
CVE-2019-2650
|
|
High
|
WebLogic CVE-2019-2890 Vulnerability (CVE-2019-2890)
|
CVE-2019-2890
|
|
High
|
WebLogic CVE-2019-2891 Vulnerability (CVE-2019-2891)
|
CVE-2019-2891
|
|
High
|
WebLogic CVE-2020-2549 Vulnerability (CVE-2020-2549)
|
CVE-2020-2549
|
|
High
|
WebLogic CVE-2020-2798 Vulnerability (CVE-2020-2798)
|
CVE-2020-2798
|
|
High
|
WebLogic CVE-2020-2828 Vulnerability (CVE-2020-2828)
|
CVE-2020-2828
|
|
High
|
WebLogic CVE-2020-2867 Vulnerability (CVE-2020-2867)
|
CVE-2020-2867
|
|
High
|
WebLogic CVE-2020-2963 Vulnerability (CVE-2020-2963)
|
CVE-2020-2963
|
|
High
|
WebLogic CVE-2020-2967 Vulnerability (CVE-2020-2967)
|
CVE-2020-2967
|
|
High
|
WebLogic CVE-2020-14588 Vulnerability (CVE-2020-14588)
|
CVE-2020-14588
|
|
High
|
WebLogic CVE-2020-14589 Vulnerability (CVE-2020-14589)
|
CVE-2020-14589
|
|
High
|
WebLogic CVE-2020-14639 Vulnerability (CVE-2020-14639)
|
CVE-2020-14639
|
|
High
|
WebLogic CVE-2020-14820 Vulnerability (CVE-2020-14820)
|
CVE-2020-14820
|
|
High
|
WebLogic CVE-2020-14883 Vulnerability (CVE-2020-14883)
|
CVE-2020-14883
|
|
High
|
WebLogic CVE-2021-2018 Vulnerability (CVE-2021-2018)
|
CVE-2021-2018
|
|
High
|
WebLogic CVE-2021-2109 Vulnerability (CVE-2021-2109)
|
CVE-2021-2109
|
|
High
|
WebLogic CVE-2021-2157 Vulnerability (CVE-2021-2157)
|
CVE-2021-2157
|
|
High
|
WebLogic CVE-2021-2376 Vulnerability (CVE-2021-2376)
|
CVE-2021-2376
|
|
High
|
WebLogic CVE-2021-2378 Vulnerability (CVE-2021-2378)
|
CVE-2021-2378
|
|
High
|
WebLogic CVE-2021-35620 Vulnerability (CVE-2021-35620)
|
CVE-2021-35620
|
|
High
|
WebLogic CVE-2022-21292 Vulnerability (CVE-2022-21292)
|
CVE-2022-21292
|
|
High
|
WebLogic CVE-2022-21441 Vulnerability (CVE-2022-21441)
|
CVE-2022-21441
|
|
High
|
WebLogic CVE-2023-21837 Vulnerability (CVE-2023-21837)
|
CVE-2023-21837
|
|
High
|
WebLogic CVE-2023-21838 Vulnerability (CVE-2023-21838)
|
CVE-2023-21838
|
|
High
|
WebLogic CVE-2023-21839 Vulnerability (CVE-2023-21839)
|
CVE-2023-21839
|
|
High
|
WebLogic CVE-2023-21841 Vulnerability (CVE-2023-21841)
|
CVE-2023-21841
|
|
High
|
WebLogic CVE-2023-21842 Vulnerability (CVE-2023-21842)
|
CVE-2023-21842
|
|
High
|
WebLogic CVE-2023-21931 Vulnerability (CVE-2023-21931)
|
CVE-2023-21931
|
|
High
|
WebLogic CVE-2023-21964 Vulnerability (CVE-2023-21964)
|
CVE-2023-21964
|
|
High
|
WebLogic CVE-2023-21979 Vulnerability (CVE-2023-21979)
|
CVE-2023-21979
|
|
High
|
WebLogic CVE-2023-21996 Vulnerability (CVE-2023-21996)
|
CVE-2023-21996
|
|
High
|
WebLogic Deserialization of Untrusted Data Vulnerability (CVE-2019-10086)
|
CVE-2019-10086
CWE-502
|
CWE-502
|
High
|
WebLogic Deserialization of Untrusted Data Vulnerability (CVE-2020-10968)
|
CVE-2020-10968
CWE-502
|
CWE-502
|
High
|
WebLogic Deserialization of Untrusted Data Vulnerability (CVE-2020-10969)
|
CVE-2020-10969
CWE-502
|
CWE-502
|
High
|
WebLogic Deserialization of Untrusted Data Vulnerability (CVE-2020-11111)
|
CVE-2020-11111
CWE-502
|
CWE-502
|
High
|
WebLogic Deserialization of Untrusted Data Vulnerability (CVE-2020-11112)
|
CVE-2020-11112
CWE-502
|
CWE-502
|
High
|
WebLogic Deserialization of Untrusted Data Vulnerability (CVE-2020-11113)
|
CVE-2020-11113
CWE-502
|
CWE-502
|
High
|
WebLogic Deserialization of Untrusted Data Vulnerability (CVE-2020-11619)
|
CVE-2020-11619
CWE-502
|
CWE-502
|
High
|
WebLogic Deserialization of Untrusted Data Vulnerability (CVE-2020-11620)
|
CVE-2020-11620
CWE-502
|
CWE-502
|
High
|
WebLogic Deserialization of Untrusted Data Vulnerability (CVE-2021-4104)
|
CVE-2021-4104
CWE-502
|
CWE-502
|
High
|
WebLogic Deserialization of Untrusted Data Vulnerability (CVE-2022-23302)
|
CVE-2022-23302
CWE-502
|
CWE-502
|
High
|
WebLogic Deserialization of Untrusted Data Vulnerability (CVE-2022-23307)
|
CVE-2022-23307
CWE-502
|
CWE-502
|
High
|
WebLogic Download of Code Without Integrity Check Vulnerability (CVE-2020-5398)
|
CVE-2020-5398
CWE-494
|
CWE-494
|
High
|
WebLogic Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-40690)
|
CVE-2021-40690
CWE-200
|
CWE-200
|
High
|
WebLogic Improper Certificate Validation Vulnerability (CVE-2021-3450)
|
CVE-2021-3450
CWE-295
|
CWE-295
|
High
|
WebLogic Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2022-21371)
|
CVE-2022-21371
CWE-22
|
CWE-22
|
High
|
WebLogic Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') Vulnerability (CVE-2020-5258)
|
CVE-2020-5258
CWE-1321
|
CWE-1321
|
High
|
WebLogic Improper Neutralization of Special Elements used in a Command ('Command Injection') Vulnerability (CVE-2015-4852)
|
CVE-2015-4852
CWE-138
|
CWE-138
|
High
|
WebLogic Inclusion of Functionality from Untrusted Control Sphere Vulnerability (CVE-2018-11040)
|
CVE-2018-11040
CWE-829
|
CWE-829
|
High
|
WebLogic Incorrect Authorization Vulnerability (CVE-2018-1258)
|
CVE-2018-1258
CWE-863
|
CWE-863
|
High
|
WebLogic Other Vulnerability (CVE-2020-10672)
|
CVE-2020-10672
|
|
High
|
WebLogic Other Vulnerability (CVE-2020-10673)
|
CVE-2020-10673
|
|
High
|
WebLogic Out-of-bounds Write Vulnerability (CVE-2020-36518)
|
CVE-2020-36518
CWE-787
|
CWE-787
|
High
|
WebLogic Uncontrolled Resource Consumption Vulnerability (CVE-2022-24839)
|
CVE-2022-24839
CWE-400
|
CWE-400
|
High
|
WebLogic Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2018-1000180)
|
CVE-2018-1000180
CWE-327
|
CWE-327
|
High
|
WebLogic Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2021-2351)
|
CVE-2021-2351
CWE-327
|
CWE-327
|
High
|
Werkzeug WSGI Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-25577)
|
CVE-2023-25577
CWE-770
|
CWE-770
|
High
|
Werkzeug WSGI Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2019-14322)
|
CVE-2019-14322
CWE-22
|
CWE-22
|
High
|
Werkzeug WSGI Insufficient Entropy Vulnerability (CVE-2019-14806)
|
CVE-2019-14806
CWE-331
|
CWE-331
|
High
|
WildFly Application Server Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-0793)
|
CVE-2016-0793
CWE-200
|
CWE-200
|
High
|
WildFly Application Server Uncontrolled Resource Consumption Vulnerability (CVE-2016-9589)
|
CVE-2016-9589
CWE-400
|
CWE-400
|
High
|
WooFramework shortcode exploit
|
CWE-95
|
CWE-95
|
High
|
WordPress Access of Resource Using Incompatible Type ('Type Confusion') Vulnerability (CVE-2019-17675)
|
CVE-2019-17675
CWE-843
|
CWE-843
|
High
|
WordPress caching plugins PHP code execution
|
CVE-2013-2010
CWE-95
|
CWE-95
|
High
|
WordPress Credentials Management Errors Vulnerability (CVE-2009-2762)
|
CVE-2009-2762
|
|
High
|
WordPress Credentials Management Errors Vulnerability (CVE-2016-5838)
|
CVE-2016-5838
|
|
High
|
WordPress Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2016-6635)
|
CVE-2016-6635
CWE-352
|
CWE-352
|
High
|
WordPress Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-5489)
|
CVE-2017-5489
CWE-352
|
CWE-352
|
High
|
WordPress Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-5492)
|
CVE-2017-5492
CWE-352
|
CWE-352
|
High
|
WordPress Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-9064)
|
CVE-2017-9064
CWE-352
|
CWE-352
|
High
|
WordPress Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-9787)
|
CVE-2019-9787
CWE-352
|
CWE-352
|
High
|
WordPress CVE-2011-4899 Vulnerability (CVE-2011-4899)
|
CVE-2011-4899
|
|
High
|
WordPress CVE-2014-5203 Vulnerability (CVE-2014-5203)
|
CVE-2014-5203
|
|
High
|
WordPress CVE-2016-5832 Vulnerability (CVE-2016-5832)
|
CVE-2016-5832
|
|
High
|
WordPress CVE-2016-5836 Vulnerability (CVE-2016-5836)
|
CVE-2016-5836
|
|
High
|
WordPress CVE-2016-5837 Vulnerability (CVE-2016-5837)
|
CVE-2016-5837
|
|
High
|
WordPress CVE-2016-5839 Vulnerability (CVE-2016-5839)
|
CVE-2016-5839
|
|
High
|
WordPress CVE-2017-1001000 Vulnerability (CVE-2017-1001000)
|
CVE-2017-1001000
|
|
High
|
WordPress CVE-2019-17673 Vulnerability (CVE-2019-17673)
|
CVE-2019-17673
|
|
High
|
WordPress CVE-2020-28033 Vulnerability (CVE-2020-28033)
|
CVE-2020-28033
|
|
High
|
WordPress Deserialization of Untrusted Data Vulnerability (CVE-2018-19296)
|
CVE-2018-19296
CWE-502
|
CWE-502
|
High
|
WordPress Deserialization of Untrusted Data Vulnerability (CVE-2022-21663)
|
CVE-2022-21663
CWE-502
|
CWE-502
|
High
|
WordPress Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-5835)
|
CVE-2016-5835
CWE-200
|
CWE-200
|
High
|
WordPress Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-20151)
|
CVE-2018-20151
CWE-200
|
CWE-200
|
High
|
WordPress Improper Authentication Vulnerability (CVE-2008-1930)
|
CVE-2008-1930
CWE-287
|
CWE-287
|
High
|
WordPress Improper Authorization Vulnerability (CVE-2016-4029)
|
CVE-2016-4029
CWE-285
|
CWE-285
|
High
|
WordPress Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2003-1599)
|
CVE-2003-1599
CWE-94
|
CWE-94
|
High
|
WordPress Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2013-4338)
|
CVE-2013-4338
CWE-94
|
CWE-94
|
High
|
WordPress Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-8942)
|
CVE-2019-8942
CWE-94
|
CWE-94
|
High
|
WordPress Improper Input Validation Vulnerability (CVE-2007-1277)
|
CVE-2007-1277
CWE-20
|
CWE-20
|
High
|
WordPress Improper Input Validation Vulnerability (CVE-2008-5695)
|
CVE-2008-5695
CWE-20
|
CWE-20
|
High
|
WordPress Improper Input Validation Vulnerability (CVE-2013-4339)
|
CVE-2013-4339
CWE-20
|
CWE-20
|
High
|
WordPress Improper Input Validation Vulnerability (CVE-2017-9065)
|
CVE-2017-9065
CWE-20
|
CWE-20
|
High
|
WordPress Improper Input Validation Vulnerability (CVE-2017-1000600)
|
CVE-2017-1000600
CWE-20
|
CWE-20
|
High
|
WordPress Improper Input Validation Vulnerability (CVE-2018-1000773)
|
CVE-2018-1000773
CWE-20
|
CWE-20
|
High
|
WordPress Improper Input Validation Vulnerability (CVE-2020-26596)
|
CVE-2020-26596
CWE-20
|
CWE-20
|
High
|
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-0194)
|
CVE-2008-0194
CWE-22
|
CWE-22
|
High
|
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2016-6896)
|
CVE-2016-6896
CWE-22
|
CWE-22
|
High
|
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2017-14719)
|
CVE-2017-14719
CWE-22
|
CWE-22
|
High
|
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2017-14722)
|
CVE-2017-14722
CWE-22
|
CWE-22
|
High
|
WordPress Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-12895)
|
CVE-2018-12895
CWE-22
|
CWE-22
|
High
|
WordPress Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2017-9062)
|
CVE-2017-9062
CWE-707
|
CWE-707
|
High
|
WordPress Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2007-4894)
|
CVE-2007-4894
CWE-138
|
CWE-138
|
High
|
WordPress Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-0491)
|
CVE-2008-0491
CWE-138
|
CWE-138
|
High
|
WordPress Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-4625)
|
CVE-2008-4625
CWE-138
|
CWE-138
|
High
|
WordPress Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2011-3130)
|
CVE-2011-3130
CWE-138
|
CWE-138
|
High
|
WordPress Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-2213)
|
CVE-2015-2213
CWE-138
|
CWE-138
|
High
|
WordPress Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2022-21661)
|
CVE-2022-21661
CWE-138
|
CWE-138
|
High
|
WordPress Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2022-21664)
|
CVE-2022-21664
CWE-138
|
CWE-138
|
High
|
WordPress Inadequate Encryption Strength Vulnerability (CVE-2012-6707)
|
CVE-2012-6707
CWE-326
|
CWE-326
|
High
|
WordPress Missing Authentication for Critical Function Vulnerability (CVE-2020-11028)
|
CVE-2020-11028
CWE-306
|
CWE-306
|
High
|
WordPress Other Vulnerability (CVE-2005-1687)
|
CVE-2005-1687
|
|
High
|
WordPress Other Vulnerability (CVE-2005-1810)
|
CVE-2005-1810
|
|
High
|
WordPress Other Vulnerability (CVE-2005-2108)
|
CVE-2005-2108
|
|
High
|
WordPress Other Vulnerability (CVE-2005-2612)
|
CVE-2005-2612
|
|
High
|
WordPress Other Vulnerability (CVE-2006-1012)
|
CVE-2006-1012
|
|
High
|
WordPress Other Vulnerability (CVE-2006-2667)
|
CVE-2006-2667
|
|
High
|
WordPress Other Vulnerability (CVE-2007-0233)
|
CVE-2007-0233
|
|
High
|
WordPress Other Vulnerability (CVE-2007-0262)
|
CVE-2007-0262
|
|
High
|
WordPress Other Vulnerability (CVE-2007-0539)
|
CVE-2007-0539
|
|
High
|
WordPress Other Vulnerability (CVE-2007-2821)
|
CVE-2007-2821
|
|
High
|
WordPress Other Vulnerability (CVE-2016-2221)
|
CVE-2016-2221
|
|
High
|
WordPress Other Vulnerability (CVE-2016-2222)
|
CVE-2016-2222
|
|
High
|
WordPress Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-2146)
|
CVE-2008-2146
CWE-264
|
CWE-264
|
High
|
WordPress Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-3747)
|
CVE-2008-3747
CWE-264
|
CWE-264
|
High
|
WordPress Server-Side Request Forgery (SSRF) Vulnerability (CVE-2017-9066)
|
CVE-2017-9066
CWE-918
|
CWE-918
|
High
|
WordPress Uncontrolled Resource Consumption Vulnerability (CVE-2018-6389)
|
CVE-2018-6389
CWE-400
|
CWE-400
|
High
|
WordPress Uncontrolled Resource Consumption Vulnerability (CVE-2023-22622)
|
CVE-2023-22622
CWE-400
|
CWE-400
|
High
|
WordPress Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2018-14028)
|
CVE-2018-14028
CWE-434
|
CWE-434
|
High
|
WordPress Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) Vulnerability (CVE-2017-5493)
|
CVE-2017-5493
CWE-338
|
CWE-338
|
High
|
WordPress Use of Insufficiently Random Values Vulnerability (CVE-2017-17091)
|
CVE-2017-17091
CWE-330
|
CWE-330
|
High
|
WordPress W3 Total Cache plugin predictable cache filenames
|
CVE-2012-6077
CVE-2012-6078
CVE-2012-6079
CWE-200
|
CWE-200
|
High
|
WordPress Weak Password Recovery Mechanism for Forgotten Password Vulnerability (CVE-2014-6412)
|
CVE-2014-6412
CWE-640
|
CWE-640
|
High
|
WordPress Weak Password Recovery Mechanism for Forgotten Password Vulnerability (CVE-2020-11027)
|
CVE-2020-11027
CWE-640
|
CWE-640
|
High
|
XOOPS CVE-2009-3963 Vulnerability (CVE-2009-3963)
|
CVE-2009-3963
|
|
High
|
XOOPS Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-0612)
|
CVE-2008-0612
CWE-22
|
CWE-22
|
High
|
XOOPS Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2008-3296)
|
CVE-2008-3296
CWE-22
|
CWE-22
|
High
|
XOOPS Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2002-2391)
|
CVE-2002-2391
CWE-138
|
CWE-138
|
High
|
XOOPS Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-0611)
|
CVE-2008-0611
CWE-138
|
CWE-138
|
High
|
XOOPS Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-4433)
|
CVE-2008-4433
CWE-138
|
CWE-138
|
High
|
XOOPS Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2008-5665)
|
CVE-2008-5665
CWE-138
|
CWE-138
|
High
|
XOOPS Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2017-7290)
|
CVE-2017-7290
CWE-138
|
CWE-138
|
High
|
XOOPS Other Vulnerability (CVE-2005-0743)
|
CVE-2005-0743
|
|
High
|
XOOPS Other Vulnerability (CVE-2005-2113)
|
CVE-2005-2113
|
|
High
|
XOOPS Other Vulnerability (CVE-2007-0377)
|
CVE-2007-0377
|
|
High
|
YetiForce CRM Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2022-0269)
|
CVE-2022-0269
CWE-352
|
CWE-352
|
High
|
YOURLS Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2022-0088)
|
CVE-2022-0088
CWE-352
|
CWE-352
|
High
|
YOURLS Improper Restriction of Rendered UI Layers or Frames Vulnerability (CVE-2021-3734)
|
CVE-2021-3734
CWE-1021
|
CWE-1021
|
High
|
ZenCart Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2017-11675)
|
CVE-2017-11675
CWE-94
|
CWE-94
|
High
|
ZenCart Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Vulnerability (CVE-2021-3291)
|
CVE-2021-3291
CWE-138
|
CWE-138
|
High
|
ZenCart Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2009-2254)
|
CVE-2009-2254
CWE-138
|
CWE-138
|
High
|
ZenCart Other Vulnerability (CVE-2009-4323)
|
CVE-2009-4323
|
|
High
|
Zend Framework local file disclosure via XXE injection
|
CVE-2012-3363
CVE-2015-5161
CWE-611
|
CWE-611
|
High
|
Zenphoto Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Vulnerability (CVE-2020-5593)
|
CVE-2020-5593
CWE-138
|
CWE-138
|
High
|
Zenphoto Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2007-6666)
|
CVE-2007-6666
CWE-138
|
CWE-138
|
High
|
Zenphoto Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2009-4566)
|
CVE-2009-4566
CWE-138
|
CWE-138
|
High
|
Zenphoto Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2010-4906)
|
CVE-2010-4906
CWE-138
|
CWE-138
|
High
|
Zenphoto Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Vulnerability (CVE-2015-5591)
|
CVE-2015-5591
CWE-138
|
CWE-138
|
High
|
Zenphoto Improper Privilege Management Vulnerability (CVE-2018-0610)
|
CVE-2018-0610
CWE-269
|
CWE-269
|
High
|
Zenphoto Other Vulnerability (CVE-2007-0616)
|
CVE-2007-0616
|
|
High
|
Zenphoto Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2020-36079)
|
CVE-2020-36079
CWE-434
|
CWE-434
|
High
|
Zope Web Application Server CVE-2011-2528 Vulnerability (CVE-2011-2528)
|
CVE-2011-2528
|
|
High
|
Zope Web Application Server Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2021-32633)
|
CVE-2021-32633
CWE-22
|
CWE-22
|
High
|
Zope Web Application Server Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2021-32674)
|
CVE-2021-32674
CWE-22
|
CWE-22
|
High
|
Zope Web Application Server Improperly Controlled Modification of Dynamically-Determined Object Attributes Vulnerability (CVE-2021-32811)
|
CVE-2021-32811
CWE-915
|
CWE-915
|
High
|
Zope Web Application Server Other Vulnerability (CVE-2000-0483)
|
CVE-2000-0483
|
|
High
|
Zope Web Application Server Other Vulnerability (CVE-2000-0725)
|
CVE-2000-0725
|
|
High
|
Zope Web Application Server Other Vulnerability (CVE-2000-1211)
|
CVE-2000-1211
|
|
High
|
Zope Web Application Server Other Vulnerability (CVE-2001-1227)
|
CVE-2001-1227
|
|
High
|
Zope Web Application Server Other Vulnerability (CVE-2001-1278)
|
CVE-2001-1278
|
|
High
|
Zope Web Application Server Other Vulnerability (CVE-2002-0170)
|
CVE-2002-0170
|
|
High
|
Zope Web Application Server Other Vulnerability (CVE-2002-0688)
|
CVE-2002-0688
|
|
High
|
Zope Web Application Server Other Vulnerability (CVE-2005-3323)
|
CVE-2005-3323
|
|
High
|