Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2010-2950 | 1 Php | 1 Php | 2011-05-03 | 6.8 MEDIUM | N/A |
Format string vulnerability in stream.c in the phar extension in PHP 5.3.x through 5.3.3 allows context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the phar_stream_flush function, leading to errors in the php_stream_wrapper_log_error function. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2094. | |||||
CVE-2010-0350 | 2 Arco Van Geest, Typo3 | 2 Goof Fotoboek, Typo3 | 2011-05-01 | 7.5 HIGH | N/A |
Directory traversal vulnerability in the Photo Book (goof_fotoboek) extension 1.7.14 and earlier for TYPO3 has unknown impact and remote attack vectors. | |||||
CVE-2007-6372 | 1 Juniper | 1 Junos | 2011-04-28 | 7.8 HIGH | N/A |
Unspecified vulnerability in Juniper JUNOS 7.3 through 8.4 allows remote attackers to cause a denial of service (crash) via malformed BGP packets, possibly BGP UPDATE packets that trigger session flapping. | |||||
CVE-2010-0336 | 1 Typo3 | 2 Kiddog Mysqldumper, Typo3 | 2011-04-28 | 5.0 MEDIUM | N/A |
Unspecified vulnerability in the kiddog_mysqldumper (kiddog_mysqldumper) extension 0.0.3 and earlier for TYPO3 allows remote attackers to obtain sensitive information via unknown attack vectors. | |||||
CVE-2010-0337 | 1 Typo3 | 2 Dl3 Tt News Alerts, Typo3 | 2011-04-28 | 7.5 HIGH | N/A |
SQL injection vulnerability in the tt_news Mail alert (dl3_tt_news_alerts) extension 0.2.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | |||||
CVE-2010-0339 | 1 Typo3 | 2 Typo3, Vm19 Userlinks | 2011-04-28 | 7.5 HIGH | N/A |
SQL injection vulnerability in the User Links (vm19_userlinks) extension 0.1.1 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | |||||
CVE-2010-0340 | 1 Typo3 | 2 Mjseventpro, Typo3 | 2011-04-28 | 7.5 HIGH | N/A |
SQL injection vulnerability in the MJS Event Pro (mjseventpro) extension 0.2.1 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | |||||
CVE-2010-0341 | 1 Typo3 | 2 Bb Simplejobs, Typo3 | 2011-04-28 | 7.5 HIGH | N/A |
SQL injection vulnerability in the BB Simple Jobs (bb_simplejobs) extension 0.1.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | |||||
CVE-2010-0342 | 1 Typo3 | 2 Job Reports, Typo3 | 2011-04-28 | 7.5 HIGH | N/A |
SQL injection vulnerability in the Reports for Job (job_reports) extension 0.1.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | |||||
CVE-2010-0343 | 1 Typo3 | 2 Pb Clanlist, Typo3 | 2011-04-28 | 7.5 HIGH | N/A |
SQL injection vulnerability in the Clan Users List (pb_clanlist) extension 0.0.1 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | |||||
CVE-2010-0344 | 1 Typo3 | 2 Typo3, Zak Store Management | 2011-04-28 | 7.5 HIGH | N/A |
SQL injection vulnerability in the zak_store_management extension 1.0.0 and earlier TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | |||||
CVE-2010-0346 | 1 Typo3 | 2 Mimi Tipfriends, Typo3 | 2011-04-28 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in the Tip many friends (mimi_tipfriends) extension 0.0.2 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | |||||
CVE-2010-0347 | 1 Typo3 | 2 Typo3, Vd Gemomap | 2011-04-28 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in the VD / Geomap (vd_geomap) extension 0.3.1 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | |||||
CVE-2010-0348 | 1 C-3.co.jp | 1 Webcalenderc3 | 2011-04-28 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in C3 Corp. WebCalenderC3 0.32 and earlier allows remote attackers to read arbitrary files via unknown vectors. | |||||
CVE-2010-0349 | 1 C-3.co.jp | 1 Webcalenderc3 | 2011-04-28 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in C3 Corp. WebCalenderC3 0.32 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors. NOTE: this issue could not be reproduced by the vendor, but a patch was provided anyway. The original researcher is reliable. | |||||
CVE-2010-0230 | 1 Suse | 2 Opensuse, Suse Linux | 2011-04-27 | 7.5 HIGH | N/A |
SUSE Linux Enterprise 10 SP3 (SLE10-SP3) and openSUSE 11.2 configures postfix to listen on all network interfaces, which might allow remote attackers to bypass intended access restrictions. | |||||
CVE-2010-0358 | 1 Ibm | 1 Lotus Domino | 2011-04-27 | 10.0 HIGH | N/A |
Heap-based buffer overflow in the server in IBM Lotus Domino 7 and 8.5 FP1 allows remote attackers to cause a denial of service (daemon exit) and possibly have unspecified other impact via a long string in a crafted LDAP message to a TCP port, a different vulnerability than CVE-2009-3087. | |||||
CVE-2010-0360 | 1 Sun | 1 Java System Web Server | 2011-04-27 | 10.0 HIGH | N/A |
Sun Java System Web Server (aka SJWS) 7.0 Update 7 allows remote attackers to overwrite memory locations in the heap, and discover the contents of memory locations, via a malformed HTTP TRACE request that includes a long URI and many empty headers, related to an "overflow." NOTE: this might overlap CVE-2010-0272 and CVE-2010-0273. | |||||
CVE-2010-0361 | 1 Sun | 1 Java System Web Server | 2011-04-27 | 10.0 HIGH | N/A |
Stack-based buffer overflow in the WebDAV implementation in webservd in Sun Java System Web Server (aka SJWS) 7.0 Update 7 allows remote attackers to cause a denial of service (daemon crash) and possibly have unspecified other impact via a long URI in an HTTP OPTIONS request. | |||||
CVE-2011-0639 | 1 Apple | 1 Mac Os X | 2011-04-27 | 6.9 MEDIUM | N/A |
Apple Mac OS X does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a smartphone that the user connected to the computer. |