Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-38184 | 1 Esri | 1 Portal For Arcgis | 2022-08-17 | N/A | 7.5 HIGH |
There is an improper access control vulnerability in Portal for ArcGIS versions 10.8.1 and below which could allow a remote, unauthenticated attacker to access an API that may induce Esri Portal for ArcGIS to read arbitrary URLs. | |||||
CVE-2022-35449 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6b0466. | |||||
CVE-2022-35448 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6b55af. | |||||
CVE-2022-35447 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6b04de. | |||||
CVE-2022-35452 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6b0b2c. | |||||
CVE-2022-35451 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6b03b5. | |||||
CVE-2022-35450 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6b84b1. | |||||
CVE-2022-35455 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6b0d63. | |||||
CVE-2022-35454 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6b05aa. | |||||
CVE-2022-35453 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6c08a6. | |||||
CVE-2022-35459 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6e412a. | |||||
CVE-2022-35458 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6b05ce. | |||||
CVE-2022-35456 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x617087. | |||||
CVE-2022-35462 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6c0bc3. | |||||
CVE-2022-35461 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6c0a32. | |||||
CVE-2022-35460 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x61731f. | |||||
CVE-2022-35463 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6b0478. | |||||
CVE-2022-35464 | 1 Otfcc Project | 1 Otfcc | 2022-08-17 | N/A | 6.5 MEDIUM |
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6171b2. | |||||
CVE-2003-0658 | 2 Caldera, Sco | 4 Openlinux Server, Openlinux Workstation, Openserver and 1 more | 2022-08-17 | 5.0 MEDIUM | N/A |
Docview before 1.1-18 in Caldera OpenLinux 3.1.1, SCO Linux 4.0, OpenServer 5.0.7, configures the Apache web server in a way that allows remote attackers to read arbitrary publicly readable files via a certain URL, possibly related to rewrite rules. | |||||
CVE-2003-0742 | 1 Sco | 1 Openserver | 2022-08-17 | 7.2 HIGH | N/A |
SCO Internet Manager (mana) allows local users to execute arbitrary programs by setting the REMOTE_ADDR environment variable to cause menu.mana to run as if it were called from ncsa_httpd, then modifying the PATH environment variable to point to a malicious "hostname" program. |