Search Results (75094 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2012-2130 3 Debian, Fedoraproject, Polarssl 3 Debian Linux, Fedora, Polarssl 2024-11-21 7.4 High
A Security Bypass vulnerability exists in PolarSSL 0.99pre4 through 1.1.1 due to a weak encryption error when generating Diffie-Hellman values and RSA keys.
CVE-2012-2079 1 Drupal 1 Activity 2024-11-21 8.8 High
A cross-site request forgery (CSRF) vulnerability in the Activity module 6.x-1.x for Drupal.
CVE-2012-1615 1 Fedoraproject 2 Fedora, Sectool 2024-11-21 7.8 High
A Privilege Escalation vulnerability exits in Fedoraproject Sectool due to an incorrect DBus file.
CVE-2012-1592 1 Apache 1 Struts 2024-11-21 8.8 High
A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files.
CVE-2012-1572 2 Debian, Openstack 2 Debian Linux, Keystone 2024-11-21 7.5 High
OpenStack Keystone: extremely long passwords can crash Keystone by exhausting stack space
CVE-2012-1567 1 Linuxmint 1 Linuxmint 2024-11-21 7.5 High
LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintUpdate.
CVE-2012-1566 1 Linuxmint 1 Linuxmint 2024-11-21 7.5 High
LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintNanny.
CVE-2012-1563 1 Joomla 1 Joomla\! 2024-11-21 7.5 High
Joomla! before 2.5.3 allows Admin Account Creation.
CVE-2012-1562 1 Joomla 1 Joomla\! 2024-11-21 7.5 High
Joomla! core before 2.5.3 allows unauthorized password change.
CVE-2012-1496 1 Webcalendar Project 1 Webcalendar 2024-11-21 8.8 High
Local file inclusion in WebCalendar before 1.2.5.
CVE-2012-1326 1 Cisco 1 Ironport Web Security Appliance 2024-11-21 7.4 High
Cisco IronPort Web Security Appliance up to and including 7.5 does not validate the basic constraints of the certificate authority which could lead to MITM attacks
CVE-2012-1170 2 Fedoraproject, Moodle 2 Fedora, Moodle 2024-11-21 7.5 High
Moodle before 2.2.2 has an external enrolment plugin context check issue where capability checks are not thorough
CVE-2012-1168 3 Fedoraproject, Moodle, Redhat 3 Fedora, Moodle, Enterprise Linux 2024-11-21 8.2 High
Moodle before 2.2.2 has a password and web services issue where when the user profile is updated the user password is reset if not specified.
CVE-2012-1156 3 Fedoraproject, Moodle, Redhat 3 Fedora, Moodle, Enterprise Linux 2024-11-21 7.5 High
Moodle before 2.2.2 has users' private files included in course backups
CVE-2012-1155 4 Debian, Fedoraproject, Moodle and 1 more 4 Debian Linux, Fedora, Moodle and 1 more 2024-11-21 7.5 High
Moodle has a database activity export permission issue where the export function of the database activity module exports all entries even those from groups the user does not belong to
CVE-2012-1109 1 Pediapress 1 Mwlib 2024-11-21 7.5 High
mwlib 0.13 through 0.13.4 has a denial of service vulnerability when parsing #iferror magic functions
CVE-2012-1102 1 Xml\ 1 \ 2024-11-21 7.5 High
It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.
CVE-2012-1094 1 Redhat 1 Jboss Application Server 2024-11-21 7.5 High
JBoss AS 7 prior to 7.1.1 and mod_cluster do not handle default hostname in the same way, which can cause the excluded-contexts list to be mismatched and the root context to be exposed.
CVE-2012-1093 1 Debian 2 Debian Linux, X11-common 2024-11-21 7.8 High
The init script in the Debian x11-common package before 1:7.6+12 is vulnerable to a symlink attack that can lead to a privilege escalation during package installation.
CVE-2012-10009 1 404like Project 1 404like 2024-11-21 7.3 High
A vulnerability was found in 404like Plugin up to 1.0.2 on WordPress. It has been classified as critical. Affected is the function checkPage of the file 404Like.php. The manipulation of the argument searchWord leads to sql injection. It is possible to launch the attack remotely. Upgrading to version 1.0.2 is able to address this issue. The name of the patch is 2c4b589d27554910ab1fd104ddbec9331b540f7f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-223404.