id
stringlengths 12
47
| title
stringlengths 0
256
β | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
β | cvss_v3_1
float64 0
10
β | cvss_v3_0
float64 0
10
β | cvss_v2_0
float64 0
10
β |
---|---|---|---|---|---|---|---|
GHSA-8p7j-772c-jrhm | The decode_mb function in libavcodec/error_resilience.c in FFmpeg before 0.10 allows remote attackers to have an unspecified impact via vectors related to an uninitialized block index, which triggers an out-of-bounds write. | []
| null | null | null | null |
|
GHSA-vpcr-4vw2-r6wh | Apple QuickTime before 7.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted H.264 movie file. | []
| null | null | null | null |
|
ICSA-22-333-04 | Moxa UC Series | An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device's authentication files to create a new user and gain full access to the system. CVE-2023-1257 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). | []
| null | null | 7.6 | null |
GHSA-wfhh-24j3-j9j7 | The HTTP interface in Swann DVR4-SecuraNet has a certain default administrative username and password, which makes it easier for remote attackers to obtain privileged access. | []
| null | null | null | null |
|
CVE-2023-20055 | Cisco DNA Center Privilege Escalation Vulnerability | A vulnerability in the management API of Cisco DNA Center could allow an authenticated, remote attacker to elevate privileges in the context of the web-based management interface on an affected device. This vulnerability is due to the unintended exposure of sensitive information. An attacker could exploit this vulnerability by inspecting the responses from the API. Under certain circumstances, a successful exploit could allow the attacker to access the API with the privileges of a higher-level user account. To successfully exploit this vulnerability, the attacker would need at least valid Observer credentials. | [
"cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:dna_center:2.3.4.0:*:*:*:*:*:*:*"
]
| null | 8 | null | null |
GHSA-g589-q56x-4rhp | Integer overflow in exif.cpp in exiv2 library allows context-dependent attackers to execute arbitrary code via a crafted EXIF file that triggers a heap-based buffer overflow. | []
| null | null | null | null |
|
CVE-2023-5018 | SourceCodester Lost and Found Information System POST Parameter sql injection | A vulnerability classified as critical has been found in SourceCodester Lost and Found Information System 1.0. This affects an unknown part of the file /classes/Master.php?f=save_category of the component POST Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-239859. | [
"cpe:2.3:a:oretnom23:lost_and_found_information_system:1.0:*:*:*:*:*:*:*"
]
| null | 6.3 | 6.3 | 6.5 |
CVE-2019-3632 | Directory Traversal vulnerability could lead to elevated privileges | Directory Traversal vulnerability in McAfee Enterprise Security Manager (ESM) prior to 11.2.0 and prior to 10.4.0 allows authenticated user to gain elevated privileges via specially crafted input. | [
"cpe:2.3:a:mcafee:enterprise_security_manager:*:*:*:*:*:*:*:*"
]
| null | null | 8.5 | null |
CVE-2014-10401 | An issue was discovered in the DBI module before 1.632 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute. | [
"cpe:2.3:a:perl:dbi:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 3.6 |
|
CVE-2002-2089 | Buffer overflow in rcp in Solaris 9.0 allows local users to execute arbitrary code via a long command line argument. | [
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*"
]
| null | null | null | 4.6 |
|
CVE-2024-47736 | erofs: handle overlapped pclusters out of crafted images properly | In the Linux kernel, the following vulnerability has been resolved:
erofs: handle overlapped pclusters out of crafted images properly
syzbot reported a task hang issue due to a deadlock case where it is
waiting for the folio lock of a cached folio that will be used for
cache I/Os.
After looking into the crafted fuzzed image, I found it's formed with
several overlapped big pclusters as below:
Ext: logical offset | length : physical offset | length
0: 0.. 16384 | 16384 : 151552.. 167936 | 16384
1: 16384.. 32768 | 16384 : 155648.. 172032 | 16384
2: 32768.. 49152 | 16384 : 537223168.. 537239552 | 16384
...
Here, extent 0/1 are physically overlapped although it's entirely
_impossible_ for normal filesystem images generated by mkfs.
First, managed folios containing compressed data will be marked as
up-to-date and then unlocked immediately (unlike in-place folios) when
compressed I/Os are complete. If physical blocks are not submitted in
the incremental order, there should be separate BIOs to avoid dependency
issues. However, the current code mis-arranges z_erofs_fill_bio_vec()
and BIO submission which causes unexpected BIO waits.
Second, managed folios will be connected to their own pclusters for
efficient inter-queries. However, this is somewhat hard to implement
easily if overlapped big pclusters exist. Again, these only appear in
fuzzed images so let's simply fall back to temporary short-lived pages
for correctness.
Additionally, it justifies that referenced managed folios cannot be
truncated for now and reverts part of commit 2080ca1ed3e4 ("erofs: tidy
up `struct z_erofs_bvec`") for simplicity although it shouldn't be any
difference. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
GHSA-5xx2-xmgx-crvj | Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory. | []
| null | null | null | null |
|
CVE-2023-53066 | qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info | In the Linux kernel, the following vulnerability has been resolved:
qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info
We have to make sure that the info returned by the helper is valid
before using it.
Found by Linux Verification Center (linuxtesting.org) with the SVACE
static analysis tool. | []
| null | null | null | null |
GHSA-hr3h-86gx-c4cp | Alcatel OmniSwitch 7000 and 7800 allows remote attackers to cause a denial of service (reboot) via certain network scans, as demonstrated using a Nessus port scan of ports 1 through 1024 with safe-checks disabled. | []
| null | null | null | null |
|
CVE-2002-1003 | Buffer overflow in MyWebServer 1.02 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request. | [
"cpe:2.3:a:mywebserver:mywebserver:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mywebserver:mywebserver:1.0.2:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-xmvg-c4x3-9qwp | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0990, CVE-2018-0993, CVE-2018-0994, CVE-2018-0995, CVE-2018-1019. | []
| null | null | 7.5 | null |
CVE-2023-36905 | Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability | Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4737:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4737:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4737:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.4737:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.2295:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.2295:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.3324:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.3324:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.3324:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:10.0.22621.2134:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:10.0.22621.2134:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3324:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3324:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3324:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20107:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20107:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.6167:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.6167:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.6167:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
GHSA-42m6-g935-5vmq | @ianwalter/merge Prototype Pollution via `merge` function | All versions of package @ianwalter/merge are vulnerable to Prototype Pollution via the main (`merge`) function. @ianwalter/merge is [deprecated](https://github.com/ianwalter/merge/blob/master/README.md) and the maintainer suggests using [@generates/merger](https://github.com/generates/generates/tree/main/packages/merger) instead. | []
| null | 5.6 | null | null |
GHSA-9mxh-2hm2-fvp4 | nasm version 2.14.01rc5, 2.15 contains a Buffer Overflow vulnerability in asm/stdscan.c:130 that can result in Stack-overflow caused by triggering endless macro generation, crash the program. This attack appear to be exploitable via a crafted nasm input file. | []
| null | null | 5.5 | null |
|
CVE-2020-14486 | OpenClinic GA | An attacker may bypass permission/authorization checks in OpenClinic GA 5.09.02 and 5.89.05b by ignoring the redirect of a permission failure, which may allow unauthorized execution of commands. | [
"cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.09.02:*:*:*:*:*:*:*",
"cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.89.05b:*:*:*:*:*:*:*"
]
| null | 6.3 | null | null |
CVE-2025-48117 | WordPress WooCommerce POS <= 1.7.8 - Broken Access Control Vulnerability | Missing Authorization vulnerability in kilbot WooCommerce POS allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WooCommerce POS: from n/a through 1.7.8. | []
| null | 5.3 | null | null |
GHSA-7pgg-7h8x-8jrh | XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at MSCTF!_CtfImeCreateThreadMgr+0x00000000000000a8." | []
| null | null | 7.8 | null |
|
GHSA-62g9-cqjr-29mv | In JetBrains TeamCity before 2020.2.2, audit logs were not sufficient when an administrator uploaded a file. | []
| null | null | null | null |
|
CVE-2022-21997 | Windows Print Spooler Elevation of Privilege Vulnerability | Windows Print Spooler Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
]
| null | 7.1 | null | null |
GHSA-r7hw-mhpq-hhjg | Cross-site scripting (XSS) vulnerability in accountlogon.cfm in classifiedZONE 1.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the rtn parameter. | []
| null | null | null | null |
|
GHSA-hcw5-6455-h9xm | A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /view/student_exam_mark_insert_form1.php. The manipulation of the argument grade leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264445 was assigned to this vulnerability. | []
| 5.3 | 6.3 | null | null |
|
RHSA-2017:3404 | Red Hat Security Advisory: rh-postgresql95-postgresql security update | postgresql: Start scripts permit database administrator to modify root-owned files postgresql: Start scripts permit database administrator to modify root-owned files | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7",
"cpe:/a:redhat:rhev_manager:4.2",
"cpe:/a:redhat:rhev_manager:4.3"
]
| null | null | 6.5 | null |
GHSA-gr5p-5pp4-jfr7 | The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message. | []
| null | null | null | null |
|
GHSA-crhg-xgrg-vvcc | a12nserver vulnerable to potential SQL Injections via Knex dependency | ImpactUsers of a12nserver that use MySQL might be vulnerable to SQL injection bugs.If you use a12nserver and MySQL, update as soon as possible. This SQL injection bug might let an attacker obtain OAuth2 Access Tokens for users unrelated to those that permitted OAuth2 clients.PatchesThe knex dependency has been updated to 2.4.0 in a12nserver 0.23.0WorkaroundsNo further workaroundsReferenceshttps://github.com/knex/knex/issues/1227https://nvd.nist.gov/vuln/detail/CVE-2016-20018https://www.ghostccamm.com/blog/knex_sqli/ | []
| null | 6.5 | null | null |
GHSA-qwrv-2qv7-f9m4 | The telnet URI handler in Microsoft Internet Explorer 6 through 9 does not properly launch the handler application, which allows remote attackers to execute arbitrary programs via a crafted web site, aka "Telnet Handler Remote Code Execution Vulnerability." | []
| null | null | null | null |
|
CVE-2023-34641 | KioWare for Windows through v8.33 was discovered to contain an incomplete blacklist filter for blocked dialog boxes on Windows 10. This issue can allow attackers to open a file dialog box via the function window.print() which can then be used to open an unprivileged command prompt. | [
"cpe:2.3:a:kioware:kioware:*:*:*:*:*:windows:*:*"
]
| null | 7.8 | null | null |
|
GHSA-hhcw-wwxv-g95c | Oqtane Framework Insecure Direct Object Reference vulnerability | Oqtane Framework is vulnerable to Insecure Direct Object Reference (IDOR) in Oqtane.Controllers.UserController. This allows unauthorized users to access sensitive information of other users by manipulating the id parameter. | []
| null | 6.5 | null | null |
CVE-2000-1069 | pollit.cgi in Poll It 2.01 and earlier allows remote attackers to access administrative functions without knowing the real password by specifying the same value to the entered_password and admin_password parameters. | [
"cpe:2.3:a:cgi-world:poll_it:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cgi-world:poll_it:2.01:*:*:*:*:*:*:*",
"cpe:2.3:a:cgi-world:poll_it_pro:1.6:*:*:*:*:*:*:*"
]
| null | null | null | 6.4 |
|
CVE-2014-8350 | Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template. | [
"cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.1.19:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2024-32960 | WordPress Booking Ultra Pro plugin 1.1.12 - Privilege Escalation vulnerability | Improper Privilege Management vulnerability in Booking Ultra Pro allows Privilege Escalation.This issue affects Booking Ultra Pro: from n/a through 1.1.12. | [
"cpe:2.3:a:bookingultrapro:booking_ultra_pro_appointments_booking_calendar:*:*:*:*:*:wordpress:*:*"
]
| null | 8.8 | null | null |
CVE-2025-6612 | code-projects Inventory Management System removeCategories.php sql injection | A vulnerability was found in code-projects Inventory Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /php_action/removeCategories.php. The manipulation of the argument categoriesId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | []
| 6.9 | 7.3 | 7.3 | 7.5 |
GHSA-hqwv-qhhm-qq2g | Insufficient Granularity of Access Control in GitHub repository fossbilling/fossbilling prior to 0.5.0. | []
| null | null | 5.4 | null |
|
CVE-2021-1195 | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. | [
"cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
GHSA-86p4-vhr6-2vv3 | A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves. | []
| null | 5.3 | null | null |
|
GHSA-68c3-jf52-w65f | A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | []
| null | null | null | null |
|
GHSA-458q-8qpc-ggh3 | OneBlog v2.3.4 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Notice Manage module. | []
| null | 5.4 | null | null |
|
CVE-2023-0093 | Okta Advanced Server Access Client versions 1.13.1 through 1.65.0 are vulnerable to command injection due to the third party library webbrowser. An outdated library, webbrowser, used by the ASA client was found to be vulnerable to command injection. To exploit this issue, an attacker would need to phish the user to enter an attacker controlled server URL during enrollment. | [
"cpe:2.3:a:okta:advanced_server_access:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
CVE-2017-6998 | An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the "AVEVideoEncoder" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 9.3 |
|
GHSA-gfhj-524q-gcrm | Stored XSS vulnerability in Jenkins console links | Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the `href` attribute of links to downstream jobs displayed in the build console page. This results in a stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission.Jenkins 2.245, LTS 2.235.2 escapes the `href` attribute of these links. | []
| null | 8 | null | null |
RHSA-2010:0103 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: unauthorized cross-domain requests (APSB10-06) | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
]
| null | null | null | null |
CVE-2000-0169 | Batch files in the Oracle web listener ows-bin directory allow remote attackers to execute commands via a malformed URL that includes '?&'. | [
"cpe:2.3:a:oracle:application_server:4.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-65p8-cv89-24c7 | BigAnt Software BigAnt Server v5.6.06 was discovered to be vulnerable to directory traversal attacks. | []
| null | 7.5 | null | null |
|
CVE-2013-1596 | An Authentication Bypass Vulnerability exists in Vivotek PT7135 IP Camera 0300a and 0400a via specially crafted RTSP packets to TCP port 554. | [
"cpe:2.3:o:vivotek:pt7135_firmware:0300a:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:pt7135_firmware:0400a:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:pt7135:-:*:*:*:*:*:*:*"
]
| null | 5.3 | null | 5 |
|
CVE-2004-0003 | Unknown vulnerability in Linux kernel before 2.4.22 allows local users to gain privileges, related to "R128 DRI limits checking." | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.6 |
|
GHSA-rwrx-hrf2-v577 | Jenkins Serena SRA Deploy Plugin stores credentials in plain text | Jenkins Serena SRA Deploy Plugin stores credentials unencrypted in its global configuration file `com.urbancode.ds.jenkins.plugins.serenarapublisher.UrbanDeployPublisher.xml` on the Jenkins controller. These credentials can be viewed by users with access to the Jenkins controller file system. | []
| null | null | 3.3 | null |
ICSMA-18-037-01 | Vyaire Medical CareFusion Upgrade Utility Vulnerability | A successful exploit of this vulnerability requires the local user to install a crafted DLL on the target machine. The application loads the DLL and gives the attacker access at the same privilege level as the application. CVE-2018-5457 has been assigned to this vulnerability. A CVSS v3 base score of 6.7 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H). | []
| null | null | 6.7 | null |
CVE-2017-15194 | include/global_session.php in Cacti 1.1.25 has XSS related to (1) the URI or (2) the refresh page. | [
"cpe:2.3:a:cacti:cacti:1.1.25:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
GHSA-xmjv-5hmh-hg5p | CGI.pl in Bugzilla before 2.14.1, when using LDAP, allows remote attackers to obtain an anonymous bind to the LDAP server via a request that does not include a password, which causes a null password to be sent to the LDAP server. | []
| null | null | null | null |
|
GHSA-452p-5pj4-w36g | Vulnerability in the Oracle Application Express Opportunity Tracker component of Oracle Database Server. The supported version that is affected is Prior to 20.2. Easily exploitable vulnerability allows low privileged attacker having Valid User Account privilege with network access via HTTP to compromise Oracle Application Express Opportunity Tracker. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express Opportunity Tracker, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express Opportunity Tracker accessible data as well as unauthorized read access to a subset of Oracle Application Express Opportunity Tracker accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). | []
| null | null | null | null |
|
GHSA-m978-hcqw-jcmw | An issue was discovered in chat.php in LiveZilla Live Chat 8.0.1.3 (Helpdesk). A blind JavaScript injection lies in the name parameter. Triggering this can fetch the username and passwords of the helpdesk employees in the URI. This leads to a privilege escalation, from unauthenticated to user-level access, leading to full account takeover. The attack fetches multiple credentials because they are stored in the database (stored XSS). This affects the mobile/chat URI via the lgn and psswrd parameters. | []
| null | null | null | null |
|
CVE-2018-11184 | Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 42 of 46). | [
"cpe:2.3:a:quest:disk_backup:*:*:*:*:*:*:*:*"
]
| null | null | 7.2 | 6.5 |
|
CVE-2015-2974 | LEMON-S PHP Gazou BBS plus before 2.36 allows remote attackers to upload arbitrary HTML documents via vectors involving a crafted image file. | [
"cpe:2.3:a:lemon-s_php:gazou_bbs_plus:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-jvcj-76c9-9cp8 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ujwol Bastakoti CT Commerce plugin <=Β 2.0.1 versions. | []
| null | 5.9 | null | null |
|
CVE-2009-3284 | Directory traversal vulnerability in phpspot PHP BBS, PHP Image Capture BBS, PHP & CSS BBS, PHP BBS CE, PHP_RSS_Builder, and webshot, dated before 20090914, allows remote attackers to read arbitrary files via unspecified vectors. | [
"cpe:2.3:a:phpspot:php_\\&_css_bbs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phpspot:php_bbs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phpspot:php_bbs_ce:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phpspot:php_image_capture_bbs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phpspot:php_rss_builder:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phpspot:webshot:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2025-30624 | WordPress WordLift <= 3.54.4 - Broken Access Control Vulnerability | Missing Authorization vulnerability in WordLift WordLift allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WordLift: from n/a through 3.54.4. | []
| null | 4.3 | null | null |
GHSA-75vj-36gh-8x22 | The Wordable plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.1.1. This is due to the use of a user supplied hashing algorithm passed to the hash_hmac() function and the use of a loose comparison on the hash which allows an attacker to trick the function into thinking it has a valid hash. This makes it possible for unauthenticated attackers to gain administrator privileges. | []
| null | 9.8 | null | null |
|
GHSA-x86v-55vr-75q7 | The File Bookmark component in Apple OS X before 10.11.2 allows attackers to bypass a sandbox protection mechanism for app scoped bookmarks via a crafted pathname. | []
| null | null | null | null |
|
CVE-2024-3735 | Smart Office Main.aspx weak password | A vulnerability was found in Smart Office up to 20240405. It has been classified as problematic. Affected is an unknown function of the file Main.aspx. The manipulation of the argument New Password/Confirm Password with the input 1 leads to weak password requirements. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-260574 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:smartofficepayroll:smartoffice:*:*:*:*:web:*:*:*"
]
| 6.3 | 3.7 | 3.7 | 2.6 |
GHSA-97fh-7m8x-9fcg | In versions prior to 5.5, LXCI for VMware allows an authenticated user to download any system file due to insufficient input sanitization during file downloads. | []
| null | null | 6.5 | null |
|
RHSA-2017:3216 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update | keycloak: SAML request parser replaces special strings with system properties | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
]
| null | null | 6.5 | null |
GHSA-mg46-hvp9-p9x3 | NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer, where any local user can cause a null-pointer dereference, which may lead to a kernel panic. | []
| null | 6.5 | null | null |
|
GHSA-pm93-x7pc-g8qx | The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.7.4, macOS Ventura 13.6.5, macOS Sonoma 14.4, visionOS 1.1, iOS 16.7.6 and iPadOS 16.7.6. Processing an image may result in disclosure of process memory. | []
| null | 3.3 | null | null |
|
CVE-2003-1520 | SQL injection vulnerability in FuzzyMonkey My Classifieds 2.11 allows remote attackers to execute arbitrary SQL commands via the email parameter. | [
"cpe:2.3:a:fuzzymonkey:myclassifieds:2.11:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
RHSA-2020:0227 | Red Hat Security Advisory: sqlite security update | sqlite: fts3: improve shadow table corruption detection | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 8.8 | null | null |
GHSA-6957-cr2x-3c96 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. The issue involves the "Siri" component. It allows physically proximate attackers to obtain sensitive information via a Siri request for private-content notifications that should not have been available in the lock-screen state. | []
| null | null | 2.4 | null |
|
GHSA-27c3-vpxp-mmff | A vulnerability was found in LΓ³gico y Creativo 1.0 and classified as critical. This issue affects some unknown processing. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. | []
| null | 9.8 | null | null |
|
GHSA-xqr4-wc4c-36xj | In the Linux kernel, the following vulnerability has been resolved:net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register()bcm_sf2_mdio_register() calls of_phy_find_device() and then
phy_device_remove() in a loop to remove existing PHY devices.
of_phy_find_device() eventually calls bus_find_device(), which calls
get_device() on the returned struct device * to increment the refcount.
The current implementation does not decrement the refcount, which causes
memory leak.This commit adds the missing phy_device_free() call to decrement the
refcount via put_device() to balance the refcount. | []
| null | 5.5 | null | null |
|
CVE-2018-1161 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.2.0.13. Authentication is not required to exploit this vulnerability. The specific flaw exists within nvwsworker.exe. When parsing the boundary header of a multipart request, the process does not properly validate the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of SYSTEM. Was ZDI-CAN-4215. | [
"cpe:2.3:a:quest:netvault_backup:11.2.0.13:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
GHSA-cppf-r7wr-43r2 | Delta Electronics CNCSoft ScreenEditor, Versions 1.00.89 and prior. Multiple out-of-bounds read vulnerabilities may cause information disclosure due to lacking user input validation for processing project files. | []
| null | null | 5.5 | null |
|
CVE-2017-15518 | All versions of OnCommand API Services prior to 2.1 and NetApp Service Level Manager prior to 1.0RC4 log a privileged database user account password. All users are urged to move to a fixed version. Since the affected password is changed during every upgrade/installation no further action is required. | [
"cpe:2.3:a:netapp:oncommand_api_services:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:service_level_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:service_level_manager:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:netapp:service_level_manager:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:netapp:service_level_manager:1.0:rc3:*:*:*:*:*:*"
]
| null | 7.8 | null | 2.1 |
|
GHSA-vrqh-v8jm-4v2m | The OSM β OpenStreetMap plugin for WordPress is vulnerable to SQL Injection via the 'tagged_filter' attribute of the 'osm_map_v3' shortcode in all versions up to, and including, 6.0.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | []
| null | 9.9 | null | null |
|
GHSA-xc4j-5g39-hrv5 | Cross Site Scripting (XSS) vulnerability in Form Tools 3.1.1 allows attackers to run arbitrary code via the First Name field in the application. | []
| null | 6.1 | null | null |
|
GHSA-76c9-566c-68x5 | I-O DATA DEVICE HDL-A and HDL2-A devices with firmware 1.07 and earlier do not properly manage sessions, which allows remote attackers to obtain sensitive information or modify data via unspecified vectors. | []
| null | null | null | null |
|
GHSA-q72m-84cc-976h | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | []
| null | 4.9 | null | null |
|
GHSA-qvjv-vp7f-48ch | Adobe Flash Media Server (FMS) before 3.0.6, and 3.5.x before 3.5.4, allows attackers to execute arbitrary code via unspecified vectors, related to a "JS method vulnerability." | []
| null | null | null | null |
|
CVE-2020-6273 | SAP S/4 HANA (Fiori UI for General Ledger Accounting), versions 103, 104, does not perform necessary authorization checks for an authenticated user working with attachment service, allowing the attacker to delete attachments due to Missing Authorization Check. | [
"cpe:2.3:a:sap:s\\/4_hana_fiori_ui_for_general_ledger_accounting:103:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s\\/4_hana_fiori_ui_for_general_ledger_accounting:104:*:*:*:*:*:*:*"
]
| null | null | 4.3 | null |
|
CVE-2014-0997 | WiFiMonitor in Android 4.4.4 as used in the Nexus 5 and 4, Android 4.2.2 as used in the LG D806, Android 4.2.2 as used in the Samsung SM-T310, Android 4.1.2 as used in the Motorola RAZR HD, and potentially other unspecified Android releases before 5.0.1 and 5.0.2 does not properly handle exceptions, which allows remote attackers to cause a denial of service (reboot) via a crafted 802.11 probe response frame. | [
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:h:google:nexus_4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:nexus_5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:d806:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:sm-t310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:h:motorola:razr_hd:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2025-43915 | In Linkerd edge releases before edge-25.2.1, and Buoyant Enterprise for Linkerd releases 2.13.0β2.13.7, 2.14.0β2.14.10, 2.15.0β2.15.7, 2.16.0β2.16.4, and 2.17.0β2.17.1, resource exhaustion can occur for Linkerd proxy metrics. | []
| null | 6.5 | null | null |
|
GHSA-ph4x-78w5-h79j | Direct static code injection vulnerability in includes/newtopic.php in SimpleBBS 1.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the Host header (possibly the name parameter or variable), which is then written to data/topics.php. | []
| null | null | null | null |
|
CVE-2018-5404 | The Quest Kace K1000 Appliance is vulnerable to multiple Blind SQL Injections. | The Quest Kace K1000 Appliance, versions prior to 9.0.270, allows an authenticated, remote attacker with least privileges ('User Console Only' role) to potentially exploit multiple Blind SQL Injection vulnerabilities to retrieve sensitive information from the database or copy the entire database. An authenticated remote attacker could leverage Blind SQL injections to obtain sensitive data. | [
"cpe:2.3:o:quest:kace_systems_management_appliance_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:quest:kace_systems_management_appliance:-:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4 |
CVE-2024-21860 | Dsoftbus has a use after free vulnerability |
in OpenHarmony v4.0.0 and prior versions
allow an adjacent attacker arbitrary code execution in any apps through use after free. | [
"cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
"cpe:2.3:o:openatom:openharmony:4.0:*:*:*:-:*:*:*"
]
| null | 8.2 | null | null |
CVE-2024-33588 | WordPress basepress plugin <= 2.16.1 - Broken Access Control vulnerability | Missing Authorization vulnerability in codeSavory Knowledge Base documentation & wiki plugin β BasePress.This issue affects Knowledge Base documentation & wiki plugin β BasePress: from n/a through 2.16.1.
| []
| null | 5.4 | null | null |
GHSA-rx66-2x9p-mvq8 | modules/admuser.php in myGesuad 0.9.14 (aka 0.9) does not require administrative authentication, which allows remote authenticated users to list user accounts via a Find action. | []
| null | null | null | null |
|
CVE-2025-29915 | Suricata af-packet: defrag option can lead to truncated packets affecting visibility | Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. The AF_PACKET defrag option is enabled by default and allows AF_PACKET to re-assemble fragmented packets before reaching Suricata. However the default packet size in Suricata is based on the network interface MTU which leads to Suricata seeing truncated packets. Upgrade to Suricata 7.0.9, which uses better defaults and adds warnings for user configurations that may lead to issues. | []
| null | 7.5 | null | null |
CVE-2019-10452 | Jenkins View26 Test-Reporting Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | [
"cpe:2.3:a:jenkins:view26_test-reporting:*:*:*:*:*:jenkins:*:*"
]
| null | 4.3 | null | 4 |
|
RHSA-2022:0344 | Red Hat Security Advisory: kernel security update | kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
]
| null | 5.5 | null | null |
CVE-2022-35868 | A vulnerability has been identified in TIA Multiuser Server V14 (All versions), TIA Multiuser Server V15 (All versions < V15.1 Update 8), TIA Project-Server (All versions < V1.1), TIA Project-Server V16 (All versions), TIA Project-Server V17 (All versions < V17 Update 6). Affected applications contain an untrusted search path vulnerability that could allow an attacker to escalate privileges, when tricking a legitimate user to start the service from an attacker controlled path. | [
"cpe:2.3:a:siemens:tia_multiuser_server:14:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:tia_multiuser_server:15:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:tia_multiuser_server:15.1:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:tia_multiuser_server:16:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:tia_project-server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:tia_project-server:17:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:tia_project-server:17:update1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:tia_project-server:17:update4:*:*:*:*:*:*"
]
| null | 6.7 | null | null |
|
CVE-2013-2993 | IBM WebSphere Commerce 6.x through 6.0.0.11 and 7.x through 7.0.0.7 does not properly perform authentication for unspecified web services, which allows remote attackers to issue requests in the context of an arbitrary user's active session via unknown vectors. | [
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.7:*:*:*:*:*:*:*"
]
| null | null | null | 5.8 |
|
GHSA-4j27-qhm5-88w7 | An issue was discovered in Archer Platform 6 before 2024.04. Authentication was mishandled because lock did not terminate an existing session. 6.14 P3 (6.14.0.3) is also a fixed release. | []
| null | 8.8 | null | null |
|
CVE-2017-9659 | A Stack-Based Buffer Overflow issue was discovered in Fuji Electric Monitouch V-SFT versions prior to Version 5.4.43.0. The stack-based buffer overflow vulnerability has been identified, which may cause a crash or allow remote code execution. | [
"cpe:2.3:a:fujielectric:monitouch_v-sft:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
CVE-2020-12386 | Out-of-bounds write in some Intel(R) Graphics Drivers before version 15.36.39.5143 may allow an authenticated user to potentially enable denial of service via local access. | [
"cpe:2.3:a:intel:graphics_drivers:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 2.1 |
|
CVE-2024-45234 | An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing a signedAttrs encoded in non-canonical form. This bypasses Fort's BER decoder, reaching a point in the code that panics when faced with data not encoded in DER. Because Fort is an RPKI Relying Party, a panic can lead to Route Origin Validation unavailability, which can lead to compromised routing. | [
"cpe:2.3:a:nicmx:fort-validator:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2009-1516 | Stack-based buffer overflow in the IceWarpServer.APIObject ActiveX control in api.dll in IceWarp Merak Mail Server 9.4.1 might allow context-dependent attackers to execute arbitrary code via a large value in the second argument to the Base64FileEncode method, as possibly demonstrated by a web application that accepts untrusted input for this method. | [
"cpe:2.3:a:icewarp:merak_mail_server:9.4.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2012-5098 | Multiple SQL injection vulnerabilities in Php-X-Links, possibly 1.0, allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to rate.php, (2) cid parameter to view.php, or (3) t parameter to pop.php. | [
"cpe:2.3:a:j_waite:php-x-links:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:j_waite:php-x-links:1.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2020-15680 | If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered. This vulnerability affects Firefox < 82. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | 5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.