id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
RHSA-2024:9819
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.8 | null | null | null |
CVE-2020-1564
|
Jet Database Engine Remote Code Execution Vulnerability
|
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.
An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.
The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
] | null | 7.8 | null | 9.3 | null |
GHSA-qrqq-9838-mwwm
|
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
|
GHSA-r6j9-5wqc-p46g
|
The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.
|
[] | null | null | 9.8 | null | null |
|
CVE-2020-3717
|
Magento versions 2.3.3 and earlier, 2.2.10 and earlier, 1.14.4.3 and earlier, and 1.9.4.3 and earlier have a path traversal vulnerability. Successful exploitation could lead to sensitive information disclosure.
|
[
"cpe:2.3:a:magento:magento:*:*:*:*:community:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-6h8p-5x85-6w38
|
Missing Authorization vulnerability in Popup Maker Popup Maker allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Popup Maker: from n/a through 1.17.1.
|
[] | null | 3.5 | null | null | null |
|
GHSA-4fgw-ccjj-q53m
|
HPE has identified a remote access to sensitive information vulnerability in HPE Network Function Virtualization Director (NFVD) 4.2.1 prior to gui patch 3.
|
[] | null | null | 4.3 | null | null |
|
CVE-2024-2836
|
Super Socializer < 7.13.64 - Editor+ Stored XSS
|
The Social Share, Social Login and Social Comments Plugin WordPress plugin before 7.13.64 does not sanitise and escape some of its settings, which could allow high privilege users such as editors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
|
[
"cpe:2.3:a:team_heateor:super_socializer:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | null | null |
GHSA-h2m3-5cf5-xw9r
|
Multiple cross-site scripting (XSS) vulnerabilities in warforge.NEWS 1.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly including the (1) first_name and (2) last_name parameter in myaccounts.php. NOTE: portions of these details were obtained from third party sources instead of the original disclosure.
|
[] | null | null | null | null | null |
|
GHSA-58jq-q8jm-f39c
|
NETGEAR R7800 devices before 1.0.2.68 are affected by remote code execution by unauthenticated attackers.
|
[] | null | null | null | null | null |
|
GHSA-96x5-37gv-6jg4
|
member.php in Crossday Discuz! Board allows remote attackers to reset passwords of arbitrary users via crafted (1) lostpasswd and (2) getpasswd actions, possibly involving predictable generation of the id parameter.
|
[] | null | null | null | null | null |
|
GHSA-xpxm-9vvw-pjc3
|
There is a denial of service (DoS) vulnerability in eCNS280 versions V100R005C00, V100R005C10. Due to a design defect, remote unauthorized attackers send a large number of specific messages to affected devices, causing system resource exhaustion and web application DoS.
|
[] | null | 7.5 | null | null | null |
|
CVE-2023-40970
|
Senayan Library Management Systems SLIMS 9 Bulian v 9.6.1 is vulnerable to SQL Injection via admin/modules/circulation/loan_rules.php.
|
[
"cpe:2.3:a:slims:senayan_library_management_system:9.6.1:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-x8q2-c92q-f922
|
A vulnerability has been found in SourceCodester Online Admission System and classified as critical. This vulnerability affects unknown code of the component POST Parameter Handler. The manipulation of the argument shift leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this entry is VDB-205564.
|
[] | null | 9.8 | null | null | null |
|
CVE-2014-7857
|
D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session's cookie to username=admin.
|
[
"cpe:2.3:o:d-link:dns-322l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-322l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dns-325_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dns-345_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-345:-:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dns-320b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-320b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dnr-326_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dnr-326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dns-327l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-327l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dns-320l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-320l:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-crw3-wx37-wqr9
|
CuppaCMS v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the saveConfigData function in /classes/ajax/Functions.php.
|
[] | null | 9.8 | null | null | null |
|
GHSA-2vm6-24x2-fw9m
|
There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user's nickname is maliciously tampered with.
|
[] | null | 5.3 | null | null | null |
|
GHSA-g562-q5g5-pfpw
|
A Cross-site WebSocket Hijacking (CSWSH) vulnerability found in UniFi OS 2.5 and earlier allows a malicious actor to access certain confidential information by persuading a UniFi OS user to visit a malicious webpage.Affected Products:Cloud Key Gen2Cloud Key Gen2 PlusUNVRUNVR ProfessionalUDMUDM ProfessionalUDM SEUDRMitigation:Update affected products to UniFi OS 3.0.13 or later.
|
[] | null | 6.5 | null | null | null |
|
CVE-2025-22635
|
WordPress Eventer - WordPress Event & Booking Manager Plugin plugin < 3.9.9 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jyothis Joy Eventer allows Reflected XSS. This issue affects Eventer: from n/a through n/a.
|
[] | null | 7.1 | null | null | null |
CVE-2024-32776
|
WordPress AppPresser plugin <= 4.3.0 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in AppPresser Team AppPresser.This issue affects AppPresser: from n/a through 4.3.0.
|
[
"cpe:2.3:a:apppresser:apppresser:-:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
GHSA-m5m7-pr9m-w6hr
|
An issue the background management system of Shanxi Internet Chuangxiang Technology Co., Ltd v1.0.1 allows a remote attacker to cause a denial of service via the index.html component.
|
[] | null | 6.5 | null | null | null |
|
CVE-2021-21261
|
Flatpak sandbox escape via spawn portal
|
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and before fixed versions 1.8.5 and 1.10.0. The Flatpak portal D-Bus service (`flatpak-portal`, also known by its D-Bus service name `org.freedesktop.portal.Flatpak`) allows apps in a Flatpak sandbox to launch their own subprocesses in a new sandbox instance, either with the same security settings as the caller or with more restrictive security settings. For example, this is used in Flatpak-packaged web browsers such as Chromium to launch subprocesses that will process untrusted web content, and give those subprocesses a more restrictive sandbox than the browser itself. In vulnerable versions, the Flatpak portal service passes caller-specified environment variables to non-sandboxed processes on the host system, and in particular to the `flatpak run` command that is used to launch the new sandbox instance. A malicious or compromised Flatpak app could set environment variables that are trusted by the `flatpak run` command, and use them to execute arbitrary code that is not in a sandbox. As a workaround, this vulnerability can be mitigated by preventing the `flatpak-portal` service from starting, but that mitigation will prevent many Flatpak apps from working correctly. This is fixed in versions 1.8.5 and 1.10.0.
|
[
"cpe:2.3:a:flatpak:flatpak:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
CVE-2019-3966
|
In OpenEMR 5.0.1 and earlier, controller.php contains a reflected XSS vulnerability in the foreign_id parameter. This could allow an attacker to execute arbitrary code in the context of a user's session.
|
[
"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2023-40207
|
WordPress Donations Made Easy – Smart Donations Plugin <= 4.0.12 is vulnerable to SQL Injection
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RedNao Donations Made Easy – Smart Donations allows SQL Injection.This issue affects Donations Made Easy – Smart Donations: from n/a through 4.0.12.
|
[
"cpe:2.3:a:rednao:donations_made_easy_-_smart_donations:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null | null |
GHSA-532c-wf5h-wp4m
|
The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any local user who has access to system running skyring service will be able to get password in plain text.
|
[] | null | null | 7 | null | null |
|
GHSA-p766-86xm-7h4p
|
Multiple stack-based buffer overflows in AFFLIB before 2.2.6 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) a long LastModified value in an S3 XML response in lib/s3.cpp; (2) a long (a) path or (b) bucket in an S3 URL in lib/vnode_s3.cpp; or (3) a long (c) EFW, (d) AFD, or (c) aimage file path. NOTE: the aimage vector (3c) has since been recalled from the researcher's original advisory, since the code is not called in any version of AFFLIB.
|
[] | null | null | null | null | null |
|
CVE-2014-0379
|
Unspecified vulnerability in the Oracle Demantra Demand Management component in Oracle Supply Chain Products Suite 7.2.0.3 SQL-Server, 7.3.0.x, 7.3.1.x, 12.2.0, 12.2.1, and 12.2.2 allows remote attackers to affect integrity via unknown vectors related to DM Others.
|
[
"cpe:2.3:a:oracle:supply_chain_products_suite:7.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:12.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:12.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:12.2.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-v3x9-wrq5-868j
|
Apache Answer: The link for resetting user password is not Single-Use
|
Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer.This issue affects Apache Answer: through 1.3.5.The password reset link remains valid within its expiration period even after it has been used. This could potentially lead to the link being misused or hijacked.
Users are recommended to upgrade to version 1.3.6, which fixes the issue.
|
[] | 6.3 | 4.8 | null | null | null |
CVE-2006-5888
|
SQL injection vulnerability in viewarticle.asp in Superfreaker Studios UPublisher 1.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter.
|
[
"cpe:2.3:a:superfreaker_studios:upublisher:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2021-20797
|
Cross-site script inclusion vulnerability in the management screen of Cybozu Remote Service 3.1.8 allows a remote authenticated attacker to obtain the information stored in the product. This issue occurs only when using Mozilla Firefox.
|
[
"cpe:2.3:a:cybozu:remote_service_manager:3.1.8:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2002-0217
|
Cross-site scripting (CSS) vulnerabilities in the Private Message System for XOOPS 1.0 RC1 allow remote attackers to execute Javascript on other web clients via (1) the Title field or a Private Message Box or (2) the image field parameter in pmlite.php.
|
[
"cpe:2.3:a:xoops:xoops:1.0_rc1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-rf5r-vg7q-hgm6
|
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a stack exhaustion vulnerability. An authenticated remote attacker can crash the HTTP server via recursive parsing of JSON.
|
[] | null | null | 6.5 | null | null |
|
GHSA-q7f5-h647-x236
|
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
|
[] | null | 3.3 | null | null | null |
|
CVE-2018-16951
|
xunfeng 0.2.0 allows command execution via CSRF because masscan.py mishandles backquote characters, a related issue to CVE-2018-16832.
|
[
"cpe:2.3:a:xunfeng_project:xunfeng:0.2.0:*:*:*:*:*:*:*"
] | null | null | 8 | 6 | null |
|
CVE-2024-21590
|
Junos OS Evolved: Packets which are not destined to the device can reach the RE
|
An Improper Input Validation vulnerability in Juniper Tunnel Driver (jtd) and ICMP module of Juniper Networks Junos OS Evolved allows an unauthenticated attacker within the MPLS administrative domain to send specifically crafted packets to the Routing Engine (RE) to cause a Denial of Service (DoS).
When specifically crafted transit MPLS IPv4 packets are received by the Packet Forwarding Engine (PFE), these packets are internally forwarded to the RE. Continued receipt of these packets may create a sustained Denial of Service (DoS) condition.
This issue affects Juniper Networks Junos OS:
* All versions before 21.2R3-S8-EVO;
* from 21.4-EVO before 21.4R3-S6-EVO;
* from 22.2-EVO before 22.2R3-S4-EVO;
* from 22.3-EVO before 22.3R3-S3-EVO;
* from 22.4-EVO before 22.4R3-EVO;
* from 23.2-EVO before 23.2R2-EVO.
* from 23.4-EVO before 23.4R1-S1-EVO.
|
[] | 7.1 | 5.3 | null | null | null |
CVE-2024-28397
|
An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call.
|
[
"cpe:2.3:a:js2py:js2py_disable_pyimport:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-j9jf-v6vm-xv8j
|
Trend Micro Virus Control System (TVCS) Log Collector allows remote attackers to obtain usernames, encrypted passwords, and other sensitive information via a URL request for getservers.exe with the action parameter set to "selects1", which returns log files.
|
[] | null | null | null | null | null |
|
GHSA-qr8g-6983-rmpw
|
Tufin SecureChange prior to R19.3 HF3 and R20-1 HF1 are vulnerable to stored XSS. The successful exploitation requires admin privileges (for storing the XSS payload itself), and can exploit (be triggered by) admin users. All TOS versions with SecureChange deployments prior to R19.3 HF3 and R20-1 HF1 are affected. Vulnerabilities were fixed in R19.3 HF3 and R20-1 HF1.
|
[] | null | null | null | null | null |
|
CVE-2005-3275
|
The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.
|
[
"cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*"
] | null | null | null | 2.6 | null |
|
GHSA-m288-f8h5-gxr4
|
In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541746; Issue ID: ALPS08541746.
|
[] | null | 4.4 | null | null | null |
|
CVE-2025-32555
|
WordPress SEO, Nutrition and Print for Recipes by Edamam plugin <= 3.3 - CSRF to Cross-Site Scripting vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Edamam SEO, Nutrition and Print for Recipes by Edamam allows Stored XSS. This issue affects SEO, Nutrition and Print for Recipes by Edamam: from n/a through 3.3.
|
[] | null | 7.1 | null | null | null |
GHSA-fvr8-8qwv-7vqx
|
Format string vulnerability in Movable Type Pro, Open Source, and Advanced before 5.2.13 and Pro and Advanced 6.0.x before 6.0.8 allows remote attackers to execute arbitrary code via vectors related to localization of templates.
|
[] | null | null | null | null | null |
|
CVE-2020-10107
|
PHPGurukul Daily Expense Tracker System 1.0 is vulnerable to stored XSS, as demonstrated by the ExpenseItem or ExpenseCost parameter in manage-expense.php.
|
[
"cpe:2.3:a:phpgurukul:daily_expense_tracker_system:1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-w364-8vfv-gvf5
|
Downloads Resources over HTTP in phantomjs-cheniu
|
Affected versions of `phantomjs-cheniu` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `phantomjs-cheniu`.RecommendationNo patch is currently available for this vulnerability.As this package is just a fork of Medium's [`phantomjs-prebuilt`](https://github.com/Medium/phantomjs) package, the best mitigation is currently to install the `Medium` version of [`phantomjs-prebuilt`](https://github.com/Medium/phantomjs). This can be done via the following command:
|
[] | null | null | null | null | null |
CVE-2024-50826
|
A SQL Injection vulnerability was found in /admin/add_content.php in kashipara E-learning Management System Project 1.0 via the title and content parameters.
|
[
"cpe:2.3:a:kashipara:e_learning_management_system_project:*:*:*:*:*:*:*:*",
"cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | null | null | null |
|
GHSA-qgfh-gp2h-mw8x
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Windows). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | 4.9 | null | null |
|
CVE-2010-4757
|
Cross-site scripting (XSS) vulnerability in submitnews.php in e107 before 0.7.23 allows remote attackers to inject arbitrary web script or HTML via the submitnews_title parameter, a different vector than CVE-2008-6208. NOTE: some of these details are obtained from third party information. NOTE: this might be the same as CVE-2009-4083.1 or CVE-2011-0457.
|
[
"cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_10:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_11:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_12:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_13:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_14:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_15:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_15a:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.13:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.14:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.15:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.16:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.17:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.18:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.19:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.545:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.547:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.548:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.549:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.551:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.552:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.553:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.554:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.554:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.555:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.600:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.601:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.602:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.603:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.604:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.605:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.606:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.607:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.608:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.609:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.610:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.611:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.612:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.613:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.614:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.615:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.615a:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.616:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.617:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6171:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6172:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6173:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6174:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6175:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-gw5w-x93w-mq79
|
An issue was discovered in InspIRCd 2 before 2.0.29 and 3 before 3.6.0. The pgsql module contains a use after free vulnerability. When combined with the sqlauth or sqloper modules, this vulnerability can be used for remote crashing of an InspIRCd server by any user able to connect to a server.
|
[] | null | 6.5 | null | null | null |
|
CVE-2024-54135
|
Untrusted Deserialization in ClipBucket-v5 Version 2.0 to 5.5.1 Revision 199
|
ClipBucket V5 provides open source video hosting with PHP. ClipBucket-v5 Version 2.0 to Version 5.5.1 Revision 199 are vulnerable to PHP Deserialization vulnerability. The vulnerability exists in upload/photo_upload.php within the decode_key function. User inputs were supplied to this function without sanitization via collection GET parameter and photoIDS POST parameter respectively. The decode_key function invokes PHP unserialize function as defined in upload/includes/classes/photos.class.php. As a result, it is possible for an adversary to inject maliciously crafted PHP serialized object and utilize gadget chains to cause unexpected behaviors of the application. This vulnerability is fixed in 5.5.1 Revision 200.
|
[
"cpe:2.3:a:clipbucket:clickbucket:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
RHSA-2024:4274
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1.3 (openstack-nova) security update
|
OpenStack: malicious qcow2/vmdk images
|
[
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 8.8 | null | null | null |
GHSA-27rp-767p-m9wx
|
PHP remote file inclusion vulnerability in config.inc.php in XZero Community Classifieds 4.95.11 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the path_escape parameter.
|
[] | null | null | null | null | null |
|
CVE-2019-16335
|
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.
|
[
"cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_api_services:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:customer_management_and_segmentation_foundation:18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:goldengate_application_adapters:19.1.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_gateway:15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_gateway:16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_gateway:16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_gateway:18.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-pfrv-pm3h-c47p
|
There is an Assertion 'ecma_is_value_undefined (value) || ecma_is_value_null (value) || ecma_is_value_boolean (value) || ecma_is_value_number (value) || ecma_is_value_string (value) || ecma_is_value_bigint (value) || ecma_is_value_symbol (value) || ecma_is_value_object (value)' failed at jerry-core/ecma/base/ecma-helpers-value.c in Jerryscripts 3.0.0.
|
[] | null | null | null | null | null |
|
GHSA-2463-g988-qqpj
|
ABB is aware of vulnerabilities in the product versions listed below. An update is available that resolves
the reported vulnerabilities in the product versions under maintenance.
An attacker who successfully exploited one or more of these vulnerabilities could cause the product to
stop or make the product inaccessible.Numeric Range Comparison Without Minimum Check vulnerability in ABB Freelance controllers AC 700F (Controller modules), ABB Freelance controllers AC 900F (controller modules).This issue affects:Freelance controllers AC 700F:from 9.0;0 through V9.2 SP2, through Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019, through Freelance 2019 SP1, through Freelance 2019 SP1 FP1;Freelance controllers AC 900F:Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019, through Freelance 2019 SP1, through Freelance 2019 SP1 FP1.
|
[] | null | 8.6 | null | null | null |
|
GHSA-2p4r-h63c-pgmr
|
The Master Addons – Free Widgets, Hover Effects, Toggle, Conditions, Animations for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in versions up to, and including, 2.0.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2015-1828
|
The Ruby http gem before 0.7.3 does not verify hostnames in SSL connections, which might allow remote attackers to obtain sensitive information via a man-in-the-middle-attack.
|
[
"cpe:2.3:a:http.rb_project:http.rb:*:*:*:*:*:ruby:*:*"
] | null | 5.9 | null | 4.3 | null |
|
CVE-2013-0318
|
The admin page in the Banckle Chat module for Drupal does not properly restrict access, which allows remote attackers to bypass intended restrictions via unspecified vectors.
|
[
"cpe:2.3:a:banckle_chat_project:banckle_chat:-:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2013-2917
|
The ReverbConvolverStage::ReverbConvolverStage function in core/platform/audio/ReverbConvolverStage.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the impulseResponse array.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.64:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2015-3126
|
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-4429.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.190:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.160:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.194:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
RHSA-2018:1449
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.20 security update
|
Artemis: Deserialization of untrusted input vulnerability solr: Directory traversal via Index Replication HTTP API jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 8.1 | null | null |
RHSA-2021:5141
|
Red Hat Security Advisory: OpenShift Container Platform 4.6.52 security update
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
|
[
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 8.1 | null | null | null |
GHSA-fh82-gm3r-mc3q
|
Sante PACS Server is vulnerable to stored cross-site scripting. An attacker could inject malicious HTML codes redirecting a user to a malicious webpage and stealing the user's cookie.
|
[] | 5.1 | 6.1 | null | null | null |
|
CVE-1999-1025
|
CDE screen lock program (screenlock) on Solaris 2.6 does not properly lock an unprivileged user's console session when the host is an NIS+ client, which allows others with physical access to login with any string.
|
[
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.6:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
CVE-2006-4646
|
Cross-site scripting (XSS) vulnerability in the Drupal 4.7 Pathauto module before pathauto_node.inc 1.17.2.1 and the Drupal 4.6 Pathauto module before pathauto_node.inc 1.14.2.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:drupal:drupal_pathauto_module:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal_pathauto_module:4.7:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2018-7832
|
An Improper Input Validation vulnerability exists in Pro-Face GP-Pro EX v4.08 and previous versions which could cause the execution arbitrary executable when GP-Pro EX is launched.
|
[
"cpe:2.3:a:schneider-electric:pro-face_gp-pro_ex:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
GHSA-mf42-cj9f-vmhp
|
The remote keyfob system on Nissan Sylphy Classic 2021 sends the same RF signal for each door-open request, which allows for a replay attack.
|
[] | null | 6.5 | null | null | null |
|
GHSA-4hpg-86m9-2894
|
Cross-site scripting (XSS) vulnerability in ZOHO ManageEngine ADSelfService Plus before 5.2 Build 5202 allows remote attackers to inject arbitrary web script or HTML via the name parameter to GroupSubscription.do.
|
[] | null | null | null | null | null |
|
CVE-2022-49112
|
mt76: fix monitor mode crash with sdio driver
|
In the Linux kernel, the following vulnerability has been resolved:
mt76: fix monitor mode crash with sdio driver
mt7921s driver may receive frames with fragment buffers. If there is a
CTS packet received in monitor mode, the payload is 10 bytes only and
need 6 bytes header padding after RXD buffer. However, only RXD in the
first linear buffer, if we pull buffer size RXD-size+6 bytes with
skb_pull(), that would trigger "BUG_ON(skb->len < skb->data_len)" in
__skb_pull().
To avoid the nonlinear buffer issue, enlarge the RXD size from 128 to
256 to make sure all MCU operation in linear buffer.
[ 52.007562] kernel BUG at include/linux/skbuff.h:2313!
[ 52.007578] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
[ 52.007987] pc : skb_pull+0x48/0x4c
[ 52.008015] lr : mt7921_queue_rx_skb+0x494/0x890 [mt7921_common]
[ 52.008361] Call trace:
[ 52.008377] skb_pull+0x48/0x4c
[ 52.008400] mt76s_net_worker+0x134/0x1b0 [mt76_sdio 35339a92c6eb7d4bbcc806a1d22f56365565135c]
[ 52.008431] __mt76_worker_fn+0xe8/0x170 [mt76 ef716597d11a77150bc07e3fdd68eeb0f9b56917]
[ 52.008449] kthread+0x148/0x3ac
[ 52.008466] ret_from_fork+0x10/0x30
|
[] | null | null | null | null | null |
RHSA-2020:1527
|
Red Hat Security Advisory: OpenShift Container Platform 4.2.29 openshift security update
|
kubernetes: Use of unbounded 'client' label in apiserver_request_total allows for memory exhaustion
|
[
"cpe:/a:redhat:openshift:4.2::el7",
"cpe:/a:redhat:openshift:4.2::el8"
] | null | 4.3 | null | null | null |
CVE-2025-30475
|
Dell PowerScale InsightIQ, versions 5.0 through 5.2, contains an improper privilege management vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to elevation of privileges.
|
[] | null | 8.1 | null | null | null |
|
GHSA-jf3w-9wv7-xjmg
|
Multiple XML external entity (XXE) vulnerabilities in the OpenText Documentum Webtop 6.8.0160.0073 allow remote authenticated users to list the contents of arbitrary directories, read arbitrary files, cause a denial of service, or, on Windows, obtain Documentum user hashes via a (1) crafted DTD, involving unspecified XML structures in a request to xda/com/documentum/ucf/server/transport/impl/GAIRConnector or crafted XML file in a MediaProfile file (2) import or (3) check in.
|
[] | null | null | 8.8 | null | null |
|
GHSA-v49r-2h6g-2ghv
|
libclamav/message.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted e-mail message.
|
[] | null | null | 5.5 | null | null |
|
CVE-2015-7973
|
NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.
|
[
"cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*",
"cpe:2.3:o:siemens:tim_4r-ie_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:tim_4r-ie:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:tim_4r-ie_dnp3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:tim_4r-ie_dnp3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p10:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p12:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p13:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p16:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p19:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p20:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p21:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p22:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p23:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p24:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p25:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p6:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p7:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p8:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:p9:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p10:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p12:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p15:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p16:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p17:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p18:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p19:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p22:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p24:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p25:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p26:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p27:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p6:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p7:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p8:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:p9:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.2:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.2:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.2:p10:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.2:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.2:p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.2:p7:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.2:p8:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.2:p9:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
] | null | 6.5 | null | 5.8 | null |
|
RHSA-2018:2166
|
Red Hat Security Advisory: ansible security and bug fix update
|
ansible: Inventory variables are loaded from current working directory when running ad-hoc command that can lead to code execution ansible: ansible.cfg is being read from current working directory allowing possible code execution
|
[
"cpe:/a:redhat:ansible_engine:2.6::el7"
] | null | null | 7.8 | null | null |
cisco-sa-20190925-iosxe-codeexec
|
Cisco IOS XE Software Arbitrary Code Execution Vulnerability
|
A vulnerability in the filesystem of Cisco IOS XE Software could allow an authenticated, local attacker with physical access to an affected device to execute arbitrary code on the underlying operating system (OS) with root privileges.
The vulnerability is due to insufficient file location validation. An attacker could exploit this vulnerability by placing code in a specific format on a USB device and inserting it into an affected Cisco device. A successful exploit could allow the attacker to execute the code with root privileges on the underlying OS of the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-codeexec ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-codeexec"]
|
[] | null | null | 6.2 | null | null |
CVE-2002-0552
|
Multiple buffer overflows in Melange Chat server 2.02 allow remote or local attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a long argument in the /yell command, (2) long lines in the /etc/melange.conf configuration file, (3) long file names, or possibly other attacks.
|
[
"cpe:2.3:a:melange:melange_chat_system:2.0.2_beta_2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-4pgr-vxfc-4wm7
|
Wavlink WN530HG4 M30HG4.V5030.191116 was discovered to contain a hardcoded encryption/decryption key for its configuration files at /etc_ro/lighttpd/www/cgi-bin/ExportAllSettings.sh.
|
[] | null | 9.8 | null | null | null |
|
CVE-2021-41555
|
In ARCHIBUS Web Central 21.3.3.815 (a version from 2014), XSS occurs in /archibus/dwr/call/plaincall/workflow.runWorkflowRule.dwr because the data received as input from clients is re-included within the HTTP response returned by the application without adequate validation. In this way, if HTML code or client-side executable code (e.g., Javascript) is entered as input, the expected execution flow could be altered. This is fixed in all recent versions, such as version 26. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Version 21.3 was officially de-supported by the end of 2020
|
[
"cpe:2.3:a:archibus:web_central:21.3.3.815:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-f6vh-hx47-j2pg
|
SQL injection vulnerability in insidepage.php in Creative Web Solutions Multi-Level CMS 1.21 allows remote attackers to execute arbitrary SQL commands via the catid parameter. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2020-36657
|
uptimed before 0.4.6-r1 on Gentoo allows local users (with access to the uptimed user account) to gain root privileges by creating a hard link within the /var/spool/uptimed directory, because there is an unsafe chown -R call.
|
[
"cpe:2.3:a:uptimed_project:uptimed:*:*:*:*:*:gentoo:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-435g-qxvx-3xc9
|
In memory management driver, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-183461315
|
[] | null | 7.8 | null | null | null |
|
CVE-2023-32280
|
Insufficiently protected credentials in some Intel(R) Server Product OpenBMC firmware before versions egs-1.05 may allow an unauthenticated user to enable information disclosure via network access.
|
[
"cpe:2.3:h:intel:eagle_stream:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2024-43470
|
Azure Network Watcher VM Agent Elevation of Privilege Vulnerability
|
Azure Network Watcher VM Agent Elevation of Privilege Vulnerability
|
[
"cpe:2.3:a:microsoft:azure_network_watcher_agent_for_windows:-:*:*:*:*:-:*:*",
"cpe:2.3:a:microsoft:azure_network_watcher_agent:*:*:*:*:*:windows:*:*"
] | null | 7.3 | null | null | null |
CVE-2024-44401
|
D-Link DI-8100G 17.12.20A1 is vulnerable to Command Injection via sub47A60C function in the upgrade_filter.asp file
|
[
"cpe:2.3:h:d-link:di-8100:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:di-8100g_firmware:17.12.20a1:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-8100g:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2017-12653
|
360 Total Security 9.0.0.1202 before 2017-07-07 allows Privilege Escalation via a Trojan horse Shcore.dll file in any directory in the PATH, as demonstrated by the C:\Python27 directory.
|
[
"cpe:2.3:a:360totalsecurity:360_total_security:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-f78j-3cq3-m6p4
|
Foreman after 1.1 and before 1.9.0-RC1 does not redirect HTTP requests to HTTPS when the require_ssl setting is set to true, which allows remote attackers to obtain user credentials via a man-in-the-middle attack.
|
[] | null | null | 8.1 | null | null |
|
GHSA-c9p4-vf3c-227c
|
In CalculateInstanceSizeForDerivedClass of objects.cc, there is possible memory corruption due to an integer overflow. This could lead to remote code execution in the proxy auto-config with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 Android ID: A-117556220
|
[] | null | null | null | null | null |
|
RHSA-2006:0548
|
Red Hat Security Advisory: kdebase security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
CVE-2021-24224
|
Easy Form Builder <= 1.0 - Authenticated Arbitrary File Upload
|
The EFBP_verify_upload_file AJAX action of the Easy Form Builder WordPress plugin through 1.0, available to authenticated users, does not have any security in place to verify uploaded files, allowing low privilege users to upload arbitrary files, leading to RCE.
|
[
"cpe:2.3:a:easy-form-builder-by-bitware_project:easy-form-builder-by-bitware:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | 6.5 | null |
GHSA-h4xp-qh97-9m3x
|
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
|
[] | null | null | null | null | null |
|
CVE-2022-3394
|
WP All Export Pro < 1.7.9 - Authenticated Code Injection
|
The WP All Export Pro WordPress plugin before 1.7.9 does not limit some functionality during exports only to users with the Administrator role, allowing any logged in user which has been given privileges to perform exports to execute arbitrary code on the site. By default only administrators can run exports, but the privilege can be delegated to lower privileged users.
|
[
"cpe:2.3:a:soflyy:wp_all_export:*:*:*:*:pro:wordpress:*:*"
] | null | 7.2 | null | null | null |
GHSA-g25p-5rvg-vw46
|
Jizhicms v2.2.5 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via the Index function in app/admin/c/PluginsController.php.
|
[] | null | 9.1 | null | null | null |
|
GHSA-pwgm-jvqv-6v8p
|
Plone anonymous access to sub-objects in CMFEditions where KwAsAttributes classes were publishable
|
The CMFEditions component 2.x in Plone 4.0.x through 4.0.9, 4.1, and 4.2 through 4.2a2 does not prevent the KwAsAttributes classes from being publishable, which allows remote attackers to access sub-objects via unspecified vectors, a different vulnerability than CVE-2011-3587.
|
[] | null | null | null | null | null |
CVE-2017-12680
|
Cross-Site Scripting (XSS) exists in NexusPHP 1.5 via the type parameter to shoutbox.php.
|
[
"cpe:2.3:a:nexusphp_project:nexusphp:1.5:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-8fx8-6qv2-vv95
|
Use-after-free vulnerability in Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving counter nodes, related to a "read-after-free" issue.
|
[] | null | null | null | null | null |
|
CVE-2004-1904
|
Buffer overflow in ascontrol.dll in Panda ActiveScan 5.0 allows remote attackers to execute arbitrary code via the Internacional property followed by a long string.
|
[
"cpe:2.3:a:panda:activescan:5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-xqqc-m37j-mrfx
|
An issue was discovered in certain Apple products. iOS before 11.3 is affected. macOS before 10.13.4 is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "Quick Look" component. A race condition allows attackers to execute arbitrary code in a privileged context via a crafted app.
|
[] | null | null | 7 | null | null |
|
GHSA-3h5g-rhxf-84j5
|
Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.
|
[] | null | 6.5 | null | null | null |
|
CVE-2018-7196
|
Cross-site scripting (XSS) vulnerability in /scp/index.php in Enhancesoft osTicket before 1.10.2 allows remote attackers to inject arbitrary web script or HTML via the "sort" parameter.
|
[
"cpe:2.3:a:osticket:osticket:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-34qx-f7ff-w7xc
|
Artica Proxy 3.06.200056 allows remote attackers to execute arbitrary commands as root by reading the ressources/settings.inc ldap_admin and ldap_password fields, using these credentials at logon.php, and then entering the commands in the admin.index.php command-line field.
|
[] | null | null | 7.2 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.