id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2018-19950
|
If exploited, this command injection vulnerability could allow remote attackers to execute arbitrary commands. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11.
|
[
"cpe:2.3:a:qnap:music_station:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.3.3:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2022-34888
|
The Remote Mount feature can potentially be abused by valid, authenticated users to make connections to internal services that may not normally be accessible to users. Internal service access controls, as applicable, remain in effect.
|
[
"cpe:2.3:o:lenovo:thinkagile_vx3331_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx3331:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx_enclosure_certified_node_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx_enclosure_certified_node:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx1021_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx1021:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx1320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx1320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx1321_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx1321:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx1520-r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx1520-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx1521-r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx1521-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx2320-e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx2320-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx2321_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx2321:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx2720-e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx2720-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3321_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3321:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3375_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3376_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3376:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3520-g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3520-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3521-g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3521-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3720_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3720:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3721_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3721:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx5520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx5520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx5520-c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx5520-c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx5521_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx5521:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx5521-c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx5521-c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx7520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx7520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx7521_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx7521:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx7820_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx7820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx7821_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx7821:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx1020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx1020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3330-f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3330-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3330-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3330-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3331-f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3331-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3331-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3331-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3530_f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3530_f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3530-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3530-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3531-f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3531-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3531_h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3531_h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx1021_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx1021:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx_1se_certified_node_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx_1se_certified_node:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx_2u4n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx_2u4n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx_4u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx_4u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx1320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx1320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx2320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx2320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx2330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx2330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx3320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx3320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx3330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx3330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx3520-g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx3520-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx3530-g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx3530-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx3720_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx3720:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx5520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx5520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx5530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx5530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7320_n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7320_n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7520_n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7520_n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7531_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7531:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7820_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkedge_se450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkedge_se450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p920_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sd530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sd530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sd630_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sd630_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sd650_dwc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sd650_dwc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sd650_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sd650_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sd650-n_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sd650-n_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_se350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_se350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sn550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sn550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sn550_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sn550_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sn850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sn850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr158_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr158:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr250_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr250_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr258_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr258:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr258_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr258_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr630_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr630_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr630_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr645_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr650_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr650_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr665_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr670_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr670_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr670_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr850_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr850_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr850p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr850p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr860_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr860:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr860_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr860_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr950_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st250_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st250_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st258_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st258:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st258_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st258_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st650_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st650_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st658_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st658_v2:-:*:*:*:*:*:*:*"
] | null | 2.7 | null | null | null |
|
CVE-2023-41609
|
An open redirect vulnerability in the sanitize_url() parameter of CouchCMS v2.3 allows attackers to redirect a victim user to an arbitrary web site via a crafted URL.
|
[
"cpe:2.3:a:couchcms:couchcms:2.3:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-qg5c-7q7p-mwc6
|
The mysql_create_function function in sql_udf.cc for MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta, when running on Windows, uses an incomplete blacklist in a directory traversal check, which allows attackers to include arbitrary files via the backslash (\) character.
|
[] | null | null | null | null | null |
|
CVE-2017-17990
|
Biometric Shift Employee Management System has CSRF via index.php in an edit_holiday action.
|
[
"cpe:2.3:a:iwcnetwork:biometric_shift_employee_management_system:4.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2025-54714
|
WordPress Zephyr Project Manager Plugin <= 3.3.201 - Broken Access Control Vulnerability
|
Missing Authorization vulnerability in Dylan James Zephyr Project Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Zephyr Project Manager: from n/a through 3.3.201.
|
[] | null | 7.1 | null | null | null |
CVE-2021-32817
|
File disclosure in express-hbs
|
express-hbs is an Express handlebars template engine. express-hbs mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .hbs appended to them. For complete details refer to the referenced GHSL-2021-019 report. Notes in documentation have been added to help users of express-hbs avoid this potential information exposure vulnerability.
|
[
"cpe:2.3:a:express_handlebars_project:express_handlebars:*:*:*:*:*:node.js:*:*"
] | null | 5.4 | null | null | null |
GHSA-w7gq-r88x-g96q
|
In all Qualcomm products with Android releases from CAF using the Linux kernel, in wma_unified_link_radio_stats_event_handler(), the number of radio channels coming from firmware is not properly validated, potentially leading to an integer overflow vulnerability followed by a buffer overflow.
|
[] | null | null | 7.8 | null | null |
|
GHSA-hcx3-vjpp-qv3j
|
Insufficient verification vulnerability in the baseband module
Impact: Successful exploitation of this vulnerability will affect availability.
|
[] | null | 7.5 | null | null | null |
|
CVE-2010-3472
|
Multiple cross-site scripting (XSS) vulnerabilities in the Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 3.5.1 before 3.5.1-021 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:001:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:002:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:003:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:004:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:005:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:006:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:007:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:008:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:009:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:010:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:011:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:012:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:013:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:014:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:015:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:016:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:017:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:018:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:019:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:020:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-jmgw-798h-3j7f
|
Cross-site request forgery (CSRF) vulnerability in the Internationalization (i18n) Drupal module 5.x before 5.x-2.3 and 5.x-1.1, and 6.x before 6.x-1.0 beta 1, allows remote attackers to change node translation relationships via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-37rq-2prw-jghm
|
An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), and M(6.0) software. There is a NULL pointer exception in PersonManager, causing memory corruption. The Samsung ID is SVE-2017-8286 (June 2017).
|
[] | null | null | null | null | null |
|
CVE-2018-4300
|
The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10.
|
[
"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
CVE-2000-1013
|
The setlocale function in FreeBSD 5.0 and earlier, and possibly other OSes, allows local users to read arbitrary files via the LANG environmental variable.
|
[
"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-7f75-78v9-wprf
|
cPanel before 76.0.8 has an open redirect when resetting connections (SEC-462).
|
[] | null | null | null | null | null |
|
CVE-2010-4852
|
Cross-site scripting (XSS) vulnerability in login.php in Eclime 1.1.2b allows remote attackers to inject arbitrary web script or HTML via the reason parameter in a fail action.
|
[
"cpe:2.3:a:eclime:eclime:1.1.2b:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-cqgc-qhjv-6wj9
|
Multiple SQL injection vulnerabilities in EasyFill before 0.5.1 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2017-14761
|
In GeniXCMS 1.1.4, /inc/lib/backend/menus.control.php has XSS via the id parameter.
|
[
"cpe:2.3:a:genixcms:genixcms:1.1.4:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-f6j3-8mjq-3wxc
|
Out-of-bounds Write in GitHub repository gpac/gpac prior to 2.3-DEV.
|
[] | null | null | 5.3 | null | null |
|
CVE-2017-3718
|
Improper setting of device configuration in system firmware for Intel(R) NUC kits may allow a privileged user to potentially enable escalation of privilege via physical access.
|
[
"cpe:2.3:o:intel:nuc_kit_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_d33217gke:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_d53427rke:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_d54250wyb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_de3815tybe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_dn2820fykh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5cpyh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5i3myhe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5i5myhe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5i7ryh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5pgyh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc6i5syh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc6i7kyk:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i3dnhe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i5dnke:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i7bnh:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i7dnke:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_card_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_card_cd1iv128mk:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_card_cd1m3128mk:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_card_cd1p64gk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_stick_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_stick_stk1aw32sc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*"
] | null | null | 6.2 | 4.6 | null |
|
GHSA-jxfr-4vcf-h5vv
|
Directory traversal vulnerability in device-linux.c in the router advertisement daemon (radvd) before 1.8.2 allows local users to overwrite arbitrary files, and remote attackers to overwrite certain files, via a .. (dot dot) in an interface name. NOTE: this can be leveraged with a symlink to overwrite arbitrary files.
|
[] | null | null | null | null | null |
|
CVE-2017-10875
|
I-O DATA DEVICE LAN DISK Connect Ver2.02 and earlier allows an attacker to cause a denial of service in the application via unspecified vectors.
|
[
"cpe:2.3:o:iodata:lan_disk_connect_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:lan_disk_connect:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-g42g-737j-qx6j
|
Access Restriction Bypass in kube-apiserver
|
A vulnerability in Kubernetes `kube-apiserver` could allow node updates to bypass a _Validating Admission Webhook_ and allow unauthorized node updates. The information that is provided to the admission controller could contain old configurations that overwrite values used for validation. Since the overwriting takes place before the validation, this could lead the admission controller to accept requests that should be blocked. The vulnerability can be exploited when an update action on node resources is performed and an admission controller is in place and configured to validate the action.Users are only affected by this vulnerability if they are running a _Validating Admission Webhook_ for Nodes that denies admission based partially on the old state of the Node object. It only impacts validating admission plugins that rely on old values in certain fields and does not impact calls from kubelets that go through the built-in NodeRestriction admission plugin.
|
[] | null | 6.5 | null | null | null |
RHSA-2014:0462
|
Red Hat Security Advisory: Red Hat JBoss Web Framework Kit 2.5.0 security update
|
Seam: XSS flaw in remoting
|
[
"cpe:/a:redhat:jboss_enterprise_web_framework:2.5.0"
] | null | null | null | null | null |
CVE-2024-27406
|
lib/Kconfig.debug: TEST_IOV_ITER depends on MMU
|
In the Linux kernel, the following vulnerability has been resolved:
lib/Kconfig.debug: TEST_IOV_ITER depends on MMU
Trying to run the iov_iter unit test on a nommu system such as the qemu
kc705-nommu emulation results in a crash.
KTAP version 1
# Subtest: iov_iter
# module: kunit_iov_iter
1..9
BUG: failure at mm/nommu.c:318/vmap()!
Kernel panic - not syncing: BUG!
The test calls vmap() directly, but vmap() is not supported on nommu
systems, causing the crash. TEST_IOV_ITER therefore needs to depend on
MMU.
|
[] | null | null | null | null | null |
CVE-2025-51541
|
A stored cross-site scripting (XSS) vulnerability exists in the Shopware 6 installation interface at /recovery/install/database-configuration/. The c_database_schema field fails to properly sanitize user-supplied input before rendering it in the browser, allowing an attacker to inject malicious JavaScript. This vulnerability can be exploited via a Cross-Site Request Forgery (CSRF) attack due to the absence of CSRF protections on the POST request. An unauthenticated remote attacker can craft a malicious web page that, when visited by a victim, stores the payload persistently in the installation configuration. As a result, the payload executes whenever any user subsequently accesses the vulnerable installation page, leading to persistent client-side code execution.
|
[] | null | 6.1 | null | null | null |
|
GHSA-hxhc-wmg8-xrqf
|
namshi/jose insecure JSON Web Signatures (JWS)
|
namshi/jose allows the acceptance of unsecure JSON Web Signatures (JWS) by default. The vulnerability arises from the $allowUnsecure flag, which, when set to true during the loading of JWSes, permits tokens signed with 'none' algorithms to be processed. This behavior poses a significant security risk as it could allow an attacker to impersonate users by crafting a valid jwt token.
|
[] | null | null | null | null | null |
GHSA-ccj4-qhw4-4rrm
|
An issue has been discovered in GitLab EE affecting all versions starting from 15.10 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. Instances with Product Analytics Dashboard configured and enabled could be vulnerable to SSRF attacks.
|
[] | null | 8.2 | null | null | null |
|
CVE-2008-5645
|
Directory traversal vulnerability in the media server in Orb Networks Orb before 2.01.0022 allows remote attackers to read arbitrary files via directory traversal sequences in an HTTP GET request.
|
[
"cpe:2.3:a:orb_networks:orb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:orb_networks:orb:2.00.0930:*:*:*:*:*:*:*",
"cpe:2.3:a:orb_networks:orb:2.00.0989:*:*:*:*:*:*:*",
"cpe:2.3:a:orb_networks:orb:2.0.1014:*:*:*:*:*:*:*",
"cpe:2.3:a:orb_networks:orb:2.00.1014:*:*:*:*:*:*:*",
"cpe:2.3:a:orb_networks:orb:2.00.1084:*:*:*:*:*:*:*",
"cpe:2.3:a:orb_networks:orb:2.01.0008:*:*:*:*:*:*:*",
"cpe:2.3:a:orb_networks:orb:2.01.0013:*:*:*:*:*:*:*",
"cpe:2.3:a:orb_networks:orb:2.01.0015:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-r6jc-q7pg-2fgq
|
DPTech VPN v8.1.28.0 was discovered to contain an arbitrary file read vulnerability.
|
[] | null | 7.5 | null | null | null |
|
GHSA-p87g-jvpm-qw44
|
Leif M. Wright's Blog 3.5 stores the config file and other txt files under the web root with insufficient access control, which allows remote attackers to read the administrator's password.
|
[] | null | null | null | null | null |
|
CVE-2024-44223
|
This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.1. An attacker with physical access to a Mac may be able to view protected content from the Login Window.
|
[
"cpe:2.3:o:apple:macos:15.0:*:*:*:*:*:*:*"
] | null | 4.6 | null | null | null |
|
CVE-2018-18506
|
When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox < 65.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 | null |
|
CVE-2024-48286
|
Linksys E3000 1.0.06.002_US is vulnerable to command injection via the diag_ping_start function.
|
[
"cpe:2.3:o:linksys:e3000_firmware:1.0.06.002_us:*:*:*:*:*:*:*"
] | null | 8 | null | null | null |
|
RHSA-2005:039
|
Red Hat Security Advisory: enscript security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null | null |
GHSA-c6w5-gx3w-hp7j
|
IBM QRadar Advisor with Watson 1.14.0 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 147810.
|
[] | null | null | 7.5 | null | null |
|
GHSA-5v4r-m243-rv3w
|
Multiple heap-based buffer overflows in Mozilla Thunderbird before 1.5.0.9 and SeaMonkey before 1.0.7 allow remote attackers to execute arbitrary code via (1) external message modies with long Content-Type headers or (2) long RFC2047-encoded (MIME non-ASCII) headers.
|
[] | null | null | null | null | null |
|
CVE-2023-30613
|
Kiwi TCMS unrestricted file upload vulnerability
|
Kiwi TCMS, an open source test management system, allows users to upload attachments to test plans, test cases, etc. In versions of Kiwi TCMS prior to 12.2, there is no control over what kinds of files can be uploaded. Thus, a malicious actor may upload an `.exe` file or a file containing embedded JavaScript and trick others into clicking on these files, causing vulnerable browsers to execute malicious code on another computer.
Kiwi TCMS v12.2 comes with functionality that allows administrators to configure additional upload validator functions which give them more control over what file types are accepted for upload. By default `.exe` are denied. Other files containing the `<script>` tag, regardless of their type are also denied b/c they are a path to XSS attacks. There are no known workarounds aside from upgrading.
|
[
"cpe:2.3:a:kiwitcms:kiwi_tcms:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
RHSA-2019:1707
|
Red Hat Security Advisory: ansible security and bug fix update
|
ansible: unsafe template evaluation of returned module data can lead to information disclosure
|
[
"cpe:/a:redhat:ansible_engine:2.6::el7"
] | null | null | 4.6 | null | null |
CVE-2020-4604
|
IBM Security Guardium Insights 2.0.2 stores user credentials in plain in clear text which can be read by a local privileged user. IBM X-Force ID: 184861.
|
[
"cpe:2.3:a:ibm:security_guardium_insights:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 4.1 | null | null |
|
CVE-2023-28821
|
Concrete CMS (previously concrete5) before 9.1 did not have a rate limit for password resets.
|
[
"cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2025-26962
|
WordPress Contact Form Plugin plugin <= 1.1.25 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GhozyLab Easy Contact Form Lite allows Stored XSS. This issue affects Easy Contact Form Lite : from n/a through 1.1.25.
|
[] | null | 6.5 | null | null | null |
CVE-2022-35535
|
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameter macAddr, which leads to command injection in page /wifi_mesh.shtml.
|
[
"cpe:2.3:o:wavlink:wn572hp3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn572hp3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wavlink:wn533a8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn533a8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wavlink:wn530h4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wavlink:wn535g3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn535g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wavlink:wn531p3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn531p3:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-3h93-cxvw-xx82
|
The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the HTML attributes of the Countdown Timer Widget in all versions up to, and including, 2.7.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-xxfh-x98p-j8fr
|
Remote code injection in Log4j (through pax-logging-log4j2)
|
ImpactRemote Code Execution.PatchesUsers of pax-logging 1.11.9 should update to 1.11.10.
Users of pax-logging 2.0.10 should update to 2.0.11.WorkaroundsSet system property `-Dlog4j2.formatMsgNoLookups=true`Referenceshttps://github.com/advisories/GHSA-jfh8-c2jp-5v3q
|
[] | null | null | null | null | null |
GHSA-7c32-r36c-5227
|
Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.
|
[] | null | null | null | null | null |
|
ICSMA-18-347-01
|
Medtronic 9790, 2090 CareLink, and 29901 Encore Programmers
|
The affected products do not encrypt or do not sufficiently encrypt the following sensitive information while at rest: PII. Some combination of personal data that enables the unique identification of an individual. PII is defined as information that can be used to distinguish or trace an individual 's identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual.
PHI. Some combination of PII and associated health related data.
CVE-2018-18984 has been assigned to this vulnerability. A CVSS v3 base score of 4.6 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[] | null | null | 4.6 | null | null |
CVE-2025-7580
|
code-projects Voting System positions_row.php sql injection
|
A vulnerability classified as critical was found in code-projects Voting System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/positions_row.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
GHSA-58fw-grv9-c5qh
|
phpgurukul Hospital Management System 4.0 is vulnerable to SQL Injection in index.php via the username parameter.
|
[] | null | 9.8 | null | null | null |
|
GHSA-5pwc-cvx7-34mp
|
HDF5 through 1.13.3 and/or 1.14.2 contains a stack buffer overflow in H5HG_read, resulting in denial of service or potential code execution.
|
[] | null | 7.4 | null | null | null |
|
ICSA-23-073-04
|
AVEVA Plant SCADA and AVEVA Telemetry Server
|
The listed versions of AVEVA Plant SCADA and AVEVA Telemetry Server are vulnerable to an improper authorization exploit, which could allow an unauthenticated user to remotely read data, cause a denial-of-service condition, and tamper with alarm states. CVE-2023-1256 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 9.8 | null | null |
GHSA-x82c-j6h7-66r2
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.0.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA CXFA_FFDocView object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7777.
|
[] | null | 7.8 | null | null | null |
|
GHSA-fj54-mvm9-92fv
|
Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.0.4.0.5.012 contain a Denial of Service vulnerability on NAS Servers with NFS exports. A remote authenticated attacker could potentially exploit this vulnerability and cause Denial of Service (Storage Processor Panic) by sending specially crafted UDP requests.
|
[] | null | null | null | null | null |
|
CVE-2001-0876
|
Buffer overflow in Universal Plug and Play (UPnP) on Windows 98, 98SE, ME, and XP allows remote attackers to execute arbitrary code via a NOTIFY directive with a long Location URL.
|
[
"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-gccm-j8cw-3hcg
|
The inprosysmedia-likes-dislikes-post WordPress plugin through 1.0.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
|
[] | null | 7.5 | null | null | null |
|
CVE-2012-0169
|
Microsoft Internet Explorer 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "JScript9 Remote Code Execution Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-46v9-6x8x-35pw
|
Certain NETGEAR devices are affected by authentication bypass. This affects D6100 before V1.0.0.55, D7000 before V1.0.1.50, D7800 before V1.0.1.24, JNR1010v2 before 1.1.0.40, JWNR2010v5 before 1.1.0.40, R6100 before 1.0.1.12, R6220 before 1.1.0.50, R7500 before 1.0.0.108, R7500v2 before 1.0.3.10, WNDR4300v1 before 1.0.2.88, WNDR4300v2 before 1.0.0.48, WNDR4500v3 before 1.0.0.48, WNR1000v4 before 1.1.0.40, WNR2000v5 before 1.0.0.42, WNR2020 before 1.1.0.40, and WNR2050 before 1.1.0.40.
|
[] | null | null | null | null | null |
|
GHSA-7j57-vrgm-pf2m
|
Winamp 2.78 and 2.77, when opening a wma file that requires a license, sends the full path of the Temporary Internet Files directory to the web page that is processing the license, which could allow malicious web servers to obtain the pathname.
|
[] | null | null | null | null | null |
|
GHSA-xr82-rp9q-jgqf
|
Microsoft Office 2007 SP3, Office 2010 SP2, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
|
[] | null | null | 7.8 | null | null |
|
GHSA-pfg2-93ch-p8v2
|
STDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .djvu file, related to a "Possible Stack Corruption starting at STDUDjVuFile!DllUnregisterServer+0x000000000000e8b8."
|
[] | null | null | 7.8 | null | null |
|
GHSA-v693-ww24-qwmw
|
A stack-based buffer overflow vulnerability exists in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can send a series of HTTP requests to trigger this vulnerability.
|
[] | null | 7.2 | null | null | null |
|
GHSA-g5jf-4jgf-qr8g
|
Buffer overflow in display function due to memory copy without checking length of size using strcpy function in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8909W, MSM8917, MSM8953, MSM8996AU, QCS605, QM215, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SM6150, SM7150, SM8150
|
[] | null | null | null | null | null |
|
GHSA-vgcq-82fv-3w3f
|
Insufficient access control vulnerability in subsystem in Intel(R) SPS before version SPS_E3_05.00.04.027.0 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
|
[] | null | null | 6.8 | null | null |
|
GHSA-2qrf-2xwp-4jc4
|
In JetBrains YouTrack before 2021.4.31698, a custom logo could be set by a user who has read-only permissions.
|
[] | null | null | null | null | null |
|
CVE-2020-19212
|
SQL Injection vulnerability in admin/group_list.php in piwigo v2.9.5, via the group parameter to delete.
|
[
"cpe:2.3:a:piwigo:piwigo:2.9.5:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 | null |
|
GHSA-9h44-mprw-x9wq
|
Faust Informatics Freestyle Chat server prior to 4.1 SR3 allows a remote attacker to create a denial of service via a URL request which includes a MS-DOS device name (e.g., GET /aux HTTP/1.0).
|
[] | null | null | null | null | null |
|
CVE-2022-35837
|
Windows Graphics Component Information Disclosure Vulnerability
|
Windows Graphics Component Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:rt:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:azure:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-5vxp-j78v-p6qp
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 4.9 | null | null | null |
|
CVE-2019-0673
|
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0671, CVE-2019-0672, CVE-2019-0674, CVE-2019-0675.
|
[
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-m7jq-xvr4-f7xc
|
A vulnerability in Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of certain TLS connections that are processed by an affected device. An attacker could exploit this vulnerability by establishing a large number of concurrent TLS connections to an affected device. A successful exploit could allow the attacker to cause the device to drop new TLS email messages that come from the associated email servers. Exploitation of this vulnerability does not cause the affected device to unexpectedly reload. The device will recover autonomously within a few hours of when the attack is halted or mitigated.
|
[] | null | 7.5 | null | null | null |
|
GHSA-cq66-gwxj-2wjq
|
JBoss Drools, Red Hat JBoss BRMS before 6.0.1, and Red Hat JBoss BPM Suite before 6.0.1 allows remote authenticated users to execute arbitrary Java code via a (1) MVFLEX Expression Language (MVEL) or (2) Drools expression.
|
[] | null | null | null | null | null |
|
CVE-2015-8874
|
Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call.
|
[
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-xq3x-fm54-p4gq
|
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A use-after-free condition can occur when accessing the Creator property of the this.info object. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
|
[] | null | null | 7.8 | null | null |
|
GHSA-jhqh-84v8-3cw2
|
An issue was discovered in Varnish HTTP Cache 4.0.1 through 4.0.4, 4.1.0 through 4.1.7, 5.0.0, and 5.1.0 through 5.1.2. A wrong if statement in the varnishd source code means that particular invalid requests from the client can trigger an assert, related to an Integer Overflow. This causes the varnishd worker process to abort and restart, losing the cached contents in the process. An attacker can therefore crash the varnishd worker process on demand and effectively keep it from serving content - a Denial-of-Service attack. The specific source-code filename containing the incorrect statement varies across releases.
|
[] | null | null | 7.5 | null | null |
|
CVE-2012-1122
|
bug_actiongroup.php in MantisBT before 1.2.9 does not properly check the report_bug_threshold permission of the receiving project when moving a bug report, which allows remote authenticated users with the report_bug_threshold and move_bug_threshold privileges for a project to bypass intended access restrictions and move bug reports to a different project.
|
[
"cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*"
] | null | null | null | 3.6 | null |
|
GHSA-7mxx-rmjg-w89q
|
Possible null pointer dereference in thread cache operation handler due to lack of validation of user provided input in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
|
[] | null | null | null | null | null |
|
CVE-2023-51415
|
WordPress GiveWP Plugin <= 3.2.2 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GiveWP GiveWP – Donation Plugin and Fundraising Platform allows Stored XSS.This issue affects GiveWP – Donation Plugin and Fundraising Platform: from n/a through 3.2.2.
|
[
"cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
GHSA-5c5j-3cq6-f3m3
|
Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.
|
[] | null | null | null | null | null |
|
GHSA-8hxm-3hf9-xxjx
|
IBM Security Secret Server 10.7 could disclose sensitive information to an authenticated user from generated error messages. IBM X-Force ID: 170013.
|
[] | null | null | null | null | null |
|
GHSA-j8wj-77mv-262g
|
RSFirewall tries to identify the original IP address by looking at different HTTP headers. A bypass is possible due to the way it is implemented.
|
[] | null | 9.8 | null | null | null |
|
CVE-2023-41849
|
WordPress Posts Like Dislike plugin <= 1.1.0 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in WP Happy Coders Posts Like Dislike allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Posts Like Dislike: from n/a through 1.1.0.
|
[] | null | 5.3 | null | null | null |
GHSA-739f-7ph5-7mxh
|
Use-after-free vulnerability in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.
|
[] | null | null | null | null | null |
|
CVE-2014-5697
|
The Dress Up! Girl Party (aka com.sgn.DressUp.GirlParty) application 2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:dressup:dress_up\\!_girl_party:2.0:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2015-6757
|
Use-after-free vulnerability in content/browser/service_worker/embedded_worker_instance.cc in the ServiceWorker implementation in Google Chrome before 46.0.2490.71 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging object destruction in a callback.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
RHSA-2021:1585
|
Red Hat Security Advisory: glibc security, bug fix, and enhancement update
|
glibc: iconv program can hang when invoked with the -c option glibc: regular-expression match via proceed_next_node in posix/regexec.c leads to heap-based buffer over-read glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop glibc: Assertion failure in ISO-2022-JP-3 gconv module related to combining characters
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | 6.5 | null | null |
GHSA-g9fj-wcmm-j9x3
|
HRworks FLOW 3.36.9 allows XSS via the purpose of a travel-expense report.
|
[] | null | 5.4 | null | null | null |
|
CVE-2017-1000456
|
freedesktop.org libpoppler 0.60.1 fails to validate boundaries in TextPool::addWord, leading to overflow in subsequent calculations.
|
[
"cpe:2.3:a:freedesktop:poppler:0.60.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-c7r5-764x-hfqw
|
A vulnerability was found in FreeFloat FTP Server 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the component REIN Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null | null |
|
GHSA-xrvj-239r-5xw7
|
Web content could access information in the HTTP cache if e10s is disabled. This can reveal some visited URLs and the contents of those pages. This issue affects Firefox 48 and 49. This vulnerability affects Firefox < 49.0.2.
|
[] | null | null | 5.9 | null | null |
|
GHSA-cc8m-2vqf-jcfq
|
PHP remote file inclusion vulnerability in includes/joomla.php in Joomla! 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the includepath parameter.
|
[] | null | null | null | null | null |
|
CVE-2023-20558
|
Insufficient control flow management in AmdCpmOemSmm may allow a privileged attacker to tamper with the SMM handler potentially leading to an escalation of privileges.
|
[
"cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5825c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5425c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3450u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3450u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3500u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3500c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3500c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3550h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3550h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3580u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3580u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3700u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3700c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3700c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3750h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3780u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3780u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2600x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2700x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2700x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3500x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3600x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3600xt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3700x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3800x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3800xt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3900x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3900xt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3950x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_pro_3900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_pro_3900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4700g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4700ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_4300g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_4300ge_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-98fj-2mhw-486f
|
SQL injection vulnerability in news_desc.php in Softbiz Jobs allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] | null | null | null | null | null |
|
GHSA-58pq-phhq-59vj
|
Trend Micro VPN Proxy One Pro, version 5.8.1012 and below is vulnerable to an arbitrary file overwrite or create attack but is limited to local Denial of Service (DoS) and under specific conditions can lead to elevation of privileges.
|
[] | null | 5.3 | null | null | null |
|
CVE-2020-12352
|
Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 3.3 | null |
|
CVE-2022-25848
|
Directory Traversal
|
This affects all versions of package static-dev-server. This is because when paths from users to the root directory are joined, the assets for the path accessed are relative to that of the root directory.
|
[
"cpe:2.3:a:static-dev-server_project:static-dev-server:1.0.0:*:*:*:*:node.js:*:*"
] | null | 7.5 | null | null | null |
GHSA-2wgq-7fx9-jf45
|
In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary shell characters during manual network configuration resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
|
[] | null | null | 8.8 | null | null |
|
CVE-2021-23355
|
Arbitrary Command Injection
|
This affects all versions of package ps-kill. If (attacker-controlled) user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file. PoC (provided by reporter): var ps_kill = require('ps-kill'); ps_kill.kill('$(touch success)',function(){});
|
[
"cpe:2.3:a:ps-kill_project:ps-kill:*:*:*:*:*:node.js:*:*"
] | null | 5.6 | null | null | null |
GHSA-mj48-4fj3-6fjg
|
VMware Workstation( 17.x prior to 17.5) and Fusion(13.x prior to 13.5) contain an out-of-bounds
read vulnerability that exists in the functionality for sharing host
Bluetooth devices with the virtual machine. A malicious actor with local administrative privileges on a virtual
machine may be able to read privileged information contained in
hypervisor memory from a virtual machine.
|
[] | null | 7.1 | null | null | null |
|
CVE-2023-31446
|
In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup.
|
[
"cpe:2.3:o:cassianetworks:xc1000_firmware:2.1.1.2303082218:*:*:*:*:*:*:*",
"cpe:2.3:h:cassianetworks:xc1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cassianetworks:xc2000_firmware:2.1.1.2303090947:*:*:*:*:*:*:*",
"cpe:2.3:h:cassianetworks:xc2000:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-g6jf-2287-2h68
|
RoomWizard before 4.4.x allows XSS via the HelpAction.action pageName parameter.
|
[] | null | null | 6.1 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.