id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2011-0561
|
Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2008-7012
|
courier/1000@/api_error_email.html (aka "error reporting page") in Accellion File Transfer Appliance FTA_7_0_178, and possibly other versions before FTA_7_0_189, allows remote attackers to send spam e-mail via modified description and client_email parameters.
|
[
"cpe:2.3:h:accellion:secure_file_transfer_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:h:accellion:secure_file_transfer_appliance:7_0_135:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
CVE-2023-4805
|
Tutor LMS < 2.3.0 - Subscriber+ Stored Cross-Site Scripting
|
The Tutor LMS WordPress plugin before 2.3.0 does not sanitise and escape some of its settings, which could allow users such as subscriber to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
[
"cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
GHSA-7m9j-326v-p83m
|
Cross-site scripting (XSS) vulnerability in services/diagnostics.php in the WordPress Social Login plugin 2.0.3 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the xhrurl parameter.
|
[] | null | null | null | null | null |
|
RHSA-2014:0897
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
|
PicketLink: XXE via insecure DocumentBuilderFactory usage
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0"
] | null | null | null | null | null |
CVE-2008-1876
|
PHP remote file inclusion vulnerability in index.php in VisualPic 0.3.1 allows remote attackers to execute arbitrary PHP code via a URL in the _CONFIG[files][functions_page] parameter.
|
[
"cpe:2.3:a:snarky:visualpic:0.3.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2021-22148
|
Elastic Enterprise Search App Search versions before 7.14.0 was vulnerable to an issue where API keys were not bound to the same engines as their creator. This could lead to a less privileged user gaining access to unauthorized engines.
|
[
"cpe:2.3:a:elastic:enterprise_search:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-j4rg-rp32-grwp
|
Improper access control for some Intel(R) EMA software before version 1.13.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | 7 | 8.2 | null | null | null |
|
CVE-2024-43391
|
Phoenix Contact: Firewall reconfiguration through the FW_PORTFORWARDING.SRC_IP in MGUARD devices
|
A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_PORTFORWARDING.SRC_IP environment variable which can lead to a DoS.
|
[
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_att_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_att_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_3g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_smart2_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_smart2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs2005_tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pci4000_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pci4000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_core_tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_core_tx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_centerport_vpn-1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_centerport_vpn-1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4305_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4305:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4302_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pcie_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4102_pcie:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pci_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4102_pci:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_2105_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_2105:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_2102_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_2102:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
GHSA-rfcv-37mc-m46j
|
Reflected cross site scripting (XSS)
|
[] | null | 6.1 | null | null | null |
|
RHSA-2023:4341
|
Red Hat Security Advisory: Logging Subsystem 5.7.4 - Red Hat OpenShift bug fix and security update
|
nodejs-semver: Regular expression denial of service rubygem-activesupport: Regular Expression Denial of Service
|
[
"cpe:/a:redhat:logging:5.7::el8"
] | null | 7.5 | null | null | null |
CVE-2024-41376
|
dzzoffice 2.02.1 is vulnerable to Directory Traversal via user/space/about.php.
|
[
"cpe:2.3:a:dzzoffice:dzzoffice:2.02.1:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-xh4q-pv2r-82c7
|
Mozilla Firefox 1.5.0.3 allows remote attackers to cause a denial of service via a web page with a large number of IMG elements in which the SRC attribute is a mailto URI. NOTE: another researcher found that the web page caused a temporary browser slowdown instead of a crash.
|
[] | null | null | null | null | null |
|
CVE-2019-2301
|
Possibility of out-of-bound read if id received from SPI is not in range of FIFO in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9980, QCS605, Qualcomm 215, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 712 / SD 710 / SD 670, SD 820A, SD 845 / SD 850, SD 855, SDM439, SDM660, SDX24
|
[
"cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm_215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
CVE-2017-13015
|
The EAP parser in tcpdump before 4.9.2 has a buffer over-read in print-eap.c:eap_print().
|
[
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2024-51697
|
WordPress Doofinder plugin <= 0.5.4 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Doofinder allows Reflected XSS.This issue affects Doofinder: from n/a through 0.5.4.
|
[] | null | 7.1 | null | null | null |
GHSA-2v7h-5r83-vh8r
|
GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article).
|
[] | null | null | 8.8 | null | null |
|
GHSA-rw5r-82jx-qr25
|
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).
|
[] | null | null | 7.8 | null | null |
|
GHSA-h4f9-wrfv-243r
|
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
|
[] | null | null | 5.3 | null | null |
|
GHSA-756j-8p5m-2p7m
|
libraries/common.inc.php in phpMyAdmin 4.0.x before 4.0.10.7, 4.1.x before 4.1.14.8, and 4.2.x before 4.2.13.1 allows remote attackers to cause a denial of service (resource consumption) via a long password.
|
[] | null | null | null | null | null |
|
CVE-2024-0932
|
Tenda AC10U setSmartPowerManagement stack-based overflow
|
A vulnerability, which was classified as critical, has been found in Tenda AC10U 15.03.06.49_multi_TDE01. This issue affects the function setSmartPowerManagement. The manipulation of the argument time leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252137 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:tendacn:ac10u_firmware:15.03.06.49_multi_tde01:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:ac10u:1.0:*:*:*:*:*:*:*"
] | null | 4.7 | 4.7 | 5.8 | null |
GHSA-3w3w-pxmm-2w2j
|
crypto-js uses insecure random numbers
|
The crypto-js package before 3.2.1 for Node.js generates random numbers by concatenating the string "0." with an integer, which makes the output more predictable than necessary.
|
[] | null | 5.3 | null | null | null |
CVE-2004-2497
|
Cross-site scripting (XSS) vulnerability in the error handler in Hitachi Web Page Generator and Web Page Generator Enterprise 4.01 and earlier, when using the default error template and debug mode is set to ON, allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors.
|
[
"cpe:2.3:a:hitachi:web_page_generator:01_00:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:web_page_generator:01_01_c:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:web_page_generator:02_00:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:web_page_generator:02_00_c:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:web_page_generator_enterprise:03_00:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:web_page_generator_enterprise:03_02_c:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:web_page_generator_enterprise:03_03:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:web_page_generator_enterprise:03_03_c:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:web_page_generator_enterprise:03_03_d:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:web_page_generator_enterprise:04_00:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:web_page_generator_enterprise:04_00_c:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:web_page_generator_enterprise:04_01:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:web_page_generator_enterprise:04_01_b:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-3qpr-v3fc-q5q5
|
In the Linux kernel, the following vulnerability has been resolved:arm64: errata: Add Cortex-A520 speculative unprivileged load workaroundImplement the workaround for ARM Cortex-A520 erratum 2966298. On an
affected Cortex-A520 core, a speculatively executed unprivileged load
might leak data from a privileged load via a cache side channel. The
issue only exists for loads within a translation regime with the same
translation (e.g. same ASID and VMID). Therefore, the issue only affects
the return to EL0.The workaround is to execute a TLBI before returning to EL0 after all
loads of privileged data. A non-shareable TLBI to any address is
sufficient.The workaround isn't necessary if page table isolation (KPTI) is
enabled, but for simplicity it will be. Page table isolation should
normally be disabled for Cortex-A520 as it supports the CSV3 feature
and the E0PD feature (used when KASLR is enabled).
|
[] | null | 4.7 | null | null | null |
|
CVE-2025-0344
|
leiyuxi cy-fast listData sql injection
|
A vulnerability has been found in leiyuxi cy-fast 1.0 and classified as critical. Affected by this vulnerability is the function listData of the file /commpara/listData. The manipulation of the argument order leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
GHSA-rrmc-jw5p-mf7q
|
D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 have a hardcoded account of username gkJ9232xXyruTRmY, which makes it easier for remote attackers to obtain access by leveraging knowledge of the username.
|
[] | null | null | null | null | null |
|
CVE-2024-50417
|
WordPress Bold Page Builder plugin <= 5.1.3 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in BoldThemes Bold Page Builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Bold Page Builder: from n/a through 5.1.3.
|
[
"cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
GHSA-vhfq-gpqw-p5cw
|
A Regular Expression Denial of Service (ReDoS) vulnerability exists in gaizhenbiao/chuanhuchatgpt, as of commit 20b2e02. The server uses the regex pattern `r'<[^>]+>'` to parse user input. In Python's default regex engine, this pattern can take polynomial time to match certain crafted inputs. An attacker can exploit this by uploading a malicious JSON payload, causing the server to consume 100% CPU for an extended period. This can lead to a Denial of Service (DoS) condition, potentially affecting the entire server.
|
[] | null | null | 6.5 | null | null |
|
CVE-2007-1973
|
Race condition in the Virtual DOS Machine (VDM) in the Windows Kernel in Microsoft Windows NT 4.0 allows local users to modify memory and gain privileges via the temporary \Device\PhysicalMemory section handle, a related issue to CVE-2007-1206.
|
[
"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
CVE-2021-21156
|
Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.182 allowed a remote attacker to potentially exploit heap corruption via a crafted script.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2017-3578
|
Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: RAS subsystems). The supported version that is affected is AK 2013. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Sun ZFS Storage Appliance Kit (AK) executes to compromise Sun ZFS Storage Appliance Kit (AK). While the vulnerability is in Sun ZFS Storage Appliance Kit (AK), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit_software:2013:*:*:*:*:*:*:*"
] | null | null | 8.8 | 4.6 | null |
|
GHSA-wh2j-cwv9-298v
|
An unspecified ActiveX control in Schneider Electric SoMachine HVAC Programming Software for M171/M172 Controllers before 2.1.0 allows remote attackers to execute arbitrary code via unknown vectors, related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER (aka safe for scripting) flag.
|
[] | null | 7.3 | null | null | null |
|
CVE-2017-13711
|
Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.
|
[
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
RHSA-2015:2661
|
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.2 security update
|
httpd: bypass of mod_headers rules via chunked requests tomcat: non-persistent DoS attack by feeding data by aborting an upload httpd: NULL pointer dereference in mod_cache if Content-Type has empty value httpd: HTTP request smuggling attack against chunked request parser tomcat: URL Normalization issue
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:3.0"
] | null | null | 4.3 | null | null |
CVE-2017-9346
|
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the SoulSeek dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-slsk.c by making loop bounds more explicit.
|
[
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 | null |
|
CVE-2014-4887
|
The Joint Radio Blues (aka com.nobexinc.wls_69685189.rc) application 3.2.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:nobexrc:joint_radio_blues:3.2.3:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2020-2275
|
Jenkins Copy data to workspace Plugin 1.0 and earlier does not limit which directories can be copied from the Jenkins controller to job workspaces, allowing attackers with Job/Configure permission to read arbitrary files on the Jenkins controller.
|
[
"cpe:2.3:a:jenkins:copy_data_to_workspace:*:*:*:*:*:jenkins:*:*"
] | null | 6.5 | null | 4 | null |
|
GHSA-84xj-78rw-rf33
|
An Insufficient Verification of Data Authenticity vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote unauthenticated attacker to send the device malicious data that will be used in place of the correct data. This results in full system command access and execution because of the lack of cryptographic signatures on critical data sets.
|
[] | null | 9.8 | null | null | null |
|
CVE-2008-2002
|
Multiple cross-site request forgery (CSRF) vulnerabilities on Motorola Surfboard with software SB5100-2.3.3.0-SCM00-NOSH allow remote attackers to (1) cause a denial of service (device reboot) via the "Restart Cable Modem" value in the BUTTON_INPUT parameter to configdata.html, and (2) cause a denial of service (hard reset) via the "Reset All Defaults" value in the BUTTON_INPUT parameter to configdata.html.
|
[
"cpe:2.3:h:motorola:surfboard:sb5100:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-c5rq-j6hh-2mxr
|
In the Linux kernel, the following vulnerability has been resolved:vdpa: ifcvf: Do proper cleanup if IFCVF init failsifcvf_mgmt_dev leaks memory if it is not freed before
returning. Call is made to correct return statement
so memory does not leak. ifcvf_init_hw does not take
care of this so it is needed to do it here.
|
[] | null | 5.5 | null | null | null |
|
GHSA-724m-f653-3f8m
|
The Auto Affiliate Links plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the aalAddLink function in all versions up to, and including, 6.4.3. This makes it possible for authenticated attackers, with subscriber access or higher, to add arbitrary links to posts.
|
[] | null | 4.3 | null | null | null |
|
CVE-2019-14391
|
cPanel before 82.0.2 does not properly enforce Reseller package creation ACLs (SEC-514).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | 2.1 | null |
|
GHSA-h35x-4m68-cvrj
|
ptrace on HP-UX 11.00 through 11.11 allows local users to cause a denial of service (data page fault panic) via "an incorrect reference to thread register state."
|
[] | null | null | null | null | null |
|
CVE-2024-56036
|
WordPress odPhotogallery plugin <= 0.5.3 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ondrej Donek odPhotogallery allows Reflected XSS.This issue affects odPhotogallery: from n/a through 0.5.3.
|
[] | null | 7.1 | null | null | null |
CVE-2010-4512
|
Cobbler before 2.0.4 uses an incorrect umask value, which allows local users to have an unspecified impact by leveraging world writable permissions for files and directories.
|
[
"cpe:2.3:a:michael_dehaan:cobbler:*:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.0.2-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.0.3-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.8-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.9-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.3.1-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.3.3-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.3.4-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.4.0-2:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.4.1-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.4.2-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.4.3-4:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.6.1-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.6.2-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.6.3-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.6.4-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.6.5-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.6.6-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.6.8-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:2.0.0-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:2.0.1-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:2.0.3.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2015-0515
|
Unrestricted file upload vulnerability in EMC M&R (aka Watch4Net) before 6.5u1 and ViPR SRM before 3.6.1 allows remote authenticated users to execute arbitrary code by uploading and then accessing an executable file.
|
[
"cpe:2.3:a:emc:watch4net:*:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:vipr_srm:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
CVE-2008-6769
|
Unrestricted file upload vulnerability in upload.php in YourPlace 1.0.2 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file.
|
[
"cpe:2.3:a:peterselie:yourplace:*:*:*:*:*:*:*:*",
"cpe:2.3:a:peterselie:yourplace:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:peterselie:yourplace:1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 6 | null |
|
CVE-2018-12827
|
Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
RHSA-2025:14421
|
Red Hat Security Advisory: webkit2gtk3 security update
|
angle: insufficient input validation can cause undefined behavior webkitgtk: Processing maliciously crafted web content may lead to memory corruption webkitgtk: Processing maliciously crafted web content may lead to memory corruption webkitgtk: Processing web content may lead to a denial-of-service webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash webkitgtk: Processing maliciously crafted web content may disclose sensitive user information webkitgtk: A download’s origin may be incorrectly associated webkitgtk: Processing maliciously crafted web content may disclose internal states of the app
|
[
"cpe:/a:redhat:rhel_e4s:9.2::appstream"
] | null | 6.5 | null | null | null |
GHSA-86q4-677r-wjxv
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PAM Auth Plugin). Supported versions that are affected are 5.7.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | null | null | null |
|
CVE-2022-44444
|
In wlan driver, there is a possible missing bounds check. This could lead to local denial of service in wlan services.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2023-41050
|
Information disclosure through Python's "format" functionality in Zope AccessControl
|
AccessControl provides a general security framework for use in Zope. Python's "format" functionality allows someone controlling the format string to "read" objects accessible (recursively) via attribute access and subscription from accessible objects. Those attribute accesses and subscriptions use Python's full blown `getattr` and `getitem`, not the policy restricted `AccessControl` variants `_getattr_` and `_getitem_`. This can lead to critical information disclosure. `AccessControl` already provides a safe variant for `str.format` and denies access to `string.Formatter`. However, `str.format_map` is still unsafe. Affected are all users who allow untrusted users to create `AccessControl` controlled Python code and execute it. A fix has been introduced in versions 4.4, 5.8 and 6.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:zope:accesscontrol:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zope:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
GHSA-6fxj-c35j-cj8x
|
SAP Web Dynpro ABAP allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
|
[] | null | null | null | null | null |
|
GHSA-g7h8-p22m-2rvx
|
Prototype Pollution in flat-wrap
|
All versions of `flat-wrap` are vulnerable to prototype pollution. The function `unflatten` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.RecommendationNo fix is currently available. Consider using an alternative package until a fix is made available.
|
[] | null | null | null | null | null |
CVE-2015-8124
|
Session fixation vulnerability in the "Remember Me" login feature in Symfony 2.3.x before 2.3.35, 2.6.x before 2.6.12, and 2.7.x before 2.7.7 allows remote attackers to hijack web sessions via a session id.
|
[
"cpe:2.3:a:sensiolabs:symfony:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.19:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.23:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.24:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.25:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.26:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.27:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.28:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.29:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.32:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.33:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.3.34:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sensiolabs:symfony:2.7.6:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
RHSA-2021:3814
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: powerpc: KVM guest OS users can cause host OS memory corruption
|
[
"cpe:/o:redhat:rhel_e4s:7.6::server"
] | null | 7.8 | null | null | null |
GHSA-cpgf-3whm-jr4g
|
member/Orderinfo.asp in ASP4CMS AspCMS 2.7.2 allows remote authenticated users to read arbitrary order information via a modified OrderNo parameter.
|
[] | null | null | 6.5 | null | null |
|
CVE-2024-42029
|
xdg-desktop-portal-hyprland (aka an XDG Desktop Portal backend for Hyprland) before 1.3.3 allows OS command execution, e.g., because single quotes are not used when sending a list of app IDs and titles via the environment.
|
[
"cpe:2.3:a:xdg:desktop_portal_hyperland:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
|
CVE-2022-24502
|
Windows HTML Platforms Security Feature Bypass Vulnerability
|
Windows HTML Platforms Security Feature Bypass Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
RHSA-2018:3461
|
Red Hat Security Advisory: [ansible] security update
|
Ansible: Information leak in "user" module
|
[
"cpe:/a:redhat:ansible_engine:2.5::el7"
] | null | null | 7.8 | null | null |
CVE-2022-20473
|
In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-f23h-w38w-mpqj
|
Cross-site scripting (XSS) vulnerability in Splunk Web in Splunk 5.0.0 through 5.0.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2017-13056
|
The launchURL function in PDF-XChange Viewer 2.5 (Build 314.0) might allow remote attackers to execute arbitrary code via a crafted PDF file.
|
[
"cpe:2.3:a:tracker-software:pdf-xchange_viewer:2.5:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-44jj-9jpw-493g
|
SQL injection vulnerability in modules/blog/index.php in AneCMS Blog 1.3 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the PATH_INFO.
|
[] | null | null | null | null | null |
|
CVE-2022-46770
|
qubes-mirage-firewall (aka Mirage firewall for QubesOS) 0.8.x through 0.8.3 allows guest OS users to cause a denial of service (CPU consumption and loss of forwarding) via a crafted multicast UDP packet (IP address range of 224.0.0.0 through 239.255.255.255).
|
[
"cpe:2.3:a:linuxfoundation:mirage_firewall:*:*:*:*:*:qubesos:*:*"
] | null | 7.5 | null | null | null |
|
ICSA-24-298-02
|
iniNet Solutions SpiderControl SCADA PC HMI Editor
|
iniNet Solutions SpiderControl SCADA PC HMI Editor has a path traversal vulnerability. When the software loads a malicious ‘ems' project template file constructed by an attacker, it can write files to arbitrary directories. This can lead to overwriting system files, causing system paralysis, or writing to startup items, resulting in remote control.
|
[] | null | 8 | null | null | null |
GHSA-242w-4wxg-327r
|
Unspecified vulnerability in the WebLogic Server Administration Console for BEA WebLogic Server 9.0 prevents the console from setting custom JDBC security policies correctly, which could allow attackers to bypass intended policies.
|
[] | null | null | null | null | null |
|
GHSA-77wj-vr78-f57f
|
Cross-site scripting (XSS) vulnerability in the product-creation administrative page in Cisco WebEx Sales Center allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCul25540.
|
[] | null | null | null | null | null |
|
GHSA-7x3w-gm8r-m55v
|
Directory traversal vulnerability in posts.php in SimpleBBS 1.0.6 through 1.1 allows remote attackers to include and execute arbitrary files via ".." sequences in the language cookie, as demonstrated by by injecting the code into the gl_session cookie of users.php, which is stored in error.log.
|
[] | null | null | null | null | null |
|
CVE-2020-27717
|
On BIG-IP DNS 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.3, 13.1.0-13.1.3.4, and 12.1.0-12.1.5.2, undisclosed series of DNS requests may cause TMM to restart and generate a core file.
|
[
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 | null |
|
GHSA-2f2p-6v5f-w6gc
|
A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6 and classified as critical. This issue affects some unknown processing of the component Web Management Interface. The manipulation of the argument src leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227651.
|
[] | null | null | 6.3 | null | null |
|
CVE-2023-52865
|
clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data
|
In the Linux kernel, the following vulnerability has been resolved:
clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data
Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
|
[] | null | 5.5 | null | null | null |
GHSA-hc92-m58j-m3m5
|
When creating a callback over IPC for showing the Color Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, and Thunderbird < 115.2.
|
[] | null | 6.5 | null | null | null |
|
CVE-2024-5213
|
Exposure of Sensitive Information in mintplex-labs/anything-llm
|
In mintplex-labs/anything-llm versions up to and including 1.5.3, an issue was discovered where the password hash of a user is returned in the response after login (`POST /api/request-token`) and after account creations (`POST /api/admin/users/new`). This exposure occurs because the entire User object, including the bcrypt password hash, is included in the response sent to the frontend. This practice could potentially lead to sensitive information exposure despite the use of bcrypt, a strong hashing algorithm. It is recommended not to expose any clues about passwords to the frontend.
|
[
"cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | null | null |
GHSA-x48q-c6cq-c3hg
|
In iaxxx_btp_write_words of iaxxx-btp.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-198653629References: N/A
|
[] | null | 4.4 | null | null | null |
|
GHSA-83qj-2pwf-j9c2
|
Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability."
|
[] | null | null | 7.5 | null | null |
|
GHSA-wcwp-7phh-vvr5
|
The vCenter Server contains an information disclosure vulnerability due to an unauthenticated appliance management API. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.
|
[] | null | 7.5 | null | null | null |
|
CVE-2022-21379
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | null | null |
|
CVE-2022-33749
|
XAPI open file limit DoS It is possible for an unauthenticated client on the network to cause XAPI to hit its file-descriptor limit. This causes XAPI to be unable to accept new requests for other (trusted) clients, and blocks XAPI from carrying out any tasks that require the opening of file descriptors.
|
[
"cpe:2.3:o:xen:xapi:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-w2f8-46cp-3x6r
|
An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Microsoft Store Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1222.
|
[] | null | null | null | null | null |
|
GHSA-9f7c-p7m5-r79c
|
Buffer overflow in PCMan FTP Server 2.0.7 allows for remote code execution via the APPE command.
|
[] | null | null | 9.8 | null | null |
|
CVE-2014-9443
|
Cross-site scripting (XSS) vulnerability in the Relevanssi plugin before 3.3.8 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:relevanssi:relevanssi:3.3.7.1:*:*:*:*:wordpress:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-wr6h-vrp6-vq67
|
Unrestricted file upload vulnerability in upload.php in WikkiTikkiTavi 1.11 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in img/.
|
[] | null | null | null | null | null |
|
GHSA-8gwh-x546-9265
|
An Buffer Overflow vulnerability leading to remote code execution was discovered in MEX01. Remote attackers can use this vulnerability by using the property that the target program copies parameter values to memory through the strcpy() function.
|
[] | null | 9.8 | null | null | null |
|
CVE-2018-8999
|
In Advanced SystemCare Ultimate 11.0.1.58, the driver file (Monitor_win7_x64.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c4060c4.
|
[
"cpe:2.3:a:iobit:advanced_systemcare_ultimate:11.0.1.58:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.1 | null |
|
GHSA-9h69-wwg8-442f
|
Stored Cross Site Scripting vulnerabilities exist in ASPECT if administrator creden-tials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*.
|
[] | 4.6 | 4.8 | null | null | null |
|
GHSA-fg3c-pj38-fxr2
|
Cross-site scripting (XSS) vulnerability in link.php in Cacti 1.1.12 allows remote anonymous users to inject arbitrary web script or HTML via the id parameter, related to the die_html_input_error function in lib/html_validate.php.
|
[] | null | null | 5.4 | null | null |
|
CVE-2002-0134
|
Telnet proxy in Avirt Gateway Suite 4.2 does not require authentication for connecting to the proxy system itself, which allows remote attackers to list file contents of the proxy and execute arbitrary commands via a "dos" command.
|
[
"cpe:2.3:a:avirt:avirt_gateway_suite:4.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-wvf7-94g7-p6gg
|
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2021:5128
|
Red Hat Security Advisory: Openshift Logging security and bug update (5.1.5)
|
netty: Request smuggling via content-length header netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
|
[
"cpe:/a:redhat:logging:5.1::el8"
] | null | 8.1 | null | null | null |
CVE-2017-12243
|
A vulnerability in the Cisco Unified Computing System (UCS) Manager, Cisco Firepower 4100 Series Next-Generation Firewall (NGFW), and Cisco Firepower 9300 Security Appliance could allow an authenticated, local attacker to obtain root shell privileges on the device, aka Command Injection. The vulnerability is due to improper validation of string input in the shell application. An attacker could exploit this vulnerability through the use of malicious commands. A successful exploit could allow the attacker to obtain root shell privileges on the device. Cisco Bug IDs: CSCvf20741, CSCvf60078.
|
[
"cpe:2.3:o:cisco:unified_computing_system_manager_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_computing_system_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firepower_9300_security_appliance_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_9300_security_appliance:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firepower_4100_next-generation_firewall_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4110_next-generation_firewall:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4120_next-generation_firewall:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4140_next-generation_firewall:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4150_next-generation_firewall:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
CVE-2018-1002102
|
Kubernetes API server follows unvalidated redirects from streaming Kubelet endpoints
|
Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.
|
[
"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] | null | 2.6 | null | null | null |
GHSA-rx7j-mw4c-76g9
|
Authlogic Information Exposure vulnerability
|
The Authlogic gem for Ruby on Rails prior to version 3.3.0 makes potentially unsafe `find_by_id` method calls, which might allow remote attackers to conduct CVE-2012-6496 SQL injection attacks via a crafted parameter in environments that have a known secret_token value, as demonstrated by a value contained in `secret_token.rb` in an open-source product.
|
[] | null | null | null | null | null |
CVE-1999-0736
|
The showcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.
|
[
"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-j5hm-cjrm-f26f
|
A tampering vulnerability exists when Microsoft IIS Server improperly handles malformed request headers, aka 'Microsoft IIS Server Tampering Vulnerability'.
|
[] | null | null | null | null | null |
|
GHSA-hcc9-635h-2qg5
|
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c.
|
[] | null | 8.8 | null | null | null |
|
GHSA-9gf4-mq65-qx36
|
Improper authentication in MTP application prior to SMR Jul-2024 Release 1 allows local attackers to enter MTP mode without proper authentication.
|
[] | null | 4 | null | null | null |
|
GHSA-p4rj-67hc-w5ff
|
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability.
|
[] | null | 7.5 | null | null | null |
|
CVE-2018-14332
|
An issue was discovered in Clementine Music Player 1.3.1. Clementine.exe is vulnerable to a user mode write access violation due to a NULL pointer dereference in the Init call in the MoodbarPipeline::NewPadCallback function in moodbar/moodbarpipeline.cpp. The vulnerability is triggered when the user opens a malformed mp3 file.
|
[
"cpe:2.3:a:clementine-player:clementine:1.3.1:*:*:*:*:*:*:*"
] | null | null | 5.5 | 1.9 | null |
|
GHSA-wj5f-6f57-f3p5
|
piwigo has XSS in password.php
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.