id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-47595
|
Local Privilege Escalation in SAP Host Agent
|
An attacker who gains local membership to sapsys group could replace local files usually protected by privileged access. On successful exploitation the attacker could cause high impact on confidentiality and integrity of the application.
|
[
"cpe:2.3:a:sap:host_agent:7.22:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
GHSA-pm8c-wh6q-xfwq
|
PiiGAB M-Bus transmits credentials in plaintext format.
|
[] | null | 7.5 | null | null |
|
GHSA-xqh3-pm3r-pgch
|
drivers/hid/hid-sony.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SONY is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
|
[] | null | null | null | null |
|
CVE-2017-15398
|
A stack buffer overflow in the QUIC networking stack in Google Chrome prior to 62.0.3202.89 allowed a remote attacker to gain code execution via a malicious server.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
RHSA-2004:047
|
Red Hat Security Advisory: pwlib security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
PYSEC-2022-291
| null |
Improper Handling of Length Parameter Inconsistency in GitHub repository ikus060/rdiffweb prior to 2.4.8.
|
[] | null | null | null | null |
GHSA-xvp8-7h22-qmfg
|
In JetBrains TeamCity before 2024.12 build credentials allowed unauthorized viewing of projects
|
[] | null | 4.3 | null | null |
|
CVE-2022-24701
|
An issue was discovered in WinAPRS 2.9.0. A buffer overflow in national.txt processing allows a local attacker to cause a denial of service or possibly achieve code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
|
[
"cpe:2.3:a:winaprs:winaprs:2.9.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2007-4045
|
The CUPS service, as used in SUSE Linux before 20070720 and other Linux distributions, allows remote attackers to cause a denial of service via unspecified vectors related to an incomplete fix for CVE-2007-0720 that introduced a different denial of service problem in SSL negotiation.
|
[
"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-w2gg-cp64-r9xq
|
The Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 52.0.2743.116, mishandles the script-path hostname, remoteBase parameter, and remoteFrontendUrl parameter, which allows remote attackers to bypass intended access restrictions via a crafted URL, a different vulnerability than CVE-2016-5143.
|
[] | null | null | 9.8 | null |
|
GHSA-m97j-rv38-w7hv
|
Unspecified vulnerability in HP ProCurve Threat Management Services zl Module (J9155A) ST.1.0.090213 and earlier allows remote attackers to cause a denial of service by triggering a stop or crash in httpd, aka PR_18770, a different vulnerability than CVE-2009-1423 and CVE-2009-1424.
|
[] | null | null | null | null |
|
CVE-2011-2718
|
Multiple directory traversal vulnerabilities in the relational schema implementation in phpMyAdmin 3.4.x before 3.4.3.2 allow remote authenticated users to include and execute arbitrary local files via directory traversal sequences in an export type field, related to (1) libraries/schema/User_Schema.class.php and (2) schema_export.php.
|
[
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:*"
] | null | null | null | 6 |
|
CVE-2016-3859
|
The Qualcomm camera driver in Android before 2016-09-05 on Nexus 5, 5X, 6, and 6P devices allows attackers to gain privileges via a crafted application, aka Android internal bug 28815326 and Qualcomm internal bug CR1034641.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-r6mm-wmhf-849m
|
Time-Based Information Disclosure Vulnerability in Flow
|
The PersistedUsernamePasswordProvider was prone to a information disclosure of account existance based on timing attacks as the hashing of passwords was only done in case an account was found. We changed the core so that the provider always does a password comparison in case credentials were submitted at all.
|
[] | null | null | null | null |
GHSA-9cw2-jqp5-7x39
|
Multiple Content Injection Vulnerabilities in marked
|
Versions 0.3.0 and earlier of `marked` are affected by two cross-site scripting vulnerabilities, even when `sanitize: true` is set.The attack vectors for this vulnerability are GFM Codeblocks and JavaScript URLs.RecommendationUpgrade to version 0.3.1 or later.
|
[] | null | 6.1 | null | null |
CVE-2016-4839
|
The Android Apps Money Forward (prior to v7.18.0), Money Forward for The Gunma Bank (prior to v1.2.0), Money Forward for SHIGA BANK (prior to v1.2.0), Money Forward for SHIZUOKA BANK (prior to v1.4.0), Money Forward for SBI Sumishin Net Bank (prior to v1.6.0), Money Forward for Tokai Tokyo Securities (prior to v1.4.0), Money Forward for THE TOHO BANK (prior to v1.3.0), Money Forward for YMFG (prior to v1.5.0) provided by Money Forward, Inc. and Money Forward for AppPass (prior to v7.18.3), Money Forward for au SMARTPASS (prior to v7.18.0), Money Forward for Chou Houdai (prior to v7.18.3) provided by SOURCENEXT CORPORATION do not properly implement the WebView class, which allows an attacker to disclose information stored on the device via a specially crafted application.
|
[
"cpe:2.3:a:moneyforward:money_forward_for_apppass:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_au_smartpass:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_chou_houdai:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_sbi_sumishin_net_bank:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_shiga_bank:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_shizuoka_bank:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_the_gunma_bank:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_the_toho_bank:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_tokai_tokyo_securities:*:*:*:*:*:android:*:*",
"cpe:2.3:a:moneyforward:money_forward_for_ymfg:*:*:*:*:*:android:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2024-11118
|
404 Error Monitor <= 1.1 - Cross-Site Request Forgery to Plugin Settings Update via updatePluginSettings Function
|
The 404 Error Monitor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing or incorrect nonce validation on the updatePluginSettings() function. This makes it possible for unauthenticated attackers to make changes to plugin settings and clear up all the error logs via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:bilbud:404_error_monitor:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2025-39594
|
WordPress Arigato Autoresponder and Newsletter plugin <= 2.7.2.4 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bob Arigato Autoresponder and Newsletter allows Reflected XSS. This issue affects Arigato Autoresponder and Newsletter: from n/a through 2.7.2.4.
|
[] | null | 7.1 | null | null |
CVE-2024-42249
|
spi: don't unoptimize message in spi_async()
|
In the Linux kernel, the following vulnerability has been resolved:
spi: don't unoptimize message in spi_async()
Calling spi_maybe_unoptimize_message() in spi_async() is wrong because
the message is likely to be in the queue and not transferred yet. This
can corrupt the message while it is being used by the controller driver.
spi_maybe_unoptimize_message() is already called in the correct place
in spi_finalize_current_message() to balance the call to
spi_maybe_optimize_message() in spi_async().
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
CVE-2022-31030
|
containerd CRI plugin: Host memory exhaustion through ExecSync
|
containerd is an open source container runtime. A bug was found in the containerd's CRI implementation where programs inside a container can cause the containerd daemon to consume memory without bound during invocation of the `ExecSync` API. This can cause containerd to consume all available memory on the computer, denying service to other legitimate workloads. Kubernetes and crictl can both be configured to use containerd's CRI implementation; `ExecSync` may be used when running probes or when executing processes via an "exec" facility. This bug has been fixed in containerd 1.6.6 and 1.5.13. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used.
|
[
"cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-8m73-w2r2-6xxj
|
Insecure defaults in UmbracoForms
|
This affects all versions of package UmbracoForms. When using the default configuration for upload forms, it is possible to upload arbitrary file types. The package offers a way for users to mitigate the issue. The users of this package can create a custom workflow and frontend validation that blocks certain file types, depending on their security needs and policies.
|
[] | null | 7.5 | null | null |
CVE-2018-8794
|
rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to an Out-Of-Bounds Write in function process_bitmap_updates() and results in a memory corruption and possibly even a remote code execution.
|
[
"cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-m9wh-p2wg-7j38
|
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-6981.
|
[] | null | null | 9.8 | null |
|
CVE-2009-1027
|
SQL injection vulnerability in OpenCart 1.1.8 allows remote attackers to execute arbitrary SQL commands via the order parameter.
|
[
"cpe:2.3:a:opencart:opencart:1.1.8:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
PYSEC-2014-50
| null |
The error pages in Plone before 4.2.3 and 4.3 before beta 1 allow remote attackers to obtain random numbers and derive the PRNG state for password resets via unspecified vectors. NOTE: this identifier was SPLIT per ADT2 due to different vulnerability types. CVE-2012-6661 was assigned for the PRNG reseeding issue in Zope.
|
[] | null | null | null | null |
CVE-2020-8549
|
Stored XSS in the Strong Testimonials plugin before 2.40.1 for WordPress can result in an attacker performing malicious actions such as stealing session tokens.
|
[
"cpe:2.3:a:wpchill:strong_testimonials:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2024-10818
|
JSFiddle Shortcode < 1.1.3 - Contributor+ XSS via Shortcode
|
The JSFiddle Shortcode WordPress plugin before 1.1.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
[] | null | 5.4 | null | null |
GHSA-54fr-263f-2q5f
|
Xigla Software Absolute FAQ Manager.NET 6.0 allows remote attackers to bypass authentication and gain administrative access by setting a cookie to a certain value.
|
[] | null | null | null | null |
|
GHSA-rqrp-8f48-953h
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in TotalPress.Org Custom post types, Custom Fields & more plugin <= 4.0.12 versions.
|
[] | null | 5.9 | null | null |
|
CVE-2021-40994
|
A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.
|
[
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.8.9:-:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.7:-:*:*:*:*:*:*"
] | null | 6.3 | null | 6.5 |
|
CVE-2022-27891
|
Palantir Gotham included an unauthenticated endpoint that listed all active usernames in the platform with an active session.
|
Palantir Gotham included an unauthenticated endpoint that listed all active usernames on the stack with an active session. The affected services have been patched and automatically deployed to all Apollo-managed Gotham instances. It is highly recommended that customers upgrade all affected services to the latest version. This issue affects: Palantir Gotham versions prior to 103.30221005.0.
|
[
"cpe:2.3:o:palantir:gotham:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
RHSA-2013:0681
|
Red Hat Security Advisory: jakarta-commons-httpclient security update
|
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0"
] | null | null | 3.7 | null |
GHSA-qf36-h9v8-48xq
|
Unspecified vulnerability in the web services framework in IBM WebSphere Commerce 6.0 through 6.0.0.11 and 7.0 through 7.0.0.6 allows remote attackers to cause a denial of service (login outage) via unknown vectors.
|
[] | null | null | null | null |
|
CVE-2024-43334
|
WordPress Halpes theme <= 1.0.3 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gavias Halpes allows Reflected XSS.This issue affects Halpes: from n/a before 1.2.5.
|
[] | null | 7.1 | null | null |
CVE-2023-46553
|
TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formParentControl.
|
[
"cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948.web:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*"
] | null | 8 | null | null |
|
CVE-2023-0787
|
Cross-site Scripting (XSS) - Generic in thorsten/phpmyfaq
|
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
[
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
GHSA-c975-8p92-pprh
|
The soledad WordPress theme before 8.2.5 does not sanitise the {id,datafilter[type],...} parameters in its penci_more_slist_post_ajax AJAX action, leading to a Reflected Cross-Site Scripting (XSS) vulnerability.
|
[] | null | 6.1 | null | null |
|
RHSA-2006:0493
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw NFS client panic using O_DIRECT security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
GHSA-mcqc-h58c-24vj
|
A vulnerability has been found in Tenda AX1806 1.0.0.1 and classified as critical. Affected by this vulnerability is the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-262129 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 8.8 | null | null |
|
GHSA-qrw8-4f9g-c6gc
|
Memory leak in the OBJ_obj2txt function in LibreSSL before 2.3.1 allows remote attackers to cause a denial of service (memory consumption) via a large number of ASN.1 object identifiers in X.509 certificates.
|
[] | null | 7.5 | null | null |
|
RHSA-2019:1294
|
Red Hat Security Advisory: bind security update
|
bind: Limiting simultaneous TCP clients is ineffective
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.6 | null |
CVE-2022-25403
|
HMS v1.0 was discovered to contain a SQL injection vulnerability via the component admin.php.
|
[
"cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2015-4164
|
The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.
|
[
"cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
RHSA-2023:5867
|
Red Hat Security Advisory: grafana security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
CVE-2022-26437
|
In httpclient, there is a possible out of bounds write due to uninitialized data. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WSAP00103831; Issue ID: WSAP00103831.
|
[
"cpe:2.3:a:mediatek:nbiot_sdk:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt2621:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt2625:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
RHSA-2020:0813
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
|
undertow: AJP File Read/Inclusion Vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | 7.6 | null | null |
CVE-2011-2838
|
Google Chrome before 14.0.835.163 does not properly consider the MIME type during the loading of a plug-in, which has unspecified impact and remote attack vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2016-4491
|
The d_print_comp function in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, which triggers infinite recursion and a buffer overflow, related to a node having "itself as ancestor more than once."
|
[
"cpe:2.3:a:gnu:libiberty:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-vx68-whc5-qv39
|
Directory traversal vulnerability in rxRPC.dll in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 allows remote attackers to upload and overwrite arbitrary files via a ..\ (dot dot backslash) sequence in the destination filename argument to sub-function 8 in the rxrReceiveFileFromServer command.
|
[] | null | null | null | null |
|
GHSA-2rxc-55rq-5r4c
|
Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using "flat" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.
|
[] | null | null | null | null |
|
CVE-2018-17897
|
LAquis SCADA Versions 4.1.0.3870 and prior has several integer overflow to buffer overflow vulnerabilities, which may allow remote code execution.
|
[
"cpe:2.3:a:lcds:laquis_scada:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2023-26916
|
libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL pointer dereference via the function lys_parse_mem at lys_parse_mem.c.
|
[
"cpe:2.3:a:cesnet:libyang:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
GHSA-jv32-5578-pxjc
|
Grafana Data source and plugin proxy endpoints leaking authentication tokens to some destination plugins
|
Today we are releasing Grafana 9.2. Alongside with new features and other bug fixes, this release includes a Moderate severity security fix for CVE-2022-31130We are also releasing security patches for Grafana 9.1.8 and Grafana 8.5.14 to fix these issues.Release 9.2, latest release, also containing security fix:[Download Grafana 9.2](https://grafana.com/grafana/download/9.2)Release 9.1.8, only containing security fix:[Download Grafana 9.1.8](https://grafana.com/grafana/download/9.1.8)Release 8.5.14, only containing security fix:[Download Grafana 8.5.14](https://grafana.com/grafana/download/8.5.14)Appropriate patches have been applied to [Grafana Cloud](https://grafana.com/cloud) and as always, we closely coordinated with all cloud providers licensed to offer Grafana Pro. They have received early notification under embargo and confirmed that their offerings are secure at the time of this announcement. This is applicable to Amazon Managed Grafana and Azure's Grafana as a service offering.CVE-2022-31130SummaryOn June 26 a security researcher contacted Grafana Labs to disclose a vulnerability with the GitLab data source plugin that could leak the API key to GitLab. After further analysis the vulnerability impacts data source and plugin proxy endpoints with authentication tokens but under some conditions.We believe that this vulnerability is rated at CVSS 4.9 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)ImpactThe destination plugin could receive a Grafana authentication token of the user.Impacted versionsAll installations for Grafana versions <=9.x, <=8.x, <=7.xSolutions and mitigationsTo fully address CVE-2022-31130 please upgrade your Grafana instances.
Appropriate patches have been applied to [Grafana Cloud](https://grafana.com/cloud).As a workaround do not use API keys, JWT authentication or any HTTP Header based authentication.Reporting security issuesIf you think you have found a security vulnerability, please send a report to security@grafana.com. This address can be used for all of Grafana Labs' open source and commercial products (including, but not limited to Grafana, Grafana Cloud, Grafana Enterprise, and grafana.com). We can accept only vulnerability reports at this address. We would prefer that you encrypt your message to us by using our PGP key. The key fingerprint isF988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CAThe key is available from keyserver.ubuntu.com.Security announcementsWe maintain a [security category](https://community.grafana.com/c/support/security-announcements) on our blog, where we will always post a summary, remediation, and mitigation details for any patch containing security fixes.You can also subscribe to our [RSS feed](https://grafana.com/tags/security/index.xml).
|
[] | 6.9 | 4.9 | null | null |
GHSA-9hpj-m9v9-5wvw
|
Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).
|
[] | null | 6.3 | null | null |
|
CVE-2002-0719
|
SQL injection vulnerability in the function that services for Microsoft Content Management Server (MCMS) 2001 allows remote attackers to execute arbitrary commands via an MCMS resource request for image files or other files.
|
[
"cpe:2.3:a:microsoft:content_management_server:2001:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:content_management_server:2001:sp1:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-hm3f-28vq-g8gm
|
server/sv_main.c in Quake3 Arena, as used in ioquake3 before r1762, OpenArena, Tremulous, and other products, allows remote attackers to cause a denial of service (network traffic amplification) via a spoofed (1) getstatus or (2) rcon request.
|
[] | null | null | null | null |
|
CVE-2025-30477
|
Dell PowerScale OneFS, versions prior to 9.11.0.0, contains a use of a broken or risky cryptographic algorithm vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure.
|
[] | null | 4.4 | null | null |
|
GHSA-667c-hxc9-rgpc
|
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector or the Visual Studio Standard Collector fail to properly handle objects in memory, aka 'Diagnostic Hub Standard Collector Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1203.
|
[] | null | null | null | null |
|
GHSA-37x3-r4vm-9pqj
|
Motorola Solutions MOSCAD IP Gateway allows remote attackers to read arbitrary files via unspecified vectors.
|
[] | null | null | 7.5 | null |
|
CVE-2018-15396
|
Cisco Unity Connection File Upload Denial of Service Vulnerability
|
A vulnerability in the Bulk Administration Tool (BAT) for Cisco Unity Connection could allow an authenticated, remote attacker to cause high disk utilization, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software does not restrict the maximum size of certain files that can be written to disk. An attacker who has valid administrator credentials for an affected system could exploit this vulnerability by sending a crafted, remote connection request to an affected system. A successful exploit could allow the attacker to write a file that consumes most of the available disk space on the system, causing application functions to operate abnormally and leading to a DoS condition.
|
[
"cpe:2.3:a:cisco:unity_connection:12.5:*:*:*:*:*:*:*"
] | null | null | 6.8 | 4 |
GHSA-67fw-7399-mm46
|
Direct static code injection vulnerability in ticker.db.php in Chucky A. Ivey N.T. 1.1.0 allows remote administrators to insert arbitrary PHP code into the config file, which is included other N.T. scripts.
|
[] | null | null | null | null |
|
GHSA-mmc3-r9ch-5g9p
|
Integer overflow in CoreFoundation in Apple Mac OS X 10.4.11 might allow local users to execute arbitrary code via crafted time zone data.
|
[] | null | null | null | null |
|
GHSA-cfc7-w9hw-779w
|
The password hashing API in Drupal 7.x before 7.34 and the Secure Password Hashes (aka phpass) module 6.x-2.x before 6.x-2.1 for Drupal allows remote attackers to cause a denial of service (CPU and memory consumption) via a crafted request.
|
[] | null | null | null | null |
|
GHSA-w4vx-j7m5-cqgh
|
All ADB broadband gateways / routers based on the Epicentro platform are affected by a privilege escalation vulnerability where attackers can gain access to the command line interface (CLI) if previously disabled by the ISP, escalate their privileges, and perform further attacks.
|
[] | null | null | 7.5 | null |
|
GHSA-454g-5jw2-mrmh
|
A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory, aka 'Microsoft Windows Codecs Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1560, CVE-2020-1574.
|
[] | null | 8.8 | null | null |
|
GHSA-59gr-vjcr-m2p7
|
Race condition in the ioctl implementation in the Samsung Graphics 2D driver (aka /dev/fimg2d) in Samsung devices with Android L(5.0/5.1) allows local users to trigger memory errors by leveraging definition of g2d_lock and g2d_unlock lock macros as no-ops, aka SVE-2015-4598.
|
[] | null | null | 7 | null |
|
CVE-2024-56052
|
WordPress WPLMS plugin < 1.9.9.5.2 - Student+ Arbitrary File Upload vulnerability
|
Unrestricted Upload of File with Dangerous Type vulnerability in VibeThemes WPLMS allows Upload a Web Shell to a Web Server.This issue affects WPLMS: from n/a before 1.9.9.5.2.
|
[] | null | 9.9 | null | null |
CVE-2023-6728
|
Nokia SR OS: BOF File Encryption Vulnerability
|
Nokia SR OS bof.cfg file encryption is vulnerable to a brute force attack. This weakness allows an attacker in possession of the encrypted file to decrypt the bof.cfg file and obtain the BOF configuration content.
|
[] | null | 3.3 | null | null |
GHSA-wv97-q48c-w5m2
|
This vulnerability allows an authenticated user to perform a Lifecycle Manager flow or other QuickLink for a target user outside of the defined QuickLink Population.
|
[] | null | 7.1 | null | null |
|
CVE-2023-5748
|
Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology SSL VPN Client before 1.4.7-0687 allows local users to conduct denial-of-service attacks via unspecified vectors.
|
[
"cpe:2.3:a:synology:ssl_vpn_client:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
|
CVE-2022-0465
|
Use after free in Extensions in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via user interaction.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
RHSA-2024:1113
|
Red Hat Security Advisory: frr security update
|
ffr: Flowspec overflow in bgpd/bgp_flowspec.c ffr: Out of bounds read in bgpd/bgp_label.c frr: crash from specially crafted MP_UNREACH_NLRI-containing BGP UPDATE message frr: crash from malformed EOR-containing BGP UPDATE message
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2025:10771
|
Red Hat Security Advisory: OpenShift Container Platform 4.19.4 bug fix and security update
|
sudo: LPE via host option
|
[
"cpe:/a:redhat:openshift:4.19::el9"
] | null | 7 | null | null |
GHSA-h935-95pr-wqf9
|
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code via a crafted web page, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3290.
|
[] | null | null | 7.5 | null |
|
CVE-2025-28367
|
mojoPortal <=2.9.0.1 is vulnerable to Directory Traversal via BetterImageGallery API Controller - ImageHandler Action. An attacker can exploit this vulnerability to access the Web.Config file and obtain the MachineKey.
|
[] | null | 6.5 | null | null |
|
GHSA-3xcc-hjh3-q7jx
|
NetApp OnCommand Unified Manager for Clustered Data ONTAP 6.3 through 6.4P1 contain a default privileged account, which allows remote attackers to execute arbitrary code via unspecified vectors.
|
[] | null | null | 9.8 | null |
|
CVE-2022-43362
|
Senayan Library Management System v9.4.2 was discovered to contain a SQL injection vulnerability via the collType parameter at loan_by_class.php.
|
[
"cpe:2.3:a:slims:senayan_library_management_system:9.4.2:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2000-0096
|
Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command.
|
[
"cpe:2.3:a:qualcomm:qpopper:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta6:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta7:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta8:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta9:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta10:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta11:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta12:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta13:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta14:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta15:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta16:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta17:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta18:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta19:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta20:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta21:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta22:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta23:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta24:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta25:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta26:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta27:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta28:*:*:*:*:*:*:*",
"cpe:2.3:a:qualcomm:qpopper:3.0beta29:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2020-27799
|
A heap-based buffer over-read was discovered in the acc_ua_get_be32 function in miniacc.h in UPX 4.0.0 via a crafted Mach-O file.
|
[
"cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-w4rw-664q-rp8h
|
IBM WebSphere MQ 9.0.0.1 and 9.0.2 could allow a local user to write to a file or delete files in a directory they should not have access to due to improper access controls. IBM X-Force ID: 117926.
|
[] | null | null | 5.5 | null |
|
GHSA-v9p7-8r6w-35xh
|
Unknown vulnerability in the Gnutella dissector in Ethereal 0.10.6 through 0.10.8 allows remote attackers to cause a denial of service (application crash).
|
[] | null | null | null | null |
|
RHSA-2024:5754
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.29 packages and security update
|
golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
GHSA-cj67-c85m-hjw4
|
Multiple array index errors in the Stream Control Transmission Protocol (SCTP) module in FreeBSD 10.1 before p5, 10.0 before p17, 9.3 before p9, and 8.4 before p23 allow local users to (1) gain privileges via the stream id to the setsockopt function, when setting the SCTIP_SS_VALUE option, or (2) read arbitrary kernel memory via the stream id to the getsockopt function, when getting the SCTP_SS_PRIORITY option.
|
[] | null | null | null | null |
|
GHSA-jq8w-gqq2-h36f
|
AOL Client Software 9.0 uses insecure permissions for its installation path, which allows local users to execute arbitrary code with SYSTEM privileges by replacing ACSD.exe with a malicious program.
|
[] | null | null | null | null |
|
RHSA-2023:2903
|
Red Hat Security Advisory: php:7.4 security update
|
php: Overflowing the length of string causes crash php: phar: infinite loop when decompressing quine gzip file php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications php: OOB read due to insufficient input validation in imageloadfont() php: PDO:: quote() may return unquoted string due to an integer overflow XKCP: buffer overflow in the SHA-3 reference implementation
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | 7.5 | null |
CVE-2023-49984
|
A cross-site scripting (XSS) vulnerability in the component /management/settings of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.
|
[
"cpe:2.3:a:sourcecodester:school_fees_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2019-8772
|
An issue existed in the handling of links in encrypted PDFs. This issue was addressed by adding a confirmation prompt. This issue is fixed in macOS Catalina 10.15. An attacker may be able to exfiltrate the contents of an encrypted PDF.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-rgjc-4jw4-4wgm
|
MyBulletinBoard (MyBB) 1.0 PR2 Rev 686 allows remote attackers to delete or move private messages (PM) via modified fields in the inbox form.
|
[] | null | null | null | null |
|
GHSA-59h3-rq7p-jqmv
|
A specially crafted x509 certificate can cause a single out of bounds byte overwrite in wolfSSL through 3.10.2 resulting in potential certificate validation vulnerabilities, denial of service and possible remote code execution. In order to trigger this vulnerability, the attacker needs to supply a malicious x509 certificate to either a server or a client application using this library.
|
[] | null | null | 9.8 | null |
|
GHSA-j2vg-p66m-8xmh
|
User32.DLL in Microsoft Windows 98SE, and possibly other operating systems, allows local and remote attackers to cause a denial of service (crash) via an icon (.ico) bitmap file with large width and height values.
|
[] | null | null | null | null |
|
GHSA-2p4j-8pc7-8jg8
|
The vCard functions in Joomla! 1.0.5 use predictable sequential IDs for vcards and do not restrict access to them, which allows remote attackers to obtain valid e-mail addresses to conduct spam attacks by modifying the contact_id parameter to index2.php.
|
[] | null | null | null | null |
|
CVE-2021-46520
|
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_jprintf at src/mjs_util.c.
|
[
"cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-9579-6qmh-v5ch
|
WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.
|
[] | null | null | null | null |
|
GHSA-vjgf-5h8j-h29j
|
A CWE-798 "Use of Hard-coded Credentials" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability is associated to the backup configuration functionality that by default encrypts the archives using a static password.
|
[] | null | 6.5 | null | null |
|
CVE-2025-35941
|
mySCADA PRO Manager Password Disclosure
|
A password is exposed locally.
|
[] | null | 5.5 | null | null |
GHSA-8x77-rwjj-37f7
|
In wifi driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220420020; Issue ID: GN20220420020.
|
[] | null | 6.7 | null | null |
|
GHSA-f3f6-q22p-8fh5
|
lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
|
[] | null | null | null | null |
|
CVE-2024-50696
|
SunGrow WiNet-S V200.001.00.P025 and earlier versions is missing integrity checks for firmware upgrades. Sending a specific MQTT message allows an update to an inverter or a WiNet connectivity dongle with a bogus firmware file that is located on attacker-controlled server.
|
[] | null | 7.5 | null | null |
|
GHSA-pgmp-7x52-hv66
|
Windows TCP/IP Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24074.
|
[] | null | 9.8 | null | null |
|
CVE-2006-2462
|
BEA WebLogic Server 8.1 before Service Pack 4 and 7.0 before Service Pack 6, may send sensitive data over non-secure channels when using JTA transactions, which allows remote attackers to read potentially sensitive network traffic.
|
[
"cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*"
] | null | null | null | 5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.