id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2008-0544 | Heap-based buffer overflow in the IMG_LoadLBM_RW function in IMG_lbm.c in SDL_image before 1.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted IFF ILBM file. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:sdl:sdl_image:1.2.6:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-8vjf-qj5h-9992 | Cisco Secure Services Client (CSSC) 4.x, Trust Agent 1.x and 2.x, Cisco Security Agent (CSA) 5.0 and 5.1 (when a vulnerable Trust Agent has been deployed), and the Meetinghouse AEGIS SecureConnect Client do not properly parse commands, which allows local users to gain privileges via unspecified vectors, aka CSCsh30624. | []
| null | null | null | null |
|
GHSA-vv4v-whgw-9284 | Unknown vulnerability in 3Com OfficeConnect Remote 812 ADSL Router allows remote attackers to bypass authentication via repeated attempts using any username and password. NOTE: this identifier was inadvertently re-used for another issue due to a typo; that issue was assigned CVE-2004-0447. This candidate is ONLY for the ADSL router bypass. | []
| null | null | null | null |
|
CVE-2019-4149 | IBM Business Automation Workflow V18.0.0.0 through V18.0.0.2 and IBM Business Process Manager V8.6.0.0 through V8.6.0.0 Cumulative Fix 2018.03, V8.5.7.0 through V8.5.7.0 Cumulative Fix 2017.06, and V8.5.6.0 through V8.5.6.0 CF2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158415. | [
"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:cf1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:cf2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf201706:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:cf201712:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:cf201803:*:*:*:*:*:*"
]
| null | null | 5.4 | null |
|
CVE-2019-3924 | MikroTik RouterOS before 6.43.12 (stable) and 6.42.12 (long-term) is vulnerable to an intermediary vulnerability. The software will execute user defined network requests to both WAN and LAN clients. A remote unauthenticated attacker can use this vulnerability to bypass the router's firewall or for general network scanning activities. | [
"cpe:2.3:o:mikrotik:routeros:*:*:*:*:ltr:*:*:*",
"cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
GHSA-r2fr-78p9-w3pq | A vulnerability classified as critical has been found in Fanli2012 native-php-cms 1.0. This affects an unknown part of the file product_list.php. The manipulation of the argument cat leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | []
| 5.3 | 6.3 | null | null |
|
GHSA-qf4q-469q-crcp | Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.2.0. | []
| null | null | null | null |
|
GHSA-g4j9-pmf2-prrv | Last Yard 22.09.8-1 does not enforce HSTS headers | []
| null | 9.8 | null | null |
|
GHSA-f5gp-267j-g6xq | Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210. | []
| null | null | 7.5 | null |
|
GHSA-4gjr-vgfx-9qvw | AList vulnerable to Improper Preservation of Permissions | Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one). Version 3.5.1 contains a patch. | []
| null | 8.8 | null | null |
GHSA-q39c-5vh5-vw2p | Improper Authentication in Apereo CAS | Apereo CAS 5.3.x before 5.3.16, 6.x before 6.1.7.2, 6.2.x before 6.2.4, and 6.3.x before 6.3.0-RC4 mishandles secret keys with Google Authenticator for multifactor authentication. | []
| null | 7.5 | null | null |
CVE-2015-4659 | Cross-site request forgery (CSRF) vulnerability in ClickHeat 1.14 and earlier allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via a config action to index.php. | [
"cpe:2.3:a:labsmedia:clickheat:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
RHSA-2009:1680 | Red Hat Security Advisory: xpdf security update | xpdf: buffer overflow in FoFiType1::parse | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
GHSA-5h32-5fxq-gm74 | A vulnerability in the web-based management interface of Cisco UCS Director could allow an unauthenticated, remote attacker to download system log files from an affected device. The vulnerability is due to an issue in the authentication logic of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web interface. A successful exploit could allow the attacker to download log files if they were previously generated by an administrator. | []
| null | null | null | null |
|
CVE-2024-29027 | Parse Server crash and RCE via invalid Cloud Function or Cloud Job name | Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 6.5.5 and 7.0.0-alpha.29, calling an invalid Parse Server Cloud Function name or Cloud Job name crashes the server and may allow for code injection, internal store manipulation or remote code execution. The patch in versions 6.5.5 and 7.0.0-alpha.29 added string sanitation for Cloud Function name and Cloud Job name. As a workaround, sanitize the Cloud Function name and Cloud Job name before it reaches Parse Server. | [
"cpe:2.3:a:parse_community:parse_server:*:*:*:*:*:*:*:*"
]
| null | 9.1 | null | null |
CVE-2010-1527 | Stack-based buffer overflow in Novell iPrint Client before 5.44 allows remote attackers to execute arbitrary code via a long call-back-url parameter in an op-client-interface-version action. | [
"cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
CVE-2024-45872 | Bandisoft BandiView 7.05 is vulnerable to Buffer Overflow via sub_0x410d1d. The vulnerability occurs due to insufficient validation of PSD files. | [
"cpe:2.3:a:bandisoft:bandiview:7.05:*:*:*:*:*:*:*"
]
| null | 6.3 | null | null |
|
CVE-2021-1817 | A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
CVE-2014-6674 | The Amazighmusic (aka nl.appsandroo.Amazighmusic) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:amazighmusic_project:amazighmusic:1.0:*:*:*:*:android:*:*"
]
| null | null | null | 5.4 |
|
CVE-2022-32153 | Splunk Enterprise lacked TLS host name validation | Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, an attacker with administrator credentials could add a peer without a valid certificate and connections from misconfigured nodes without valid certificates did not fail by default. For Splunk Enterprise, update to Splunk Enterprise version 9.0 and Configure TLS host name validation for Splunk-to-Splunk communications (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation) to enable the remediation. | [
"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*"
]
| null | 8.1 | null | null |
CVE-2006-5579 | Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using JavaScript to cause certain errors simultaneously, which results in the access of previously freed memory, aka "Script Error Handling Memory Corruption Vulnerability." | [
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
CVE-2025-27775 | Applio allows SSRF and file write in model_download.py | Applio is a voice conversion tool. Versions 3.2.7 and prior are vulnerable to server-side request forgery (SSRF) and file write in `model_download.py` (line 143 in 3.2.7). The blind SSRF allows for sending requests on behalf of Applio server and can be leveraged to probe for other vulnerabilities on the server itself or on other back-end systems on the internal network, that the Applio server can reach. The file write allows for writing files on the server, which can be coupled with other vulnerabilities, for example an unsafe deserialization, to achieve remote code execution on the Applio server. As of time of publication, no known patches are available. | []
| 8.8 | null | null | null |
GHSA-w9h3-r69r-j5c4 | Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls. | []
| null | null | 5.3 | null |
|
CVE-2010-4706 | The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check. | [
"cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:linux-pam:linux-pam:1.1.1:*:*:*:*:*:*:*"
]
| null | null | null | 4.9 |
|
CVE-2016-0356 | IBM Sametime Enterprise Meeting Server 8.5.2 and 9.0 could allow an authenticated user that has been invited to a Sametime meeting room, to cause the screen sharing to cease through the use of cross-site request forgery. IBM X-Force ID: 111895. | [
"cpe:2.3:a:ibm:sametime:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.1:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4 |
|
GHSA-v32r-mrmh-qxvx | TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter ip in the setDiagnosisCfg function. | []
| null | 8.8 | null | null |
|
CVE-2024-6965 | Tenda O3 fromVirtualSet stack-based overflow | A vulnerability has been found in Tenda O3 1.0.0.10 and classified as critical. Affected by this vulnerability is the function fromVirtualSet. The manipulation of the argument ip/localPort/publicPort/app leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272119. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:h:tenda:o3v2:1.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:o3v2_firmware:1.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:o3_firmware1.0.0.10\\(2478\\):*:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:o3:2.0:*:*:*:*:*:*:*"
]
| 8.7 | 8.8 | 8.8 | 9 |
CVE-2014-6283 | SAP Adaptive Server Enterprise (ASE) 15.7 before SP122 or SP63, 15.5 before ESD#5.4, and 15.0.3 before ESD#4.4 does not properly restrict access, which allows remote authenticated database users to (1) overwrite the master encryption key or (2) trigger a buffer overflow via a crafted RPC message to the hacmpmsgxchg function, and possibly other vectors. | [
"cpe:2.3:a:sybase:adaptive_server_enterprise:15.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sybase:adaptive_server_enterprise:15.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sybase:adaptive_server_enterprise:15.7:*:*:*:*:*:*:*"
]
| null | null | null | 6.5 |
|
GHSA-p939-r66p-8wwm | A vulnerability has been identified in SCALANCE SC622-2C (All versions < V2.3), SCALANCE SC622-2C (All versions >= 2.3 < V3.0), SCALANCE SC626-2C (All versions < V2.3), SCALANCE SC626-2C (All versions >= 2.3 < V3.0), SCALANCE SC632-2C (All versions < V2.3), SCALANCE SC632-2C (All versions >= 2.3 < V3.0), SCALANCE SC636-2C (All versions < V2.3), SCALANCE SC636-2C (All versions >= 2.3 < V3.0), SCALANCE SC642-2C (All versions < V2.3), SCALANCE SC642-2C (All versions >= 2.3 < V3.0), SCALANCE SC646-2C (All versions < V2.3), SCALANCE SC646-2C (All versions >= 2.3 < V3.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive. | []
| 7.1 | 6.5 | null | null |
|
CVE-2013-3502 | monarch_scan.cgi in the MONARCH component in GroundWork Monitor Enterprise 6.7.0 allows remote authenticated users to execute arbitrary commands, and consequently obtain sensitive information, by leveraging a JOSSO SSO cookie. | [
"cpe:2.3:a:gwos:groundwork_monitor:6.7.0:-:enterprise:*:*:*:*:*"
]
| null | null | null | 6.5 |
|
CVE-2008-5600 | Merlix Teamworx Server stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file via a direct request for teamworx.mdb. | [
"cpe:2.3:a:merlix:teamworx_server:_nil_:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2020-22570 | Memcached 1.6.0 before 1.6.3 allows remote attackers to cause a denial of service (daemon crash) via a crafted meta command. | [
"cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2014-3618 | Heap-based buffer overflow in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted email header, related to "unbalanced quotes." | [
"cpe:2.3:a:procmail:procmail:3.22:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2024-0565 | Kernel: cifs filesystem decryption improper input validation remote code execution vulnerability in function receive_encrypted_standard of client | An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service. | [
"cpe:/a:redhat:enterprise_linux:8::realtime",
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/o:redhat:enterprise_linux:8::baseos",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8",
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhel_eus:8.8::baseos",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos",
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime",
"cpe:/a:redhat:logging:5.7::el8",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:9",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.7:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_tools:-:*:*:*:*:vmware_vsphere:*:*"
]
| null | 6.8 | null | null |
GHSA-434h-p4gx-jm89 | Observable Response Discrepancy in Flask-AppBuilder | ImpactUser enumeration in database authentication in Flask-AppBuilder <= 3.2.3. Allows for a non authenticated user to enumerate existing accounts by timing the response time from the server when you are logging in.PatchesUpgrade to 3.3.0For more informationIf you have any questions or comments about this advisory:Open an issue in [Flask-AppBuilder](https://github.com/dpgaspar/Flask-AppBuilder) | []
| 6.9 | 5.3 | null | null |
GHSA-mwhf-vhr5-7j23 | whatsapp-api-js fails to validate message's signature | ImpactIncorrect Access Control, anyone using the post or verifyRequestSignature methods to handle messages is impacted.PatchesPatched in version 4.0.3.WorkaroundsIt's possible to check the payload validation using the WhatsAppAPI.verifyRequestSignature and expect false when the signature is valid.Referenceshttps://github.com/Secreto31126/whatsapp-api-js/pull/371 | []
| 5.3 | 5.8 | null | null |
GHSA-2rqf-4qh6-w5pg | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_compact_strings at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS). | []
| null | null | null | null |
|
GHSA-r8vm-2j4g-7jq3 | In the Linux kernel, the following vulnerability has been resolved:net/mlx5e: kTLS, Fix incorrect page refcountingThe kTLS tx handling code is using a mix of get_page() and
page_ref_inc() APIs to increment the page reference. But on the release
path (mlx5e_ktls_tx_handle_resync_dump_comp()), only put_page() is used.This is an issue when using pages from large folios: the get_page()
references are stored on the folio page while the page_ref_inc()
references are stored directly in the given page. On release the folio
page will be dereferenced too many times.This was found while doing kTLS testing with sendfile() + ZC when the
served file was read from NFS on a kernel with NFS large folios support
(commit 49b29a573da8 ("nfs: add support for large folios")). | []
| null | 5.5 | null | null |
|
GHSA-v5j3-mr3h-g2mq | A Division by Zero vulnerability in bj10v_print_page() in contrib/japanese/gdev10v.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. | []
| null | 5.5 | null | null |
|
GHSA-v8cv-gqh8-47r4 | NetScout nGeniusONE 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability (issue 3 of 4). | []
| null | 5.4 | null | null |
|
CVE-2023-29501 | Jiyu Kukan Toku-Toku coupon App for iOS versions 3.5.0 and earlier, and Jiyu Kukan Toku-Toku coupon App for Android versions 3.5.0 and earlier are vulnerable to improper server certificate verification. If this vulnerability is exploited, a man-in-the-middle attack may allow an attacker to eavesdrop on an encrypted communication. | [
"cpe:2.3:a:runsystem:jiyu_kukan_toku-toku_coupon:*:*:*:*:*:android:*:*",
"cpe:2.3:a:runsystem:jiyu_kukan_toku-toku_coupon:*:*:*:*:*:iphone_os:*:*"
]
| null | 4.8 | null | null |
|
CVE-2009-5071 | Unspecified vulnerability in Palm Pre WebOS before 1.2.1 has unknown impact and attack vectors related to an "included contact template file." | [
"cpe:2.3:o:hp:palm_pre_webos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:palm_pre_webos:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:palm_pre_webos:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:palm_pre_webos:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:palm_pre_webos:1.1.0:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-mq4j-vx6c-wx9j | XML external entity (XXE) vulnerability in the WebHMI server in Yokogawa Electric Corporation FAST/TOOLS before R9.05-SP2 allows local users to cause a denial of service (CPU or network traffic consumption) or read arbitrary files via unspecified vectors. | []
| null | null | null | null |
|
RHSA-2009:1584 | Red Hat Security Advisory: java-1.6.0-openjdk security update | deprecate MD2 in SSL cert validation (Kaminsky) OpenJDK ICC_Profile file existence detection information leak (6631533) OpenJDK JRE AWT setDifflCM stack overflow (6872357) OpenJDK JRE AWT setBytePixels heap overflow (6872358) OpenJDK JPEG Image Writer quantization problem (6862968) OpenJDK ImageI/O JPEG heap overflow (6874643) OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503) OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK GraphicsConfiguration information leak(6822057) OpenJDK UI logging information leakage(6664512) OpenJDK resurrected classloaders can still have children (6636650) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK zoneinfo file existence information leak (6824265) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
CVE-2012-0023 | Double free vulnerability in the get_chunk_header function in modules/demux/ty.c in VideoLAN VLC media player 0.9.0 through 1.1.12 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TiVo (TY) file. | [
"cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.1.12:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-q2x4-v7h3-phvm | Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via crafted XSL in an SVG file. | []
| null | null | null | null |
|
CVE-2013-1908 | The Commons Wikis module before 7.x-3.1 for Drupal, as used in the Commons module before 7.x-3.1, does not properly restrict access to groups, which allows remote attackers to post arbitrary content to groups via unspecified vectors. | [
"cpe:2.3:a:acquia:commons:*:*:*:*:*:*:*:*",
"cpe:2.3:a:acquia:commons:7.x-3.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:commons_wikis_project:commons_wikis:*:*:*:*:*:*:*:*",
"cpe:2.3:a:commons_wikis_project:commons_wikis:7.x-3.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-gjcg-2hrx-9qgc | sound/soc/msm/qdsp6v2/msm-audio-effects-q6-v2.c in the MSM QDSP6 audio driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (out-of-bounds write and memory corruption) or possibly have unspecified other impact via a crafted application that makes an ioctl call triggering incorrect use of a parameters pointer. | []
| null | 7.8 | null | null |
|
CVE-2006-4629 | PHP remote file inclusion vulnerability in affichage/commentaires.php in C-News.fr C-News 1.0.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the path parameter. | [
"cpe:2.3:a:c-news.fr:c-news:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-fv5h-g6gw-g23h | RIOT 2019.07 contains a NULL pointer dereference in the MQTT-SN implementation (asymcute), potentially allowing an attacker to crash a network node running RIOT. This requires spoofing an MQTT server response. To do so, the attacker needs to know the MQTT MsgID of a pending MQTT protocol message and the ephemeral port used by RIOT's MQTT implementation. Additionally, the server IP address is required for spoofing the packet. | []
| null | 7.5 | null | null |
|
CVE-2009-4000 | Directory traversal vulnerability in goform/formExportDataLogs in HP Power Manager before 4.2.10 allows remote attackers to overwrite arbitrary files, and execute arbitrary code, via directory traversal sequences in the fileName parameter. | [
"cpe:2.3:a:hp:power_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:power_manager:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:power_manager:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:power_manager:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:power_manager:4.2.8:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2018-8576 | A remote code execution vulnerability exists in Microsoft Outlook software when it fails to properly handle objects in memory, aka "Microsoft Outlook Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Outlook. This CVE ID is unique from CVE-2018-8522, CVE-2018-8524, CVE-2018-8582. | [
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:outlook:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 9.3 |
|
GHSA-8gwq-mv35-rmmj | The Better Search Replace plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.4 via deserialization of untrusted input. This makes it possible for unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | []
| null | 9.8 | null | null |
|
CVE-2014-6280 | Multiple cross-site scripting (XSS) vulnerabilities in OSClass before 3.4.2 allow remote attackers to inject arbitrary web script or HTML via the (1) action or (2) nsextt parameter to oc-admin/index.php or the (3) nsextt parameter in an items_reported action to oc-admin/index.php. | [
"cpe:2.3:a:osclass:osclass:*:*:*:*:*:*:*:*",
"cpe:2.3:a:osclass:osclass:3.4.0:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2025-21551 | Vulnerability in the Oracle Solaris product of Oracle Systems (component: File system). The supported version that is affected is 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Solaris accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 6.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H). | [
"cpe:2.3:a:oracle:solaris:11:*:*:*:*:*:*:*"
]
| null | 6 | null | null |
|
GHSA-3j64-fv5j-4hpw | IBM Jazz Reporting Service (JRS) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | []
| null | null | 5.4 | null |
|
CVE-2015-0735 | Cross-site request forgery (CSRF) vulnerability in Cisco Unified Customer Voice Portal (CVP) 10.5(1) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut93970. | [
"cpe:2.3:a:cisco:unified_customer_voice_portal:10.5\\(1\\):*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-g6f3-7pfm-rg7m | Multiple vulnerabilities in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to lack of proper input validation of the HTTPS request. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: This vulnerability affects only specific AnyConnect and WebVPN configurations. For more information, see the Vulnerable Products section. | []
| null | 7.5 | null | null |
|
CVE-2021-0272 | Junos OS: QFX10002-32Q, QFX10002-60C, QFX10002-72Q, QFX10008, QFX10016: In EVPN-VXLAN scenarios receipt of specific genuine packets by an adjacent attacker will cause a kernel memory leak in FPC. | A kernel memory leak in QFX10002-32Q, QFX10002-60C, QFX10002-72Q, QFX10008, QFX10016 devices Flexible PIC Concentrators (FPCs) on Juniper Networks Junos OS allows an attacker to send genuine packets destined to the device to cause a Denial of Service (DoS) to the device. On QFX10002-32Q, QFX10002-60C, QFX10002-72Q devices the device will crash and restart. On QFX10008, QFX10016 devices, depending on the number of FPCs involved in an attack, one more more FPCs may crash and traffic through the device may be degraded in other ways, until the attack traffic stops. A reboot is required to restore service and clear the kernel memory. Continued receipt and processing of these genuine packets will create a sustained Denial of Service (DoS) condition. On QFX10008, QFX10016 devices, an indicator of compromise may be the existence of DCPFE core files. You can also monitor PFE memory utilization for incremental growth: user@qfx-RE:0% cprod -A fpc0 -c "show heap 0" | grep -i ke 0 3788a1b0 3221225048 2417120656 804104392 24 Kernel user@qfx-RE:0% cprod -A fpc0 -c "show heap 0" | grep -i ke 0 3788a1b0 3221225048 2332332200 888892848 27 Kernel This issue affects: Juniper Networks Junos OS on QFX10002-32Q, QFX10002-60C, QFX10002-72Q, QFX10008, QFX10016: 16.1 versions 16.1R1 and above prior to 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R3-S2; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R3; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R2. This issue does not affect releases prior to Junos OS 16.1R1. This issue does not affect EX Series devices. This issue does not affect Junos OS Evolved. | [
"cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx10002-32q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx10002-60c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx10002-72q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx10008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx10016:-:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
GHSA-m53q-66x7-v5m2 | D-Link DAP-2622 DDP Configuration Backup Auth Password Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20065. | []
| null | null | 8.8 | null |
|
GHSA-42qm-8v8m-m78c | PocketMine MP vulnerable to uncontrolled resource consumption via mismatched type of 'InventoryTransactionPacket' | ImpactA "mismatch" type `InventoryTransactionPacket` is sent by the client to request a resync of all currently open inventories.Since PocketMine-MP does not rate-limit these "mismatch" transactions, and the syncing of inventories is not deferred until, e.g. the end of the current tick, they can be used as a very cheap bandwidth multiplier by making the server send out many MB of data (network serialized inventory items can be very large, especially when dealing with large amounts of NBT).This is not currently known to have been exploited in the wild.PatchesThis problem was fixed in 4.18.0-ALPHA2 by ca6d51498f12427a947467da8fcad7811418e6cc alongside the introduction of the `ItemStackRequest` system implementation.WorkaroundsPlugins can handle `DataPacketReceiveEvent` for `InventoryTransactionPacket` and check if the type is `MismatchTransactionData`. If it is, apply some kind of rate limit (e.g. max 1 per tick). | []
| null | 5.3 | null | null |
CVE-2016-8221 | Privilege Escalation in Lenovo XClarity Administrator earlier than 1.2.0, if LXCA is used to manage rack switches or chassis with embedded input/output modules (IOMs), certain log files viewable by authenticated users may contain passwords for internal administrative LXCA accounts with temporary passwords that are used internally by LXCA code. | [
"cpe:2.3:a:lenovo:xclarity_administrator:*:*:*:*:*:*:*:*"
]
| null | null | 7 | 1.9 |
|
GHSA-q76q-x9c4-447v | The Multipass service was found to have code paths that could be abused to cause a denial of service for authentication or authorization operations. A malicious attacker could perform an application-level denial of service attack, potentially causing authentication and/or authorization operations to fail for the duration of the attack. This could lead to performance degradation or login failures for customer Palantir Foundry environments. This vulnerability is resolved in Multipass 3.647.0. This issue affects: Palantir Foundry Multipass versions prior to 3.647.0. | []
| null | 9.1 | null | null |
|
GHSA-43fv-rqxp-47v5 | Multiple SQL injection vulnerabilities in MH Products Projekt Shop allow remote attackers to execute arbitrary SQL commands via the (1) ts parameter to details.php and possibly the (2) ilceler parameter to index.php. | []
| null | null | null | null |
|
RHSA-2019:1884 | Red Hat Security Advisory: libssh2 security update | libssh2: Out-of-bounds memory comparison with specially crafted message channel request | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 7.3 | null |
CVE-2022-25841 | Uncontrolled search path elements in the Intel(R) Datacenter Group Event Android application, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:datacenter_group_event:*:*:*:*:*:android:*:*"
]
| null | 7.8 | null | null |
|
CVE-2022-25698 | Memory corruption in SPI buses due to improper input validation while reading address configuration from spi buses in Snapdragon Mobile, Snapdragon Wearables | [
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
]
| null | 8.4 | null | null |
|
GHSA-4qm8-vg2r-2hg7 | Missing Authorization vulnerability in looks_awesome Team Builder allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Team Builder: from n/a through 1.5.7. | []
| null | 7.6 | null | null |
|
CVE-2025-48056 | Hubble CLI vulnerable to character injection | Hubble is a fully distributed networking and security observability platform for cloud native workloads. Prior to version 1.17.2, a network attacker could inject malicious control characters into Hubble CLI terminal output, potentially leading to loss of integrity and manipulation of the output. This could be leveraged to conceal log entries, rewrite output, or even make the terminal temporarily unusable. Exploitation of this attack would require the victim to be monitoring Kafka traffic using Layer 7 Protocol Visibility at the time of the attack. The issue is patched in Hubble CLI v1.17.2. Hubble CLI users who are unable to upgrade can direct their Hubble flows to a log file and inspect the output within a text editor. | []
| null | 5.3 | null | null |
CVE-2018-16983 | NoScript Classic before 5.1.8.7, as used in Tor Browser 7.x and other products, allows attackers to bypass script blocking via the text/html;/json Content-Type value. | [
"cpe:2.3:a:noscript:noscript:*:*:*:*:*:*:*:*",
"cpe:2.3:a:torproject:tor_browser:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
CVE-2021-44117 | A Cross Site Request Forgery (CSRF) vulnerability exists in TheDayLightStudio Fuel CMS 1.5.0 via a POST call to /fuel/sitevariables/delete/4. | [
"cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.0:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
CVE-2024-40908 | bpf: Set run context for rawtp test_run callback | In the Linux kernel, the following vulnerability has been resolved:
bpf: Set run context for rawtp test_run callback
syzbot reported crash when rawtp program executed through the
test_run interface calls bpf_get_attach_cookie helper or any
other helper that touches task->bpf_ctx pointer.
Setting the run context (task->bpf_ctx pointer) for test_run
callback. | []
| null | null | null | null |
PYSEC-2021-183 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger an integer division by zero undefined behavior in `tf.raw_ops.QuantizedBiasAdd`. This is because the implementation of the Eigen kernel(https://github.com/tensorflow/tensorflow/blob/61bca8bd5ba8a68b2d97435ddfafcdf2b85672cd/tensorflow/core/kernels/quantization_utils.h#L812-L849) does a division by the number of elements of the smaller input (based on shape) without checking that this is not zero. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | []
| null | null | null | null |
CVE-2025-43837 | WordPress Total Donations <= 3.0.8 - Cross Site Scripting (XSS) Vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in binti76 Total Donations allows Reflected XSS.This issue affects Total Donations: from n/a through 3.0.8. | []
| null | 7.1 | null | null |
RHSA-2020:1000 | Red Hat Security Advisory: rsyslog security, bug fix, and enhancement update | rsyslog: heap-based overflow in contrib/pmaixforwardedfrom/pmaixforwardedfrom.c rsyslog: heap-based overflow in contrib/pmcisconames/pmcisconames.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 7.5 | null |
CVE-2021-40347 | An issue was discovered in views/list.py in GNU Mailman Postorius before 1.3.5. An attacker (logged into any account) can send a crafted POST request to unsubscribe any user from a mailing list, also revealing whether that address was subscribed in the first place. | [
"cpe:2.3:a:postorius_project:postorius:*:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 5.5 |
|
GHSA-78xf-x743-mmc6 | In the Linux kernel, the following vulnerability has been resolved:media: s5p-jpeg: prevent buffer overflowsThe current logic allows word to be less than 2. If this happens,
there will be buffer overflows, as reported by smatch. Add extra
checks to prevent it.While here, remove an unused word = 0 assignment. | []
| null | 7.8 | null | null |
|
GHSA-hxpr-67mw-jh59 | A vulnerability was found in Turante Sandbox Theme up to 1.5.2. It has been classified as problematic. This affects the function sandbox_body_class of the file functions.php. The manipulation of the argument page leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.6.1 is able to address this issue. The name of the patch is 8045b1e10970342f558b2c5f360e0bd135af2b10. It is recommended to upgrade the affected component. The identifier VDB-225357 was assigned to this vulnerability. | []
| null | 6.1 | null | null |
|
CVE-2024-27839 | A privacy issue was addressed by moving sensitive data to a more secure location. This issue is fixed in iOS 17.5 and iPadOS 17.5. A malicious application may be able to determine a user's current location. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
RHSA-2023:0189 | Red Hat Security Advisory: Red Hat AMQ Streams 2.3.0 release and security update | jetty-http: improver hostname input handling http2-server: Invalid HTTP/2 requests cause DoS jetty-server: Improper release of ByteBuffers in SslConnections snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays | [
"cpe:/a:redhat:amq_streams:2"
]
| null | 7.5 | null | null |
PYSEC-2012-14 | null | Universal Feed Parser (aka feedparser or python-feedparser) before 5.1.2 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML ENTITY declaration in a non-ASCII encoded document. | []
| null | null | null | null |
CVE-2011-3711 | BIGACE 2.7.5 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by system/libs/javascript.inc.php and certain other files. | [
"cpe:2.3:a:bigace:bigace:2.7.5:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-x9w2-g9gv-85xr | Multiple PHP file inclusion vulnerabilities in WGS-PPC (aka PPC Search Engine), as distributed with other aliases, allow remote attackers to execute arbitrary PHP code via a URL in the INC parameter in (1) config_admin.php, (2) config_main.php, (3) config_member.php, and (4) mysql_config.php in config/; (5) admin.php and (6) index.php in admini/; (7) paypalipn/ipnprocess.php; (8) index.php and (9) registration.php in members/; and (10) ppcbannerclick.php and (11) ppcclick.php in main/. | []
| null | null | null | null |
|
GHSA-9g7f-gmj5-mxvq | V3 Chat - Profiles/Dating Script 3.0.2 allows remote attackers to bypass authentication and gain administrative access by setting the admin cookie to 1. | []
| null | 9.8 | null | null |
|
GHSA-w573-v9j8-jgf8 | Directory traversal vulnerability in Irmin CMS (formerly Pepsi CMS) 0.6 BETA2 allows remote attackers to read arbitrary files via a .. (dot dot) in the w parameter to index.php. | []
| null | null | null | null |
|
CVE-2022-49037 | Insertion of sensitive information into log file vulnerability in proxy settings component in Synology Drive Client before 3.3.0-15082 allows remote authenticated users to obtain sensitive information via unspecified vectors. | [
"cpe:2.3:a:synology:drive_client:*:*:*:*:*:desktop:*:*"
]
| null | 6.5 | null | null |
|
CVE-2015-9318 | The awesome-support plugin before 3.1.7 for WordPress has a security issue in which shortcodes are allowed in replies. | [
"cpe:2.3:a:getawesomesupport:awesome_support:*:*:*:*:*:wordpress:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2019-1357 | A spoofing vulnerability exists when Microsoft Browsers improperly handle browser cookies, aka 'Microsoft Browser Spoofing Vulnerability'. This CVE ID is unique from CVE-2019-0608. | [
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
]
| null | 4.3 | null | 4.3 |
|
GHSA-9hr3-j9mc-xmq2 | Path Traversal in com.alibaba.oneagent:one-java-agent-plugin | All versions of package `com.alibaba.oneagent:one-java-agent-plugin` are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) using a specially crafted archive that holds directory traversal filenames (e.g. `../../evil.exe`). The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victim’s machine. | []
| null | 6.9 | null | null |
GHSA-v6p8-wpfj-2gpr | In Vanilla before 2.6.4, a flaw exists within the getSingleIndex function of the AddonManager class. The issue results in a require call using a crafted type value, leading to Directory Traversal with File Inclusion. An attacker can leverage this vulnerability to execute code under the context of the web server. | []
| null | null | 2.7 | null |
|
CVE-2019-13198 | The web application of several Kyocera printers (such as the ECOSYS M5526cdw 2R7_2000.001.701) was affected by Stored XSS. Successful exploitation of this vulnerability can lead to session hijacking of the administrator in the web application or the execution of unwanted actions. | [
"cpe:2.3:o:kyocera:ecosys_m5526cdw_firmware:2r7_2000.001.701:*:*:*:*:*:*:*",
"cpe:2.3:h:kyocera:ecosys_m5526cdw:-:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2022-40027 | SourceCodester Simple Task Managing System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component newTask.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the shortName parameter. | [
"cpe:2.3:a:simple_task_managing_system_project:simple_task_managing_system:1.0:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
GHSA-xp9m-x8x2-9jh8 | The IKEv1 implementation in Cisco Adaptive Security Appliance (ASA) software 7.2 and 8.2 before 8.2(5.58), 8.3 and 8.4 before 8.4(7.29), 8.5 through 8.7 before 8.7(1.17), 9.0 before 9.0(4.37), 9.1 before 9.1(6.8), 9.2 before 9.2(4), and 9.3 before 9.3(3) allows remote attackers to cause a denial of service (device reload) via crafted ISAKMP UDP packets, aka Bug ID CSCus94026. | []
| null | null | null | null |
|
GHSA-mjr3-48vc-h485 | Multiple buffer overflows in the AGate component for SAP Internet Transaction Server (ITS) allow remote attackers to execute arbitrary code via long (1) ~command, (2) ~runtimemode, or (3) ~session parameters, or (4) a long HTTP Content-Type header. | []
| null | null | null | null |
|
CVE-2015-4660 | Cross-site scripting (XSS) vulnerability in Enhanced SQL Portal 5.0.7961 allows remote attackers to inject arbitrary web script or HTML via the id parameter to iframe.php. | [
"cpe:2.3:a:eliacom:enhanced_sql_portal:5.0.7961:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-prj7-2jhj-62fj | In some cases, Kea log files or lease files may be world-readable.
This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8. | []
| null | 4 | null | null |
|
CVE-2009-3150 | SQL injection vulnerability in index.php in Multi Website 1.5 allows remote attackers to execute arbitrary SQL commands via the Browse parameter in a vote action. | [
"cpe:2.3:a:multi-website:multi_website:1.5:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2020-0322 | In apexd, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-147002540 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
]
| null | 4.4 | null | 2.1 |
|
CVE-2019-13735 | Out of bounds write in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x86:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x64:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x86:*"
]
| null | 8.8 | null | 6.8 |
|
CVE-2021-24079 | Windows Backup Engine Information Disclosure Vulnerability | Windows Backup Engine Information Disclosure Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
]
| null | 5.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.