id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2005-2194 | Unspecified vulnerability in the Apple Mac OS X kernel before 10.4.2 allows remote attackers to cause a denial of service (kernel panic) via a crafted TCP packet, possibly related to source routing or loose source routing. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2023-43767 | Certain WithSecure products allow Denial of Service via the aepack archive unpack handler. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1. | [
"cpe:2.3:a:f-secure:linux_protection:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:linux_security_64:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:atlant:1.0.35-1:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:client_security:15.00:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:email_and_server_security:15.00:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:server_security:15.00:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2010-3212 | SQL injection vulnerability in index.php in Seagull 0.6.7 and earlier allows remote attackers to execute arbitrary SQL commands via the frmQuestion parameter in a retrieve action, in conjunction with a user/password PATH_INFO. | [
"cpe:2.3:a:seagullproject.org:seagull:*:*:*:*:*:*:*:*",
"cpe:2.3:a:seagullproject.org:seagull:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:seagullproject.org:seagull:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:seagullproject.org:seagull:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:seagullproject.org:seagull:0.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:seagullproject.org:seagull:0.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:seagullproject.org:seagull:0.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:seagullproject.org:seagull:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:seagullproject.org:seagull:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:seagullproject.org:seagull:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:seagullproject.org:seagull:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:seagullproject.org:seagull:0.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:seagullproject.org:seagull:0.6.6:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-3w97-3qww-vxj8 | Buffer Overflow vulnerability in FFmpeg 4.2 in mov_write_video_tag due to the out of bounds in libavformat/movenc.c, which could let a remote malicious user obtain sensitive information, cause a Denial of Service, or execute arbitrary code. | []
| null | null | null | null |
|
GHSA-p4p4-5jgp-86pf | IBM Security Guardium Insights 2.0.1 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 184823. | []
| null | null | null | null |
|
CVE-2025-26773 | WordPress Analytify plugin <= 5.5.0 - Broken Access Control vulnerability | Missing Authorization vulnerability in Adnan Analytify allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Analytify: from n/a through 5.5.0. | []
| null | 4.3 | null | null |
GHSA-frpq-wjg3-5rp5 | CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate. | []
| null | null | null | null |
|
CVE-2023-50137 | JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) in the site management office. | [
"cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
|
CVE-2023-35873 | Missing Authentication check in SAP NetWeaver Process Integration (Runtime Workbench) | The Runtime Workbench (RWB) of SAP NetWeaver Process Integration - version SAP_XITOOL 7.50, does not perform authentication checks for certain functionalities that require user identity. An unauthenticated user might access technical data about the product status and its configuration. The vulnerability does not allow access to sensitive information or administrative functionalities. On successful exploitation an attacker can cause limited impact on confidentiality and availability of the application.
| [
"cpe:2.3:a:sap:netweaver_process_integration:7.50:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
CVE-2019-2237 | Failure in taking appropriate action to handle the error case If keypad gpio deactivation fails leads to silent failure scenario and subsequent logic gets executed everytime in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 210/SD 212/SD 205, SD 410/12, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 8CX, SXR1130 | [
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 2.1 |
|
CVE-2004-1476 | Stack-based buffer overflow in the VideoCD (VCD) code in xine-lib 1-rc2 through 1-rc5, as derived from libcdio, allows attackers to execute arbitrary code via a VideoCD with an unterminated disk label. | [
"cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.2:*:personal:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*"
]
| null | null | null | 5.1 |
|
CVE-2017-11683 | There is a reachable assertion in the Internal::TiffReader::visitDirectory function in tiffvisitor.cpp of Exiv2 0.26 that will lead to a remote denial of service attack via crafted input. | [
"cpe:2.3:a:exiv2:exiv2:0.26:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4.3 |
|
GHSA-4jjg-vcj3-q93v | An XSS issue was discovered in the Bootstrap 5 Lite theme before 1.x-1.0.3 for Backdrop CMS. It doesn't sufficiently sanitize certain class names. | []
| null | 6.4 | null | null |
|
GHSA-353h-6pqj-x3c5 | Directory traversal vulnerability in AjaXplorer 2.0 allows remote attackers to read arbitrary files via unspecified vectors. | []
| null | null | null | null |
|
RHSA-2023:1516 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 security update | SnakeYaml: Constructor Deserialization Remote Code Execution undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode hsqldb: Untrusted input may lead to RCE attack dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider RESTEasy: creation of insecure temp files Undertow: Infinite loop in SslConduit during close | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
]
| null | 7.5 | null | null |
CVE-2020-5637 | Improper validation of integrity check value vulnerability in Aterm SA3500G firmware versions prior to Ver. 3.5.9 allows an attacker with an administrative privilege to execute a malicious program. | [
"cpe:2.3:o:necplatforms:aterm_sa3500g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:necplatforms:aterm_sa3500g:-:*:*:*:*:*:*:*"
]
| null | 6.8 | null | 5.2 |
|
CVE-2023-5421 | Possible XSS execution in customer information | An attacker who is logged into OTRS as an user with privileges to create and change customer user data may manipulate the CustomerID field to execute JavaScript code that runs
immediatly after the data is saved.The issue onlyoccurs if the configuration for AdminCustomerUser::UseAutoComplete was changed before.
This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.
| [
"cpe:2.3:a:otrs:otrs:*:*:*:*:community:*:*:*",
"cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*"
]
| null | 3.5 | null | null |
GHSA-gcjr-rx2g-5wh3 | Symantec Diagnostic Tool (SymDiag), prior to 3.0.79, may be susceptible to a Privilege Escalation vulnerability. | []
| null | 7.8 | null | null |
|
GHSA-cvc5-776g-xgcw | Buffer overflow in the locale implementation in Google Chrome before 17.0.963.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | []
| null | null | null | null |
|
GHSA-4hm3-h6v2-69cm | Reflected XSS in wordpress plugin indexisto v1.0.5 | []
| null | null | 6.1 | null |
|
CVE-2006-5844 | Speedywiki 2.0 allows remote attackers to obtain the full path of the web server via the (1) showRevisions[] and (2) searchText[] parameters in (a) index.php, and (b) a direct request to upload.php without any parameters. | [
"cpe:2.3:a:speedywiki:speedywiki:2.0:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-62m6-hw85-vr62 | CMS Made Simple Version 2.2.19 is vulnerable to Cross Site Scripting (XSS). This vulnerability resides in the File Manager module of the admin panel. Specifically, the issue arises due to inadequate sanitization of user input in the "New directory" field. | []
| null | 4.8 | null | null |
|
GHSA-fpg9-4hq2-2j28 | A Stored Cross-Site Scripting vulnerability was discovered in ZenTao 18.3 where a user can create a project, and in the name field of the project, they can inject malicious JavaScript code. | []
| null | 5.4 | null | null |
|
CVE-2012-3753 | Buffer overflow in the plugin in Apple QuickTime before 7.7.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted MIME type. | [
"cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.7.1:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
RHSA-2023:1179 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.27.1 | golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:serverless:1.0::el8"
]
| null | 5.3 | null | null |
GHSA-g7fg-2mgf-5jhr | A memory corruption vulnerability exists in the PSD-parsing functionality of Computerinsel Photoline 20.54. A specially crafted PSD image processed via the application can lead to a stack overflow, overwriting arbitrary data. An attacker can deliver a PSD image to trigger this vulnerability and gain code execution. | []
| null | null | 7.8 | null |
|
GHSA-23w5-m3rw-wr6g | Improper Control of Generation of Code ('Code Injection') vulnerability in termel PDF 2 Post allows Remote Code Inclusion. This issue affects PDF 2 Post: from n/a through 2.4.0. | []
| null | 9.9 | null | null |
|
GHSA-326x-r6gv-8vqm | McAfee VirusScan 4.5.1, when the WebScanX.exe module is enabled, searches for particular DLLs from the user's home directory, even when browsing the local hard drive, which allows local users to run arbitrary code via malicious versions of those DLLs. | []
| null | null | null | null |
|
GHSA-jw73-h3mc-vq6c | The graphics device interface (GDI) implementation in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate input received from user mode, which allows remote attackers to execute arbitrary code via a crafted (1) Windows Metafile (aka WMF) or (2) Enhanced Metafile (aka EMF) image file, aka "Windows Kernel Input Validation Vulnerability." | []
| null | null | null | null |
|
CVE-2012-1234 | SQL injection vulnerability in Advantech/BroadWin WebAccess 7.0 allows remote authenticated users to execute arbitrary SQL commands via a malformed URL. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0234. | [
"cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:*",
"cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:*"
]
| null | null | null | 6.5 |
|
CVE-2024-38697 | WordPress Goftino plugin <= 1.6 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ali Rahimi Goftino allows Stored XSS.This issue affects Goftino: from n/a through 1.6. | []
| null | 6.5 | null | null |
CVE-2022-31475 | WordPress GiveWP plugin <= 2.20.2 - Authenticated Arbitrary File Read via Export function vulnerability | Authenticated (custom plugin role) Arbitrary File Read via Export function vulnerability in GiveWP's GiveWP plugin <= 2.20.2 at WordPress. | [
"cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*"
]
| null | 5.5 | null | null |
CVE-2009-3952 | Buffer overflow in Adobe Illustrator CS3 13.0.3 and earlier and Illustrator CS4 14.0.0 allows attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:illustrator:13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:illustrator:13.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:illustrator:13.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:illustrator:14.0.0:cs4:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-5prj-xxq4-rcrr | Buffer overflow in FreeBSD fts library routines allows local user to modify arbitrary files via the periodic program. | []
| null | null | null | null |
|
RHSA-2024:6210 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.4 security update | axios: axios: Server-Side Request Forgery elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed | [
"cpe:/a:redhat:service_mesh:2.5::el8"
]
| null | 5.3 | null | null |
CVE-2024-50634 | A vulnerability in a weak JWT token in Watcharr v1.43.0 and below allows attackers to perform privilege escalation using a crafted JWT token. This vulnerability is not limited to privilege escalation but also affects all functions that require authentication. | [
"cpe:2.3:a:sbondco:watcharr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sbond:watcharr:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
CVE-2023-30941 | In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
GHSA-cv4m-7ph2-f339 | Missing Authorization vulnerability in Easy Digital Downloads allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Digital Downloads: from n/a through 3.2.12. | []
| null | 4.3 | null | null |
|
CVE-2021-42314 | Microsoft Defender for IoT Remote Code Execution Vulnerability | Microsoft Defender for IoT Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:defender_for_iot:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:defender_for_iot:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
GHSA-fwjw-9h58-fg63 | STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .xps file, related to an "Illegal Instruction Violation starting at Unknown Symbol @ 0x00000000048c024d called from STDUXPSFile!DllUnregisterServer+0x0000000000025638." | []
| null | null | 7.8 | null |
|
RHSA-2013:1553 | Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update | qemu: buffer overflow in scsi_target_emulate_report_luns | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
GHSA-h63r-7v46-7432 | Permission control vulnerability in the Bluetooth module.
Impact: Successful exploitation of this vulnerability may affect service confidentiality. | []
| null | 6.5 | null | null |
|
CVE-2018-3187 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 5.5 |
|
CVE-2005-1405 | HTTP response splitting vulnerability in the @SetHTTPHeader function in Lotus Domino 6.5.x before 6.5.4 and 6.0.x before 6.0.5 allows attackers to poison the web cache via malicious applications. | [
"cpe:2.3:a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
GHSA-6rh5-23hx-j452 | Improper Authorization in Jenkins Core | An improper authorization vulnerability exists in Jenkins 2.158 and earlier, LTS 2.150.1 and earlier in core/src/main/java/hudson/security/TokenBasedRememberMeServices2.java that allows attackers with Overall/RunScripts permission to craft Remember Me cookies that would never expire, allowing e.g. to persist access to temporarily compromised user accounts. | []
| null | 7.2 | null | null |
GHSA-h2pj-764q-j54x | Cross-site scripting (XSS) vulnerability in the RECRUIT Dokodemo Rikunabi 2013 extension before 1.0.1 for Google Chrome allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | []
| null | null | null | null |
|
GHSA-vcw8-rv56-c6jq | Xlpd v7.0.0094 and below contains a binary hijack vulnerability which allows attackers to execute arbitrary code via a crafted .exe file. | []
| null | 6.5 | null | null |
|
CVE-2023-43544 | Use After Free in Audio | Memory corruption when IPC callback handle is used after it has been released during register callback by another thread. | [
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*"
]
| null | 6.7 | null | null |
CVE-2024-4600 | Cross-Site Request Forgery vulnerability in Socomec Net Vision | Cross-Site Request Forgery vulnerability in Socomec Net Vision, version 7.20. This vulnerability could allow an attacker to trick registered users into performing critical actions, such as adding and updating accounts, due to lack of proper sanitisation of the ‘set_param.cgi’ file. | [
"cpe:2.3:a:socomec:net_vision:7.20:*:*:*:*:*:*:*"
]
| null | 7.1 | null | null |
GHSA-v285-5c63-6rph | A null pointer dereference in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service. | []
| null | 7.5 | null | null |
|
CVE-2018-4202 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. The issue involves the "iBooks" component. It allows man-in-the-middle attackers to spoof a password prompt. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
| null | null | 5.9 | 4.3 |
|
GHSA-7wjc-6rvv-v2h4 | admin/save-settings.php in Chadha PHPKB Standard Multi-Language 9 allows remote attackers to achieve Code Execution by injecting PHP code into any POST parameter when saving global settings. | []
| null | 7.2 | null | null |
|
GHSA-9g5w-2h6h-7h82 | In the Linux kernel, the following vulnerability has been resolved:cppc_cpufreq: Fix possible null pointer dereferencecppc_cpufreq_get_rate() and hisi_cppc_cpufreq_get_rate() can be called from
different places with various parameters. So cpufreq_cpu_get() can return
null as 'policy' in some circumstances.
Fix this bug by adding null return check.Found by Linux Verification Center (linuxtesting.org) with SVACE. | []
| null | 7.5 | null | null |
|
CVE-2025-24460 | In JetBrains TeamCity before 2024.12.1 improper access control allowed to see Projects’ names in the agent pool | []
| null | 4.3 | null | null |
|
GHSA-5cp5-w68m-9w38 | A flaw was found in mbsync before v1.3.5 and v1.4.1. Validations of the mailbox names returned by IMAP LIST/LSUB do not occur allowing a malicious or compromised server to use specially crafted mailbox names containing '..' path components to access data outside the designated mailbox on the opposite end of the synchronization channel. The highest threat from this vulnerability is to data confidentiality and integrity. | []
| null | 7.4 | null | null |
|
GHSA-5h65-2pwj-39r9 | The MapSVG plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 8.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. | []
| null | 6.4 | null | null |
|
CVE-2020-7722 | Prototype Pollution | All versions of package nodee-utils are vulnerable to Prototype Pollution via the deepSet function. | [
"cpe:2.3:a:nodee-utils_project:nodee-utils:*:*:*:*:*:node.js:*:*"
]
| null | 9.8 | null | null |
CVE-2009-4926 | Multiple cross-site scripting (XSS) vulnerabilities in Online Contact Manager (formerly EContact PRO) 3.0 allow remote attackers to inject arbitrary web script or HTML via the (1) showGroup parameter to (a) index.php and the (2) id parameter to (b) view.php, (c) email.php, (d) edit.php, and (e) delete.php. | [
"cpe:2.3:a:esoftpro:online_contact_manager:3.0:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-wfq2-x3j2-m69q | In ReadOneJNGImage in coders/png.c in GraphicsMagick 1.3.26, a Null Pointer Dereference occurs while transferring JPEG scanlines, related to a PixelPacket pointer. | []
| null | null | 8.8 | null |
|
GHSA-vr5m-3h59-7jcp | Prototype Pollution in think-helper | ImpactThe software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.Patches`think-helper@1.1.3` patched it, anyone used `think-helper` should upgrade to `>=1.1.3` version.Referenceshttps://cwe.mitre.org/data/definitions/1321.htmlFor more informationIf you have any questions or comments about this advisory:Open an issue in [thinkjs/thinkjs](https://github.com/thinkjs/thinkjs)Email us at [i@imnerd.org](mailto:i@imnerd.org) | []
| null | 7.5 | null | null |
CVE-2018-9540 | In avrc_ctrl_pars_vendor_rsp of avrc_pars_ct.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-111450417 | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2024-7781 | Jupiter X Core <= 4.7.5 - Limited Unauthenticated Authentication Bypass to Account Takeover | The Jupiter X Core plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 4.7.5. This is due to improper authentication via the Social Login widget. This makes it possible for unauthenticated attackers to log in as the first user to have logged in with a social media account, including administrator accounts. Attackers can exploit the vulnerability even if the Social Login element has been disabled, as long as it was previously enabled and used. The vulnerability was partially patched in version 4.7.5, and fully patched in version 4.7.8. | [
"cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*"
]
| null | 8.1 | null | null |
GHSA-5h94-mxhc-fgxw | In the Linux kernel, the following vulnerability has been resolved:enic: Validate length of nl attributes in enic_set_vf_portenic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE
is of length PORT_PROFILE_MAX and that the nl attributes
IFLA_PORT_INSTANCE_UUID, IFLA_PORT_HOST_UUID are of length PORT_UUID_MAX.
These attributes are validated (in the function do_setlink in rtnetlink.c)
using the nla_policy ifla_port_policy. The policy defines IFLA_PORT_PROFILE
as NLA_STRING, IFLA_PORT_INSTANCE_UUID as NLA_BINARY and
IFLA_PORT_HOST_UUID as NLA_STRING. That means that the length validation
using the policy is for the max size of the attributes and not on exact
size so the length of these attributes might be less than the sizes that
enic_set_vf_port expects. This might cause an out of bands
read access in the memcpys of the data of these
attributes in enic_set_vf_port. | []
| null | null | null | null |
|
CVE-2011-3709 | b2evolution 3.3.3 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by locales/ru_RU/ru-RU.locale.php and certain other files. | [
"cpe:2.3:a:b2evolution:b2evolution:3.3.3:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-864j-6gwg-g82x | Memory corruption while running VK synchronization with KASAN enabled. | []
| null | 8.4 | null | null |
|
RHSA-2013:1860 | Red Hat Security Advisory: kernel security and bug fix update | kernel: dm: dm-snapshot data leak | [
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
GHSA-fvq4-vxm4-wp27 | The Under Construction plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.96. This is due to missing or incorrect nonce validation on the dismiss_notice function called via the admin_action_ucp_dismiss_notice action. This makes it possible for unauthenticated attackers to dismiss plugin notifications via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | []
| null | 4.3 | null | null |
|
GHSA-qr56-4922-vccv | An OS command injection vulnerability has been reported to affect QUSBCam2. If exploited, the vulnerability could allow users to execute commands via a network.We have already fixed the vulnerability in the following version:
QUSBCam2 2.0.3 ( 2023/06/15 ) and later | []
| null | 8.8 | null | null |
|
CVE-2008-0263 | The SIP module in Ingate Firewall before 4.6.1 and SIParator before 4.6.1 does not reuse SIP media ports in unspecified call hold and send-only stream scenarios, which allows remote attackers to cause a denial of service (port exhaustion) via unspecified vectors. | [
"cpe:2.3:a:ingate:firewall:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ingate:ingate_siparator:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-fw8m-f5g8-v52m | In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the ‘tstats command handles Javascript Object Notation (JSON) lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. | []
| null | 8.8 | null | null |
|
GHSA-gp27-4xgj-f4pj | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1001, CVE-2019-1004, CVE-2019-1056. | []
| null | null | null | null |
|
GHSA-wrgm-m92f-pf2v | Information disclosure in video due to buffer over-read while processing avi file in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables | []
| null | 5.5 | null | null |
|
ICSA-12-179-01 | Pro-Face Pro-Server EX Vulnerabilities | Pro-face WinGP PC Runtime 3.1.00 and earlier, and ProServr.exe in Pro-face Pro-Server EX 1.30.000 and earlier, allows remote attackers to cause a denial of service (out-of-bounds read operation) via a crafted packet that triggers a certain Find Node check attempt. Pro-face WinGP PC Runtime 3.1.00 and earlier, and ProServr.exe in Pro-face Pro-Server EX 1.30.000 and earlier, allows remote attackers to cause a denial of service (daemon crash) via a crafted packet with a certain opcode and a large value in a size field. Pro-face WinGP PC Runtime 3.1.00 and earlier, and ProServr.exe in Pro-face Pro-Server EX 1.30.000 and earlier, allows remote attackers to cause a denial of service (unhandled exception and daemon crash) via a crafted packet with a certain opcode that triggers an invalid attempt to allocate a large amount of memory. Integer overflow in Pro-face WinGP PC Runtime 3.1.00 and earlier, and ProServr.exe in Pro-face Pro-Server EX 1.30.000 and earlier, allows remote attackers to cause a denial of service (daemon crash) via a crafted packet with a certain opcode that triggers an incorrect memory allocation and a buffer overflow. Pro-face WinGP PC Runtime 3.1.00 and earlier, and ProServr.exe in Pro-face Pro-Server EX 1.30.000 and earlier, does not properly check packet sizes before reusing packet memory buffers, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a short crafted packet with a certain opcode. | []
| null | null | null | null |
GHSA-3xrv-3mx5-r2p6 | Insufficient data validation in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | []
| null | null | null | null |
|
RHSA-2019:1196 | Red Hat Security Advisory: kernel security update | hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) | [
"cpe:/o:redhat:rhel_aus:6.5::server"
]
| null | null | 3.8 | null |
CVE-2023-35828 | An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*"
]
| null | 7 | null | null |
|
GHSA-2wgj-4jrq-2g66 | An issue in Netis Wifi6 Router NX10 2.0.1.3643 and 2.0.1.3582 and Netis Wifi 11AC Router NC65 3.0.0.3749 and Netis Wifi 11AC Router NC63 3.0.0.3327 and 3.0.0.3503 and Netis Wifi 11AC Router NC21 3.0.0.3800, 3.0.0.3500 and 3.0.0.3329 and Netis Wifi Router MW5360 1.0.1.3442 and 1.0.1.3031 allows a remote attacker to obtain sensitive information via the parameter password at the change admin password page at the router web interface. | []
| null | 7.5 | null | null |
|
GHSA-gqcq-mrjf-wgc6 | The SuperSaaS – online appointment scheduling plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘after’ parameter in all versions up to, and including, 2.1.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This is limited to Chromium-based browsers (e.g. Chrome, Edge, Brave). | []
| null | 4.9 | null | null |
|
CVE-2020-14154 | Mutt before 1.14.3 proceeds with a connection even if, in response to a GnuTLS certificate prompt, the user rejects an expired intermediate certificate. | [
"cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
]
| null | 4.8 | null | 5.8 |
|
CVE-2007-4597 | SQL injection vulnerability in index.php in TurnkeyWebTools SunShop Shopping Cart 4.0 RC 6 allows remote attackers to execute arbitrary SQL commands via the s[cid] parameter in a search_list action, a different vector than CVE-2007-2549. | [
"cpe:2.3:a:turnkey_web_tools:sunshop_shopping_cart:4.0:rc_6:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2018-21151 | Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D7800 before 1.0.1.34, R7500v2 before 1.0.3.26, R7800 before 1.0.2.42, R8900 before 1.0.3.10, R9000 before 1.0.3.10, WNDR4300v2 before 1.0.0.54, and WNDR4500v3 before 1.0.0.54. | [
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*"
]
| null | null | 6.8 | null |
|
GHSA-4frf-q9p9-gg69 | SQL injection vulnerability in the host_new_graphs function in graphs_new.php in Cacti 0.8.8f and earlier allows remote authenticated users to execute arbitrary SQL commands via the cg_g parameter in a save action. | []
| null | null | 8.8 | null |
|
CVE-2024-50091 | dm vdo: don't refer to dedupe_context after releasing it | In the Linux kernel, the following vulnerability has been resolved:
dm vdo: don't refer to dedupe_context after releasing it
Clear the dedupe_context pointer in a data_vio whenever ownership of
the context is lost, so that vdo can't examine it accidentally. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
GHSA-75jp-83j7-2672 | A Security Bypass vulnerability exists in PolarSSL 0.99pre4 through 1.1.1 due to a weak encryption error when generating Diffie-Hellman values and RSA keys. | []
| null | 7.4 | null | null |
|
RHSA-2015:2697 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 flash-plugin: multiple code execution issues fixed in APSB16-01 | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | null | null |
CVE-2019-15989 | Cisco IOS XR Software Border Gateway Protocol Attribute Denial of Service Vulnerability | A vulnerability in the implementation of the Border Gateway Protocol (BGP) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to incorrect processing of a BGP update message that contains a specific BGP attribute. An attacker could exploit this vulnerability by sending BGP update messages that include a specific, malformed attribute to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit this vulnerability, the malicious BGP update message would need to come from a configured, valid BGP peer or would need to be injected by the attacker into the victim’s BGP network on an existing, valid TCP connection to a BGP peer. | [
"cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9000v:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:x64:*",
"cpe:2.3:h:cisco:ncs_540:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5501-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5502-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9000v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:crs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:xrv_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_540l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_1001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_1002:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_1004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5002:-:*:*:*:*:*:*:*"
]
| null | null | 8.6 | null |
CVE-2017-0477 | A remote code execution vulnerability in libgdx could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 7.1.1. Android ID: A-33621647. | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 6.8 |
|
CVE-2024-27364 | An issue was discovered in Mobile Processor, Wearable Processor Exynos 980, Exynos 850, Exynos 1080, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 1480, Exynos W920, Exynos W930. In the function slsi_rx_roamed_ind(), there is no input validation check on a length coming from userspace, which can lead to a potential heap over-read. | [
"cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_w920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_w920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_w930_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_w930:-:*:*:*:*:*:*:*"
]
| null | 4.4 | null | null |
|
RHSA-2024:4368 | Red Hat Security Advisory: git security update | git: Recursive clones RCE git: RCE while cloning local repos git: insecure hardlinks git: symlink bypass git: additional local RCE | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
]
| null | 7.3 | null | null |
GHSA-qqvf-cxm2-r29j | In declareDuplicatePermission of ParsedPermissionUtils.java, there is a possible way to obtain a dangerous permission without user consent due to improper input validation. This could lead to local escalation of privilege during app installation or upgrade with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-213323615 | []
| null | 7.8 | null | null |
|
CVE-2001-1431 | Nokia Firewall Appliances running IPSO 3.3 and VPN-1/FireWall-1 4.1 Service Pack 3, IPSO 3.4 and VPN-1/FireWall-1 4.1 Service Pack 4, and IPSO 3.4 or IPSO 3.4.1 and VPN-1/FireWall-1 4.1 Service Pack 5, when SYN Defender is configured in Active Gateway mode, does not properly rewrite the third packet of a TCP three-way handshake to use the NAT IP address, which allows remote attackers to gain sensitive information. | [
"cpe:2.3:a:checkpoint:firewall-1:4.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:4.1:sp4:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:4.1:sp5:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:vpn-1:4.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:vpn-1:4.1:sp4:*:*:*:*:*:*",
"cpe:2.3:h:nokia:firewall_appliance:ipso_3.3:*:*:*:*:*:*:*",
"cpe:2.3:h:nokia:firewall_appliance:ipso_3.4:*:*:*:*:*:*:*",
"cpe:2.3:h:nokia:firewall_appliance:ipso_3.41:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2019-8952 | A Path Traversal vulnerability located in the webserver affects several Bosch hardware and software products. The vulnerability potentially allows a remote authorized user to access arbitrary files on the system via the network interface. Affected hardware products: Bosch DIVAR IP 2000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.62.0019 and newer), Bosch DIVAR IP 5000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.80.0033 and newer). Affected software products: Video Recording Manager (VRM) (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; 3.70; 3.71 before 3.71.0032 ; fixed versions: 3.71.0032; 3.81.0032 and newer), Bosch Video Management System (BVMS) (vulnerable versions: 3.50.00XX; 3.55.00XX; 3.60.00XX; 3.70.0056; fixed versions: 7.5; 3.71.0032). | [
"cpe:2.3:o:bosch:divar_ip_2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:divar_ip_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:divar_ip_5000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4 |
|
GHSA-mjh3-g7qw-vgfv | Cross-site scripting (XSS) vulnerability in the jQuery Countdown module 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the "access administration pages" permission to inject arbitrary web script or HTML via unspecified vectors. | []
| null | null | null | null |
|
CVE-2007-2266 | Progress Webspeed Messenger allows remote attackers to read, create, modify, and execute arbitrary files by invoking webutil/_cpyfile.p in the WService parameter to (1) cgiip.exe or (2) wsisa.dll in scripts/, as demonstrated by using the save,editor options to create a new file using the fileName parameter. | [
"cpe:2.3:a:progress:webspeed_messenger:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2025-21315 | Microsoft Brokering File System Elevation of Privilege Vulnerability | Microsoft Brokering File System Elevation of Privilege Vulnerability | []
| null | 7.8 | null | null |
CVE-2011-1479 | Double free vulnerability in the inotify subsystem in the Linux kernel before 2.6.39 allows local users to cause a denial of service (system crash) via vectors involving failed attempts to create files. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-4250. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38:rc8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.38.7:*:*:*:*:*:*:*"
]
| null | null | null | 4.7 |
|
CVE-2022-23350 | BigAnt Software BigAnt Server v5.6.06 was discovered to contain a cross-site scripting (XSS) vulnerability. | [
"cpe:2.3:a:bigantsoft:bigant_server:5.6.06:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
GHSA-6h74-22qj-hmh5 | IBM QRadar SIEM 7.3, 7.4, and 7.5 could allow a local user to obtain sensitive information from the TLS key file due to incorrect file permissions. IBM X-Force ID: 223597. | []
| null | 5.5 | null | null |
|
CVE-1999-0195 | Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1. | [
"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-g52c-2cj5-jgxg | In MISP before 2.4.187, add_misp_export in app/Controller/EventsController.php does not properly check for a valid file upload. | []
| null | 9.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.