id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-xw4h-x937-qmm7
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in New Media One GeoDigs allows Reflected XSS. This issue affects GeoDigs: from n/a through 3.4.1.
|
[] | null | 7.1 | null | null |
|
CVE-2020-27008
|
A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PLT files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to access data in the context of the current process. (ZDI-CAN-12209)
|
[
"cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
RHSA-2020:4050
|
Red Hat Security Advisory: qemu-kvm security update
|
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
|
[
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | 5 | null | null |
GHSA-m5pv-qhf4-7jxp
|
Directory traversal vulnerability in ver.2.8.4.0 and earlier and ver.3.3.0.0 and earlier allows an attacker to create arbitrary files via specially crafted ATC file.
|
[] | null | null | 3.3 | null |
|
CVE-2021-44463
|
Emerson DeltaV Uncontrolled Search Path Element
|
Missing DLLs, if replaced by an insider, could allow an attacker to achieve local privilege escalation on the DeltaV Distributed Control System Controllers and Workstations (All versions) when some DeltaV services are started.
|
[
"cpe:2.3:a:emerson:deltav:13.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav:14:feature_pack1:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav:14:feature_pack2:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav:14.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emerson:deltav:r6:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
GHSA-wj2h-p5xg-r4jc
|
Horde Application Framework 3.0.9 allows remote attackers to read arbitrary files via a null character in the url parameter in services/go.php, which bypasses a sanity check.
|
[] | null | null | null | null |
|
CVE-2014-7787
|
The iShuttle (aka com.synapse.ishuttle_user) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:synapse:ishuttle:1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
CVE-2022-40770
|
Zoho ManageEngine ServiceDesk Plus versions 13010 and prior are vulnerable to authenticated command injection. This can be exploited by high-privileged users.
|
[
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:13.0:13000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:13.0:13001:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:13.0:13002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:13.0:13003:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:13.0:13004:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:13.0:13005:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:13.0:13006:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:13.0:13007:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:13.0:13008:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:13.0:13009:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:13.0:13010:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.6:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.6:10600:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.6:10601:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.6:10602:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.6:10603:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.6:10604:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.6:10605:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.6:10606:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.6:10607:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.6:10608:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.6:10609:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus_msp:10.6:10610:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11001:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11003:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11004:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11005:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11006:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11007:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11008:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11009:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11010:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11011:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11012:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11013:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11014:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11015:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11016:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11017:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11018:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11019:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11020:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11021:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11022:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11024:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_supportcenter_plus:11.0:11025:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-776g-cf7f-cc6x
|
The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's su_meta shortcode combined with post meta data in all versions up to, and including, 5.13.3 due to insufficient input sanitization and output escaping on user supplied meta values. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null |
|
GHSA-mjvc-frcm-6323
|
Some Huawei products use the OpenHpi software for hardware management. A function that parses data returned by OpenHpi contains an out-of-bounds read vulnerability that could lead to a denial of service. Affected product versions include: eCNS280_TD V100R005C10; eSE620X vESS V100R001C10SPC200, V100R001C20SPC200, V200R001C00SPC300.
|
[] | null | null | null | null |
|
CVE-2021-37693
|
Re-use of email tokens in Discourse
|
Discourse is an open-source platform for community discussion. In Discourse before versions 2.7.8 and 2.8.0.beta4, when adding additional email addresses to an existing account on a Discourse site an email token is generated as part of the email verification process. Deleting the additional email address does not invalidate an unused token which can then be used in other contexts, including reseting a password.
|
[
"cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta3:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-cjc8-2cq5-7jq7
|
A heap buffer overflow in Fortinet FortiOS all versions below 6.0.5 in the SSL VPN web portal may cause the SSL VPN web service termination for logged in users due to a failure to properly handle javascript href data when proxying webpages.
|
[] | null | 6.5 | null | null |
|
GHSA-q8jh-ww7h-qmr7
|
User.php in Gallery, as used in Postnuke, allows users with any Admin privileges to gain access to all galleries.
|
[] | null | null | null | null |
|
CVE-2023-47115
|
Label Studio XSS Vulnerability on Avatar Upload
|
Label Studio is an a popular open source data labeling tool. Versions prior to 1.9.2 have a cross-site scripting (XSS) vulnerability that could be exploited when an authenticated user uploads a crafted image file for their avatar that gets rendered as a HTML file on the website. Executing arbitrary JavaScript could result in an attacker performing malicious actions on Label Studio users if they visit the crafted avatar image. For an example, an attacker can craft a JavaScript payload that adds a new Django Super Administrator user if a Django administrator visits the image.
The file `users/functions.py` lines 18-49 show that the only verification check is that the file is an image by extracting the dimensions from the file. Label Studio serves avatar images using Django's built-in `serve` view, which is not secure for production use according to Django's documentation. The issue with the Django `serve` view is that it determines the `Content-Type` of the response by the file extension in the URL path. Therefore, an attacker can upload an image that contains malicious HTML code and name the file with a `.html` extension to be rendered as a HTML page. The only file extension validation is performed on the client-side, which can be easily bypassed.
Version 1.9.2 fixes this issue. Other remediation strategies include validating the file extension on the server side, not in client-side code; removing the use of Django's `serve` view and implement a secure controller for viewing uploaded avatar images; saving file content in the database rather than on the filesystem to mitigate against other file related vulnerabilities; and avoiding trusting user controlled inputs.
|
[
"cpe:2.3:a:humansignal:label_studio:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
CVE-2021-40616
|
thinkcmf v5.1.7 has an unauthorized vulnerability. The attacker can modify the password of the administrator account with id 1 through the background user management group permissions. The use condition is that the background user management group authority is required.
|
[
"cpe:2.3:a:thinkcmf:thinkcmf:5.1.7:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
CVE-2025-30375
|
Microsoft Excel Remote Code Execution Vulnerability
|
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
|
[] | null | 7.8 | null | null |
GHSA-wg73-763q-mvp2
|
CFNetwork in Apple Safari before 5.0.6 on Windows does not properly handle an untrusted attribute of a system root certificate, which allows remote web servers to bypass intended SSL restrictions via a certificate signed by a blacklisted certification authority.
|
[] | null | null | null | null |
|
GHSA-rphx-h6qg-2rqj
|
A vulnerability was found in FreePBX arimanager up to 13.0.5.3 and classified as problematic. Affected by this issue is some unknown functionality of the component Views Handler. The manipulation of the argument dataurl leads to cross site scripting. The attack may be launched remotely. Upgrading to version 13.0.5.4 is able to address this issue. The name of the patch is 199dea7cc7020d3c469a86a39fbd80f5edd3c5ab. It is recommended to upgrade the affected component. VDB-216878 is the identifier assigned to this vulnerability.
|
[] | null | 6.1 | null | null |
|
CVE-2024-54041
|
Adobe Connect | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[
"cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-855f-h3m2-hfc5
|
In UnwindingWorker of unwinding.cc, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-233338564
|
[] | null | 6.7 | null | null |
|
CVE-2010-2421
|
Multiple unspecified vulnerabilities in Opera before 10.54 have unknown impact and attack vectors related to (1) "extremely severe," (2) "highly severe," (3) "moderately severe," and (4) "less severe" issues.
|
[
"cpe:2.3:a:opera:opera_browser:*:b:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
ICSA-22-167-13
|
Siemens Teamcenter
|
Java EE Server Manager HTML Adaptor in Teamcenter consists of default hardcoded credentials. Access to the application allows a user to perform a series of actions that could potentially lead to remote code execution with elevated permissions.
|
[] | null | 9.9 | null | null |
GHSA-3vxx-8f6w-cpxp
|
The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.
|
[] | null | null | null | null |
|
CVE-2018-18227
|
In Wireshark 2.6.0 to 2.6.3 and 2.4.0 to 2.4.9, the MS-WSP protocol dissector could crash. This was addressed in epan/dissectors/packet-mswsp.c by properly handling NULL return values.
|
[
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2025-6580
|
SourceCodester Best Salon Management System Login sql injection
|
A vulnerability classified as critical has been found in SourceCodester Best Salon Management System 1.0. Affected is an unknown function of the component Login. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2022-32301
|
YoudianCMS v9.5.0 was discovered to contain a SQL injection vulnerability via the IdList parameter at /App/Lib/Action/Home/ApiAction.class.php.
|
[
"cpe:2.3:a:youdiancms:youdiancms:9.5.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2021-33135
|
Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.
|
[
"cpe:2.3:a:intel:software_guard_extensions:*:*:*:*:*:linux:*:*"
] | null | 5.5 | null | 2.1 |
|
GHSA-2cgp-p7jr-3hv7
|
An integer overflow was addressed with improved input validation. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1. An app may be able to break out of its sandbox
|
[] | null | 8.6 | null | null |
|
CVE-2010-1229
|
The sandbox infrastructure in Google Chrome before 4.1.249.1036 does not properly use pointers, which has unspecified impact and attack vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.2.149.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.156.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.157.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.157.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.158.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.159.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.169.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.169.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.170.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.182.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.190.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.193.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.195.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.195.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.195.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.195.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.244.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.78:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.78:beta:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.89:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1001:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1004:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1006:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1007:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1008:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1009:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1010:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1011:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1012:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1013:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1014:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1015:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1016:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1017:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1018:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1019:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1020:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1021:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1022:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1023:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1024:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1025:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1026:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1027:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1028:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1029:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1030:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1031:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1032:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1033:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1034:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1036:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1045:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2020-35582
|
A stored cross-site scripting (XSS) issue in Envira Gallery Lite before 1.8.3.3 allows remote attackers to inject arbitrary JavaScript/HTML code via a POST /wp-admin/post.php request with the post_title parameter.
|
[
"cpe:2.3:a:enviragallery:envira_gallery:*:*:*:*:lite:wordpress:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-67r4-4qh9-q72f
|
Open redirect vulnerability in IBM Maximo Asset Management and Asset Management Essentials 6.2, 7.1, and 7.5 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via the uisessionid parameter to an unspecified component.
|
[] | null | null | null | null |
|
CVE-2022-1367
|
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in Handler_TCV.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.
|
[
"cpe:2.3:a:deltaww:diaenergie:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2008-4321
|
Buffer overflow in FlashGet (formerly JetCar) FTP 1.9 allows remote FTP servers to execute arbitrary code via a long response to the PWD command.
|
[
"cpe:2.3:a:flashget:flashget_ftp:1.9:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2015-8338
|
Xen 4.6.x and earlier does not properly enforce limits on page order inputs for the (1) XENMEM_increase_reservation, (2) XENMEM_populate_physmap, (3) XENMEM_exchange, and possibly other HYPERVISOR_memory_op suboperations, which allows ARM guest OS administrators to cause a denial of service (CPU consumption, guest reboot, or watchdog timeout and host reboot) and possibly have unspecified other impact via unknown vectors.
|
[
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2022-45659
|
Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the wpapsk_crypto parameter in the fromSetWirelessRepeat function.
|
[
"cpe:2.3:o:tendacn:ac6_firmware:15.03.05.19:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:ac6:1.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2005-4534
|
The shadow database feature (syncshadowdb) in Bugzilla 2.9 through 2.16.10 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
|
[
"cpe:2.3:a:mozilla:bugzilla:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-p3mv-3xmv-c627
|
The login page of Revive Adserver v5.4.1 is vulnerable to brute force attacks.
|
[] | null | 7.5 | null | null |
|
GHSA-3qwj-7p4f-cf9r
|
platform/msm_shared/partition_parser.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 and 7 (2013) devices does not validate certain GUID Partition Table (GPT) data, which allows attackers to bypass intended access restrictions via a crafted MultiMediaCard (MMC), aka Android internal bug 28822878 and Qualcomm internal bug CR823461.
|
[] | null | null | 7.8 | null |
|
CVE-2005-0984
|
Buffer overflow in the G_Printf function in Star Wars Jedi Knight: Jedi Academy 1.011 and earlier allows remote attackers to execute arbitrary code via a long message using commands such as (1) say and (2) tell.
|
[
"cpe:2.3:a:lucasarts:star_wars_jedi_knight_jedi_academy:1.0.11:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2016-1711
|
WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 52.0.2743.82, does not disable frame navigation during a detach operation on a DocumentLoader object, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
RHSA-2023:6279
|
Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.11.5
|
golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:cert_manager:1.11::el9"
] | null | 7.5 | null | null |
RHSA-2021:0976
|
Red Hat Security Advisory: Red Hat Virtualization Host security, bug fix and enhancement update (4.4.4-2)
|
lldp/openvswitch: denial of service via externally triggered memory leak
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.5 | null | null |
GHSA-4r6w-8469-h8vg
|
SAP BusinessObjects Business Intelligence Suite, versions 4.10 and 4.20, does not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
|
[] | null | null | 6.1 | null |
|
CVE-2015-5357
|
The Juniper EX4600, QFX3500, QFX3600, and QFX5100 switches with Junos 13.2X51-D15 through 13.2X51-D25, 13.2X51 before 13.2X51-D30, and 14.1X53 before 14.1X53-D10 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
|
[
"cpe:2.3:o:juniper:junos:13.2x51:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:13.2x51:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:13.2x51:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2022:6750
|
Red Hat Security Advisory: Red Hat OpenStack Platform (openstack-barbican) security update
|
openstack-barbican: access policy bypass via query string injection
|
[
"cpe:/a:redhat:openstack:13::el7",
"cpe:/a:redhat:openstack:16.1::el8",
"cpe:/a:redhat:openstack:16.2::el8",
"cpe:/a:redhat:openstack:17.0::el9"
] | null | 7.1 | null | null |
GHSA-6jj9-r558-4xvv
|
An issue was discovered in Kabona AB WebDatorCentral (WDC) application prior to Version 3.4.0. This non-validated redirect/non-validated forward (OPEN REDIRECT) allows chaining with authenticated vulnerabilities.
|
[] | null | null | 6.1 | null |
|
GHSA-f5f2-44mf-667j
|
The POP3 proxy service (POPROXY.EXE) in Norton AntiVirus 2001 allows local users to cause a denial of service (CPU consumption and crash) via a long username with multiple /localhost entries.
|
[] | null | null | null | null |
|
RHSA-2004:156
|
Red Hat Security Advisory: mailman security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es"
] | null | null | null | null |
GHSA-fp75-j58g-99xp
|
includes/library.php in netOffice Dwins 1.3 p2 compares the demoSession variable to the 'true' string literal instead of the true boolean literal, which allows remote attackers to bypass authentication and execute arbitrary code by setting this variable to 1, as demonstrated by uploading a PHP script via an add action to projects_site/uploadfile.php.
|
[] | null | null | null | null |
|
CVE-2012-2111
|
The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the "take ownership" privilege via an LSA connection.
|
[
"cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
RHSA-2007:0818
|
Red Hat Security Advisory: java-1.5.0-sun security update
|
HTML files generated with Javadoc are vulnerable to a XSS A buffer overflow vulnerability in Java Web Start URL parsing code Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions
|
[
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2019:3353
|
Red Hat Security Advisory: freeradius:3.0 security and bug fix update
|
freeradius: privilege escalation due to insecure logrotate configuration
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 6.4 | null |
CVE-2015-8864
|
Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 1.0.9 and 1.1.x before 1.1.5 allows remote attackers to inject arbitrary web script or HTML via a crafted SVG, a different vulnerability than CVE-2016-4068.
|
[
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:roundcube_webmail:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:roundcube_webmail:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:roundcube_webmail:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:1.1:rc:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:1.1.4:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2022-21240
|
Out of bounds read for some Intel(R) PROSet/Wireless WiFi products may allow a privileged user to potentially enable information disclosure via local access.
|
[
"cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:wi-fi_6e_ax211_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:wi-fi_6e_ax411_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
CVE-2024-23809
|
A double-free vulnerability exists in the BrainVision ASCII Header Parsing functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .vdhr file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
|
[
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"cpe:2.3:a:the_biosig_project:libbiosig:2.5.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
RHSA-2019:0919
|
Red Hat Security Advisory: openstack-ceilometer security update
|
openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 4 | null |
GHSA-gqv7-wg8q-m48q
|
Improper input validation vulnerability in ApexPackageInstaller in Galaxy Store prior to version 4.5.41.8 allows local attackers to launch activities as Galaxy Store privilege.
|
[] | null | 7.8 | null | null |
|
RHSA-2015:0863
|
Red Hat Security Advisory: glibc security and bug fix update
|
glibc: getaddrinfo() writes DNS queries to random file descriptors under high load glibc: buffer overflow in gethostbyname_r() and related functions with misaligned buffer
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-rggv-4m8c-3m5j
|
Directory traversal vulnerability in FTP Serv-U before 2.5i allows remote attackers to escape the FTP root and read arbitrary files by appending a string such as "/..%20." to a CD command, a variant of a .. (dot dot) attack.
|
[] | null | null | null | null |
|
CVE-2024-38456
|
HIGH-LEIT V05.08.01.03 and HIGH-LEIT V04.25.00.00 to 4.25.01.01 for Windows from Vivavis contain an insecure file and folder permissions vulnerability in prunsrv.exe. A regular user (non-admin) can exploit the weak folder and file permissions to escalate privileges and execute arbitrary code in the context of NT AUTHORITY\SYSTEM.
|
[
"cpe:2.3:a:vivavis:high-leit:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-r9g3-6m6x-rjvm
|
The Export All Posts, Products, Orders, Refunds & Users plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.13 via deserialization of untrusted input in the 'returnMetaValueAsCustomerInput' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
|
[] | null | 9.8 | null | null |
|
GHSA-2f3q-68v6-f6wq
|
Cisco Unified Communications Manager (CUCM, formerly CallManager) and Unified Presence Server (CUPS) allow remote attackers to obtain sensitive information via unspecified vectors that reveal the SNMP community strings and configuration settings, aka (1) CSCsj20668 and (2) CSCsj25962.
|
[] | null | null | null | null |
|
GHSA-8wj2-ww8w-44pr
|
Receipt of a specific MPLS or IPv6 packet on the core facing interface of an MX Series device configured for Broadband Edge (BBE) service may trigger a kernel crash (vmcore), causing the device to reboot. The issue is specific to the processing of packets destined to BBE clients connected to MX Series subscriber management platforms. This issue affects MX Series running Juniper Networks Junos OS: 17.2 versions starting from17.2R2-S6, 17.2R3 and later releases, prior to 17.2R3-S3; 17.3 versions starting from 17.3R2-S4, 17.3R3-S2 and later releases, prior to 17.3R2-S5, 17.3R3-S5; 17.4 versions starting from 17.4R2 and later releases, prior to 17.4R2-S7,17.4R3; 18.1 versions starting from 18.1R2-S3, 18.1R3 and later releases, prior to 18.1R3-S6; 18.2 versions starting from18.2R1-S1, 18.2R2 and later releases, prior to 18.2R3-S2; 18.2X75 versions prior to 18.2X75-D51, 18.2X75-D60; 18.3 versions prior to 18.3R3; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R1-S3, 19.1R2; 19.2 versions prior to 19.2R1-S2, 19.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 17.2R2-S6.
|
[] | null | null | null | null |
|
cisco-sa-20190828-nxos-snmp-bypass
|
Cisco NX-OS Software SNMP Access Control List Configuration Name Bypass Vulnerability
|
A vulnerability in the implementation of the Simple Network Management Protocol (SNMP) Access Control List (ACL) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to perform SNMP polling of an affected device, even if it is configured to deny SNMP traffic.
The vulnerability is due to an incorrect length check when the configured ACL name is the maximum length, which is 32 ASCII characters. An attacker could exploit this vulnerability by performing SNMP polling of an affected device. A successful exploit could allow the attacker to perform SNMP polling that should have been denied. The attacker has no control of the configuration of the SNMP ACL name.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-snmp-bypass ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-snmp-bypass"]
|
[] | null | null | 5.8 | null |
ICSA-18-067-01
|
Siemens SIPROTEC 4, SIPROTEC Compact, DIGSI 4, and EN100 Ethernet Module (Update D)
|
An attacker with local access to the engineering system or in a privileged network position and able to obtain certain network traffic could possibly reconstruct access authorization passwords. The device engineering mechanism allows an unauthenticated remote user to upload a modified device configuration overwriting access authorization passwords.
|
[] | null | 7.5 | null | null |
GHSA-f7hx-hg43-f938
|
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GX Works3 versions 1.086Q and prior allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthorized users may view or execute programs illegally.
|
[] | null | 7.5 | null | null |
|
CVE-2021-25701
|
The fUSBHub driver in the PCoIP Software Client prior to version 21.07.0 had an error in object management during the handling of a variety of IOCTLs, which allowed an attacker to cause a denial of service.
|
[
"cpe:2.3:a:teradici:pcoip_client:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2021-28194
|
ASUS BMC's firmware: buffer overflow - Remote image configuration setting
|
The specific function in ASUS BMC’s firmware Web management page (Remote image configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.
|
[
"cpe:2.3:o:asus:asmb9-ikvm_firmware:1.11.12:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:asmb9-ikvm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720a-e9-rs24-e_firmware:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720a-e9-rs24-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs700a-e9-rs4_firmware:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs700a-e9-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs700-e9-rs4_firmware:1.09:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs700-e9-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:esc4000_g4x_firmware:1.11.6:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:esc4000_g4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs700-e9-rs12_firmware:1.11.5:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs700-e9-rs12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs100-e10-pi2_firmware:1.13.6:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs100-e10-pi2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs300-e10-ps4_firmware:1.13.6:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs300-e10-ps4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs300-e10-rs4_firmware:1.13.6:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs300-e10-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500a-e9-ps4_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500a-e9-ps4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500a-e9-rs4_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500a-e9-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500a-e9_rs4_u_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500a-e9_rs4_u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:e700_g4_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:e700_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:ws_c422_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:ws_c422_pro\\/se:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:ws_x299_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:ws_x299_pro\\/se:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z11pa-u12_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z11pa-u12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z11pa-u12\\/10g-2s_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z11pa-u12\\/10g-2s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:knpa-u16_firmware:1.13.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:knpa-u16:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:esc4000_dhd_g4_firmware:1.13.7:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:esc4000_dhd_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:esc4000_g4_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:esc4000_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720q-e9-rs24-s_firmware:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720q-e9-rs24-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720q-e9-rs8_firmware:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720q-e9-rs8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720q-e9-rs8-s_firmware:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720q-e9-rs8-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z11pa-d8_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z11pa-d8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z11pa-d8c_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z11pa-d8c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720-e9-rs24-u_firmware:1.14.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720-e9-rs24-u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720-e9-rs8-g_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720-e9-rs8-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500-e9-ps4_firmware:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500-e9-ps4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:pro_e800_g4_firmware:1.14.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:pro_e800_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500-e9-rs4_firmware:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500-e9-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500-e9-rs4-u_firmware:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500-e9-rs4-u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs520-e9-rs12-e_firmware:1.15.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs520-e9-rs12-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs520-e9-rs8_firmware:1.15.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs520-e9-rs8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:esc8000_g4_firmware:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:esc8000_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:esc8000_g4\\/10g_firmware:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:esc8000_g4\\/10g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720-e9-rs12-e_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720-e9-rs12-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:ws_c621e_sage_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:ws_c621e_sage:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500a-e10-ps4_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500a-e10-ps4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500a-e10-rs4_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500a-e10-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs700a-e9-rs12v2_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs700a-e9-rs12v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs700a-e9-rs4v2_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs700a-e9-rs4v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720a-e9-rs12v2_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720a-e9-rs12v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720a-e9-rs24v2_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720a-e9-rs24v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z11pr-d16_firmware:1.15.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z11pr-d16:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
CVE-2014-7604
|
The Easy Tips For Glowing Skin (aka com.n.easytipsforglowingskin) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:easy_tips_for_glowing_skin_project:easy_tips_for_glowing_skin:1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-wxgq-mv23-pgqr
|
LemonLDAP::NG before 1.9.20 has an XML External Entity (XXE) issue when submitting a notification to the notification server. By default, the notification server is not enabled and has a "deny all" rule.
|
[] | null | null | 8.1 | null |
|
CVE-2022-0212
|
SpiderCalendar <= 1.5.65 - Reflected Cross-Site Scripting
|
The SpiderCalendar WordPress plugin through 1.5.65 does not sanitise and escape the callback parameter before outputting it back in the page via the window AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected Cross-Site Scripting issue.
|
[
"cpe:2.3:a:10web:spidercalendar:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 |
GHSA-48g3-w2gf-xjrv
|
In the Linux kernel, the following vulnerability has been resolved:usb: cdc-acm: Check control transfer buffer size before accessIf the first fragment is shorter than struct usb_cdc_notification, we can't
calculate an expected_size. Log an error and discard the notification
instead of reading lengths from memory outside the received data, which can
lead to memory corruption when the expected_size decreases between
fragments, causing `expected_size - acm->nb_index` to wrap.This issue has been present since the beginning of git history; however,
it only leads to memory corruption since commit ea2583529cd1
("cdc-acm: reassemble fragmented notifications").A mitigating factor is that acm_ctrl_irq() can only execute after userspace
has opened /dev/ttyACM*; but if ModemManager is running, ModemManager will
do that automatically depending on the USB device's vendor/product IDs and
its other interfaces.
|
[] | null | null | null | null |
|
GHSA-7vgw-g2hc-25j8
|
An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication.
|
[] | null | 9.8 | null | null |
|
GHSA-cfw8-pqh2-f432
|
The image-upload feature in ProjeQtOr 7.2.5 allows remote attackers to execute arbitrary code by uploading a .shtml file with "#exec cmd" because rejected files remain on the server, with predictable filenames, after a "This file is not a valid image" error message.
|
[] | null | null | 8.8 | null |
|
CVE-2013-0835
|
Unspecified vulnerability in the Geolocation implementation in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service (application crash) via unknown vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1272.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1272.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1273.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1274.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1275.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1276.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1276.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1277.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1278.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1279.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1280.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1282.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1283.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1286.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1286.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1287.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1287.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1288.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1288.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1289.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1289.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1291.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1292.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1293.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1294.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1295.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1296.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1297.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1298.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1299.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1300.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1302.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1303.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1304.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1304.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1306.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1306.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1307.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1307.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1308.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1309.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1310.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1311.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1311.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.50:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-46502
|
An issue in openCRX v.5.2.2 allows a remote attacker to read internal files and execute server side request forgery attack via insecure DocumentBuilderFactory.
|
[
"cpe:2.3:a:opencrx:opencrx:5.2.2:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2006-1771
|
Directory traversal vulnerability in misc in pbcs.dll in SAXoTECH SAXoPRESS, aka Saxotech Online (formerly Publicus) allows remote attackers to read arbitrary files and possibly execute arbitrary programs via a .. (dot dot) in the url parameter.
|
[
"cpe:2.3:a:saxotech:saxopress:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-c82j-mm7v-vfp8
|
Deserialization of Untrusted Data vulnerability in PenciDesign Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme.This issue affects Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme: from n/a through 8.4.1.
|
[] | null | 8.1 | null | null |
|
CVE-2019-13035
|
Artica Pandora FMS 7.0 NG before 735 suffers from local privilege escalation due to improper permissions on C:\PandoraFMS and its sub-folders, allowing standard users to create new files. Moreover, the Apache service httpd.exe will try to execute cmd.exe from C:\PandoraFMS (the current directory) as NT AUTHORITY\SYSTEM upon web requests to the portal. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\SYSTEM.
|
[
"cpe:2.3:a:pandorafms:pandora_fms:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2005-4147
|
The TCLHTTPd service in Lyris ListManager before 8.9b allows remote attackers to obtain source code for arbitrary .tml (TCL) files via (1) a request with a trailing null byte (%00), which might also require (2) an authentication bypass step that involves a username with a trailing "@" characters.
|
[
"cpe:2.3:a:lyris_technologies_inc:listmanager:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lyris_technologies_inc:listmanager:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lyris_technologies_inc:listmanager:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lyris_technologies_inc:listmanager:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lyris_technologies_inc:listmanager:8.8a:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2024-26124
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[
"cpe:2.3:a:adobe:experience_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null |
GHSA-2fjf-h46q-8mfr
|
Transient DOS in WLAN firmware while parsing MLO (multi-link operation).
|
[] | null | 7.5 | null | null |
|
GHSA-f92q-2q89-r8mx
|
Integer overflow in the jpeg_data_load_data function in jpeg-data.c in libjpeg in exif 0.6.20 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain potentially sensitive information via a crafted JPEG file.
|
[] | null | null | null | null |
|
GHSA-mpcc-6v35-3pvf
|
Vulnerability of HwWatchHealth being hijacked.Successful exploitation of this vulnerability may cause repeated pop-up windows of the app.
|
[] | null | 10 | null | null |
|
GHSA-7cgv-mhxc-5m23
|
IBM Control Center 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 198761.
|
[] | null | null | null | null |
|
GHSA-2j48-x5hc-4xv7
|
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 make it easier for remote attackers to obtain sensitive information by sniffing the network during use of a weak algorithm in an SSL cipher suite.
|
[] | null | null | null | null |
|
CVE-2024-6803
|
itsourcecode Document Management System insert.php sql injection
|
A vulnerability has been found in itsourcecode Document Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file insert.php. The manipulation of the argument anothercont leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-271705 was assigned to this vulnerability.
|
[
"cpe:2.3:a:itsourcecode:document_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:document_management_system_project:document_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 5.5 | 5.5 | 6.5 |
CVE-2025-48069
|
ejson2env has insufficient input sanitization
|
ejson2env allows users to decrypt EJSON secrets and export them as environment variables. Prior to version 2.0.8, the `ejson2env` tool has a vulnerability related to how it writes to `stdout`. Specifically, the tool is intended to write an export statement for environment variables and their values. However, due to inadequate output sanitization, there is a potential risk where variable names or values may include malicious content, resulting in additional unintended commands being output to `stdout`. If this output is improperly utilized in further command execution, it could lead to command injection, allowing an attacker to execute arbitrary commands on the host system. Version 2.0.8 sanitizes output during decryption. Other mitigations involve avoiding use of `ejson2env` to decrypt untrusted user secrets and/or avoiding evaluating or executing the direct output from `ejson2env` without removing nonprintable characters.
|
[] | null | 6.6 | null | null |
CVE-2017-10949
|
Directory Traversal in Dell Storage Manager 2016 R2.1 causes Information Disclosure when the doGet method of the EmWebsiteServlet class doesn't properly validate user provided path before using it in file operations. Was ZDI-CAN-4459.
|
[
"cpe:2.3:a:dell:storage_manager_2016:r2.1:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-r4g9-49vg-wwc7
|
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin\/category\/add.
|
[] | null | 8.8 | null | null |
|
GHSA-xw28-8m8c-883v
|
An issue was discovered in BTITeam XBTIT 2.5.4. When a user logs in, their password hash is rehashed using a predictable salt and stored in the "pass" cookie, which is not flagged as HTTPOnly. Due to the weak and predictable salt that is in place, an attacker who successfully steals this cookie can efficiently brute-force it to retrieve the user's cleartext password.
|
[] | null | null | 9.8 | null |
|
GHSA-85qq-vf84-rfg4
|
Cross-site request forgery (CSRF) vulnerability in I-O DATA DEVICE HDL-F160, HDL-F250, HDL-F300, and HDL-F320 firmware before 1.02 allows remote attackers to (1) change a configuration or (2) delete files as an authenticated user via unknown vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null |
|
GHSA-629h-ppqv-h6fv
|
Wildix WMS 6 before 6.02.20221216, WMS 5 before 5.04.20221214, and WMS4 before 4.04.45396.23 allows Server-side request forgery (SSRF) via ZohoClient.php.
|
[] | null | 9.8 | null | null |
|
GHSA-vprf-7c8r-mgc2
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
|
[] | null | 9.8 | null | null |
|
GHSA-xq9j-rj57-v855
|
Research Artisan Lite before 1.18 does not ensure that a user has authenticated, which allows remote attackers to perform unspecified actions via unknown vectors.
|
[] | null | null | null | null |
|
CVE-2023-21883
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
GHSA-93vw-8fm5-p2jf
|
Parse Server is vulnerable to Prototype Pollution via Cloud Code Webhooks
|
ImpactA compromised Parse Server Cloud Code Webhook target endpoint allows an attacker to use prototype pollution to bypass the Parse Server `requestKeywordDenylist` option.PatchesImproved keyword detection.WorkaroundsNone.CollaboratorsMikhail Shcherbakov, Cristian-Alexandru Staicu and Musard Balliu working with Trend Micro Zero Day InitiativeReferenceshttps://github.com/parse-community/parse-server/security/advisories/GHSA-93vw-8fm5-p2jf
|
[] | null | 7.2 | null | null |
CVE-2024-20771
|
Bridge 2024 MOV File parsing memory corruption
|
Bridge versions 13.0.6, 14.0.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:bridge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-q5px-r484-x44m
|
Buffer overflow in POP3 and IMAP servers in the MERCUR mail server suite allows remote attackers to cause a denial of service.
|
[] | null | null | null | null |
|
CVE-2024-27394
|
tcp: Fix Use-After-Free in tcp_ao_connect_init
|
In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix Use-After-Free in tcp_ao_connect_init
Since call_rcu, which is called in the hlist_for_each_entry_rcu traversal
of tcp_ao_connect_init, is not part of the RCU read critical section, it
is possible that the RCU grace period will pass during the traversal and
the key will be free.
To prevent this, it should be changed to hlist_for_each_entry_safe.
|
[
"cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.4 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.