id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-ww8q-v9pv-4h4f
|
A vulnerability, which was classified as critical, has been found in Campcodes Beauty Salon Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/edit-accepted-appointment.php. The manipulation of the argument contactno leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235244.
|
[] | null | null | 6.3 | null |
|
CVE-2008-3503
|
RSSFromParent in Plain Black WebGUI before 7.5.13 does not restrict view access to Collaboration System (CS) RSS feeds, which allows remote attackers to obtain sensitive information (CS data).
|
[
"cpe:2.3:a:webgui:plain_black_webgui:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:0.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:3.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:4.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:5.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.99.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.99.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.99.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.99.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.99.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:6.99.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.19:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:webgui:plain_black_webgui:7.5.12:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-qgvf-5jhp-5rmx
|
The ADFO – Custom data in admin dashboard plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'dbp_id' parameter in all versions up to, and including, 1.9.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null |
|
GHSA-rvm6-q4p6-g665
|
There is a use-after-free at asm/preproc.c (function pp_getline) in Netwide Assembler (NASM) 2.14rc16 that will cause a denial of service during a line-number increment attempt.
|
[] | null | null | 5.5 | null |
|
CVE-2021-36006
|
Adobe Photoshop MP4 File Parsing Uninitialized Variable Information Disclosure Vulnerability
|
Adobe Photoshop versions 21.2.9 (and earlier) and 22.4.2 (and earlier) are affected by an Improper input validation vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
GHSA-x443-5gjr-4gr5
|
In the Linux kernel, the following vulnerability has been resolved:eventfs: Use list_del_rcu() for SRCU protected list variableChi Zhiling reported:We found a null pointer accessing in tracefs[1], the reason is that the
variable 'ei_child' is set to LIST_POISON1, that means the list was
removed in eventfs_remove_rec. so when access the ei_child->is_freed, the
panic triggered.by the way, the following script can reproduce this panicloop1 (){
while true
do
echo "p:kp submit_bio" > /sys/kernel/debug/tracing/kprobe_events
echo "" > /sys/kernel/debug/tracing/kprobe_events
done
}
loop2 (){
while true
do
tree /sys/kernel/debug/tracing/events/kprobes/
done
}
loop1 &
loop2[1]:
[ 1147.959632][T17331] Unable to handle kernel paging request at virtual address dead000000000150
[ 1147.968239][T17331] Mem abort info:
[ 1147.971739][T17331] ESR = 0x0000000096000004
[ 1147.976172][T17331] EC = 0x25: DABT (current EL), IL = 32 bits
[ 1147.982171][T17331] SET = 0, FnV = 0
[ 1147.985906][T17331] EA = 0, S1PTW = 0
[ 1147.989734][T17331] FSC = 0x04: level 0 translation fault
[ 1147.995292][T17331] Data abort info:
[ 1147.998858][T17331] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[ 1148.005023][T17331] CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[ 1148.010759][T17331] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[ 1148.016752][T17331] [dead000000000150] address between user and kernel address ranges
[ 1148.024571][T17331] Internal error: Oops: 0000000096000004 [#1] SMP
[ 1148.030825][T17331] Modules linked in: team_mode_loadbalance team nlmon act_gact cls_flower sch_ingress bonding tls macvlan dummy ib_core bridge stp llc veth amdgpu amdxcp mfd_core gpu_sched drm_exec drm_buddy radeon crct10dif_ce video drm_suballoc_helper ghash_ce drm_ttm_helper sha2_ce ttm sha256_arm64 i2c_algo_bit sha1_ce sbsa_gwdt cp210x drm_display_helper cec sr_mod cdrom drm_kms_helper binfmt_misc sg loop fuse drm dm_mod nfnetlink ip_tables autofs4 [last unloaded: tls]
[ 1148.072808][T17331] CPU: 3 PID: 17331 Comm: ls Tainted: G W ------- ---- 6.6.43 #2
[ 1148.081751][T17331] Source Version: 21b3b386e948bedd29369af66f3e98ab01b1c650
[ 1148.088783][T17331] Hardware name: Greatwall GW-001M1A-FTF/GW-001M1A-FTF, BIOS KunLun BIOS V4.0 07/16/2020
[ 1148.098419][T17331] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 1148.106060][T17331] pc : eventfs_iterate+0x2c0/0x398
[ 1148.111017][T17331] lr : eventfs_iterate+0x2fc/0x398
[ 1148.115969][T17331] sp : ffff80008d56bbd0
[ 1148.119964][T17331] x29: ffff80008d56bbf0 x28: ffff001ff5be2600 x27: 0000000000000000
[ 1148.127781][T17331] x26: ffff001ff52ca4e0 x25: 0000000000009977 x24: dead000000000100
[ 1148.135598][T17331] x23: 0000000000000000 x22: 000000000000000b x21: ffff800082645f10
[ 1148.143415][T17331] x20: ffff001fddf87c70 x19: ffff80008d56bc90 x18: 0000000000000000
[ 1148.151231][T17331] x17: 0000000000000000 x16: 0000000000000000 x15: ffff001ff52ca4e0
[ 1148.159048][T17331] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 1148.166864][T17331] x11: 0000000000000000 x10: 0000000000000000 x9 : ffff8000804391d0
[ 1148.174680][T17331] x8 : 0000000180000000 x7 : 0000000000000018 x6 : 0000aaab04b92862
[ 1148.182498][T17331] x5 : 0000aaab04b92862 x4 : 0000000080000000 x3 : 0000000000000068
[ 1148.190314][T17331] x2 : 000000000000000f x1 : 0000000000007ea8 x0 : 0000000000000001
[ 1148.198131][T17331] Call trace:
[ 1148.201259][T17331] eventfs_iterate+0x2c0/0x398
[ 1148.205864][T17331] iterate_dir+0x98/0x188
[ 1148.210036][T17331] __arm64_sys_getdents64+0x78/0x160
[ 1148.215161][T17331] invoke_syscall+0x78/0x108
[ 1148.219593][T17331] el0_svc_common.constprop.0+0x48/0xf0
[ 1148.224977][T17331] do_el0_svc+0x24/0x38
[ 1148.228974][T17331] el0_svc+0x40/0x168
[ 1148.232798][T17
---truncated---
|
[] | null | 5.5 | null | null |
|
CVE-2019-4112
|
IBM WebSphere eXtreme Scale 8.6 Admin Console allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 158105.
|
[
"cpe:2.3:a:ibm:websphere_extreme_scale:*:*:*:*:*:*:*:*"
] | null | null | 4 | null |
|
GHSA-96x7-cmg8-h727
|
Mozilla Firefox 1.0.1 and possibly other versions, including Mozilla and Thunderbird, allows remote attackers to spoof the URL in the Status Bar via an A HREF tag that contains a TABLE tag that contains another A tag.
|
[] | null | null | null | null |
|
GHSA-87hc-3ff5-jjvh
|
Cross-site scripting (XSS) vulnerability in the backend in Kajona before 4.6.3 allows remote attackers to inject arbitrary web script or HTML via the action parameter to index.php.
|
[] | null | null | null | null |
|
CVE-2024-4606
|
WordPress Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder plugin <= 2.0.3 - PHP Object Injection vulnerability
|
Deserialization of Untrusted Data vulnerability in BdThemes Ultimate Store Kit Elementor Addons.This issue affects Ultimate Store Kit Elementor Addons: from n/a through 2.0.3.
|
[
"cpe:2.3:a:bdthemes:utlimate_store_kit_elementor_addons:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
CVE-2023-4637
|
The WPvivid plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the restore() and get_restore_progress() function in versions up to, and including, 0.9.94. This makes it possible for unauthenticated attackers to invoke these functions and obtain full file paths if they have access to a back-up ID.
|
[
"cpe:2.3:a:wpvivid:migration\\,_backup\\,_staging:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
|
GHSA-cvqv-p8vx-m5h8
|
Heap-based buffer overflow in lmadmin in Flexera FlexNet Publisher 11.10 (aka FlexNet License Server Manager) allows remote attackers to execute arbitrary code via a crafted 0x2f packet.
|
[] | null | null | null | null |
|
cisco-sa-ccc-authz-bypass-5EKchJRb
|
Cisco Catalyst Center Authorization Bypass Vulnerability
|
A vulnerability in the web-based management interface of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to change specific data within the interface on an affected device.
This vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to change a specific field within the web-based management interface, even though they should not have access to change that field.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 4.3 | null | null |
GHSA-p26j-hx3p-vjcf
|
Cross Site Scripting (XSS) vulnerability in configMap parameters in Yellowfin Business Intelligence 7.3 allows remote attackers to run arbitrary code via MIAdminStyles.i4 Admin UI.
|
[] | null | 5.4 | null | null |
|
GHSA-vgjp-vh3c-32v3
|
Directory Traversal in mockserve
|
Affected versions of `mockserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
[] | null | null | 7.5 | null |
GHSA-prfm-28jw-x9h8
|
Unspecified vulnerability in lpadmin in Sun Solaris 10 and OpenSolaris snv_61 through snv_106 allows local users to cause a denial of service via unspecified vectors, related to enumeration of "wrong printers," aka a "Temporary file vulnerability."
|
[] | null | null | null | null |
|
GHSA-7mh4-c5mx-6jq7
|
OCaml 3.12.1 and earlier computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
|
[] | null | null | null | null |
|
GHSA-9p62-qh48-3frr
|
Ruckus Wireless Zone Director Controller firmware releases ZD9.9.x, ZD9.10.x, ZD9.13.0.x less than 9.13.0.0.232 contain OS Command Injection vulnerabilities in the ping functionality that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system.
|
[] | null | null | 8.8 | null |
|
ICSA-18-051-01
|
ABB netCADOPS Web Application
|
A vulnerability exists in the password entry section of netCADOPS Web Application that may expose critical database information. CVE-2018-5477 has been assigned to this vulnerability. A CVSS v3 base score of 5.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N).
|
[] | null | null | 5.8 | null |
CVE-2022-28382
|
An issue was discovered in certain Verbatim drives through 2022-03-31. Due to the use of an insecure encryption AES mode (Electronic Codebook, aka ECB), an attacker may be able to extract information even from encrypted data, for example by observing repeating byte patterns. The firmware of the USB-to-SATA bridge controller INIC-3637EN uses AES-256 with the ECB mode. This operation mode of block ciphers (e.g., AES) always encrypts identical plaintext data, in this case blocks of 16 bytes, to identical ciphertext data. For some data, for instance bitmap images, the lack of the cryptographic property called diffusion, within ECB, can leak sensitive information even in encrypted data. Thus, the use of the ECB operation mode can put the confidentiality of specific information at risk, even in an encrypted form. This affects Keypad Secure USB 3.2 Gen 1 Drive Part Number #49428, Store 'n' Go Secure Portable HDD GD25LK01-3637-C VER4.0, Executive Fingerprint Secure SSD GDMSFE01-INI3637-C VER1.1, and Fingerprint Secure Portable Hard Drive Part Number #53650.
|
[
"cpe:2.3:o:verbatim:keypad_secure_usb_3.2_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:verbatim:keypad_secure_usb_3.2_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:verbatim:store_\\'n\\'_go_secure_portable_hdd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:verbatim:store_\\'n\\'_go_secure_portable_hdd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:verbatim:executive_fingerprint_secure_ssd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:verbatim:executive_fingerprint_secure_ssd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:verbatim:fingerprint_secure_portable_hard_drive_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:verbatim:fingerprint_secure_portable_hard_drive:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-6phg-4wmq-h5h3
|
Frappe has possibility of SQL injection due to improper validations
|
ImpactSQL injection could be achieved via a specially crafted request, which could allow malicious person to gain access to sensitive information.WorkaroundsUpgrading is required, no other workaround is present.
|
[] | 6.6 | null | null | null |
GHSA-wrmr-hgjg-7q2j
|
An issue was discovered in gpac 0.8.0. An invalid memory dereference exists in the function FixTrackID located in isom_intern.c, which allows attackers to cause a denial of service (DoS) via a crafted input.
|
[] | null | null | null | null |
|
CVE-2019-19334
|
In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type "identityref". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or possibly gain code execution.
|
[
"cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.11:r2:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.12:r1:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.12:r2:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.13:r1:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.13:r2:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.14:r1:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.15:r1:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.16:r1:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.16:r2:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.16:r3:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:1.0:r1:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:1.0:r2:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:1.0:r3:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:1.0:r4:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] | null | null | 8.1 | null |
|
CVE-2019-7880
|
A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to marketing email templates to inject malicious javascript.
|
[
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*"
] | null | null | 4.8 | 3.5 |
|
CVE-2024-37007
|
Multiple ZDI Vulnerabilities in Autodesk AutoCAD and certain AutoCAD-based products
|
A maliciously crafted X_B and X_T file, when parsed in pskernel.DLL through Autodesk applications, can cause a use-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
|
[
"cpe:2.3:a:autodesk:autocad:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-r8qr-w292-387j
|
Billing System Project v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /phpinventory/editbrand.php.
|
[] | null | 7.2 | null | null |
|
GHSA-2qjj-4522-pjgp
|
The SMS Alert Order Notifications – WooCommerce plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.7.9. This is due to the plugin using the Host header to determine if the plugin is in a playground environment. This makes it possible for unauthenticated attackers to spoof the Host header to make the OTP code "1234" and authenticate as any user, including administrators.
|
[] | null | 9.8 | null | null |
|
GHSA-47gf-mp33-83pp
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, and SD 850, while processing the content headers in the Playready module, a buffer overread may occur if the header count exceeds the expected value.
|
[] | null | null | 9.8 | null |
|
CVE-2022-4357
|
LetsRecover < 1.2.0 - Unauthenticated SQLi
|
The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
|
[
"cpe:2.3:a:letsrecover_project:letsrecover:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null |
ICSA-21-131-13
|
Siemens SINAMICS Medium Voltage Products Telnet (Update A)
|
The Telnet service of the HMI Comfort Panels system component in affected SINAMICS products does not require authentication, which may allow a remote attacker to gain access to the device if the service is enabled. Telnet is disabled by default. CVE-2020-15798 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).. --------- End Update A Part 2 of 3 ---------CVE-2020-15798 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 8.1 | null |
GHSA-9468-6vrh-r29c
|
Adobe RoboHelp versions 2020.0.7 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[] | null | 6.1 | null | null |
|
GHSA-6mvm-83wh-44gh
|
Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1089, CVE-2016-1091, CVE-2016-6944, CVE-2016-6945, CVE-2016-6946, CVE-2016-6949, CVE-2016-6952, CVE-2016-6953, CVE-2016-6961, CVE-2016-6962, CVE-2016-6963, CVE-2016-6964, CVE-2016-6965, CVE-2016-6967, CVE-2016-6969, CVE-2016-6971, CVE-2016-6979, CVE-2016-6988, and CVE-2016-6993.
|
[] | null | null | 9.8 | null |
|
CVE-2005-2855
|
Cross-site scripting (XSS) vulnerability in Unclassified NewsBoard 1.5.3 allows remote attackers to inject arbitrary web script or HTML via the description field.
|
[
"cpe:2.3:a:unclassified_newsboard:unclassified_newsboard:1.5.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2009-0590
|
The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.
|
[
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
PYSEC-2021-550
| null |
TensorFlow is an end-to-end open source platform for machine learning. It is possible to trigger a null pointer dereference in TensorFlow by passing an invalid input to `tf.raw_ops.CompressElement`. The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/data/compression_utils.cc#L34) was accessing the size of a buffer obtained from the return of a separate function call before validating that said buffer is valid. We have patched the issue in GitHub commit 5dc7f6981fdaf74c8c5be41f393df705841fb7c5. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
|
[] | null | null | null | null |
GHSA-9p5v-74f3-3rq6
|
IBM QRadar Suite 1.10.12.0 through 1.10.17.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 279975.
|
[] | null | 5.1 | null | null |
|
GHSA-mf53-vhfr-cjjw
|
The WP MultiTasking WordPress plugin through 0.1.12 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
[] | null | 5.4 | null | null |
|
GHSA-c6q5-rrw7-p494
|
Missing Authorization vulnerability in Pixelite Meta Tag Manager. This issue affects Meta Tag Manager: from n/a through 3.1.
|
[] | null | 4.3 | null | null |
|
CVE-2019-1481
|
An information disclosure vulnerability exists in Windows Media Player when it fails to properly handle objects in memory, aka 'Windows Media Player Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1480.
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 |
|
RHSA-2019:3968
|
Red Hat Security Advisory: qemu-kvm-ma security update
|
QEMU: slirp: heap buffer overflow during packet reassembly
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 7 | null |
CVE-2021-31257
|
The HintFile function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
|
[
"cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
RHSA-2005:267
|
Red Hat Security Advisory: Evolution security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2006-6674
|
Ozeki HTTP-SMS Gateway 1.0, and possibly earlier, stores usernames and passwords in plaintext in the HKLM\Software\Ozeki\SMSServer\CurrentVersion\Plugins\httpsmsgate registry key, which allows local users to obtain sensitive information.
|
[
"cpe:2.3:a:ozeki:http-sms_gateway:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-6c8p-qphv-668v
|
Denial of service in ruby-openid
|
The ruby-openid gem before 2.2.2 for Ruby allows remote OpenID providers to cause a denial of service (CPU consumption) via (1) a large XRDS document or (2) an XML Entity Expansion (XEE) attack.
|
[] | null | null | null | null |
CVE-2007-2322
|
NMMediaServer.exe in Nero MediaHome 2.5.5.0 and CE 1.3.0.4 allows remote attackers to cause a denial of service (NULL dereference and application crash) via a crafted packet that contains two CRLF sequences. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:nero:mediahome:2.5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nero:mediahome_ce:1.3.0.4:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2006-1223
|
Cross-site scripting (XSS) vulnerability in Jupiter Content Manager 1.1.5 and earlier allows remote attackers to inject arbitrary web script or HTML via a Javascript URI in the image BBcode tag.
|
[
"cpe:2.3:a:jupiter_cms:jupiter_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jupiter_cms:jupiter_cms:1.1.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-v864-fp9f-3qv4
|
Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
|
[] | null | null | 8.2 | null |
|
GHSA-wppf-7c2c-mmm7
|
EMC Smarts Network Configuration Manager (NCM) before 9.2 does not require authentication for all Java RMI method calls, which allows remote attackers to execute arbitrary code via unspecified vectors.
|
[] | null | null | null | null |
|
CVE-2011-4118
|
Mahara before 1.4.1, when MNet (aka the Moodle network feature) is used, allows remote authenticated users to gain privileges via a jump to an XMLRPC target.
|
[
"cpe:2.3:a:mahara:mahara:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.3.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.3.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.3.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.4:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.4:rc4:*:*:*:*:*:*"
] | null | null | null | 6 |
|
GHSA-q5wp-qj6q-q9jm
|
A vulnerability classified as critical was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. This vulnerability affects unknown code of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 9.2 | 8.1 | null | null |
|
ICSA-25-162-10
|
PTZOptics and Other Pan-Tilt-Zoom Cameras
|
PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an insufficient authentication issue. The camera does not properly enforce authentication to /cgi-bin/param.cgi when requests are sent without an HTTP Authorization header. The result is a remote and unauthenticated attacker can leak sensitive data such as usernames, password hashes, and configurations details. Additionally, the attacker can update individual configuration values or overwrite the whole file. PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an OS command injection issue. The camera does not sufficiently validate the ntp_addr configuration value which may lead to arbitrary command execution when ntp_client is started. When chained with CVE-2024-8956, a remote and unauthenticated attacker can execute arbitrary OS commands on affected devices. Certain PTZOptics and possibly other ValueHD-based cameras have SSH or telnet or both enabled by default. Operating system users with administrative privileges (including the root user) have default passwords that are trivial to crack. The passwords cannot be changed by the user, nor can the SSH or telnet service be disabled by the user. PTZOptics and possibly other ValueHD-based cameras use a default, shared password for the administrative web interface. The table below shows the affected firmware. This has been patched on production firmware for the current generation of devices.
|
[] | null | 9.8 | null | null |
GHSA-mq4h-3x66-jfc7
|
Some Samsung devices include the SIMalliance Toolbox Browser (aka S@T Browser) on the UICC, which might allow remote attackers to retrieve location and IMEI information, or retrieve other data or execute certain commands, via SIM Toolkit (STK) instructions in an SMS message, aka Simjacker.
|
[] | null | 9.8 | null | null |
|
GHSA-v2p4-5xw6-2p26
|
PHP remote file inclusion vulnerability in includes/functions_admin.php in PNphpBB 1.2g allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
|
[] | null | null | null | null |
|
CVE-2002-0778
|
The default configuration of the proxy for Cisco Cache Engine and Content Engine allows remote attackers to use HTTPS to make TCP connections to allowed IP addresses while hiding the actual source IP.
|
[
"cpe:2.3:a:cisco:content_distribution_manager_4630:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4630:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4630:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4650:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4650:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4650:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:507:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:507_2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:507_3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:507_4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:507_4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:560:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:560_2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:560_3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:560_4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:560_4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:590:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:590_2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:590_3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:590_4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:590_4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7320:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7320_2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7320_3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7320_4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7320_4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:enterprise_content_delivery_network_software:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:enterprise_content_delivery_network_software:4.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cache_engine_505:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cache_engine_505:3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cache_engine_550:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cache_engine_550:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cache_engine_550:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cache_engine_550:3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cache_engine_570:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cache_engine_570:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cache_engine_570:3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cache_engine_570:570:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:content_router_4430:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-g5ww-5jh7-63cx
|
Protobuf Java vulnerable to Uncontrolled Resource Consumption
|
A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
|
[] | null | 7.5 | null | null |
GHSA-j5r3-qrhr-2674
|
A vulnerability was found in lmxcms up to 1.41. It has been rated as critical. Affected by this issue is some unknown functionality of the file admin.php. The manipulation of the argument lid leads to sql injection. VDB-239858 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | null | 5.5 | null |
|
GHSA-7342-qgvc-m343
|
Possible buffer overflow in trust zone access control API. Buffer overflow may occur due to lack of buffer size checking. Product: Android. Versions: Kernel 3.18. Android ID: A-31625204. References: QC-CR#1027804.
|
[] | null | null | 9.8 | null |
|
CVE-2017-2100
|
Hands-on Vulnerability Learning Tool "AppGoat" for Web Application V3.0.1 and earlier allows remote attackers to conduct DNS rebinding attacks via unspecified vectors.
|
[
"cpe:2.3:a:ipa:appgoat:*:*:*:*:*:*:*:*"
] | null | null | 6.3 | 6.8 |
|
CVE-2020-3332
|
Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers Command Shell Injection Vulnerability
|
A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers could allow an authenticated, remote attacker to inject arbitrary shell commands that are executed by an affected device. The vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary shell commands or scripts with root privileges on the affected device.
|
[
"cpe:2.3:o:cisco:rv110w_wireless-n_vpn_firewall_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv110w_wireless-n_vpn_firewall:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_wireless-n_multifunction_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130w_wireless-n_multifunction_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*"
] | null | null | 8.1 | null |
GHSA-2v2g-rr8c-cpwh
|
NCP Secure Enterprise Client before 10.15 r47589 allows a symbolic link attack on enumusb.reg via Support Assistant.
|
[] | null | null | null | null |
|
CVE-2024-4422
|
Comparison Slider <= 1.0.5 - Authenticated (Subscriber+) Stored Cross-Site Scripting
|
The Comparison Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the slider title parameter in all versions up to, and including, 1.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null |
GHSA-2v77-g93r-76vh
|
A vulnerability, which was classified as critical, has been found in SourceCodester Best Employee Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/fetch_product_details.php. The manipulation of the argument barcode leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | null | null |
|
CVE-2021-26558
|
Deserialization of Untrusted Data
|
Deserialization of Untrusted Data vulnerability of Apache ShardingSphere-UI allows an attacker to inject outer link resources. This issue affects Apache ShardingSphere-UI Apache ShardingSphere-UI version 4.1.1 and later versions; Apache ShardingSphere-UI versions prior to 5.0.0.
|
[
"cpe:2.3:a:apache:shardingsphere-ui:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
RHSA-2016:1944
|
Red Hat Security Advisory: bind security update
|
bind: assertion failure in buffer.c while building responses to a specifically constructed request
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
CVE-2008-4593
|
Apple iPhone 2.1 with firmware 5F136, when Require Passcode is enabled and Show SMS Preview is disabled, allows physically proximate attackers to obtain sensitive information by performing an Emergency Call tap and then reading SMS messages on the device screen, aka Apple bug number 6267416.
|
[
"cpe:2.3:h:apple:iphone:2.1:*:*:*:*:*:*:*"
] | null | null | null | 1.2 |
|
GHSA-3p43-73rv-cj74
|
A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address.
|
[] | null | null | null | null |
|
GHSA-mh5r-cxjx-37mf
|
A stack-based buffer overflow vulnerability exists in the Web Manager SslGenerateCSR functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
|
[] | null | 9.1 | null | null |
|
CVE-2011-3427
|
The Data Security component in Apple iOS before 5 and Apple TV before 4.4 does not properly restrict use of the MD5 hash algorithm within X.509 certificates, which makes it easier for man-in-the-middle attackers to spoof servers or obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:apple:apple_tv:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:apple_tv:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:apple_tv:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:apple_tv:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:-:ipad:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:-:ipodtouch:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-xww9-82cx-c8c3
|
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0320, and CVE-2015-0322.
|
[] | null | null | null | null |
|
GHSA-45gh-j7vr-755q
|
Valid Host header field can cause Apache Traffic Server to crash on some platforms.This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5.Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue.
|
[] | null | 7.5 | null | null |
|
CVE-2025-22702
|
WordPress Photography theme <= 7.5.2 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in EPC Photography. This issue affects Photography: from n/a through 7.5.2.
|
[] | null | 6.3 | null | null |
CVE-2022-48301
|
The bundle management module lacks permission verification in some APIs. Successful exploitation of this vulnerability may restore the pre-installed apps that have been uninstalled.
|
[
"cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-q9wq-fgjg-qwhp
|
NVIDIA drivers (nvidia-drivers) before 1.0.7185, 1.0.9639, and 100.14.11, as used in Gentoo Linux and possibly other distributions, creates /dev/nvidia* device files with insecure permissions, which allows local users to modify video card settings, cause a denial of service (crash or physical video card damage), and obtain sensitive information.
|
[] | null | null | null | null |
|
CVE-2018-19918
|
CuppaCMS has XSS via an SVG document uploaded to the administrator/#/component/table_manager/view/cu_views URI.
|
[
"cpe:2.3:a:cuppacms:cuppacms:-:*:*:*:*:*:*:*"
] | null | 5.4 | 5.4 | 3.5 |
|
GHSA-jjpj-fj74-73gv
|
CRLF injection vulnerability in the Digest Authentication support for Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allows remote attackers to conduct HTTP request splitting attacks via LF (%0a) bytes in the username attribute.
|
[] | null | null | null | null |
|
GHSA-7c9r-v4q2-x3rh
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in cmsmasters CMSMasters Content Composer allows PHP Local File Inclusion. This issue affects CMSMasters Content Composer: from n/a through n/a.
|
[] | null | 8.1 | null | null |
|
GHSA-22h8-5mmq-pgx3
|
Citrix StoreFront Server before 1903, 7.15 LTSR before CU4 (3.12.4000), and 7.6 LTSR before CU8 (3.0.8000) allows XXE attacks.
|
[] | null | null | 7.5 | null |
|
CVE-2019-0135
|
Improper permissions in the installer for Intel(R) Accelerated Storage Manager in Intel(R) RSTe before version 5.5.0.2015 may allow an authenticated user to potentially enable escalation of privilege via local access. L-SA-00206
|
[
"cpe:2.3:a:intel:rapid_storage_technology_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p520c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p520c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p720_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p720:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p920:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2007-0489
|
PHP remote file inclusion vulnerability in includes/functions.visohotlink.php in VisoHotlink 1.01 and possibly earlier allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
|
[
"cpe:2.3:a:visohotlink:visohotlink:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2024-46553
|
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the ipaddrmsk%d parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
|
[
"cpe:2.3:o:draytek:vigor3910_firmware:4.3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-wrr5-p265-7252
|
Jenkins Warnings NG Plugin Cross-site scripting vulnerability
|
A cross-site scripting vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attacker with Job/Configure permission to inject arbitrary JavaScript in build overview pages.
|
[] | null | null | 5.4 | null |
CVE-2018-11230
|
jbig2_add_page in jbig2enc.cc in libjbig2enc.a in jbig2enc 0.29 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted file.
|
[
"cpe:2.3:a:jbig2enc_project:jbig2enc:0.29:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2023-4003
|
One Identity Password Manager version 5.9.7.1 - Unauthenticated physical access privilege escalation
|
One Identity Password Manager version 5.9.7.1 - An unauthenticated attacker with physical access to a workstation may upgrade privileges to SYSTEM through an unspecified method. CWE-250: Execution with Unnecessary Privileges.
|
[
"cpe:2.3:a:oneidentity:password_manager:*:*:*:*:*:*:*:*"
] | null | 7.6 | null | null |
RHSA-2011:1536
|
Red Hat Security Advisory: sos security, bug fix, and enhancement update
|
sos: sosreport is gathering certificate-based RHN entitlement private keys
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-wmwf-43vq-qhq2
|
In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer.
|
[] | null | null | null | null |
|
CVE-2020-0362
|
In libstagefright, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-123237930
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2024-45806
|
Potential manipulate `x-envoy` headers from external sources in envoy
|
Envoy is a cloud-native high-performance edge/middle/service proxy. A security vulnerability in Envoy allows external clients to manipulate Envoy headers, potentially leading to unauthorized access or other malicious actions within the mesh. This issue arises due to Envoy's default configuration of internal trust boundaries, which considers all RFC1918 private address ranges as internal. The default behavior for handling internal addresses in Envoy has been changed. Previously, RFC1918 IP addresses were automatically considered internal, even if the internal_address_config was empty. The default configuration of Envoy will continue to trust internal addresses while in this release and it will not trust them by default in next release. If you have tooling such as probes on your private network which need to be treated as trusted (e.g. changing arbitrary x-envoy headers) please explicitly include those addresses or CIDR ranges into `internal_address_config`. Successful exploitation could allow attackers to bypass security controls, access sensitive data, or disrupt services within the mesh, like Istio. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-qhx6-j2hf-9j4g
|
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.70 and earlier, 5.5.32 and earlier, and 5.6.12 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
|
[] | null | null | null | null |
|
CVE-2024-5193
|
Ritlabs TinyWeb Server Request crlf injection
|
A vulnerability was found in Ritlabs TinyWeb Server 1.94. It has been classified as problematic. Affected is an unknown function of the component Request Handler. The manipulation with the input %0D%0A leads to crlf injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-265830 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:ritlabs:tinyweb:*:*:*:*:*:*:*:*"
] | 6.9 | 5.3 | 5.3 | 5 |
GHSA-q4cq-539c-3mmm
|
Directory Traversal in serveryztyzt
|
Affected versions of `serveryztyzt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
[] | null | null | 7.5 | null |
CVE-2024-10093
|
VSO ConvertXtoDvd ConvertXtoDvd.exe uncontrolled search path
|
A vulnerability, which was classified as critical, was found in VSO ConvertXtoDvd 7.0.0.83. Affected is an unknown function in the library avcodec.dll of the file ConvertXtoDvd.exe. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:vso:convertxtodvd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vso-software:convertxtodvd:7.0.0.83:*:*:*:*:*:*:*"
] | 8.5 | 7.8 | 7.8 | 6.8 |
GHSA-5cjw-xf6c-qrgq
|
A vulnerability classified as critical was found in itsourcecode Ticket Reservation System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php of the component Login Page. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273529 was assigned to this vulnerability.
|
[] | 6.9 | 7.3 | null | null |
|
GHSA-xr25-82p4-842w
|
It is possible to inject HTML and/or JavaScript in the HTML to PDF conversion in Gotenberg through 6.2.1 via the /convert/html endpoint.
|
[] | null | null | null | null |
|
GHSA-vf6h-p6gg-4q67
|
Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null |
|
GHSA-459h-qwrj-j9gc
|
The allows any authenticated user to join a private group due to a missing authorization check on a function
|
[] | null | 6.5 | null | null |
|
GHSA-cvj7-3x62-49h3
|
Multiple cross-site scripting (XSS) vulnerabilities in Mahara before 1.0.15, 1.1.x before 1.1.9, and 1.2.x before 1.2.5 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null |
|
CVE-2010-2192
|
The make_lockdir_name function in policy.c in pmount 0.9.18 allow local users to overwrite arbitrary files via a symlink attack on a file in /var/lock/.
|
[
"cpe:2.3:a:vincent_fourmond:pmount:0.9.18:*:*:*:*:*:*:*"
] | null | null | null | 1.9 |
|
CVE-2021-44837
|
An issue was discovered in Delta RM 1.2. It is possible for an unprivileged user to access the same information as an admin user regarding the risk creation information in the /risque/administration/referentiel/json/create/categorie endpoint, using the id_cat1 query parameter to indicate the risk.
|
[
"cpe:2.3:a:deltarm:delta_rm:1.2:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
CVE-2022-35703
|
Adobe Bridge SVG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
|
Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
CVE-2023-34540
|
Langchain before v0.0.225 was discovered to contain a remote code execution (RCE) vulnerability in the component JiraAPIWrapper (aka the JIRA API wrapper). This vulnerability allows attackers to execute arbitrary code via crafted input. As noted in the "releases/tag" reference, a fix is available.
|
[
"cpe:2.3:a:langchain:langchain:0.0.171:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.