id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
RHSA-2017:1422
|
Red Hat Security Advisory: Red Hat Directory Server 9 - Final Day Of Retirement Notice
|
This is the final day of notification for the retirement of Red Hat Directory Server 9.
|
[
"cpe:/a:redhat:directory_server:9"
] | null | null | null | null |
CVE-2017-4898
|
VMware Workstation Pro/Player 12.x before 12.5.3 contains a DLL loading vulnerability that occurs due to the "vmware-vmx" process loading DLLs from a path defined in the local environment-variable. Successful exploitation of this issue may allow normal users to escalate privileges to System in the host machine where VMware Workstation is installed.
|
[
"cpe:2.3:a:vmware:workstation_player:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_player:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_player:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_player:12.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_player:12.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_player:12.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:12.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:12.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:12.5.2:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.9 |
|
RHSA-2020:0178
|
Red Hat Security Advisory: kernel security and enhancement update
|
kernel: use-after-free in fs/xfs/xfs_super.c
|
[
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 7.8 | null |
GHSA-pr7f-w5w8-8mp6
|
Rukovoditel v3.2.1 was discovered to contain a SQL injection vulnerability via the order_by parameter at /rukovoditel/index.php?module=logs/view&type=php.
|
[] | null | 8.8 | null | null |
|
CVE-2019-14682
|
The acf-better-search (aka ACF: Better Search) plugin before 3.3.1 for WordPress allows wp-admin/options-general.php?page=acfbs_admin_page CSRF.
|
[
"cpe:2.3:a:acf\\:_better_search_project:acf\\:_better_search:*:*:*:*:*:wordpress:*:*"
] | null | null | 4.3 | 4.3 |
|
CVE-2025-46345
|
Auth0 Account Link Extension JWT Invalid Signature Validation
|
Auth0 Account Link Extension is an extension aimed to help link accounts easily. Versions 2.3.4 to 2.6.6 do not verify the signature of the provided JWT. This allows the user the ability to supply a forged token and the potential to access user information without proper authorization. This issue has been patched in versions 2.6.7, 2.7.0, and 3.0.0. It is recommended to upgrade to version 3.0.0 or greater.
|
[] | 6.9 | null | null | null |
GHSA-rg3w-c6h2-jc6h
|
Vulnerability in the Oracle Hospitality OPERA 5 Property Services component of Oracle Hospitality Applications (subcomponent: Integration). The supported version that is affected is 5.5.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Hospitality OPERA 5 Property Services accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[] | null | null | 5.3 | null |
|
GHSA-g6j9-fwc6-jmgq
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in 沈唁 OSS Aliyun.This issue affects OSS Aliyun: from n/a through 1.4.10.
|
[] | null | 7.6 | null | null |
|
GHSA-f7pg-m34f-mphj
|
Heap-based buffer overflow in the avcodec_default_get_buffer function (utils.c) in FFmpeg libavcodec 0.4.9-pre1 and earlier, as used in products such as (1) mplayer, (2) xine-lib, (3) Xmovie, and (4) GStreamer, allows remote attackers to execute arbitrary commands via small PNG images with palettes.
|
[] | null | null | null | null |
|
RHSA-2016:2007
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: use after free in v8 chromium-browser: various fixes from internal audits
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
GHSA-f5w3-q6fx-5p9r
|
In the Linux kernel, the following vulnerability has been resolved:iio: adc: ti-ads8688: fix information leak in triggered bufferThe 'buffer' local array is used to push data to user space from a
triggered buffer, but it does not set values for inactive channels, as
it only uses iio_for_each_active_channel() to assign new values.Initialize the array to zero before using it to avoid pushing
uninitialized information to userspace.
|
[] | null | 7.1 | null | null |
|
CVE-2018-18552
|
ServersCheck Monitoring Software through 14.3.3 allows local users to cause a denial of service (menu functionality loss) by creating an LNK file that points to a second LNK file, if this second LNK file is associated with a Start menu. Ultimately, this behavior comes from a Directory Traversal bug (via the sensor_details.html id parameter) that allows creating empty files in arbitrary directories.
|
[
"cpe:2.3:a:serverscheck:monitoring_software:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 5 |
|
CVE-2014-5589
|
The Now Browser (Material) (aka com.browser.nowbasic) 2.8.1 application Material for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:nowbrowser:now_browser_\\(material\\):2.8.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-9wv4-24w7-q589
|
LGSERVER.EXE in BrightStor Mobile Backup 4.0 allows remote attackers to cause a denial of service (disk consumption and daemon hang) via a value of 0xFFFFFF7F at a certain point in an authentication negotiation packet, which writes a large amount of data to a .USX file in CA_BABLDdata\Server\data\transfer\.
|
[] | null | null | null | null |
|
GHSA-47f8-wcf5-f9q4
|
AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
|
[] | null | null | null | null |
|
GHSA-pj5m-7gqr-5h69
|
The WLST script generated by the configToScript command in BEA WebLogic Express and WebLogic Server 9.0 and 9.1 does not encrypt certain attributes in configuration files when creating a new domain, which allows remote authenticated users to obtain sensitive information.
|
[] | null | null | null | null |
|
GHSA-238g-wwhc-fr8p
|
A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the WEBSITE TITLE parameter under the Menu module.
|
[] | null | 9.6 | null | null |
|
CVE-2025-20667
|
In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741.
|
[] | null | 7.5 | null | null |
|
CVE-2025-37768
|
drm/amd/pm: Prevent division by zero
|
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/pm: Prevent division by zero
The user can set any speed value.
If speed is greater than UINT_MAX/8, division by zero is possible.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
|
[] | null | null | null | null |
GHSA-wg7c-c82w-8v8f
|
Memory corruption while invoking IOCTL calls from user space to set generic private command inside WLAN driver.
|
[] | null | 7.8 | null | null |
|
CVE-2004-2293
|
Multiple cross-site scripting (XSS) vulnerabilities in PHP-Nuke 6.0 to 7.3 allow remote attackers to inject arbitrary web script or HTML via the (1) eid parameter or (2) query parameter to the Encyclopedia module, (3) preview_review function in the Reviews module as demonstrated by the url, cover, rlanguage, and hits parameters, or (4) savecomment function in the Reviews module, as demonstrated using the uname parameter. NOTE: the Faq/categories and Encyclopedia/ltr issues are already covered by CVE-2005-1023.
|
[
"cpe:2.3:a:francisco_burzi:php-nuke:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.5_final:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:7.0_final:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-fg53-q2jq-9xxq
|
Improper Authentication of RemoteUI of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger unauthorized access to the product. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
|
[] | null | 3.1 | null | null |
|
CVE-2023-49825
|
WordPress Soledad Theme <= 8.4.1 is vulnerable to SQL Injection
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PenciDesign Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme.This issue affects Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme: from n/a through 8.4.1.
|
[
"cpe:2.3:a:pencidesign:soledad:*:*:*:*:*:wordpress:*:*"
] | null | 8.5 | null | null |
GHSA-3vj3-3jw5-xpqc
|
A stack-based buffer overflow vulnerability exists in the httpd gwcfg.cgi get functionality of Yifan YF325 v1.0_20221108. A specially crafted network packet can lead to command execution. An attacker can send a network request to trigger this vulnerability.
|
[] | null | 9.8 | null | null |
|
CVE-2017-9870
|
The III_i_stereo function in layer3.c in mpglib, as used in libmpgdecoder.a in LAME 3.99.5 and other products, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file that is mishandled in the code for the "block_type == 2" case, a similar issue to CVE-2017-11126.
|
[
"cpe:2.3:a:lame_project:lame:3.99.5:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
CVE-2022-25841
|
Uncontrolled search path elements in the Intel(R) Datacenter Group Event Android application, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:datacenter_group_event:*:*:*:*:*:android:*:*"
] | null | 7.8 | null | null |
|
CVE-2021-24801
|
WP Survey Plus <= 1.0 - Subscriber+ AJAX Calls
|
The WP Survey Plus WordPress plugin through 1.0 does not have any authorisation and CSRF checks in place in its AJAX actions, allowing any user to call them and add/edit/delete Surveys. Furthermore, due to the lack of sanitization in the Surveys' Title, this could also lead to Stored Cross-Site Scripting issues
|
[
"cpe:2.3:a:wp_survey_plus_project:wp_survey_plus:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | 4.3 |
CVE-2017-13235
|
A other vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. ID: A-68342866.
|
[
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2024-53809
|
WordPress Namaste! LMS plugin <= 2.6.4.1 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Kiboko Labs Namaste! LMS allows Cross Site Request Forgery.This issue affects Namaste! LMS: from n/a through 2.6.4.1.
|
[] | null | 4.3 | null | null |
GHSA-ww5r-mvp5-3f4g
|
IBM Informix Dynamic Server 12.1 could allow an authenticated user to cause a buffer overflow that would write large assertion fail files to the server. Done enough times, this could use large parts of the file system and cause the server to crash. IBM X-Force ID: 125569.
|
[] | null | null | 6.5 | null |
|
CVE-2021-43412
|
An issue was discovered in GNU Hurd before 0.9 20210404-9. libports accepts fake notification messages from any client on any port, which can lead to port use-after-free. This can be exploited for local privilege escalation to get full root access.
|
[
"cpe:2.3:a:gnu:hurd:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2024-44570
|
RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain a code injection vulnerability via the getParams function in phpinf.php.
|
[
"cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
RHSA-2024:9016
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.8 | null | null |
GHSA-784p-f8qg-9fqj
|
Multiple cross-site request forgery (CSRF) vulnerabilities in Drupal 5.x before 5.2 allow remote attackers to (1) delete comments, (2) delete content revisions, and (3) disable menu items as privileged users, related to improper use of HTTP GET and the Forms API.
|
[] | null | null | null | null |
|
CVE-2005-4240
|
SQL injection vulnerability in search.php in VCD-db 0.98 and earlier allows remote attackers to execute arbitrary SQL commands via the by parameter.
|
[
"cpe:2.3:a:vcd-db:vcd-db:0.97:*:*:*:*:*:*:*",
"cpe:2.3:a:vcd-db:vcd-db:0.98:*:*:*:*:*:*:*",
"cpe:2.3:a:vcd-db:vcd-db:0.961:*:*:*:*:*:*:*",
"cpe:2.3:a:vcd-db:vcd-db:0.971:*:*:*:*:*:*:*",
"cpe:2.3:a:vcd-db:vcd-db:0.972:*:*:*:*:*:*:*",
"cpe:2.3:a:vcd-db:vcd-db:0.973:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-8fvc-gf7v-rjqg
|
A vulnerability has been found in wanglongcn ltcms 1.0.20 and classified as critical. This vulnerability affects the function download of the file /api/test/download of the component API Endpoint. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 6.9 | 7.3 | null | null |
|
GHSA-qh9q-34h6-hcv9
|
Directory traversal in mkdocs
|
The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information.
|
[] | 8.7 | 7.5 | null | null |
GHSA-68gp-7m2f-pch3
|
Authentication Bypass Using an Alternate Path or Channel vulnerability in Envato Security Team Woffice allows Authentication Bypass.This issue affects Woffice: from n/a through 5.4.14.
|
[] | null | 9.8 | null | null |
|
CVE-2009-2635
|
PHP remote file inclusion vulnerability in toolbar_ext.php in the RealEstateManager (com_realestatemanager) component 1.0 Basic for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
|
[
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ordasoft:com_realestatemanager:1.0:*:basic:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2018:2469
|
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 4 security and bug fix update
|
tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins tomcat-native: Mishandled OCSP invalid response tomcat-native: Mishandled OCSP responses can allow clients to authenticate with revoked certificates
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7"
] | null | null | 7.1 | null |
CVE-2025-4775
|
WordPress Infinite Scroll – Ajax Load More <= 7.4.0.1 - Authenticated(Contributor+) Stored Cross-Site Scripting
|
The WordPress Infinite Scroll – Ajax Load More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the data-button-label HTML attribute in all versions up to, and including, 7.4.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null |
CVE-2019-6750
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Studio Photo 3.6.6. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of EZI files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7639.
|
[
"cpe:2.3:a:foxitsoftware:foxit_studio_photo:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
|
GHSA-v47j-qgrw-jfmf
|
The web management interface for Mitel 3300 Integrated Communications Platform (ICP) before 4.2.2.11 allows remote authenticated users to cause a denial of service (resource exhaustion) via a large number of active sessions, which exceeds ICP's maximum.
|
[] | null | null | null | null |
|
CVE-2017-11766
|
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8731, CVE-2017-8734, and CVE-2017-8751.
|
[
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
CVE-2008-2136
|
Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-wwmp-j24j-c23h
|
Use after free in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had convinced a user to allow for connection to debugger to potentially exploit heap corruption via a crafted HTML page.
|
[] | null | null | null | null |
|
GHSA-9mx7-g5mq-8w76
|
A vulnerability was found in Totolink N350RT 9.3.5u.6255. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/cstecgi.cgi. The manipulation leads to session expiration. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252187. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 3.7 | null | null |
|
CVE-2009-4990
|
Cross-site scripting (XSS) vulnerability in the Webform report module 5.x and 6.x for Drupal allows remote attackers to inject arbitrary web script or HTML via a submission.
|
[
"cpe:2.3:a:jrbcs:webform_report:5.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:jrbcs:webform_report:5.x-2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jrbcs:webform_report:5.x-2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:jrbcs:webform_report:5.x-2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:jrbcs:webform_report:5.x-2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:jrbcs:webform_report:6.x-1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:jrbcs:webform_report:6.x-1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:jrbcs:webform_report:6.x-1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:jrbcs:webform_report:6.x-1.x-dev:*:*:*:*:*:*:*",
"cpe:2.3:a:jrbcs:webform_report:6.x-2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:jrbcs:webform_report:6.x-2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:jrbcs:webform_report:6.x-2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:jrbcs:webform_report:6.x-2.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-w399-vx6v-6gr5
|
The get_portfolios() and get_portfolio_attributes() functions in the class-portfolio-responsive-gallery-list-table.php and class-portfolio-responsive-gallery-attributes-list-table.php files of the Portfolio Responsive Gallery WordPress plugin before 1.1.8 did not use whitelist or validate the orderby parameter before using it in SQL statements passed to the get_results() DB calls, leading to SQL injection issues in the admin dashboard
|
[] | null | null | null | null |
|
CVE-2021-26229
|
SQL injection vulnerability in SourceCodester CASAP Automated Enrollment System v 1.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to edit_stud.php.
|
[
"cpe:2.3:a:casap_automated_enrollment_system_project:casap_automated_enrollment_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-p7fh-hvqc-m963
|
Mozilla Firefox 3.5.1 and SeaMonkey 1.1.17, and Flock 2.5.1, allow context-dependent attackers to spoof the address bar, via window.open with a relative URI, to show an arbitrary file: URL after a victim has visited any file: URL, as demonstrated by a visit to a file: document written by the attacker.
|
[] | null | null | null | null |
|
GHSA-ww2r-cpjx-g6vr
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Basix NEX-Forms – Ultimate Form Builder allows Stored XSS.This issue affects NEX-Forms – Ultimate Form Builder: from n/a through 8.5.10.
|
[] | null | 6.5 | null | null |
|
GHSA-53xj-v576-3ch2
|
OS Command Injection in giting
|
giting version prior to 0.0.8 allows execution of arbritary commands. The first argument `repo` of function `pull()` is executed by the package without any validation.
|
[] | null | 9.8 | null | null |
CVE-2024-26466
|
A DOM based cross-site scripting (XSS) vulnerability in the component /dom/ranges/Range-test-iframe.html of web-platform-tests/wpt before commit 938e843 allows attackers to execute arbitrary Javascript via sending a crafted URL.
|
[] | null | 6.1 | null | null |
|
CVE-2024-51609
|
WordPress Emoji Shortcode plugin <= 1.0.0 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Elsner Technologies Pvt. Ltd. Emoji Shortcode allows Stored XSS.This issue affects Emoji Shortcode: from n/a through 1.0.0.
|
[
"cpe:2.3:a:elsner:emoji_shortcode:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
CVE-2021-24860
|
BSK PDF Manager < 3.1.2 - Admin+ SQL Injection
|
The BSK PDF Manager WordPress plugin before 3.1.2 does not validate and escape the orderby and order parameters before using them in a SQL statement, leading to a SQL injection issue
|
[
"cpe:2.3:a:bannersky:bsk_pdf_manager:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | 6.5 |
GHSA-rhf4-g6xh-53vf
|
The ElementsKit Elementor addons plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.1.0 via the generate_navigation_markup function of the Onepage Scroll module. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
|
[] | null | 8.8 | null | null |
|
GHSA-vvfq-8hwr-qm4m
|
Nokogiri updates packaged libxml2 to 2.13.6 to resolve CVE-2025-24928 and CVE-2024-56171
|
SummaryNokogiri v1.18.3 upgrades its dependency libxml2 to [v2.13.6](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.6).libxml2 v2.13.6 addresses:CVE-2025-24928described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/847CVE-2024-56171described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/828ImpactCVE-2025-24928Stack-buffer overflow is possible when reporting DTD validation errors if the input contains a long (~3kb) QName prefix.CVE-2024-56171Use-after-free is possible during validation against untrusted XML Schemas (.xsd) and, potentially, validation of untrusted documents against trusted Schemas if they make use of `xsd:keyref` in combination with recursively defined types that have additional identity constraints.
|
[] | null | null | null | null |
CVE-2023-30940
|
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-3j94-c55m-42mx
|
Cross-site scripting (XSS) vulnerability in openreport.jsp in IBM Maximo Asset Management 7.x before 7.1.1.12 IFIX.20140321-1336 and 7.5.x before 7.5.0.5 IFIX006; SmartCloud Control Desk 7.x before 7.5.0.3 and 7.5.1.x before 7.5.1.2; and Tivoli IT Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database (CCMDB) 7.x before 7.1.1.12 IFIX.20140218-1510 allows remote authenticated users to inject arbitrary web script or HTML via a crafted report parameter.
|
[] | null | null | null | null |
|
GHSA-7gj9-33j5-c3xx
|
Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[] | null | null | null | null |
|
CVE-2009-2393
|
admin/index.php in Virtuenetz Virtue Online Test Generator does not require administrative privileges, which allows remote authenticated users to have an unknown impact via unspecified vectors.
|
[
"cpe:2.3:a:virtuenetz:virtue_online_test_generator:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2024-42604
|
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_group.php?mode=delete&group_id=3
|
[
"cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2016-5361
|
programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial-responder states, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed UDP packet. NOTE: the original behavior complies with the IKEv1 protocol, but has a required security update from the libreswan vendor; as of 2016-06-10, it is expected that several other IKEv1 implementations will have vendor-required security updates, with separate CVE IDs assigned to each.
|
[
"cpe:2.3:a:libreswan:libreswan:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-26gr-c7rc-wwqj
|
Drupal 6.x before 6.34 and 7.x before 7.34 allows remote attackers to hijack sessions via a crafted request, as demonstrated by a crafted request to a server that supports both HTTP and HTTPS sessions.
|
[] | null | null | null | null |
|
GHSA-p39c-84x2-h365
|
PHP before 5.3.10 does not properly perform a temporary change to the magic_quotes_gpc directive during the importing of environment variables, which makes it easier for remote attackers to conduct SQL injection attacks via a crafted request, related to main/php_variables.c, sapi/cgi/cgi_main.c, and sapi/fpm/fpm/fpm_main.c.
|
[] | null | null | null | null |
|
GHSA-783p-hc52-7xhh
|
The default configuration of the administrative interface on the Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers does not require authentication, which allows remote attackers to modify the configuration by visiting the Advanced page. NOTE: the vendor has apparently responded by stating "for user convenience, the default setting does not require a password. However, if a user has a particular concern about third parties accessing the user's home printer, the default setting can be changed to add a password."
|
[] | null | null | null | null |
|
CVE-2024-8583
|
SourceCodester Online Bank Management System Feedback mfeedback.php cross site scripting
|
A vulnerability was found in SourceCodester Online Bank Management System and Online Bank Management System - 1.0. It has been classified as problematic. This affects an unknown part of the file /mfeedback.php of the component Feedback Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:sourcecodester:online_bank_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:online_bank_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 3.5 | 3.5 | 4 |
GHSA-44hj-4cvh-q8j8
|
Insufficient input validation in firmware update software for Intel(R) CSME before versions 12.0.45,13.0.10 and 14.0.10 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | null | null | null | null |
|
GHSA-gw37-g74p-jfg6
|
White Shark System (WSS) 1.3.2 has a SQL injection vulnerability. The vulnerability stems from the control_task.php, control_project.php, default_user.php files failing to filter the sort parameter. Remote attackers can exploit the vulnerability to obtain database sensitive information.
|
[] | null | null | null | null |
|
CVE-2007-0949
|
Stack-based buffer overflow in iTinySoft Studio Total Video Player 1.03, and possibly earlier, allows remote attackers to execute arbitrary code via a M3U playlist file that contains a long file name. NOTE: it was later reported that 1.20 and 1.30 are also affected.
|
[
"cpe:2.3:a:itinysoft_studio:total_video_player:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-mr2f-hp4h-x4x7
|
Cisco Application Velocity System (AVS) before 5.1.0 is installed with default passwords for some system accounts, which allows remote attackers to gain privileges.
|
[] | null | null | null | null |
|
CVE-2000-0480
|
Dragon telnet server allows remote attackers to cause a denial of service via a long username.
|
[
"cpe:2.3:a:shadow_op_software:dragon_server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:shadow_op_software:dragon_server:2.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2023:6785
|
Red Hat Security Advisory: Machine Deletion Remediation Operator 0.2.1 security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:workload_availability_mdr:0.2::el8"
] | null | 7.5 | null | null |
GHSA-rpx3-33f7-v6hv
|
The Responsive Blocks – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘section_tag’ parameter in all versions up to, and including, 1.9.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null |
|
GHSA-qrxg-6w43-8h52
|
In the Linux kernel, the following vulnerability has been resolved:IB/hfi1: Restore allocated resources on failed copyoutFix a resource leak if an error occurs.
|
[] | null | null | null | null |
|
CVE-2023-25833
|
BUG-000155004 HTML injection issue in Portal for ArcGIS.
|
There is an HTML injection vulnerability in Esri Portal for ArcGIS versions 11.0 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim’s browser (no stateful change made or customer data rendered).
|
[
"cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
RHSA-2025:3698
|
Red Hat Security Advisory: opentelemetry-collector security update
|
golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.5 | null | null |
CVE-2023-20891
|
VMware Tanzu Application Service for VMs and Isolation Segment information disclosure vulnerability
|
The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs. A malicious non-admin user who has access to the platform system audit logs can access hex encoded CF API admin credentials and can push new malicious versions of an application. In a default deployment non-admin users do not have access to the platform system audit logs.
|
[
"cpe:2.3:a:vmware:isolation_segment:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:tanzu_application_service_for_virtual_machines:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-7v39-pqxg-4xwf
|
The issue was addressed with improved checks. This issue is fixed in iOS 17.2 and iPadOS 17.2. An attacker in a privileged network position may be able to perform a denial-of-service attack using crafted Bluetooth packets.
|
[] | null | 4.8 | null | null |
|
GHSA-9pg2-h843-82vg
|
The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 2.8.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability exists due to an incomplete fix for CVE-2024-3307.
|
[] | null | 6.4 | null | null |
|
GHSA-hw6h-8grh-49hp
|
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in OpenNebula OpenNebula core on Linux allows Remote Code Inclusion.
|
[] | null | 9.8 | null | null |
|
CVE-2025-38266
|
pinctrl: mediatek: eint: Fix invalid pointer dereference for v1 platforms
|
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: mediatek: eint: Fix invalid pointer dereference for v1 platforms
Commit 3ef9f710efcb ("pinctrl: mediatek: Add EINT support for multiple
addresses") introduced an access to the 'soc' field of struct
mtk_pinctrl in mtk_eint_do_init() and for that an include of
pinctrl-mtk-common-v2.h.
However, pinctrl drivers relying on the v1 common driver include
pinctrl-mtk-common.h instead, which provides another definition of
struct mtk_pinctrl that does not contain an 'soc' field.
Since mtk_eint_do_init() can be called both by v1 and v2 drivers, it
will now try to dereference an invalid pointer when called on v1
platforms. This has been observed on Genio 350 EVK (MT8365), which
crashes very early in boot (the kernel trace can only be seen with
earlycon).
In order to fix this, since 'struct mtk_pinctrl' was only needed to get
a 'struct mtk_eint_pin', make 'struct mtk_eint_pin' a parameter
of mtk_eint_do_init() so that callers need to supply it, removing
mtk_eint_do_init()'s dependency on any particular 'struct mtk_pinctrl'.
|
[] | null | null | null | null |
CVE-2025-31080
|
WordPress HTML Forms plugin <= 1.5.1 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Link Software LLC HTML Forms allows Stored XSS. This issue affects HTML Forms: from n/a through 1.5.1.
|
[] | null | 7.1 | null | null |
CVE-2010-5140
|
wxBitcoin and bitcoind before 0.3.13 do not properly handle bitcoins associated with Bitcoin transactions that have zero confirmations, which allows remote attackers to cause a denial of service (invalid-transaction flood) by sending low-valued transactions without transaction fees.
|
[
"cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:wxbitcoin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:wxbitcoin:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:wxbitcoin:0.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:wxbitcoin:0.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:wxbitcoin:0.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:wxbitcoin:0.3.11:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-3qxr-2r44-6w45
|
An issue in the component /logins of oasys v1.1 allows attackers to access sensitive information via a burst attack.
|
[] | null | 7.5 | null | null |
|
CVE-2011-3100
|
Google Chrome before 19.0.1084.46 does not properly draw dash paths, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-j622-84gv-vx9m
|
Software installed and run as a non-privileged user may conduct improper GPU system calls to access OOB kernel memory.
|
[] | null | 7.8 | null | null |
|
GHSA-p9q3-w9jq-7p9j
|
gnome-screensaver 2.28.0 does not resume adherence to its activation settings after an inhibiting application becomes unavailable on the session bus, which allows physically proximate attackers to access an unattended workstation on which screen locking had been intended.
|
[] | null | null | null | null |
|
CVE-2018-20895
|
In cPanel before 71.9980.37, API tokens retain ACLs after those ACLs are removed from the corresponding accounts (SEC-393).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 |
|
GHSA-7r46-fpc4-h7v3
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in PluginOps Landing Page Builder allows PHP Local File Inclusion.This issue affects Landing Page Builder: from n/a through 1.5.2.0.
|
[] | null | 7.5 | null | null |
|
CVE-2023-42363
|
A use-after-free vulnerability was discovered in xasprintf function in xfuncs_printf.c:344 in BusyBox v.1.36.1.
|
[
"cpe:2.3:a:busybox:busybox:1.36.1:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2013-4947
|
Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors.
|
[
"cpe:2.3:a:sawmill:sawmill:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.5:b3:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.5:b4:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.5:b5:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sawmill:sawmill:8.6.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-8jqr-962c-69rw
|
IBM Security Verify Access 10.0.0.0 through 10.0.7.1, under certain configurations, could allow an unauthenticated attacker to cause a denial of service due to asymmetric resource consumption. IBM X-Force ID: 287615.
|
[] | null | 5.3 | null | null |
|
CVE-2022-41184
|
Due to lack of proper memory management, when a victim opens a manipulated Windows Cursor File (.cur, ico.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.
|
[
"cpe:2.3:a:sap:3d_visual_enterprise_author:9.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
RHSA-2006:0749
|
Red Hat Security Advisory: tar security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2006-0477
|
Buffer overflow in git-checkout-index in GIT before 1.1.5 allows remote attackers to execute arbitrary code via an index file with a long symbolic link.
|
[
"cpe:2.3:a:git:git:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:git:git:1.1.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.