id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-c3xg-7w53-6ghf
|
SnapCenter versions 4.8 through 4.9 are susceptible to a
vulnerability which may allow an authenticated SnapCenter Server user to
become an admin user on a remote system where a SnapCenter plug-in has
been installed.
|
[] | null | 8.8 | null | null | null |
|
GHSA-gmjx-74cx-5p3f
|
A denial of service (DoS) vulnerability was found in OpenShift. This flaw allows attackers to exploit the GraphQL batching functionality. The vulnerability arises when multiple queries can be sent within a single request, enabling an attacker to submit a request containing thousands of aliases in one query. This issue causes excessive resource consumption, leading to application unavailability for legitimate users.
|
[] | null | null | 6.5 | null | null |
|
GHSA-g2xw-jrgp-4j4f
|
MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM or Zend PHP, allows remote attackers to cause a denial of service ("quadratic blowup" and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, a different vulnerability than CVE-2015-2942.
|
[] | null | null | null | null | null |
|
GHSA-57p4-7ph9-v9qx
|
Huawei P9 smartphones with the versions before EVA-AL10C00B399SP02 have an information disclosure vulnerability. The software does not properly protect certain resource which can be accessed by multithreading. An attacker tricks the user who has root privilege to install a crafted application, successful exploit could result in kernel information disclosure.
|
[] | null | null | 5.5 | null | null |
|
GHSA-w7j2-4h84-4q9m
|
Dragon telnet server allows remote attackers to cause a denial of service via a long username.
|
[] | null | null | null | null | null |
|
CVE-2017-5857
|
Memory leak in the virgl_cmd_resource_unref function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_UNREF commands sent without detaching the backing storage beforehand.
|
[
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.9 | null |
|
CVE-2017-3619
|
Vulnerability in the Automatic Service Request (ASR) component of Oracle Support Tools (subcomponent: ASR Manager). The supported version that is affected is Prior to 5.7. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Automatic Service Request (ASR) executes to compromise Automatic Service Request (ASR). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Automatic Service Request (ASR) accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
|
[
"cpe:2.3:a:oracle:automatic_service_request:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 | null |
|
GHSA-22qm-pq7c-f85x
|
Lack of check in length before using memcpy in WLAN function can lead to OOB access in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCS605, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24, SXR1130
|
[] | null | null | 9.8 | null | null |
|
GHSA-fr4x-v988-5548
|
Improper restriction of XML external entity reference (XXE) vulnerability exists in FRENIC RHC Loader v1.1.0.3 and earlier. If a user opens a specially crafted project file, sensitive information on the system where the affected product is installed may be disclosed.
|
[] | null | 5.5 | null | null | null |
|
CVE-2020-24903
|
Cute Editor for ASP.NET 6.4 is vulnerable to reflected cross-site scripting (XSS) caused by improper validation of user supplied input. A remote attacker could exploit this vulnerability using a specially crafted URL to execute a script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
|
[
"cpe:2.3:a:cutesoft:cute_editor:6.4:*:*:*:*:asp.net:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-pv6w-mqrp-629m
|
NVIDIA libnvomx contains a possible out of bounds write due to a missing bounds check which could lead to local escalation of privilege. This issue is rated as high. Product: Android. Version: N/A. Android: A-64893247. Reference: N-CVE-2017-6286.
|
[] | null | null | 7.8 | null | null |
|
CVE-2023-4958
|
Stackrox: missing http security headers allows for clickjacking in web ui
|
In Red Hat Advanced Cluster Security (RHACS), it was found that some security related HTTP headers were missing, allowing an attacker to exploit this with a clickjacking attack. An attacker could exploit this by convincing a valid RHACS user to visit an attacker-controlled web page, that deceptively points to valid RHACS endpoints, hijacking the user's account permissions to perform other actions.
|
[
"cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:kubernates:*:*",
"cpe:/a:redhat:advanced_cluster_security:4.2::el8",
"cpe:/a:redhat:advanced_cluster_security:3"
] | null | 6.1 | null | null | null |
CVE-2024-52432
|
WordPress NIX Anti-Spam Light plugin <= 0.0.4 - PHP Object Injection vulnerability
|
Deserialization of Untrusted Data vulnerability in NIX Solutions Ltd NIX Anti-Spam Light allows Object Injection.This issue affects NIX Anti-Spam Light: from n/a through 0.0.4.
|
[
"cpe:2.3:a:nix_solutions:nix_anti-spam_light:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nixsolutions:nix_anti-spam_light:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null | null |
CVE-2004-0627
|
The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string.
|
[
"cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2025-1592
|
SourceCodester Best Employee Management System Add Role Page Role.php cross site scripting
|
A vulnerability was found in SourceCodester Best Employee Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/Operations/Role.php of the component Add Role Page. The manipulation of the argument assign_name/description leads to cross site scripting. The attack may be launched remotely.
|
[] | 4.8 | 2.4 | 2.4 | 3.3 | null |
CVE-2011-4624
|
Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.
|
[
"cpe:2.3:a:codeasily:grand_flagallery:*:*:*:*:*:wordpress:*:*"
] | null | null | null | 4.3 | null |
|
RHSA-2021:5081
|
Red Hat Security Advisory: mailman:2.1 security update
|
mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8 | null | null | null |
ICSA-18-151-01
|
ICSA-18-151-01_Delta Industrial Automation DOPSoft
|
The application performs read operations on a memory buffer where the position can be determined by a value read from a .dpa file. This may cause improper restriction of operations within the bounds of the memory buffer, allow remote code execution, alter the intended control flow, allow reading of sensitive information, or cause the application to crash.CVE-2018-10623 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
|
[] | null | null | 7.3 | null | null |
CVE-2014-1943
|
Fine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file.
|
[
"cpe:2.3:a:fine_free_file_project:fine_free_file:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2002-1496
|
Heap-based buffer overflow in Null HTTP Server 0.5.0 and earlier allows remote attackers to execute arbitrary code via a negative value in the Content-Length HTTP header.
|
[
"cpe:2.3:a:nulllogic:null_httpd:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-6xp7-6pxv-jccr
|
A vulnerability in the embedded test subsystem of Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers could allow an authenticated, local attacker to write arbitrary values to arbitrary locations in the memory space of an affected device. The vulnerability is due to the presence of certain test commands that were intended to be available only in internal development builds of the affected software. An attacker could exploit this vulnerability by using these commands on an affected device. A successful exploit could allow the attacker to write arbitrary values to arbitrary locations in the memory space of the affected device.
|
[] | null | null | 6.7 | null | null |
|
CVE-2013-4197
|
member_portrait.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote authenticated users to modify or delete portraits of other users via unspecified vectors.
|
[
"cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*"
] | null | null | null | 5.5 | null |
|
GHSA-jp4j-77rm-m7cf
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: RBR). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | 4.9 | null | null |
|
CVE-2010-4918
|
PHP remote file inclusion vulnerability in iJoomla Magazine (com_magazine) component 3.0.1 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the config parameter to magazine.functions.php.
|
[
"cpe:2.3:a:ijoomla:com_magazine:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-42247
|
pfSense v2.5.2 was discovered to contain a cross-site scripting (XSS) vulnerability in the browser.php component. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into a file name.
|
[
"cpe:2.3:a:pfsense:pfsense:2.5.2:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2024-9357
|
xili-tidy-tags <= 1.12.04 - Reflected Cross-Site Scripting
|
The xili-tidy-tags plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'action' parameter in all versions up to, and including, 1.12.04 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
CVE-2024-28921
|
Secure Boot Security Feature Bypass Vulnerability
|
Secure Boot Security Feature Bypass Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
GHSA-fr26-pfff-8v8q
|
Use after free vulnerability in sdp_mm_set_process_sensitive function of sdpmm driver prior to SMR Sep-2022 Release 1 allows attackers to perform malicious actions.
|
[] | null | 7.8 | null | null | null |
|
GHSA-whx4-pff6-8f75
|
Cross-site scripting (XSS) vulnerability in myBloggie 2.1.1 allows remote attackers to inject arbitrary web script or HTML via the comments.
|
[] | null | null | null | null | null |
|
CVE-2007-0790
|
Heap-based buffer overflow in SmartFTP 2.0.1002 allows remote FTP servers to execute arbitrary code via a large banner.
|
[
"cpe:2.3:a:smartftp:smartftp:2.0.1002:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-jg9m-4m4c-v7c8
|
KERUI HD 3MP 1080P Tuya Camera 1.0.4 has a command injection vulnerability in the module that connects to the local network via a QR code. This vulnerability allows an attacker to create a custom, unauthenticated QR code and abuse one of the parameters, either SSID or PASSWORD, in the JSON data contained within the QR code. By that, the attacker can execute arbitrary code on the camera.
|
[] | null | 8.4 | null | null | null |
|
CVE-2020-27276
|
SOOIL Developments Co Ltd DiabecareRS,AnyDana-i & AnyDana-A, the communication protocol of the insulin pump and its AnyDana-i & AnyDana-A mobile apps doesn't use adequate measures to authenticate the communicating entities before exchanging keys, which allows unauthenticated, physically proximate attackers to eavesdrop the authentication sequence via Bluetooth Low Energy.
|
[
"cpe:2.3:o:sooil:anydana-a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sooil:anydana-a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sooil:anydana-i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sooil:anydana-i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sooil:diabecare_rs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sooil:diabecare_rs:-:*:*:*:*:*:*:*"
] | null | 5.7 | null | 2.9 | null |
|
CVE-2018-3076
|
Vulnerability in the PeopleSoft Enterprise CS Financial Aid component of Oracle PeopleSoft Products (subcomponent: ISIR Processing). Supported versions that are affected are 9.0 and 9.2. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CS Financial Aid. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise CS Financial Aid accessible data. CVSS 3.0 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_cs_financial_aid:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_cs_financial_aid:9.2:*:*:*:*:*:*:*"
] | null | null | 2.7 | 4 | null |
|
CVE-2017-11575
|
FontForge 20161012 is vulnerable to a buffer over-read in strnmatch (char.c) resulting in DoS or code execution via a crafted otf file, related to a call from the readttfcopyrights function in parsettf.c.
|
[
"cpe:2.3:a:fontforge:fontforge:20161012:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
CVE-2023-44042
|
A stored cross-site scripting (XSS) vulnerability in /settings/index.php of Black Cat CMS 1.4.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website header parameter.
|
[
"cpe:2.3:a:blackcat-cms:blackcat_cms:1.4.1:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
CVE-2025-38272
|
net: dsa: b53: do not enable EEE on bcm63xx
|
In the Linux kernel, the following vulnerability has been resolved:
net: dsa: b53: do not enable EEE on bcm63xx
BCM63xx internal switches do not support EEE, but provide multiple RGMII
ports where external PHYs may be connected. If one of these PHYs are EEE
capable, we may try to enable EEE for the MACs, which then hangs the
system on access of the (non-existent) EEE registers.
Fix this by checking if the switch actually supports EEE before
attempting to configure it.
|
[] | null | null | null | null | null |
CVE-2024-35090
|
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the findPage function in SysUreportFileMapper.xml.
|
[
"cpe:2.3:a:j2eefast:j2eefast:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
|
RHSA-2020:0813
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
|
undertow: AJP File Read/Inclusion Vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | 7.6 | null | null | null |
CVE-2024-33864
|
An issue was discovered in linqi before 1.4.0.1 on Windows. There is SSRF via Document template generation; i.e., via remote images in process creation, file inclusion, and PDF document generation via malicious JavaScript.
|
[
"cpe:2.3:a:linqi:linqi:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
|
GHSA-r9wv-hvx2-jx2c
|
IBM Content Navigator 3.0.CD could allow a malicious user to cause a denial of service due to improper input validation. IBM X-Force ID: 200968.
|
[] | null | null | null | null | null |
|
CVE-2018-10881
|
A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | null | 4.2 | null | null |
|
GHSA-q568-w7cw-qc3x
|
Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the ssid parameter at /goform/fast_setting_wifi_set.
|
[] | null | 7.5 | null | null | null |
|
CVE-2023-1385
|
Improper JPAKE implementation allows offline PIN brute-forcing due to the initialization of random values to a known value, which leads to unauthorized authentication to amzn.lightning services.
This issue affects:
Amazon Fire TV Stick 3rd gen versions prior to 6.2.9.5.
Insignia TV with FireOS 7.6.3.3.
|
[
"cpe:2.3:o:amazon:fire_os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amazon:fire_tv_stick_3rd_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bestbuy:insignia_tv:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
|
CVE-2023-39665
|
D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the acStack_50 parameter.
|
[
"cpe:2.3:h:d-link:dir-868l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-868l_firmware:1.12_eu_multi_20170316:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-868l:a:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2020-0475
|
In createInputConsumer of WindowManagerService.java, there is a possible way to block and intercept input events due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-162324374
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
GHSA-m2v2-9gxp-2r53
|
parisneo/lollms-webui version V13 (feather) suffers from a Server-Side Request Forgery (SSRF) vulnerability in the `POST /api/proxy` REST API. Attackers can exploit this vulnerability to abuse the victim server's credentials to access unauthorized web resources by specifying the JSON parameter `{"url":"http://steal.target"}`. Existing security mechanisms such as `forbid_remote_access(lollmsElfServer)`, `lollmsElfServer.config.headless_server_mode`, and `check_access(lollmsElfServer, request.client_id)` do not protect against this vulnerability.
|
[] | null | null | 7.5 | null | null |
|
RHSA-2013:0700
|
Red Hat Security Advisory: jenkins security update
|
maven-wagon: all SSL certificate checking is disabled by default
|
[
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null | null |
GHSA-58pg-75f2-3jxj
|
Authenticated users with Administrator or Developer roles may execute OS commands by SPEL Expression in Spring beans. SPEL Expression does not have security restrictions, which will cause attackers to execute arbitrary commands remotely (RCE).
|
[] | null | null | null | null | null |
|
CVE-2006-4938
|
help.php in Moodle before 1.6.2 does not check the existence of certain help files before including them, which might allow remote authenticated users to obtain the path in an error message.
|
[
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.0:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-f57q-wp5c-hvr2
|
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where an out of bounds array access may lead to denial of service or information disclosure.
|
[] | null | 6.1 | null | null | null |
|
CVE-2022-28397
|
An arbitrary file upload vulnerability in the file upload module of Ghost CMS v4.42.0 allows attackers to execute arbitrary code via a crafted file. NOTE: Vendor states as detailed in Ghost's security documentation, files can only be uploaded and published by trusted users, this is intentional
|
[
"cpe:2.3:a:ghost:ghost:4.42.0:*:*:*:*:node.js:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2012-3010
|
rifsrvd.exe in the Remote Interface Service in GE Intelligent Platforms Proficy Real-Time Information Portal 2.6 through 3.5 SP1 allows remote attackers to cause a denial of service (memory corruption and service crash) or possibly execute arbitrary code via long input data, a different vulnerability than CVE-2012-3021 and CVE-2012-3026.
|
[
"cpe:2.3:a:ge:intelligent_platforms_proficy_real-time_information_portal:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ge:intelligent_platforms_proficy_real-time_information_portal:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ge:intelligent_platforms_proficy_real-time_information_portal:3.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ge:intelligent_platforms_proficy_real-time_information_portal:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ge:intelligent_platforms_proficy_real-time_information_portal:3.5:sp1:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-7vrg-mmxg-pgfj
|
GitLab 10.8 through 12.9 has a vulnerability that allows someone to mirror a repository even if the feature is not activated.
|
[] | null | null | null | null | null |
|
GHSA-66f7-rp5w-cxgr
|
Multiple untrusted search path vulnerabilities in Autodesk Design Review 2011 11.0.0.86 allow local users to gain privileges via a Trojan horse (1) dwmapi.dll, (2) whiptk_wt.7.12.601.dll, or (3) xaml_wt.7.6.0.dll file in the current working directory, as demonstrated by a directory that contains a .dwf file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2020-10056
|
A vulnerability has been identified in License Management Utility (LMU) (All versions < V2.4). The lmgrd service of the affected application is executed with local SYSTEM privileges on the server while its configuration can be modified by local users. The vulnerability could allow a local authenticated attacker to execute arbitrary commands on the server with local SYSTEM privileges.
|
[
"cpe:2.3:a:siemens:license_management_utility:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
GHSA-9h24-8pw7-c9p6
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Black and White Digital Ltd AgendaPress – Easily Publish Meeting Agendas and Programs on WordPress allows Stored XSS.This issue affects AgendaPress – Easily Publish Meeting Agendas and Programs on WordPress: from n/a through 1.0.8.
|
[] | null | 6.5 | null | null | null |
|
CVE-2021-21436
|
Agent is able to link customer's Config Items without permission
|
Agents are able to see and link Config Items without permissions, which are defined in General Catalog. This issue affects: OTRS AG OTRSCIsInCustomerFrontend 7.0.x version 7.0.14 and prior versions.
|
[
"cpe:2.3:a:otrs:cis_in_customer_frontend:*:*:*:*:*:*:*:*"
] | null | 3.5 | null | null | null |
RHBA-2023:1507
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.12.10 packages update
|
python-werkzeug: high resource usage when parsing multipart form data with many fields
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9",
"cpe:/a:redhat:openshift_ironic:4.12::el9"
] | null | 7.5 | null | null | null |
GHSA-g394-5cmh-8vvj
|
Vulnerability in the Oracle iSupport product of Oracle E-Business Suite (component: Profile). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iSupport. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iSupport, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iSupport accessible data as well as unauthorized update, insert or delete access to some of Oracle iSupport accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[] | null | null | null | null | null |
|
GHSA-796j-2mh8-qff6
|
The mono package before 6.8.0.105+dfsg-3.3 for Debian allows arbitrary code execution because the application/x-ms-dos-executable MIME type is associated with an un-sandboxed Mono CLR interpreter.
|
[] | null | 8.8 | null | null | null |
|
RHSA-2017:1836
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0.7
|
Artemis: Deserialization of untrusted input vulnerability jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
] | null | null | 8.1 | null | null |
CVE-2014-0988
|
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode parameter.
|
[
"cpe:2.3:a:advantech:advantech_webaccess:7.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2023-43641
|
libcue vulnerable to out-of-bounds array access
|
libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.
|
[
"cpe:2.3:a:lipnitsk:libcue:-:*:*:*:*:*:*:*",
"cpe:2.3:a:lipnitsk:libcue:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
CVE-2022-44591
|
WordPress Anthologize plugin <= 0.8.0 - Auth. Stored Cross-Site Scripting (XSS) vulnerability
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Anthologize plugin <= 0.8.0 on WordPress.
|
[
"cpe:2.3:a:anthologize_project:anthologize:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null | null |
GHSA-gxhf-xj94-x8r3
|
Microsoft SharePoint Server Information Disclosure Vulnerability
|
[] | null | 7.5 | null | null | null |
|
CVE-1999-1004
|
Buffer overflow in the POP server POProxy for the Norton Anti-Virus protection NAV2000 program via a large USER command.
|
[
"cpe:2.3:a:symantec:norton_antivirus:2000:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2012-3425
|
The png_push_read_zTXt function in pngpread.c in libpng 1.0.x before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.26:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.28:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.29:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.31:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.32:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.33:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.34:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.35:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.36:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.37:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.38:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.39:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.40:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.41:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.42:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.43:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.43:devel:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.44:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.45:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.45:devel:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.46:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.46:devel:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.47:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.47:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.48:betas:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libpng:1.2.2-16:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libpng:1.2.2-20:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.7:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.8:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.9:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.5.10:beta:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.46:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.47:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.48:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.53:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.55:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.55:rc01:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.56:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.56:devel:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.57:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.57:rc01:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2015-6763
|
Multiple unspecified vulnerabilities in Google Chrome before 46.0.2490.71 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
RHSA-2016:0367
|
Red Hat Security Advisory: rabbitmq-server security and bugfix update
|
RabbitMQ: /api/... XSS vulnerability RabbitMQ: /api/definitions response splitting vulnerability
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null | null |
GHSA-g4fg-5mvh-6qmq
|
The Photo Gallery by 10Web WordPress plugin before 1.8.33 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] | null | 3.5 | null | null | null |
|
GHSA-c359-wq75-m99w
|
Observable discrepancies in the login process allow an attacker to guess legitimate user names registered in the BMC. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
|
[] | null | 5.3 | null | null | null |
|
GHSA-xc8q-qrg6-rp5r
|
Buffer overflow in AspUpload.dll in Persits Software AspUpload before 1.4.0.2 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long argument in the HTTP request.
|
[] | null | null | null | null | null |
|
CVE-2013-3163
|
Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
|
[
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
CVE-2017-17299
|
Huawei AR120-S V200R006C10, V200R007C00, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C02, AR1200-S V200R006C10, V200R007C00, V200R008C20, AR150 V200R006C10, V200R007C00, V200R007C02, AR150-S V200R006C10, V200R007C00, AR160 V200R006C10, V200R006C12, V200R007C00S, V200R007C02, AR200 V200R006C10, V200R007C00, AR200-S V200R006C10, V200R007C00, AR2200 V200R006C10, V200R006C13, V200R006C16, V200R007C00, V200R007C02, AR2200-S V200R006C10, V200R007C00, V200R008C20, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C02, AR3600 V200R006C10, V200R007C00, AR510 V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00, IPS Module V500R001C30, NIP6300 V500R001C30, NetEngine16EX V200R006C10, V200R007C00 have an insufficient input validation vulnerability. An unauthenticated, remote attacker may send crafted IKE V2 messages to the affected products. Due to the insufficient validation of the messages, successful exploit will cause invalid memory access and result in a denial of service on the affected products.
|
[
"cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r006c13:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c02:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c02:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r006c12:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c00s:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c02:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r006c13:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r006c16:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c02:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c11:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c02:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r006c12:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r006c13:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r006c15:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r006c16:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r006c17:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar510_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2023-26921
|
OS Command Injection vulnerability in quectel AG550QCN allows attackers to execute arbitrary commands via ql_atfwd.
|
[
"cpe:2.3:o:quectel:ag550qcn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:quectel:ag550qcn:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-c76p-cr59-2v5j
|
Releases prior to VMware vRealize Operations Tenant App 8.6 contain an Information Disclosure Vulnerability.
|
[] | null | 7.5 | null | null | null |
|
CVE-2009-0760
|
Team Board 1.x and 2.x stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing credentials via a direct request for data/team.mdb.
|
[
"cpe:2.3:a:team5:team_board:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:team5:team_board:2.0.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-w2hq-6wrg-qrh6
|
Allegra extractFileFromZip Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Authentication is required to exploit this vulnerability.The specific flaw exists within the implementation of the extractFileFromZip method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26524.
|
[] | null | null | 7.2 | null | null |
|
GHSA-6mgc-x488-j94w
|
Improper access control in some firmware package and LED mode toggle tool for some Intel(R) PCIe Switch software before version MR4_1.0b1 may allow a privileged user to potentially enable escalation of privilege via local access.
|
[] | 7 | 6.5 | null | null | null |
|
GHSA-q69f-x478-xp8g
|
Out-of-bounds write in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow an authenticated user to potentially enable denial of service via local access.
|
[] | null | 6.1 | null | null | null |
|
CVE-2019-14768
|
An Arbitrary File Upload issue in the file browser of DIMO YellowBox CRM before 6.3.4 allows a standard authenticated user to deploy a new WebApp WAR file to the Tomcat server via Path Traversal, allowing remote code execution with SYSTEM privileges.
|
[
"cpe:2.3:a:dimo-crm:yellowbox_crm:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9 | null |
|
CVE-2018-0011
|
Junos Space: Reflected XSS vulnerability in Junos Space management interface
|
A reflected cross site scripting (XSS) vulnerability in Junos Space may potentially allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a session, and to perform administrative actions on the Junos Space network management device.
|
[
"cpe:2.3:a:juniper:junos_space:13.3:r1:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:13.3:r2:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:13.3:r4:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:14.1:r1:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:14.1:r2:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:14.1:r3:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:15.1:r1:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:15.1:r2:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:15.1:r3:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:15.2:r1:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:15.2:r2:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:16.1:r1:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:16.1:r2:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:16.1:r3:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:17.1:r1:*:*:*:*:*:*"
] | null | null | 5.4 | null | null |
GHSA-j4q5-px5w-x7c7
|
IBM Security Access Manager Appliance 9.0.1.0, 9.0.2.0, 9.0.3.0, 9.0.4.0, and 9.0.5.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 150018.
|
[] | null | null | 7.5 | null | null |
|
GHSA-8x53-cjgc-4hcj
|
An issue was discovered in libgig 4.1.0. There is an out-of-bounds write in the function DLS::Info::SaveString in DLS.cpp.
|
[] | null | null | 8.8 | null | null |
|
CVE-2020-3418
|
Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family Improper Access Control Vulnerability
|
A vulnerability in Cisco IOS XE Wireless Controller Software for Cisco Catalyst 9800 Series Routers could allow an unauthenticated, adjacent attacker to send ICMPv6 traffic prior to the client being placed into RUN state. The vulnerability is due to an incomplete access control list (ACL) being applied prior to RUN state. An attacker could exploit this vulnerability by connecting to the associated service set identifier (SSID) and sending ICMPv6 traffic. A successful exploit could allow the attacker to send ICMPv6 traffic prior to RUN state.
|
[
"cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*"
] | null | null | 4.7 | null | null |
CVE-2018-12089
|
In Octopus Deploy version 2018.5.1 to 2018.5.7, a user with Task View is able to view a password for a Service Fabric Cluster, when the Service Fabric Cluster target is configured in Azure Active Directory security mode and a deployment is executed with OctopusPrintVariables set to True. This is fixed in 2018.6.0.
|
[
"cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 3.5 | null |
|
CVE-2019-1676
|
Cisco Meeting Server SIP Processing Denial of Service Vulnerability
|
A vulnerability in the Session Initiation Protocol (SIP) call processing of Cisco Meeting Server (CMS) software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of the Cisco Meeting Server. The vulnerability is due to insufficient validation of Session Description Protocol (SDP) messages. An attacker could exploit this vulnerability by sending a crafted SDP message to the CMS call bridge. An exploit could allow the attacker to cause the CMS to reload, causing a DoS condition for all connected clients. Versions prior to 2.3.9 are affected.
|
[
"cpe:2.3:a:cisco:meeting_server:*:*:*:*:*:*:*:*"
] | null | null | 6.8 | null | null |
GHSA-p84g-j2gh-83g3
|
TYPO3 possible cache poisoning on the homepage when anchors are used
|
A request URL with arbitrary arguments, but still pointing to the home page of a TYPO3 installation can be cached if the configuration option config.prefixLocalAnchors is used with the values "all" or "cached". The impact of this vulnerability is that unfamiliar looking links to the home page can end up in the cache, which leads to a reload of the page in the browser when section links are followed by web page visitors, instead of just directly jumping to the requested section of the page. TYPO3 versions 4.6.x and higher are only affected if the homepage is not a shortcut to a different page.
|
[] | null | null | null | null | null |
GHSA-8mwh-r4r7-636g
|
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."
|
[] | null | 8.8 | null | null | null |
|
CVE-2024-4509
|
Ruijie RG-UAC add_commit.php os command injection
|
A vulnerability was found in Ruijie RG-UAC up to 20240428. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /view/IPV6/naborTable/add_commit.php. The manipulation of the argument ip_addr/mac_addr leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263113 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:ruijie:rg_uac:20240428:*:*:*:*:*:*:*"
] | null | 4.7 | 4.7 | 5.8 |
https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-add_commit.php.pdf
|
GHSA-qffq-v3jw-w9v7
|
The "Your Legacy Federal Credit Union Mobile Banking" by Your Legacy Federal Credit Union app 3.0.1 -- aka your-legacy-federal-credit-union-mobile-banking/id919131389 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | 5.9 | null | null |
|
CVE-2020-27196
|
An issue was discovered in PlayJava in Play Framework 2.6.0 through 2.8.2. The body parsing of HTTP requests eagerly parses a payload given a Content-Type header. A deep JSON structure sent to a valid POST endpoint (that may or may not expect JSON payloads) causes a StackOverflowError and Denial of Service.
|
[
"cpe:2.3:a:lightbend:play_framework:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2020-0448
|
In getPhoneAccountsForPackage of TelecomServiceImpl.java, there is a possible way to access a tracking identifier due to a missing permission check. This could lead to local information disclosure of the identifier, which could be used to track an account across devices, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-153995334
|
[
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
GHSA-293j-x829-fj24
|
The i-recommend-this plugin before 3.7.3 for WordPress has SQL injection.
|
[] | null | null | 9.8 | null | null |
|
CVE-2022-30190
|
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
|
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights.
Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2009-3488
|
Cross-site scripting (XSS) vulnerability in the Bibliography (aka Biblio) module 6.x-1.6 for Drupal allows remote authenticated users, with certain content-creation privileges, to inject arbitrary web script or HTML via the Title field, probably a different vulnerability than CVE-2009-3479.
|
[
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ron_jerome:bibliography:6.x-1.6:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
RHSA-2011:0306
|
Red Hat Security Advisory: samba3x security update
|
Samba unsafe fd_set usage
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-8c55-2mpc-h6vf
|
ZNC before 1.7.1-rc1 is prone to a path traversal flaw via ../ in a web skin name to access files outside of the intended skins directories.
|
[] | null | null | 5.3 | null | null |
|
GHSA-q8pc-q7mj-47x6
|
net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.
|
[] | null | null | 7.8 | null | null |
|
RHSA-2025:11035
|
Red Hat Security Advisory: lz4 security update
|
lz4: heap-based buffer overflow in LZ4_write32
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.1 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.