id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2025-32685
WordPress WP Inquiries <= 0.2.1 - SQL Injection Vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aristo Rinjuang WP Inquiries allows SQL Injection. This issue affects WP Inquiries: from n/a through 0.2.1.
[]
null
7.6
null
null
null
RHSA-2023:3360
Red Hat Security Advisory: apr-util security update
apr-util: out-of-bounds writes in the apr_base64
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
6.5
null
null
null
CVE-2001-1041
oracle program in Oracle 8.0.x, 8.1.x and 9.0.1 allows local users to overwrite arbitrary files via a symlink attack on an Oracle log trace (.trc) file that is created in an alternate home directory identified by the ORACLE_HOME environment variable.
[ "cpe:2.3:a:oracle:database_server:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:9.0.1:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-gr52-482f-6whp
A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a server-side request forgery (SSRF) attack through an affected device.This vulnerability is due to improper input validation for specific HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected device.
[]
null
5.8
null
null
null
CVE-2014-2715
Multiple cross-site scripting (XSS) vulnerabilities in vwrooms\templates\logout.tpl.php in the VideoWhisper Webcam plugins for Drupal 7.x allow remote attackers to inject arbitrary web script or HTML via the (1) module or (2) message parameter to index.php.
[ "cpe:2.3:a:videowhisper:videowhisper:7.x-1.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:videowhisper:videowhisper:7.x-1.1:*:*:*:*:drupal:*:*", "cpe:2.3:a:videowhisper:videowhisper:7.x-1.3:*:*:*:*:drupal:*:*", "cpe:2.3:a:videowhisper:videowhisper:7.x-1.x:dev:*:*:*:drupal:*:*" ]
null
null
null
4.3
null
CVE-2024-51760
WordPress Dashing Memberships plugin <= 1.1 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in RistrettoApps Dashing Memberships allows Reflected XSS.This issue affects Dashing Memberships: from n/a through 1.1.
[]
null
7.1
null
null
null
CVE-2023-5399
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause tampering of files on the personal computer running C-Bus when using the File Command.
[ "cpe:2.3:a:schneider-electric:spacelogic_c-bus_toolkit:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2020-11942
An issue was discovered in Open-AudIT 3.2.2. There are Multiple SQL Injections.
[ "cpe:2.3:a:opmantek:open-audit:3.2.2:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2025-27754
Extension - rsjoomla.com - A stored XSS vulnerability RSBlog! component 1.11.6 - 1.14.4 for Joomla
A stored XSS vulnerability in RSBlog! component 1.11.6 - 1.14.4 for Joomla was discovered. The vulnerability allows authenticated users to inject malicious JavaScript into the plugin's resource. The injected payload is stored by the application and later executed when other users view the affected content.
[]
null
6.5
null
null
null
GHSA-hvp4-qmrj-gvhf
Buffer Overflow vulnerability in function bitwriter_grow_ in flac before 1.4.0 allows remote attackers to run arbitrary code via crafted input to the encoder.
[]
null
9.8
null
null
null
GHSA-rvqq-gvgx-253h
vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 6 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability."
[]
null
null
null
null
null
CVE-2023-6750
Clone < 2.4.3 - Unauthenticated Backup Download
The Clone WordPress plugin before 2.4.3 uses buffer files to store in-progress backup informations, which is stored at a publicly accessible, statically defined file path.
[ "cpe:2.3:a:backupbliss:clone:*:*:*:*:*:wordpress:*:*" ]
null
7.5
null
null
null
CVE-2025-22084
w1: fix NULL pointer dereference in probe
In the Linux kernel, the following vulnerability has been resolved: w1: fix NULL pointer dereference in probe The w1_uart_probe() function calls w1_uart_serdev_open() (which includes devm_serdev_device_open()) before setting the client ops via serdev_device_set_client_ops(). This ordering can trigger a NULL pointer dereference in the serdev controller's receive_buf handler, as it assumes serdev->ops is valid when SERPORT_ACTIVE is set. This is similar to the issue fixed in commit 5e700b384ec1 ("platform/chrome: cros_ec_uart: properly fix race condition") where devm_serdev_device_open() was called before fully initializing the device. Fix the race by ensuring client ops are set before enabling the port via w1_uart_serdev_open().
[]
null
null
null
null
null
GHSA-9q2j-c74h-2vcr
SQL injection vulnerability in backoffice/login.asp in Dynamicsoft WSC CMS 2.2 allows remote attackers to execute arbitrary SQL commands via the Password parameter. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
GHSA-ph6r-7rr4-4c2q
Unrestricted file upload vulnerability in the N-Media file uploader plugin before 3.4 for WordPress allows remote authenticated users to execute arbitrary PHP code by leveraging Author privileges to store a file.
[]
null
null
null
null
null
CVE-2017-10053
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
[ "cpe:2.3:a:oracle:jdk:1.6.0:update151:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update141:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update131:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update151:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update141:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update131:*:*:*:*:*:*", "cpe:2.3:a:oracle:jrockit:r28.3.14:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*", "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*", "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*", "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:vasa_provider:*:*:*:*:*:clustered_data_ontap:*:*", "cpe:2.3:a:netapp:vasa_provider:6.0:*:*:*:*:clustered_data_ontap:*:*", "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vsphere:*:*", "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vsphere:*:*", "cpe:2.3:a:netapp:virtual_storage_console:6.2.2:*:*:*:*:vsphere:*:*", "cpe:2.3:a:phoenixcontact:fl_mguard_dm:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
CVE-2014-7513
The Top Hangover Cures (aka com.TopHangoverCures) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:appbelle:top_hangover_cures:1.2:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-7pgj-273w-w98j
libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted archive file.
[]
null
6.5
null
null
null
GHSA-w8j8-f63m-pcx8
Off-by-one error in monitor.c in Qemu 0.9.1 might make it easier for remote attackers to guess the VNC password, which is limited to seven characters where eight was intended.
[]
null
null
null
null
null
GHSA-fm46-fm6f-wvf5
Frog CMS 0.9.5 allows PHP code execution by visiting admin/?/page/edit/1 and inserting additional <?php lines.
[]
null
null
7.2
null
null
CVE-2025-6861
SourceCodester Best Salon Management System add_plan.php sql injection
A vulnerability was found in SourceCodester Best Salon Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /panel/add_plan.php. The manipulation of the argument plan_name/description/duration_days/price leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
null
CVE-2017-1000091
GitHub Branch Source Plugin connects to a user-specified GitHub API URL (e.g. GitHub Enterprise) as part of form validation and completion (e.g. to verify Scan Credentials are correct). This functionality improperly checked permissions, allowing any user with Overall/Read access to Jenkins to connect to any web server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery.
[ "cpe:2.3:a:jenkins:github_branch_source:0.1:beta-1:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:0.1:beta-2:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:0.1:beta-3:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:0.1:beta-4:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:1.0:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:1.1:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:1.2:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:1.3:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:1.4:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:1.4:beta-1:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:1.5:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:1.6:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:1.7:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:1.8:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:1.8.1:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:1.9:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:1.10:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.0:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.0:beta-1:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.0:beta-2:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.1:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.1:beta-1:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.1:beta-2:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.1:beta-3:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.1:beta-4:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.1:beta-5:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.1:beta-6:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.2:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.3:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.4:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.4:beta-1:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.5:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.6:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.0.7:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.2.0:alpha-1:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.2.0:alpha-2:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.2.0:alpha-3:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.2.0:alpha-4:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:github_branch_source:2.2.0:beta-1:*:*:*:jenkins:*:*" ]
null
null
6.3
6.8
null
CVE-2018-14563
An issue was discovered in libthulac.so in THULAC through 2018-02-25. "operator delete" is used with "operator new[]" in the TaggingLearner class in include/cb_tagging_learner.h, possibly leading to memory corruption.
[ "cpe:2.3:a:thunlp:thulac:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2024-10666
Easy Twitter Feed – Twitter feeds plugin for WP <= 1.2.6 - Authenticated (Contributor+) Post Exposure
The Easy Twitter Feed – Twitter feeds plugin for WP plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.6 via the [etf] shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.
[]
null
4.3
null
null
null
GHSA-h626-v3v8-8r8x
A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.9 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on the Universal Windows Platform; GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux.
[]
null
null
null
null
null
CVE-2022-39424
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.40. Difficult to exploit vulnerability allows unauthenticated attacker with network access via VRDP to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
GHSA-8427-qx4w-7x27
Untrusted search path vulnerability in DAEMON Tools Lite 4.35.6.0091 and Pro Standard 4.36.0309.0160 allows local users to gain privileges via a Trojan horse mfc80loc.dll file in the current working directory, as demonstrated by a directory that contains a .mds file. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
CVE-2017-6253
NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where the size of an input buffer is not validated which may lead to denial of service or potential escalation of privileges
[ "cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
null
CVE-2015-4074
Directory traversal vulnerability in the Helpdesk Pro plugin before 1.4.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter in a ticket.download_attachment task.
[ "cpe:2.3:a:helpdesk_pro_project:helpdesk_pro:*:*:*:*:*:joomla\\!:*:*" ]
null
null
7.5
5
null
CVE-2021-40814
The Customer Photo Gallery addon before 2.9.4 for PrestaShop is vulnerable to SQL injection.
[ "cpe:2.3:a:mypresta:customer_photo_gallery:*:*:*:*:*:prestashop:*:*" ]
null
9.8
null
7.5
null
GHSA-jpg2-xrjx-58x8
In Anti-Web through 3.8.7, as used on NetBiter FGW200 devices through 3.21.2, WS100 devices through 3.30.5, EC150 devices through 1.40.0, WS200 devices through 3.30.4, EC250 devices through 1.40.0, and other products, an LFI vulnerability allows a remote attacker to read or modify files through a path traversal technique, as demonstrated by reading the password file, or using the template parameter to cgi-bin/write.cgi to write to an arbitrary file.
[]
null
null
9.1
null
null
GHSA-v337-5vmr-j864
In Loopchain through 2.2.1.3, an attacker can escalate privileges from a low-privilege shell by changing the environment (aka injection in the DEFAULT_SCORE_HOST environment variable).
[]
null
null
8.8
null
null
CVE-2008-2307
Unspecified vulnerability in WebKit in Apple Safari before 3.1.2, as distributed in Mac OS X before 10.5.4, and standalone for Windows and Mac OS X 10.4, allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors involving JavaScript arrays that trigger memory corruption.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.8:*:mac_mini:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.8:*:macbook:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.8:*:macbook_pro:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.2:2008-002:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2022-44702
Windows Terminal Remote Code Execution Vulnerability
Windows Terminal Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:terminal:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-4hhx-gmqj-x5qp
Microsoft SharePoint Server 2007 SP3, 2010 SP1 and SP2, and 2013; Office Web Apps 2010; Excel 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office for Mac 2011; Excel Viewer; and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
[]
null
null
null
null
null
GHSA-27rm-4c27-5jqc
A use-after-free vulnerability in the Autodesk FBX-SDK versions 2019.0 and earlier may lead to code execution on a system running it.
[]
null
null
null
null
null
GHSA-5g27-7962-cxwr
Unspecified vulnerability in the Auditing component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.7 allows remote authenticated users to affect confidentiality via unknown vectors.
[]
null
null
null
null
null
GHSA-8fh9-fccm-v79p
Unspecified vulnerability in Microsoft Office Excel 2002 SP3, Office 2004 for Mac, Office 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via an Excel file with a malformed SxView (0xB0) record, aka "Excel Record Memory Corruption Vulnerability," a different vulnerability than CVE-2010-0824 and CVE-2010-0821.
[]
null
null
null
null
null
GHSA-p2pv-cg7x-h35m
Multiple cross-site scripting (XSS) vulnerabilities in the management console (aka Java console) on the Symantec Security Information Manager (SSIM) appliance 4.7.x and 4.8.x before 4.8.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
RHBA-2019:2819
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.1.17 packages update
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth
[ "cpe:/a:redhat:openshift:4.1::el7", "cpe:/a:redhat:openshift:4.1::el8" ]
null
null
7.5
null
null
CVE-2022-33229
Buffer over-read in Modem
Information disclosure due to buffer over-read in Modem while using static array to process IPv4 packets.
[ "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm8207_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9207_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca4010_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca4020_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qts110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm8207:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9207:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca4010:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca4020:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qts110:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*" ]
null
8.2
null
null
null
CVE-2021-34792
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Resource Exhaustion Denial of Service Vulnerability
A vulnerability in the memory management of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper resource management when connection rates are high. An attacker could exploit this vulnerability by opening a significant number of connections on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
[ "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5512-x_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5512-x_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5512-x_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5512-x_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5505_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5505_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5505_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5505_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5515-x_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5515-x_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5515-x_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5515-x_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5525-x_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5525-x_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5525-x_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5525-x_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5545-x_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5545-x_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5545-x_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5545-x_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5555-x_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5555-x_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5555-x_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5555-x_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5580_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5580_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5580_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5580_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5585-x_firmware:009.014\\(001.150\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5585-x_firmware:099.017\\(001.211\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5585-x_firmware:099.017\\(001.220\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5585-x_firmware:099.017\\(015.050\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*" ]
null
8.6
null
null
null
CVE-2022-29587
Konica Minolta bizhub MFP devices before 2022-04-14 have an internal Chromium browser that executes with root (aka superuser) access privileges.
[ "cpe:2.3:o:konicaminolta:bizhub_226i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_226i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_227_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_227:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_246i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_246i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_287_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_287:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_306i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_306i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_308_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_308:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_308e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_308e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_367_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_367:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_368_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_368:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_368e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_368e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4052_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4052:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_458_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_458:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_458e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_458e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_4752_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_4752:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_558_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_558:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_558e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_558e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_658e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_658e:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_758_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_758:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_808_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_808:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_958_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_958:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c227_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c227:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c250i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c250i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c258_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c258:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c287_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c287:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c300i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c300i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c308_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c308:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3300i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3300i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3320i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3320i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3350i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3350i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3351_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3351:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c360i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c360i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c368_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c368:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3851_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3851:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c3851fs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c3851fs:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c4000i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c4000i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c4050i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c4050i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c450i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c450i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c458_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c458:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c550i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c550i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c558_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c558:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c650i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c650i:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c658_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c658:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c659_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c659:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_c759_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_c759:-:*:*:*:*:*:*:*", "cpe:2.3:o:konicaminolta:bizhub_pro958_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:konicaminolta:bizhub_pro958:-:*:*:*:*:*:*:*" ]
null
4
null
4.7
null
CVE-2023-34092
Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)
Vite provides frontend tooling. Prior to versions 2.9.16, 3.2.7, 4.0.5, 4.1.5, 4.2.3, and 4.3.9, Vite Server Options (`server.fs.deny`) can be bypassed using double forward-slash (//) allows any unauthenticated user to read file from the Vite root-path of the application including the default `fs.deny` settings (`['.env', '.env.*', '*.{crt,pem}']`). Only users explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected, and only files in the immediate Vite project root folder could be exposed. This issue is fixed in vite@4.3.9, vite@4.2.3, vite@4.1.5, vite@4.0.5, vite@3.2.7, and vite@2.9.16.
[ "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*", "cpe:2.3:a:vitejs:vite:2.9.15:*:*:*:*:node.js:*:*" ]
null
7.5
null
null
null
GHSA-wpfm-839m-3pxg
An issue in Hyper on macOS version 3.4.1 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
[]
null
9.8
null
null
null
GHSA-qrg2-vh9f-gq55
An authentication bypass vulnerability exists in the device password generation functionality of Swift Sensors Gateway SG3-1010. A specially-crafted network request can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.
[]
null
10
null
null
null
GHSA-92gq-cfj6-292h
A stored XSS issue was discovered in DAViCal through 1.1.8. It does not adequately sanitize output of various fields that can be set by unprivileged users, making it possible for JavaScript stored in those fields to be executed by another (possibly privileged) user. Affected database fields include Username, Display Name, and Email.
[]
null
null
null
null
null
CVE-2019-11959
A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
[ "cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*" ]
null
null
8.8
9
null
CVE-2025-31022
WordPress PayU India plugin < 3.8.8 - Account Takeover vulnerability
Authentication Bypass Using an Alternate Path or Channel vulnerability in PayU PayU India allows Authentication Abuse.This issue affects PayU India: from n/a before 3.8.8.
[]
null
9.8
null
null
null
GHSA-3j69-7qgr-69pj
A vulnerability was found in PHPGurukul Old Age Home Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/manage-services.php. The manipulation of the argument sertitle leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
null
CVE-2025-7107
SimStudioAI sim route.ts handleLocalFile path traversal
A vulnerability classified as critical has been found in SimStudioAI sim up to 0.1.17. Affected is the function handleLocalFile of the file apps/sim/app/api/files/parse/route.ts. The manipulation of the argument filePath leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as b2450530d1ddd0397a11001a72aa0fde401db16a. It is recommended to apply a patch to fix this issue.
[]
6.9
5.3
5.3
5
https://github.com/simstudioai/sim/commit/b2450530d1ddd0397a11001a72aa0fde401db16a
GHSA-q547-25x8-mx66
A flaw was found in the X Record extension. The RecordSanityCheckRegisterClients function does not check for an integer overflow when computing request length, which allows a client to bypass length checks.
[]
null
6.6
null
null
null
GHSA-wc5c-mc82-hwrm
Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
[]
null
null
7.8
null
null
CVE-2024-21144
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
[ "cpe:2.3:a:oracle:jdk:1.8.0:update411:*:*:-:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update411:*:*:enterprise_performance_pack:*:*:*", "cpe:2.3:a:oracle:jdk:11.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update411:*:*:-:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update411:*:*:enterprise_performance_pack:*:*:*", "cpe:2.3:a:oracle:jre:11.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:graalvm:20.3.14:*:*:*:enterprise:*:*:*", "cpe:2.3:a:oracle:graalvm:21.3.10:*:*:*:enterprise:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*" ]
null
3.7
null
null
null
GHSA-gj3g-f445-3rm6
Cross-site scripting (XSS) vulnerability in the search implementation in IBM Rational Quality Manager (RQM) 2.0 through 2.0.1.1, 3.x before 3.0.1.6 iFix 1, and 4.x before 4.0.5, as used in Rational Team Concert, Rational Requirements Composer, and other products, allows remote authenticated users to inject arbitrary web script or HTML via vectors involving an IFRAME element.
[]
null
null
null
null
null
GHSA-rc9q-r7g9-f52x
Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a command injection vulnerability in the function formSetIpGroup. This vulnerability allows attackers to execute arbitrary commands via the IPGroupStartIP and IPGroupEndIP parameters.
[]
null
null
null
null
null
RHSA-2015:1636
Red Hat Security Advisory: net-snmp security update
net-snmp: snmp_pdu_parse() incompletely parsed varBinds left in list of variables net-snmp: Heap corruption in snmp_pdu_parse function in snmplib/snmp_api.c
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
null
CVE-2024-7959
SSRF in open-webui/open-webui
The `/openai/models` endpoint in open-webui/open-webui version 0.3.8 is vulnerable to Server-Side Request Forgery (SSRF). An attacker can change the OpenAI URL to any URL without checks, causing the endpoint to send a request to the specified URL and return the output. This vulnerability allows the attacker to access internal services and potentially gain command execution by accessing instance secrets.
[]
null
null
7.7
null
null
CVE-2019-15724
An issue was discovered in GitLab Community and Enterprise Edition 11.10 through 12.2.1. Label descriptions are vulnerable to HTML injection.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
6.1
null
4.3
null
cisco-sa-xwork-xss-KCcg7WwU
Cisco Crosswork Network Controller Stored Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Crosswork Network Controller could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against users of the interface of an affected system. These vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by inserting malicious data into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid administrative credentials. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
[]
null
4.8
null
null
null
GHSA-2xg5-79q2-hw57
Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.
[]
null
7
null
null
null
CVE-2025-53077
An execution after redirect in Samsung DMS(Data Management Server) allows attackers to execute limited functions without permissions. An attacker could compromise the integrity of the platform by executing this vulnerability.
[]
null
6.5
null
null
null
GHSA-87f6-8gr7-pc6h
KubePi may leak password hash of any user
Summaryhttp://kube.pi/kubepi/api/v1/users/search?pageNum=1&&pageSize=10 leak password of any user (including admin). This leads to password crack attackPoChttps://drive.google.com/file/d/1ksdawJ1vShRJyT3wAgpqVmz-Ls6hMA7M/previewImpactLeaking confidential information.Can lead to password cracking attacks
[]
null
6.5
null
null
null
CVE-2022-47945
ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (lang_switch_on=true). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including pearcmd.php.
[ "cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
RHSA-2003:052
Red Hat Security Advisory: krb5 security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
null
CVE-2010-3692
Directory traversal vulnerability in the callback function in client.php in phpCAS before 1.1.3, when proxy mode is enabled, allows remote attackers to create or overwrite arbitrary files via directory traversal sequences in a Proxy Granting Ticket IOU (PGTiou) parameter.
[ "cpe:2.3:a:apereo:phpcas:*:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.19:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.21:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.22:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.23:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:1.1.1:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
GHSA-479x-2w9f-6grr
The forum implementation in the ecommerce component in the Apache Open For Business Project (OFBiz) trusts the (1) dataResourceTypeId, (2) contentTypeId, and certain other hidden form fields, which allows remote attackers to create unauthorized types of content, modify content, or have other unknown impact.
[]
null
null
null
null
null
CVE-2019-1080
Scripting Engine Memory Corruption Vulnerability
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website designed to exploit the vulnerability through a Microsoft browser and then convince a user to view the website. An attacker could also embed an ActiveX control marked &quot;safe for initialization&quot; in an application or Microsoft Office document that hosts the browser rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2019-11374
74CMS v5.0.1 has a CSRF vulnerability to add a new admin user via the index.php?m=Admin&c=admin&a=add URI.
[ "cpe:2.3:a:74cms:74cms:5.0.1:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2020-3281
Cisco Digital Network Architecture Center Information Disclosure Vulnerability
A vulnerability in the audit logging component of Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to view sensitive information in clear text. The vulnerability is due to the storage of certain unencrypted credentials. An attacker could exploit this vulnerability by accessing the audit logs and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to use those credentials to discover and manage network devices.
[ "cpe:2.3:a:cisco:digital_network_architecture_center:*:*:*:*:*:*:*:*" ]
null
null
4.3
null
null
CVE-2005-1505
The new account wizard in Mail.app 2.0 in Mac OS 10.4, when configuring an IMAP mail account and checking the credentials, does not prompt the user to use SSL until after the password has already been sent, which causes the password to be sent in plaintext.
[ "cpe:2.3:a:apple:mail:2.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-q656-rwpj-5q6j
Cross-Site Request Forgery (CSRF) vulnerability in CyberChimps Responsive Plus allows Cross Site Request Forgery. This issue affects Responsive Plus: from n/a through 3.2.2.
[]
null
4.3
null
null
null
GHSA-rcf3-hf9p-7v6j
Integer signedness error in D-Link AirPlus DI-614+ running firmware 2.30 and earlier allows remote attackers to cause a denial of service (IP lease depletion) via a DHCP request with the LEASETIME option set to -1, which makes the DHCP lease valid for thirteen or more years.
[]
null
null
null
null
null
RHSA-2022:7704
Red Hat Security Advisory: webkit2gtk3 security and bug fix update
webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Buffer overflow leading to arbitrary code execution webkitgtk: Cookie management issue leading to sensitive user information disclosure webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: malicious content may lead to UI spoofing webkitgtk: UI spoofing while Visiting a website that frames malicious content
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.1
null
null
null
CVE-2023-23906
Missing authentication for critical function exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier, which may allow a remote unauthenticated attacker to execute some critical functions without authentication, e.g., rebooting the product.
[ "cpe:2.3:o:seiko-sol:skybridge_mb-a110_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:seiko-sol:skybridge_mb-a110:-:*:*:*:*:*:*:*", "cpe:2.3:o:seiko-sol:skybridge_mb-a100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:seiko-sol:skybridge_mb-a100:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2015-8600
The SysAdminWebTool servlets in SAP Mobile Platform allow remote attackers to bypass authentication and obtain sensitive information, gain privileges, or have unspecified other impact via unknown vectors, aka SAP Security Note 2227855.
[ "cpe:2.3:a:sap:mobile_platform:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
ICSA-19-337-02
Moxa AWK-3121
The device uses HTTP traffic by default allowing insecure communication to the web server, which could allow an attacker to compromise sensitive data such as credentials.CVE-2018-10690 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). An attacker can navigate to a URL and download the system log without authentication, which may allow access to sensitive information.CVE-2018-10691 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). A cross-site scripting attack allows access to session cookies, which may allow an attacker to login into the device.CVE-2018-10692 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). An unauthorized user may execute network troubleshooting commands to cause a buffer overflow condition, which may allow the attacker to execute commands on the device.CVE-2018-10693 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The Wi-Fi connection used to set up the device is not encrypted by default, which may allow an attacker to capture sensitive data.CVE-2018-10694 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). An unauthorized user may cause a buffer overflow using the device alert functionality, which may allow the attacker to execute commands on the device.CVE-2018-10695 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The web interface is not protected against CSRF attacks, which may allow an attacker to trick a user into executing commands or actions by clicking a malicious link.CVE-2018-10696 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). An unauthorized user may inject malicious commands into the system while using network troubleshooting functions, which may allow the attacker to execute unauthorized commands on the device.CVE-2018-10697 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The system enables an insecure service by default, which may allow an attacker to view sensitive information or modify information being transmitted through a man-in-the-middle attack.CVE-2018-10698 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). An unauthorized user can inject malicious commands while using system certificate functions, which may allow the attacker to execute unauthorized commands on the device.CVE-2018-10699 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). An unauthorized user can execute an XSS attack, which may allow the injection of a malicious payload on the server.CVE-2018-10700 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). An unauthorized user may cause a buffer overflow on the system using system troubleshooting functions, which may allow the attacker to execute commands.CVE-2018-10701 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). An unauthorized user may inject malicious commands on the system using system troubleshooting functions, which may allow the attacker to execute commands on the device.CVE-2018-10702 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). An unauthorized user may cause a buffer overflow on the system using system troubleshooting functions, which may allow the attacker to execute commands on the device.CVE-2018-10703 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
8.8
null
null
GHSA-r894-c8ph-2pv7
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka "Microsoft SharePoint Remote Code Execution Vulnerability." This affects Microsoft SharePoint.
[]
null
null
8.8
null
null
CVE-2025-8639
Kenwood DMX958XR Firmware Update Command Injection Vulnerability
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected Kenwood DMX958XR devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware update process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26262.
[]
null
null
6.8
null
null
GHSA-x8jj-j32x-rqj9
An issue in hackathon-starter v.8.1.0 allows a remote attacker to escalate privileges via the user.js component.
[]
null
5.9
null
null
null
CVE-2021-23374
Arbitrary Command Injection
This affects all versions of package ps-visitor. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
[ "cpe:2.3:a:ps-visitor_project:ps-visitor:*:*:*:*:*:node.js:*:*" ]
null
7.3
null
null
null
CVE-2020-6240
SAP NetWeaver AS ABAP (Web Dynpro ABAP), versions (SAP_UI 750, 752, 753, 754 and SAP_BASIS 700, 710, 730, 731, 804) allows an unauthenticated attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service leading to Denial of Service
[ "cpe:2.3:a:sap:netweaver_application_server_abap:700:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:710:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:730:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:731:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:752:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:753:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:754:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:804:*:*:*:*:*:*:*" ]
null
null
5.3
null
null
CVE-2014-4104
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2799, CVE-2014-4059, CVE-2014-4065, CVE-2014-4079, CVE-2014-4081, CVE-2014-4083, CVE-2014-4085, CVE-2014-4088, CVE-2014-4090, CVE-2014-4094, CVE-2014-4097, CVE-2014-4100, CVE-2014-4103, CVE-2014-4105, CVE-2014-4106, CVE-2014-4107, CVE-2014-4108, CVE-2014-4109, CVE-2014-4110, and CVE-2014-4111.
[ "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2008-3804
Unspecified vulnerability in the Multi Protocol Label Switching (MPLS) Forwarding Infrastructure (MFI) in Cisco IOS 12.2 and 12.4 allows remote attackers to cause a denial of service (memory corruption) via crafted packets for which the software path is used.
[ "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*" ]
null
null
null
7.1
null
GHSA-m3x4-xj3g-vgpg
IBM Spectrum Scale 4.2 and 5.0 could allow a local unprivileged attacker with intimate knowledge of the enviornment to execute commands as root using specially crafted input. IBM X-Force ID: 175977.
[]
null
null
null
null
null
GHSA-f553-xh7g-ffm9
tcprewrite in Tcpreplay 4.4.1 has a heap-based buffer over-read in get_ipv6_next in common/get.c.
[]
null
7.8
null
null
null
GHSA-mqjf-rj8m-pww9
Multiple cross-site scripting (XSS) vulnerabilities in Sonexis ConferenceManager 9.2.11.0 allow remote attackers to inject arbitrary web script or HTML via (1) the txtConferenceID parameter to HostLogin.asp, (2) the txtConferenceID parameter to ParticipantLogin.asp, (3) the acp parameter to ForgotPIN.asp, or the (4) Description, (5) title, or (6) Heading parameter to Error.asp.
[]
null
null
null
null
null
GHSA-hc5m-68rf-53fj
Sourcecodester Password Storage Application in PHP/OOP and MySQL 1.0 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities via the Name, Username, Description and Site Feature parameters.
[]
null
5.4
null
null
null
CVE-2024-52840
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
Adobe Experience Manager versions 6.5.21 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by an attacker to execute arbitrary code in the context of the victim's browser session. By manipulating a DOM element through a crafted URL or user input, the attacker can inject malicious scripts that run when the page is rendered. This type of attack requires user interaction, as the victim would need to access the manipulated URL or input the malicious data themselves.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*" ]
null
5.4
null
null
null
GHSA-rxq3-gmwr-j659
The Essential Real Estate plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation on the 'ajaxUploadFonts' function in versions up to, and including, 4.3.5. This makes it possible for authenticated attackers with subscriber-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
[]
null
7.5
null
null
null
CVE-2024-40617
Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.
[ "cpe:2.3:o:fujitsu:network_edgiot_gw1500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fujitsu:network_edgiot_gw1500:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2007-1191
The Social Bookmarks (del.icio.us) plug-in 8F in Quicksilver writes usernames and passwords in plaintext to the /Library/Logs/Console/UID/Console.log file, which allows local users to obtain sensitive information by reading this file.
[ "cpe:2.3:a:quicksilver:del.icio.us_module:8f:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
CVE-2025-7905
itsourcecode Insurance Management System insertPayment.php sql injection
A vulnerability has been found in itsourcecode Insurance Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /insertPayment.php. The manipulation of the argument recipt_no leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
null
GHSA-9jr9-v2r2-fm78
Summer Baby Zoom Wifi Monitor & Internet Viewing System allows remote attackers to bypass authentication, related to the MySnapCam web service.
[]
null
9.8
null
null
null
CVE-2025-22918
Polycom RealPresence Group 500 <=20 has Insecure Permissions due to automatically loaded cookies. This allows for the use of administrator functions, resulting in the leakage of sensitive user information.
[]
null
7.5
null
null
null
CVE-2006-2667
Direct static code injection vulnerability in WordPress 2.0.2 and earlier allows remote attackers to execute arbitrary commands by inserting a carriage return and PHP code when updating a profile, which is appended after a special comment sequence into files in (1) wp-content/cache/userlogins/ (2) wp-content/cache/users/ which are later included by cache.php, as demonstrated using the displayname argument.
[ "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-mvrj-5m9x-8628
IBM WebSphere Application Server (WAS) Liberty Profile 8.5 before 8.5.5.1 uses weak permissions for unspecified files, which allows local users to obtain sensitive information via standard filesystem operations.
[]
null
null
null
null
null
GHSA-v3rc-pqvc-mv75
Multiple cross-site scripting (XSS) vulnerabilities in the web interface on Cisco Video Surveillance 5000 HD IP Dome cameras allow remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug IDs CSCud10943 and CSCud10950.
[]
null
null
null
null
null
CVE-2024-47171
Agnai vulnerable to Relative Path Traversal in Image Upload
Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to upload image files at attacker-chosen location on the server. This issue can lead to image file uploads to unauthorized or unintended directories, including overwriting of existing images which may be used for defacement. This does not affect `agnai.chat`, installations using S3-compatible storage, or self-hosting that is not publicly exposed. Version 1.0.330 fixes this vulnerability.
[ "cpe:2.3:a:agnai:agnai:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
CVE-2021-4066
Integer underflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null