id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-xf82-53gc-8p9x | Multiple SQL injection vulnerabilities in akocomment.php in AkoComment 2.0 module for Mambo, with magic_quotes_gpc disabled, allow remote attackers to execute arbitrary SQL commands via the (1) acname or (2) contentid parameter. | []
| null | null | null | null |
|
CVE-2025-7160 | PHPGurukul Zoo Management System index.php sql injection | A vulnerability classified as critical has been found in PHPGurukul Zoo Management System 2.1. This affects an unknown part of the file /admin/index.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | []
| 6.9 | 7.3 | 7.3 | 7.5 |
RHSA-2015:2083 | Red Hat Security Advisory: postgresql92-postgresql security update | postgresql: limited memory disclosure flaw in crypt() postgresql: stack overflow DoS when parsing json or jsonb inputs | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
]
| null | null | null | null |
RHSA-2005:785 | Red Hat Security Advisory: firefox security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
ICSA-22-195-16 | Siemens EN100 Ethernet Module | Affected applications contains a memory corruption vulnerability while parsing specially crafted HTTP packets to /txtrace endpoint manupulating a specific argument. This could allow an attacker to crash the affected application leading to a denial of service condition | []
| null | 8.6 | null | null |
RHSA-2009:0348 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP06 update | JBoss EAP unprivileged local xml file access | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5"
]
| null | null | null | null |
CVE-2020-23249 | GigaVUE-OS (GVOS) 5.4 - 5.9 stores a Redis database password in plaintext. | [
"cpe:2.3:o:gigamon:gigavue-os:*:*:*:*:*:*:*:*"
]
| null | 4.7 | null | 4 |
|
RHSA-2019:3883 | Red Hat Security Advisory: kernel security update | hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
]
| null | null | 8.8 | null |
CVE-2015-4376 | Cross-site scripting (XSS) vulnerability in the Profile2 Privacy module 7.x-1.x before 7.x-1.5 for Drupal allows remote authenticated users with the "Administer Profile2 Privacy Levels" permission to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:profile2_privacy_project:profile2_privacy:7.x-1.0:*:*:*:*:drupal:*:*",
"cpe:2.3:a:profile2_privacy_project:profile2_privacy:7.x-1.1:*:*:*:*:drupal:*:*",
"cpe:2.3:a:profile2_privacy_project:profile2_privacy:7.x-1.2:*:*:*:*:drupal:*:*",
"cpe:2.3:a:profile2_privacy_project:profile2_privacy:7.x-1.3:*:*:*:*:drupal:*:*",
"cpe:2.3:a:profile2_privacy_project:profile2_privacy:7.x-1.4:*:*:*:*:drupal:*:*",
"cpe:2.3:a:profile2_privacy_project:profile2_privacy:7.x-1.x:dev:*:*:*:drupal:*:*"
]
| null | null | null | 3.5 |
|
CVE-2021-20711 | Aterm WG2600HS firmware Ver1.5.1 and earlier allows an attacker to execute arbitrary OS commands via unspecified vectors. | [
"cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 10 |
|
CVE-2022-37084 | TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the sPort parameter at the addEffect function. | [
"cpe:2.3:o:totolink:a7000r_firmware:9.1.0u.6115_b20201022:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
CVE-2021-31908 | In JetBrains TeamCity before 2020.2.3, stored XSS was possible on several pages. | [
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
CVE-2021-24657 | Limit Login Attempts < 4.0.50 - Unauthenticated Stored Cross-Site Scripting | The Limit Login Attempts WordPress plugin before 4.0.50 does not escape the IP addresses (which can be controlled by attacker via headers such as X-Forwarded-For) of attempted logins before outputting them in the reports table, leading to an Unauthenticated Stored Cross-Site Scripting issue. | [
"cpe:2.3:a:limit_login_attempts_project:limit_login_attempts:*:*:*:*:*:wordpress:*:*"
]
| null | 6.1 | null | 4.3 |
CVE-2025-22454 | Insufficiently restrictive permissions in Ivanti Secure Access Client before 22.7R4 allows a local authenticated attacker to escalate their privileges. | []
| null | 7.8 | null | null |
|
GHSA-g6hx-mx2f-fvx9 | Possible Command Injectionin iManager GET parameter has been discovered in
OpenText™ iManager 3.2.6.0000. | []
| null | 8.8 | null | null |
|
CVE-2012-2760 | mod_auth_openid before 0.7 for Apache uses world-readable permissions for /tmp/mod_auth_openid.db, which allows local users to obtain session ids. | [
"cpe:2.3:a:findingscience:mod_auth_openid:*:*:*:*:*:apache:*:*",
"cpe:2.3:a:findingscience:mod_auth_openid:0.1:*:*:*:*:apache:*:*",
"cpe:2.3:a:findingscience:mod_auth_openid:0.2:*:*:*:*:apache:*:*",
"cpe:2.3:a:findingscience:mod_auth_openid:0.2.1:*:*:*:*:apache:*:*",
"cpe:2.3:a:findingscience:mod_auth_openid:0.3:*:*:*:*:apache:*:*",
"cpe:2.3:a:findingscience:mod_auth_openid:0.4:*:*:*:*:apache:*:*",
"cpe:2.3:a:findingscience:mod_auth_openid:0.5:*:*:*:*:apache:*:*"
]
| null | null | null | 2.1 |
|
GHSA-5fhm-3rf4-cfq4 | Heap-based buffer overflow in SiteMinder Affiliate Agent 4.x allows remote attackers to execute arbitrary code via a large SMPROFILE cookie. | []
| null | null | null | null |
|
GHSA-4r9w-r4jc-fqgq | The Theater for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 0.18.6.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | []
| null | 6.1 | null | null |
|
CVE-2019-8589 | This issue was addressed with improved checks. This issue is fixed in macOS Mojave 10.14.5. A malicious application may bypass Gatekeeper checks. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 4.3 |
|
RHSA-2020:1317 | Red Hat Security Advisory: nodejs:10 security update | ICU: Integer overflow in UnicodeString::doAppend() | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 8.8 | null | null |
CVE-2024-43387 | Phoenix Contact: Access files due to improper neutralization of special elements in MGUARD devices | A low privileged remote attacker can read and write files as root due to improper neutralization of special elements in the variable EMAIL_RELAY_PASSWORD in mGuard devices. | [
"cpe:2.3:o:phoenixcontact:fl_mguard_centerport_vpn-1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_2102_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_2105_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pcie_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pci_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4302_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4305_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_att_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_att_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_3g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_smart2_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_smart2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs2005_tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pci4000_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pci4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_core_tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_core_tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_centerport_vpn-1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4305:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4302:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4102_pcie:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4102_pci:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_2105:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_2102:-:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
CVE-2021-43398 | Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. NOTE: this report is disputed by the vendor and multiple third parties. The execution-time differences are intentional. A user may make a choice of a longer key as a tradeoff between strength and performance. In making this choice, the amount of information leaked to an adversary is of infinitesimal value | [
"cpe:2.3:a:cryptopp:crypto\\+\\+:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | 5 |
|
CVE-2022-43969 | Ricoh mp_c4504ex devices with firmware 1.06 mishandle credentials. | [
"cpe:2.3:o:ricoh:mp_c307_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c307:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c407_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c407:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c406_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c406:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c306_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c306:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_cw2200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_cw2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_cw2201_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_cw2201:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_402spf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_402spf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c2003_smart_operation_panel_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c2003_smart_operation_panel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c2503_smart_operation_panel_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c2503_smart_operation_panel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c2003_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c2003:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c2503_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c2503:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c4503_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c4503:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c5503_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c5503:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c6003_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c6003:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c3003_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c3003:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c3503_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c3503:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c4503_smart_operation_panel_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c4503_smart_operation_panel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c5503_smart_operation_panel_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c5503_smart_operation_panel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c6003_smart_operation_panel_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c6003_smart_operation_panel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c3003_smart_operation_panel_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c3003_smart_operation_panel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c3503_smart_operation_panel_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c3503_smart_operation_panel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c2004ex_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c2004ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c2504ex_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c2504ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c4504ex_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c4504ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c5504ex_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c5504ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c6004ex_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c6004ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c3004ex_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c3004ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c3504ex_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c3504ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:pro_c5300s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:pro_c5300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:pro_c5310s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:pro_c5310s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:m_c2001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:m_c2001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_c530f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c530f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_c530fb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c530fb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_350f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_350f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_430f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_430f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_430fb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_430fb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_305\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_305\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_550f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_550f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_600f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_600f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_600srf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_600srf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_2555_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_2555:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_3055_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_3055:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_3555_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_3555:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_4055_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_4055:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_5055_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_5055:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_6055_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_6055:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_2500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_2500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_3000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_3500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_3500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_4000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_4000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_5000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_6000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_2702_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_2702:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_c400f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c400f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_c300f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c300f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_c300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_c400srf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c400srf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_c2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_c2500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c2500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_c6000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_c5500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_c3000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_c3500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c3500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_c4500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c4500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c2504_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c2504:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c2004_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c2004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c4504_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c4504:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c5504_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c5504:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c6004_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c6004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c3504_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c3504:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:mp_c3004_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:mp_c3004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_c6500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c6500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:im_c8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c8000:-:*:*:*:*:*:*:*"
]
| null | 9.1 | null | null |
|
CVE-2000-1042 | Buffer overflow in ypserv in Mandrake Linux 7.1 and earlier, and possibly other Linux operating systems, allows an attacker to gain root privileges when ypserv is built without a vsyslog() function. | [
"cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2022-36913 | Jenkins Openstack Heat Plugin 1.5 and earlier does not perform permission checks in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | [
"cpe:2.3:a:jenkins:openstack_heat:*:*:*:*:*:jenkins:*:*"
]
| null | 4.3 | null | null |
|
RHSA-2023:0932 | Red Hat Security Advisory: Logging Subsystem 5.6.3 - Red Hat OpenShift | express: "qs" prototype poisoning causes the hang of the node process golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:logging:5.6::el8"
]
| null | 5.3 | null | null |
GHSA-537v-pf35-xw47 | The multisite-post-duplicator plugin before 1.1.3 for WordPress has wp-admin/tools.php?page=mpd CSRF. | []
| null | null | null | null |
|
GHSA-8m6g-gw2g-4vv5 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in piotnetdotcom Piotnet Forms allows Stored XSS. This issue affects Piotnet Forms: from n/a through 1.0.30. | []
| null | 5.9 | null | null |
|
CVE-2025-23176 | Tecnick – CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | []
| null | 8.8 | null | null |
GHSA-q89f-q98p-7vmj | MSA FieldServer Gateway 5.0.0 through 6.5.2 allows cross-origin WebSocket hijacking. | []
| null | 4.3 | null | null |
|
GHSA-hgwh-rmqp-9hq9 | The cmd_boot function in app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to bypass intended device-lock and kernel-signature restrictions by using fastboot mode in a boot command for an arbitrary kernel image. | []
| null | null | null | null |
|
GHSA-jcrx-xhx2-r8m2 | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.1. An app may be able to access information about a user's contacts. | []
| null | 5.5 | null | null |
|
CVE-2017-11686 | Zoho ManageEngine Event Log Analyzer 11.4 and 11.5 allows remote attackers to obtain an authenticated user's password via XSS vulnerabilities or sniffing non-SSL traffic on the network, because the password is represented in a cookie with a reversible encoding method. | [
"cpe:2.3:a:zohocorp:manageengine_eventlog_analyzer:11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_eventlog_analyzer:11.5:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2011-5318 | Multiple cross-site request forgery (CSRF) vulnerabilities in diafan.CMS before 5.1 allow remote attackers to hijack the authentication of administrators for requests that (1) modify articles via a save_post action to admin/news/saveNEWS_ID/, (2) modify settings via a save_post action to admin/site/save2/, or (3) modify credentials via a save_post action to admin/usersite/save2/. | [
"cpe:2.3:a:diafan:diafan.cms:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-79q2-v554-rhr4 | The KiviCare WordPress plugin before 2.3.9 does not sanitise and escape some parameters before using them in SQL statements via the ajax_post AJAX action with the get_doctor_details route, leading to SQL Injections exploitable by unauthenticated users | []
| null | 9.8 | null | null |
|
GHSA-x2qg-388q-986c | A vulnerability has been identified in SIMATIC S7-PLCSIM V17 (All versions), SIMATIC S7-PLCSIM V18 (All versions), SIMATIC STEP 7 Safety V17 (All versions), SIMATIC STEP 7 Safety V18 (All versions), SIMATIC STEP 7 Safety V19 (All versions), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions), SIMATIC STEP 7 V19 (All versions), SIMATIC WinCC Unified PC Runtime V18 (All versions), SIMATIC WinCC Unified PC Runtime V19 (All versions), SIMATIC WinCC Unified V17 (All versions), SIMATIC WinCC Unified V18 (All versions), SIMATIC WinCC Unified V19 (All versions), SIMATIC WinCC V17 (All versions), SIMATIC WinCC V18 (All versions), SIMATIC WinCC V19 (All versions), SIMOCODE ES V17 (All versions), SIMOCODE ES V18 (All versions), SIMOCODE ES V19 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SIMOTION SCOUT TIA V5.6 SP1 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SINAMICS Startdrive V19 (All versions), SIRIUS Safety ES V17 (TIA Portal) (All versions), SIRIUS Safety ES V18 (TIA Portal) (All versions), SIRIUS Safety ES V19 (TIA Portal) (All versions), SIRIUS Soft Starter ES V17 (TIA Portal) (All versions), SIRIUS Soft Starter ES V18 (TIA Portal) (All versions), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions), TIA Portal Cloud V17 (All versions), TIA Portal Cloud V18 (All versions), TIA Portal Cloud V19 (All versions). The affected devices do not properly sanitize user-controllable input when parsing user settings. This could allow an attacker to locally execute arbitrary commands in the host operating system with the privileges of the user. | []
| 7 | 7.3 | null | null |
|
GHSA-hrx3-8v75-xqrh | A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(27) and 8.2(3). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(6). Nexus 3500 Platform Switches are affected running software versions prior to 6.0(2)A8(11) and 7.0(3)I7(6). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9), 7.0(3)I7(6). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22) and 8.2(3). | []
| null | 6.7 | null | null |
|
CVE-2025-27591 | A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow. | []
| null | 6.8 | null | null |
|
GHSA-47hc-24v5-rj9r | X-Man 1.0 has a SQL injection vulnerability, which can cause data leakage. | []
| null | 7.5 | null | null |
|
CVE-2017-10061 | Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Integration Broker). Supported versions that are affected are 8.54 and 8.55. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. While the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise PeopleTools. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L). | [
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*"
]
| null | null | 8.3 | 7.5 |
|
CVE-2023-33860 | IBM Security ReaQta information disclosure | IBM Security QRadar EDR 3.12 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. | [
"cpe:2.3:a:ibm:security_qradar_edr:3.12:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
GHSA-8hc5-v62f-53vj | WampServer before 3.1.9 has CSRF in add_vhost.php because the synchronizer pattern implemented as remediation of CVE-2018-8817 was incomplete. An attacker could add/delete any vhosts without the consent of the owner. | []
| null | null | 6.5 | null |
|
GHSA-8gcx-vcr8-7vhv | Dell EMC CloudLink 7.1 and all prior versions contain an Improper Input Validation Vulnerability. A remote low privileged attacker, may potentially exploit this vulnerability, leading to execution of arbitrary files on the server | []
| null | null | null | null |
|
CVE-2022-29433 | https://patchstack.com/database/vulnerability/nd-donations/wordpress-donations-plugin-1-8-authenticated-stored-cross-site-scripting-xss-vulnerability | Authenticated (contributor or higher role) Cross-Site Scripting (XSS) vulnerability in Donations plugin <= 1.8 on WordPress. | [
"cpe:2.3:a:donations_project:donations:*:*:*:*:*:wordpress:*:*"
]
| null | 4.1 | null | null |
GHSA-mp92-8wvj-jphh | An issue was discovered on Mitel 6869i through 4.5.0.41 and 5.x through 5.0.0.1018 devices. A command injection vulnerability exists in the hostname parameter taken in by the provis.html endpoint. The provis.html endpoint performs no sanitization on the hostname parameter (sent by an authenticated user), which is subsequently written to disk. During boot, the hostname parameter is executed as part of a series of shell commands. Attackers can achieve remote code execution in the root context by placing shell metacharacters in the hostname parameter. | []
| null | 8.8 | null | null |
|
GHSA-5qhm-mrwg-x22r | Integer overflow in Adobe Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow attackers to execute arbitrary code via unspecified vectors. | []
| null | null | null | null |
|
CVE-2013-3961 | SQL injection vulnerability in edit_event.php in Simple PHP Agenda before 2.2.9 allows remote authenticated users to execute arbitrary SQL commands via the eventid parameter. | [
"cpe:2.3:a:abeel:simple_php_agenda:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:0.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:abeel:simple_php_agenda:2.2.7:*:*:*:*:*:*:*"
]
| null | null | null | 6.5 |
|
GHSA-rgm2-hxqf-7hh2 | A perfaddormoddevicemonitor expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). | []
| null | null | null | null |
|
PYSEC-2011-15 | null | Cross-site scripting (XSS) vulnerability in the safe_html filter in Products.PortalTransforms in Plone 2.1 through 4.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2010-2422. | []
| null | null | null | null |
CVE-2016-6634 | Cross-site scripting (XSS) vulnerability in the network settings page in WordPress before 4.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2006-3570 | Cross-site scripting (XSS) vulnerability in the webform module in Drupal 4.6 before July 8, 2006 and 4.7 before July 8, 2006 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:drupal:drupal:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:4.7:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2020-8940 | Unchecked buffer overrun in enc_untrusted_recvmsg | An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_recvmsg using an attacker controlled result parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading or past commit fa6485c5d16a7355eab047d4a44345a73bc9131e | [
"cpe:2.3:a:google:asylo:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
CVE-2025-25944 | Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the Ap4RtpAtom.cpp, specifically in AP4_RtpAtom::AP4_RtpAtom, during the execution of mp4fragment with a crafted MP4 input file. | []
| null | 7.3 | null | null |
|
CVE-2012-6059 | The dissect_isakmp function in epan/dissectors/packet-isakmp.c in the ISAKMP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data structure to determine IKEv2 decryption parameters, which allows remote attackers to cause a denial of service (application crash) via a malformed packet. | [
"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
RHSA-2016:2614 | Red Hat Security Advisory: pacemaker security and bug fix update | pacemaker: Privilege escalation due to improper guarding of IPC communication | [
"cpe:/o:redhat:enterprise_linux:7::server"
]
| null | null | 8.8 | null |
GHSA-v6hg-x8c9-r375 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | []
| null | null | null | null |
|
CVE-2020-27261 | Omron CX-One | The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. | [
"cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*",
"cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*",
"cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*",
"cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
CVE-2020-14536 | Vulnerability in the Oracle Commerce Guided Search / Oracle Commerce Experience Manager product of Oracle Commerce (component: Workbench). Supported versions that are affected are 11.0, 11.1, 11.2 and prior to 11.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Commerce Guided Search / Oracle Commerce Experience Manager. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Commerce Guided Search / Oracle Commerce Experience Manager accessible data as well as unauthorized access to critical data or complete access to all Oracle Commerce Guided Search / Oracle Commerce Experience Manager accessible data. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:commerce_experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:commerce_guided_search:*:*:*:*:*:*:*:*"
]
| null | 7.4 | null | null |
|
GHSA-9pwg-j47x-j9gj | In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a "service ipmievd restart" loop. | []
| null | 7.5 | null | null |
|
CVE-2022-36558 | Seiko SkyBridge MB-A100/A110 v4.2.0 and below implements a hard-coded passcode for the root account. Attackers are able to access the passcord via the file /etc/ciel.cfg. | [
"cpe:2.3:o:seiko-sol:skybridge_mb-a100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:seiko-sol:skybridge_mb-a100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:seiko-sol:skybridge_mb-a110_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:seiko-sol:skybridge_mb-a110:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2025-21132 | Substance3D - Stager | Out-of-bounds Write (CWE-787) | Substance3D - Stager versions 3.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
| null | 7.8 | null | null |
GHSA-x5rq-j2xg-h7qm | Regular Expression Denial of Service (ReDoS) in lodash | lodash prior to 4.7.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.7.11. | []
| null | null | null | null |
GHSA-h976-8v6c-8j56 | In the Linux kernel, the following vulnerability has been resolved:net: dsa: bcm_sf2: don't use devres for mdiobusAs explained in commits:
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")mdiobus_free() will panic when called from devm_mdiobus_free() <-
devres_release_all() <- __device_release_driver(), and that mdiobus was
not previously unregistered.The Starfighter 2 is a platform device, so the initial set of
constraints that I thought would cause this (I2C or SPI buses which call
->remove on ->shutdown) do not apply. But there is one more which
applies here.If the DSA master itself is on a bus that calls ->remove from ->shutdown
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
between the switch and the DSA master, and device_links_unbind_consumers()
will unbind the bcm_sf2 switch driver on shutdown.So the same treatment must be applied to all DSA switch drivers, which
is: either use devres for both the mdiobus allocation and registration,
or don't use devres at all.The bcm_sf2 driver has the code structure in place for orderly mdiobus
removal, so just replace devm_mdiobus_alloc() with the non-devres
variant, and add manual free where necessary, to ensure that we don't
let devres free a still-registered bus. | []
| null | null | null | null |
|
CVE-2019-13563 | D-Link DIR-655 C devices before 3.02B05 BETA03 allow CSRF for the entire management console. | [
"cpe:2.3:o:dlink:dir-655_firmware:3.02b05:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-655:c1:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
GHSA-ppf4-9j93-82w7 | A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 2). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | []
| null | 7.8 | null | null |
|
GHSA-vwpm-799j-8hxq | IBM Control Center 6.2.1 and 6.3.1could allow an authenticated user to obtain sensitive information exposed through a directory listing. | []
| null | 4.3 | null | null |
|
CVE-2008-1351 | SQL injection vulnerability in the Tutorials 2.1b module for XOOPS allows remote attackers to execute arbitrary SQL commands via the tid parameter to printpage.php, which is accessible directly or through a printpage action to index.php. | [
"cpe:2.3:a:xoops:tutoriais_module:2.1b:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2018-7631 | Buffer Overflow in httpd in EpiCentro E_7.3.2+ allows attackers to execute code remotely via a specially crafted GET request without a leading "/" and without authentication. | [
"cpe:2.3:o:adbglobal:epicentro:7.3.2:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
GHSA-8rrh-9958-v272 | In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | []
| null | 5.5 | null | null |
|
GHSA-23j3-qh8r-rpx6 | Cross-site scripting vulnerability in L-Forum 2.40 and earlier, when the "Enable HTML in messages" option is off, allows remote attackers to insert arbitrary script or HTML via message fields including (1) From, (2) E-Mail, and (3) Subject. | []
| null | null | null | null |
|
CVE-2007-3695 | Buffer overflow in LICRCMD.EXE in CA ERwin Process Modeler (formerly AllFusion Process Modeler) 7.1 allows attackers to execute arbitrary code via a long filename. NOTE: the researcher does not suggest any circumstances in which the filename would come from an untrusted source, and therefore perhaps the issue does not cross privilege boundaries and should not be included in CVE. | [
"cpe:2.3:a:broadcom:erwin_process_modeler:7.1:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-425g-3v2m-rf2q | dingfanzu CMS V1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/doAdminAction.php?act=addAdmin. | []
| null | 9.3 | null | null |
|
CVE-2019-4701 | IBM Security Guardium Data Encryption (GDE) 3.0.0.2 is deployed with active debugging code that can create unintended entry points. IBM X-Force ID: 171936. | [
"cpe:2.3:a:ibm:guardium_data_encryption:3.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:guardium_for_cloud_key_management:*:*:*:*:*:*:*:*"
]
| null | null | 5.3 | null |
|
ICSA-21-056-04 | ProSoft Technology ICX35 | Changing the password on the module webpage does not require the user to type in the current password first. Thus, the password could be changed by a user or external process without knowledge of the current password.CVE-2021-22661 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L). | []
| null | null | 8.2 | null |
CVE-2017-17472 | TG Soft Vir.IT eXplorer Lite 8.5.42 allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact via a \\.\Viragtlt DeviceIoControl request of 0x82730030. | [
"cpe:2.3:a:tgsoft:vir.it_explorer:8.5.42:*:*:*:lite:*:*:*"
]
| null | null | 7.8 | 6.1 |
|
CVE-2022-24082 | If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture. | [
"cpe:2.3:a:pega:infinity:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | null |
|
GHSA-8ph9-x262-cchw | The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN). | []
| null | 5.9 | null | null |
|
GHSA-j939-hwr4-9qqc | The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. | []
| null | null | null | null |
|
GHSA-v4j6-g54m-mcxj | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). | []
| null | 4.3 | null | null |
|
GHSA-pvvp-x5gj-xmcr | libxcrypt in SUSE openSUSE 11.0 uses the DES algorithm when the configuration specifies the MD5 algorithm, which makes it easier for attackers to conduct brute-force attacks against hashed passwords. | []
| null | 7.5 | null | null |
|
RHSA-2012:1593 | Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.0 update | apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token | [
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3"
]
| null | null | null | null |
GHSA-89gq-fxm9-f6xg | An issue was discovered in AUO Solar Data Recorder before 1.3.0. The web portal uses HTTP Basic Authentication and provides the account and password in the WWW-Authenticate attribute. By using this account and password, anyone can login successfully. | []
| null | null | 9.8 | null |
|
GHSA-54vm-jhgv-phv5 | In the Linux kernel, the following vulnerability has been resolved:drivers: staging: rtl8192bs: Fix deadlock in rtw_joinbss_event_prehandle()There is a deadlock in rtw_joinbss_event_prehandle(), which is shown
below:(Thread 1) | (Thread 2)
| _set_timer()
rtw_joinbss_event_prehandle()| mod_timer()
spin_lock_bh() //(1) | (wait a time)
... | _rtw_join_timeout_handler()
del_timer_sync() | spin_lock_bh() //(2)
(wait timer to stop) | ...We hold pmlmepriv->lock in position (1) of thread 1 and
use del_timer_sync() to wait timer to stop, but timer handler
also need pmlmepriv->lock in position (2) of thread 2.
As a result, rtw_joinbss_event_prehandle() will block forever.This patch extracts del_timer_sync() from the protection of
spin_lock_bh(), which could let timer handler to obtain
the needed lock. What`s more, we change spin_lock_bh() to
spin_lock_irq() in _rtw_join_timeout_handler() in order to
prevent deadlock. | []
| null | 5.5 | null | null |
|
GHSA-gfxg-882h-6vf5 | The integrity check feature in OpenPGP, when handling a message that was encrypted using cipher feedback (CFB) mode, allows remote attackers to recover part of the plaintext via a chosen-ciphertext attack when the first 2 bytes of a message block are known, and an oracle or other mechanism is available to determine whether an integrity check failed. | []
| null | null | null | null |
|
CVE-2020-10289 | RVD#2401: Use of unsafe yaml load, ./src/actionlib/tools/library.py:132 | Use of unsafe yaml load. Allows instantiation of arbitrary objects. The flaw itself is caused by an unsafe parsing of YAML values which happens whenever an action message is processed to be sent, and allows for the creation of Python objects. Through this flaw in the ROS core package of actionlib, an attacker with local or remote access can make the ROS Master, execute arbitrary code in Python form. Consider yaml.safe_load() instead. Located first in actionlib/tools/library.py:132. See links for more info on the bug. | [
"cpe:2.3:o:openrobotics:robot_operating_system:-:*:*:*:*:*:*:*"
]
| null | null | 8 | null |
GHSA-j8pm-8jqg-vg5f | cmds/servicemanager/service_manager.c in Android before commit 7d42a3c31ba78a418f9bdde0e0ab951469f321b5 allows attackers to cause a denial of service (NULL pointer dereference, or out-of-bounds write) via vectors related to binder passed lengths. | []
| null | null | 7.5 | null |
|
CVE-2020-20125 | EARCLINK ESPCMS-P8 contains a cross-site scripting (XSS) vulnerability in espcms_web\espcms_load.php. | [
"cpe:2.3:a:earclink:espcms-p8:-:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
GHSA-jpw9-fm6r-w3ph | Inappropriate implementation in WebAuthentication in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | []
| null | null | null | null |
|
CVE-2021-22775 | A CWE-427: Uncontrolled Search Path Element vulnerability exists in GP-Pro EX,V4.09.250 and prior, that could cause local code execution with elevated privileges when installing the software. | [
"cpe:2.3:a:schneider-electric:gp-pro_ex:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 4.4 |
|
GHSA-9p7x-652m-pw9q | The Web Application Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.1.2. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in. | []
| null | 5.3 | null | null |
|
CVE-2022-43563 | Risky command safeguards bypass via rex search command field names in Splunk Enterprise | In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.
| [
"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*"
]
| null | 8.1 | null | null |
CVE-2018-0900 | The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0901 and CVE-2018-0926. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
]
| null | null | 4.7 | 1.9 |
|
GHSA-pxmf-hj8c-p8f5 | A Reflected Cross Site Scripting (XSS) vulnerability exists in the authorization function exposed by RESTful Web Api of IBM Worklight Framework 6.1, 6.2, 6.3, 7.0, 7.1, and 8.0. The vulnerable parameter is "scope"; if you set as its value a "realm" not defined in authenticationConfig.xml, you get an HTTP 403 Forbidden response and the value will be reflected in the body of the HTTP response. By setting it to arbitrary JavaScript code it is possible to modify the flow of the authorization function, potentially leading to credential disclosure within a trusted session. | []
| null | null | 6.1 | null |
|
CVE-2024-31395 | Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the schedule management page. | []
| null | 6.1 | null | null |
|
ICSA-21-061-01 | Hitachi ABB Power Grids Ellipse EAM | An attacker could exploit this vulnerability by tricking a user to click on a link containing malicious code that would then be run by the web browser. This can result in the compromise of confidential information, or even the takeover of the user 's session.CVE-2021-27416 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L). An attacker could trick a user into visiting a malicious website posing as a login page for the Ellipse application and gather authentication credentials.CVE-2021-27414 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L). | []
| null | null | 5.5 | null |
GHSA-mh8r-x9cq-9xpw | Cross-site scripting (XSS) vulnerability in register.html in PHPShop 2.1 EE and earlier allows remote attackers to inject arbitrary web script or HTML via the name_new parameter. | []
| null | null | null | null |
|
GHSA-pp59-86jf-38h5 | CVA6 commit 909d85a accesses invalid memory when reading the value of MHPMCOUNTER30. | []
| null | 7.5 | null | null |
|
CVE-2021-45079 | In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication. | [
"cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*"
]
| null | 9.1 | null | 5.8 |
|
RHSA-2021:3873 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.9 security, bug, and container updates | semver-regex: inefficient regular expression complexity nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-15256 nodejs-set-value: type confusion allows bypass of CVE-2019-10747 redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Out of bounds read in lua debugger protocol parser redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings | [
"cpe:/a:redhat:acm:2.2::el7",
"cpe:/a:redhat:acm:2.2::el8"
]
| null | 7.5 | null | null |
CVE-2020-25278 | An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. The Quram image codec library allows attackers to overwrite memory and execute arbitrary code via crafted JPEG data that is mishandled during decoding. The Samsung IDs are SVE-2020-18088, SVE-2020-18225, SVE-2020-18301 (September 2020). | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.