id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-wr46-prmv-f8jh | In app uninstallation, there is a possible set of permissions that may not be removed from a shared app ID. This could lead to a local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10 Android ID: A-116608833 | []
| null | null | null | null |
|
GHSA-x34j-6mpj-mxmm | PHP remote file inclusion vulnerability in MOD_forum_fields_parse.php in the Forum picture and META tags 1.7 module for phpBB allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | []
| null | null | null | null |
|
CVE-2019-14257 | pyraw in Zenoss 2.5.3 allows local privilege escalation by modifying environment variables to redirect execution before privileges are dropped, aka ZEN-31765. | [
"cpe:2.3:a:zenoss:zenoss:2.5.3:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 7.2 |
|
CVE-2020-26297 | XSS in mdBook's search page | mdBook is a utility to create modern online books from Markdown files and is written in Rust. In mdBook before version 0.4.5, there is a vulnerability affecting the search feature of mdBook, which could allow an attacker to execute arbitrary JavaScript code on the page. The search feature of mdBook (introduced in version 0.1.4) was affected by a cross site scripting vulnerability that allowed an attacker to execute arbitrary JavaScript code on an user's browser by tricking the user into typing a malicious search query, or tricking the user into clicking a link to the search page with the malicious search query prefilled. mdBook 0.4.5 fixes the vulnerability by properly escaping the search query. Owners of websites built with mdBook have to upgrade to mdBook 0.4.5 or greater and rebuild their website contents with it. | [
"cpe:2.3:a:rust-lang:mdbook:*:*:*:*:*:rust:*:*"
]
| null | 8.2 | null | null |
CVE-2006-7126 | SQL injection vulnerability in Joomla BSQ Sitestats 1.8.0 and 2.2.1 allows remote attackers to execute arbitrary SQL commands via the query string, possibly PHP_SELF. | [
"cpe:2.3:a:joomla:bsq_sitestats:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:bsq_sitestats:2.1.1:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2014-5324 | Unrestricted file upload vulnerability in the N-Media file uploader plugin before 3.4 for WordPress allows remote authenticated users to execute arbitrary PHP code by leveraging Author privileges to store a file. | [
"cpe:2.3:a:najeebmedia:n-media_file_uploader:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:najeebmedia:n-media_file_uploader:3.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:najeebmedia:n-media_file_uploader:3.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:najeebmedia:n-media_file_uploader:3.2:*:*:*:*:wordpress:*:*"
]
| null | null | null | 6.5 |
|
CVE-2020-25756 | A buffer overflow vulnerability exists in the mg_get_http_header function in Cesanta Mongoose 6.18 due to a lack of bounds checking. A crafted HTTP header can exploit this bug. NOTE: a committer has stated "this will not happen in practice. | [
"cpe:2.3:a:cesanta:mongoose:6.18:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2020-1289 | A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'. This CVE ID is unique from CVE-2020-1148. | [
"cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
CVE-2012-5192 | Directory traversal vulnerability in gmap/view_overlay.php in Bitweaver 2.8.1 and earlier allows remote attackers to read arbitrary files via "''%2F" (dot dot encoded slash) sequences in the overlay_type parameter. | [
"cpe:2.3:a:bitweaver:bitweaver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bitweaver:bitweaver:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bitweaver:bitweaver:1.1.1_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:bitweaver:bitweaver:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bitweaver:bitweaver:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bitweaver:bitweaver:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bitweaver:bitweaver:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bitweaver:bitweaver:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bitweaver:bitweaver:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bitweaver:bitweaver:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bitweaver:bitweaver:2.7:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2021-28950 | An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A "stall on CPU" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 2.1 |
|
CVE-2017-10355 | Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). | [
"cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | 5.3 | null | 5 |
|
GHSA-4mxc-25gg-cmp8 | IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow remote attackers to execute arbitrary Java code through an administrative client class with a serialized object from untrusted sources. IBM X-Force ID: 152533. | []
| null | null | 9.8 | null |
|
GHSA-qjrv-wmmp-jvg2 | The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface. | []
| null | null | 7.8 | null |
|
CVE-2020-7037 | Avaya Equinox Conferencing XXE vulnerability | An XML External Entities (XXE) vulnerability in Media Server component of Avaya Equinox Conferencing could allow an authenticated, remote attacker to gain read access to information that is stored on an affected system or even potentially lead to a denial of service. The affected versions of Avaya Equinox Conferencing includes all 9.x versions before 9.1.11. Equinox Conferencing is now offered as Avaya Meetings Server. | [
"cpe:2.3:a:avaya:equinox_conferencing:*:*:*:*:*:*:*:*"
]
| null | 8.1 | null | null |
GHSA-89g3-3wcc-6vq4 | The RSVP and Event Management plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX functions like bulk_delete_attendees() and bulk_delete_questions() in all versions up to, and including, 2.7.13. This makes it possible for unauthenticated attackers to delete questions and attendees and for authenticated users to update question menu orders. | []
| null | 5.3 | null | null |
|
GHSA-g872-jwwr-vggm | Admidio Vulnerable to RCE via Arbitrary File Upload in Message Attachment | Description:Remote Code Execution Vulnerability has been identified in the Message module of the Admidio Application, where it is possible to upload a PHP file in the attachment. The uploaded file can be accessed publicly through the URL `{admidio_base_url}/adm_my_files/messages_attachments/{file_name}`.The vulnerability is caused due to the lack of file extension verification, allowing malicious files to be uploaded to the server and public availability of the uploaded file.An attacker can upload a PHP web shell that executes OS commands on the server, compromising the application server.Note: I am using the docker-compose.yaml file from https://github.com/Admidio/admidio/blob/master/README-Docker.md#docker-compose-usage official documentation.Impact:An attacker can exploit this flaw to upload a PHP web shell, which can be used to execute arbitrary commands on the server. This can lead to a complete compromise of the application server, allowing the attacker to:Execute arbitrary code or commands.Access, modify, or delete sensitive data.Install malicious software or scripts.Gain further access to internal networks.Disrupt services and applications hosted on the server.Recommendation:Implement strict file extension verification to ensure that only allowed file types (e.g., images, documents) can be uploaded.Reject any file upload with disallowed or suspicious extensions such as .php, .phtml, .exe, etc.Steps to Reproduce:As a member user, go to write an email message.Upload a PHP file in the Attachment, containing the following content:Send the email.In the message history go to the sent message.Download the file, to get the uploaded file name.Go to the following URL:
`{admidio_base_url}/adm_my_files/messages_attachments/{file_name}?command=cat+/etc/passwd`The server's passwd file would be returned in the response.Proof Of Concept:_Figure 1: Code of messages_send.php, not having file extension verification.__Figure 2: Uploading Webshell as attachment.__Figure 3: Download the uploaded file to get the uploaded file name.__Figure 4: Uploaded File name.__Figure 5: RCE via web shell.__Figure 6: RCE via Webshell._ | []
| 9.3 | 9 | null | null |
GHSA-47pj-q2vm-46xc | Collection.js vulnerable to Prototype Pollution | Versions of the package collection.js before 6.8.1 are vulnerable to Prototype Pollution via the `extend` function in `Collection.js/dist/node/iterators/extend.js`. | []
| null | 7.5 | null | null |
CVE-2025-25125 | WordPress Fyrebox Quizzes plugin <= 2.7 - CSRF to Stored XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in CyrilG Fyrebox Quizzes allows Stored XSS. This issue affects Fyrebox Quizzes: from n/a through 2.7. | []
| null | 7.1 | null | null |
CVE-2023-1330 | Redirection < 1.1.4 - Redirect Creation via CSRF | The Redirection WordPress plugin before 1.1.4 does not add nonce verification in place when adding the redirect, which could allow attackers to add redirects via a CSRF attack. | [
"cpe:2.3:a:inisev:redirection:*:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | null |
CVE-2017-17480 | In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtovolume function in jp3d/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution. | [
"cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-2c3g-5x92-qfrv | Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39900. | []
| null | 7.8 | null | null |
|
CVE-2022-38997 | The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. | [
"cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
RHSA-2025:0063 | Red Hat Security Advisory: kernel security update | kernel: i40e: Do not allow untrusted VF to remove administratively set MAC kernel: net/sched: Fix UAF when resolving a clash kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
]
| null | 5.9 | null | null |
CVE-2018-14773 | An issue was discovered in Http Foundation in Symfony 2.7.0 through 2.7.48, 2.8.0 through 2.8.43, 3.3.0 through 3.3.17, 3.4.0 through 3.4.13, 4.0.0 through 4.0.13, and 4.1.0 through 4.1.2. It arises from support for a (legacy) IIS header that lets users override the path in the request URL via the X-Original-URL or X-Rewrite-URL HTTP request header. These headers are designed for IIS support, but it's not verified that the server is in fact running IIS, which means anybody who can send these requests to an application can trigger this. This affects \Symfony\Component\HttpFoundation\Request::prepareRequestUri() where X-Original-URL and X_REWRITE_URL are both used. The fix drops support for these methods so that they cannot be used as attack vectors such as web cache poisoning. | [
"cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4 |
|
CVE-2018-20940 | cPanel before 68.0.27 allows attackers to read root's crontab file during a short time interval upon the enabling of backups (SEC-342). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
]
| null | null | 3.3 | 2.1 |
|
GHSA-7g99-j2h6-cvr3 | The Facetag extension 0.0.3 for Piwigo allows XSS via the name parameter to ws.php in a facetag.changeTag action. | []
| null | null | 6.1 | null |
|
CVE-2009-2803 | CarbonCore in Apple Mac OS X 10.4.11 and 10.5.8 allows attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a file with a crafted resource fork. | [
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
RHSA-2008:0825 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP03 security update | Cross-site scripting (XSS) vulnerability in Sun Java Server Faces JBossEAP status servlet info leak | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
]
| null | null | null | null |
RHSA-2024:1150 | Red Hat Security Advisory: buildah security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 5.9 | null | null |
CVE-2020-1827 | Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage. | [
"cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
CVE-2004-0417 | Integer overflow in the "Max-dotdot" CVS protocol command (serve_max_dotdot) for CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, may allow remote attackers to cause a server crash, which could cause temporary data to remain undeleted and consume disk space. | [
"cpe:2.3:a:cvs:cvs:1.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.11.1_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.11.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.11.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.11.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.11.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.11.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.12.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cvs:cvs:1.12.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openpkg:openpkg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openpkg:openpkg:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
RHSA-2022:2196 | Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update | dotnet: excess memory allocation via HttpClient causes DoS dotnet: malicious content causes high CPU and memory usage dotnet: parsing HTML causes Denial of Service | [
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
]
| null | 7.5 | null | null |
CVE-2020-26897 | Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11. | [
"cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*"
]
| null | 9.6 | null | null |
|
GHSA-cg82-hjjv-j6cv | Information disclosure due to lack of address range check done on the SysDBG buffers in SDI code. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, MDM9205, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8998, Nicobar, QCS404, QCS405, QCS605, QM215, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, Snapdragon_High_Med_2016, SXR1130 | []
| null | null | null | null |
|
GHSA-wrv9-wmj5-v6r7 | Hospital Management System v4.0 was discovered to contain a blind SQL injection vulnerability via the register function in func2.php. | []
| null | 7.5 | null | null |
|
GHSA-46fc-9xfj-r45q | member2.php in vBulletin 2.2.9 and earlier does not properly restrict the $perpage variable to be an integer, which causes an error message to be reflected back to the user without quoting, which facilitates cross-site scripting (XSS) and possibly other attacks. | []
| null | null | null | null |
|
GHSA-7g9c-8m96-pfwh | PHP remote file inclusion vulnerability in article.php in ACGV News 0.9.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the PathNews parameter. | []
| null | null | null | null |
|
GHSA-jvjg-hq5c-v4vm | The start function in class.t3lib_formmail.php in TYPO3 before 4.0.5, 4.1beta, and 4.1RC1 allows attackers to inject arbitrary email headers via unknown vectors. NOTE: some details were obtained from third party information. | []
| null | null | null | null |
|
CVE-2024-45271 | MB connect line/Helmholz: Remote code execution due to improper input validation | An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation. | [
"cpe:2.3:a:mb_connect_line:mbnet.mini:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rex100:helmholz:*:*:*:*:*:*:*:*",
"cpe:2.3:o:mbconnectline:mbnet.mini_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mbconnectline:mbnet.mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:helmholz:rex_100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:helmholz:rex_100:-:*:*:*:*:*:*:*"
]
| null | 8.4 | null | null |
GHSA-9xvg-x75r-p5hp | A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution. | []
| null | null | 8.8 | null |
|
CVE-2001-0556 | The Nirvana Editor (NEdit) 5.1.1 and earlier allows a local attacker to overwrite other users' files via a symlink attack on (1) backup files or (2) temporary files used when nedit prints a file or portions of a file. | [
"cpe:2.3:a:nedit:nedit:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
CVE-2009-1861 | Multiple heap-based buffer overflows in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF file with a JPX (aka JPEG2000) stream that triggers heap memory corruption. | [
"cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:elements:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.9:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:security_update:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:security_update:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
CVE-2009-2051 | Cisco IOS 12.2 through 12.4 and 15.0 through 15.1, Cisco IOS XE 2.5.x and 2.6.x before 2.6.1, and Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.x, 5.x before 5.1(3g), 6.x before 6.1(4), and 7.x before 7.1(2) allow remote attackers to cause a denial of service (device reload or voice-services outage) via a malformed SIP INVITE message that triggers an improper call to the sipSafeStrlen function, aka Bug IDs CSCsz40392 and CSCsz43987. | [
"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
GHSA-xxh7-3px8-x367 | A vulnerability, which was classified as critical, has been found in SourceCodester AC Repair and Services System 1.0. Affected by this issue is some unknown functionality of the file services/view.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227702 is the identifier assigned to this vulnerability. | []
| null | null | 6.3 | null |
|
GHSA-27hw-76jw-48hx | The default configuration of Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, does not enable the Enhanced Security feature, which has unspecified impact and attack vectors, related to a "script injection vulnerability," as demonstrated by Acrobat Forms Data Format (FDF) behavior that allows cross-site scripting (XSS) by user-assisted remote attackers. | []
| null | null | null | null |
|
CVE-2015-9350 | The feed-them-social plugin before 1.7.0 for WordPress has reflected XSS in the Facebook Feeds load more button. | [
"cpe:2.3:a:slickremix:feed_them_social:*:*:*:*:*:wordpress:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2024-2774 | Campcodes Online Marriage Registration System search.php sql injection | A vulnerability classified as critical was found in Campcodes Online Marriage Registration System 1.0. This vulnerability affects unknown code of the file /user/search.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257608. | [
"cpe:2.3:a:campcodes:online_marriage_registration_system:1.0:*:*:*:*:*:*:*"
]
| null | 6.3 | 6.3 | 6.5 |
CVE-2023-29505 | An issue was discovered in Zoho ManageEngine Network Configuration Manager 12.6.165. The WebSocket endpoint allows Cross-site WebSocket hijacking. | [
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126165:*:*:*:*:*:*"
]
| null | 4.3 | null | null |
|
CVE-2022-34727 | Microsoft ODBC Driver Remote Code Execution Vulnerability | Microsoft ODBC Driver Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:azure:*:*"
]
| null | 8.8 | null | null |
CVE-2018-11228 | Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices before 2.001.0037.001 allow unauthenticated remote code execution via a Bash shell service in Crestron Toolbox Protocol (CTP). | [
"cpe:2.3:o:crestron:crestron_toolbox_protocol_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:dmc-str:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-1060:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-1060-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-560:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-560-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-760-nc:-:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
CVE-2018-4157 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. macOS before 10.13.4 is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "Quick Look" component. A race condition allows attackers to execute arbitrary code in a privileged context via a crafted app. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
| null | null | 7 | 7.6 |
|
CVE-2025-31381 | WordPress Booking Calendar and Notification plugin <= 4.0.3 - Broken Authentication vulnerability | Missing Authorization vulnerability in shiptrack Booking Calendar and Notification allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booking Calendar and Notification: from n/a through 4.0.3. | []
| null | 6.5 | null | null |
GHSA-6cf3-hrc5-w9g6 | IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152157. | []
| null | 5.4 | null | null |
|
GHSA-8rp4-gqh3-jpxm | Cleartext transmission of sensitive information vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to obtain sensitive information via an HTTP session. | []
| null | 5.9 | null | null |
|
GHSA-8c5h-pgpw-2c92 | CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/User/level_sort. | []
| null | 8.8 | null | null |
|
GHSA-m6vg-4fc5-7hch | Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via the comment parameter. | []
| null | null | null | null |
|
GHSA-gh8j-c69q-gf38 | The Squid Software Foundation Squid HTTP Caching Proxy version 3.0 to 3.5.27, 4.0 to 4.0.22 contains a Incorrect Pointer Handling vulnerability in ESI Response Processing that can result in Denial of Service for all clients using the proxy.. This attack appear to be exploitable via Remote server delivers an HTTP response payload containing valid but unusual ESI syntax.. This vulnerability appears to have been fixed in 4.0.23 and later. | []
| null | null | 7.5 | null |
|
GHSA-pgm8-68cp-c7h6 | SQL injection vulnerability in shipup before v.3.3.0 allows a remote attacker to escalate privileges via the getShopID function. | []
| null | null | null | null |
|
CVE-2014-0181 | The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
CVE-2008-6483 | PHP remote file inclusion vulnerability in admin.googlebase.php in the Ecom Solutions VirtueMart Google Base (aka com_googlebase or Froogle) component 1.1 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. | [
"cpe:2.3:a:virtuemart-solutions:com_googlebase:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2020-7064 | Use-of-uninitialized-value in exif | In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead to information disclosure or crash. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
CVE-2021-22548 | Arbitrary enclave memory overread vulnerability in Asylo TrustedPrimitives::UntrustedCall | An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c | [
"cpe:2.3:a:google:asylo:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
CVE-2024-39631 | WordPress Contest Gallery plugin <= 23.1.2 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Contest Gallery allows Stored XSS.This issue affects Contest Gallery: from n/a through 23.1.2. | [
"cpe:2.3:a:contest_gallery:contest_gallery:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:*:wordpress:*:*"
]
| null | 7.1 | null | null |
GHSA-x3fr-wvmg-75f4 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14898. | []
| null | null | null | null |
|
CVE-2021-43712 | Stored XSS in Add New Employee Form in Sourcecodester Employee Daily Task Management System 1.0 Allows Remote Attacker to Inject/Store Arbitrary Code via the Name Field. | [
"cpe:2.3:a:employee_daily_task_management_system_project:employee_daily_task_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
CVE-1999-1070 | Buffer overflow in ping CGI program in Xylogics Annex terminal service allows remote attackers to cause a denial of service via a long query parameter. | [
"cpe:2.3:a:xylogics:annex:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2020-24842 | PNPSCADA 2.200816204020 allows cross-site scripting (XSS), which can execute arbitrary JavaScript in the victim's browser. | [
"cpe:2.3:a:sdgc:pnpscada:2.200816204020:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
GHSA-578q-5cjf-hf99 | platform/msm_shared/mmc.c in the Qualcomm components in Android before 2016-07-05 on Nexus 7 (2013) devices mishandles the power-on write-protect feature, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28821253 and Qualcomm internal bug CR580567. | []
| null | null | 7.8 | null |
|
CVE-2024-37439 | WordPress Uncanny Toolkit Pro for LearnDash plugin < 4.1.4.1 - Subscriber+ Arbitrary Post/Page Duplication vulnerability | Missing Authorization vulnerability in Uncanny Owl Uncanny Toolkit Pro for LearnDash allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Uncanny Toolkit Pro for LearnDash: from n/a through 4.1.4.0 | [
"cpe:2.3:a:uncannyowl:uncanny_toolkit_pro_for_learndash:*:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
GHSA-jj2v-2j63-rcwf | In the Linux kernel, the following vulnerability has been resolved:netfilter: nf_tables: set dormant flag on hook register failureWe need to set the dormant flag again if we fail to register
the hooks.During memory pressure hook registration can fail and we end up
with a table marked as active but no registered hooks.On table/base chain deletion, nf_tables will attempt to unregister
the hook again which yields a warn splat from the nftables core. | []
| null | 5.5 | null | null |
|
CVE-2019-3640 | Data Loss Prevention - Unprotected Transport of Credentials | Unprotected Transport of Credentials in ePO extension in McAfee Data Loss Prevention 11.x prior to 11.4.0 allows remote attackers with access to the network to collect login details to the LDAP server via the ePO extension not using a secure connection when testing LDAP connectivity. | [
"cpe:2.3:a:mcafee:data_loss_prevention:*:*:*:*:*:*:*:*"
]
| null | 4.8 | null | null |
GHSA-pj47-cjfq-jwp4 | A validation issue was addressed with improved logic. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina. A malicious application may be able to send unauthorized Apple events to Finder. | []
| null | null | null | null |
|
CVE-2023-39670 | Tenda AC6 _US_AC6V1.0BR_V15.03.05.16 was discovered to contain a buffer overflow via the function fgets. | [
"cpe:2.3:h:tenda:ac6:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-wxfm-v7w9-3w7w | Cross Site Scripting vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to obtain sensitive information via the adminname parameter of admin-profile.php. | []
| null | 4.8 | null | null |
|
CVE-2024-0448 | The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widget URL parameters in all versions up to, and including, 8.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor access or higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:livemesh:elementor_addons:*:*:*:*:*:wordpress:*:*"
]
| null | 6.4 | null | null |
|
GHSA-h3wp-82m4-rpj4 | SQL injection vulnerability in gallery.asp in Absolute Image Gallery 2.0 allows remote attackers to execute arbitrary SQL commands via the categoryid parameter in a viewimage action. | []
| null | null | null | null |
|
CVE-2023-32231 | An issue was discovered in Vasion PrinterLogic Client for Windows before 25.0.0.818. During installation, binaries gets executed out of a subfolder in C:\Windows\Temp. A standard user can create the folder and path file ahead of time and obtain elevated code execution. | [
"cpe:2.3:a:vasion:printerlogic_client:*:*:*:*:*:windows:*:*"
]
| null | 9.9 | null | null |
|
GHSA-fv9m-f7w4-889c | discordi.js is malware | The `discordi.js` package is malware that attempts to discover and exfiltrate a user's [Discord](https://discordapp.com/) credentials, sending them to pastebin.All versions have been unpublished from the npm registry.RecommendationDo not install / use this module. It has been unpublished from the npm registry but may exist in some caches. Any users that logged into Discord using this library will need to change their credentials. | []
| null | null | 7.3 | null |
GHSA-mj94-22c5-c665 | Sample Internet Data Query (IDQ) scripts in IIS 3 and 4 allow remote attackers to read files via a .. (dot dot) attack. | []
| null | null | null | null |
|
CVE-2019-19250 | OpenTrade before 2019-11-23 allows SQL injection, related to server/modules/api/v1.js and server/utils.js. | [
"cpe:2.3:a:opentrade_project:opentrade:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-2m33-fq4w-f79p | Unspecified vulnerability in the Sun Java System Communications Express component in Oracle Sun Product Suite 6 2005Q4 (6.2) and and 6.3 allows remote authenticated users to affect confidentiality via unknown vectors related to Address Book. | []
| null | null | null | null |
|
CVE-2014-3157 | Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.71:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.72:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.82:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.84:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.85:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.86:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.88:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.90:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.92:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.93:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.95:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.96:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.98:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.99:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.101:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.103:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.104:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.105:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.106:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.107:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.108:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.109:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.110:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.111:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.112:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.113:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.114:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.115:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.116:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.117:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.118:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.119:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.120:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.121:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.122:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.123:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.124:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.125:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.126:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.127:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.128:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.137:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.138:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.140:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.141:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.142:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.149:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.150:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.151:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2017-2610 | jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting in search suggestions due to improperly escaping users with less-than and greater-than characters in their names (SECURITY-388). | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*"
]
| null | null | 5.4 | null |
|
GHSA-w6fr-625j-hv8m | Unspecified vulnerability in the PeopleSoft PeopleTools component in Oracle PeopleSoft Products 8.51 and 8.52 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to PeopleCode. | []
| null | null | null | null |
|
CVE-2022-46348 | A vulnerability has been identified in Parasolid V33.1 (All versions < V33.1.264), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.170), Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2022 (All versions), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds write past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19383) | [
"cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
CVE-2013-5553 | Multiple memory leaks in Cisco IOS 15.1 before 15.1(4)M7 allow remote attackers to cause a denial of service (memory consumption or device reload) by sending a crafted SIP message over (1) IPv4 or (2) IPv6, aka Bug IDs CSCuc42558 and CSCug25383. | [
"cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
CVE-2010-4054 | The gs_type2_interpret function in Ghostscript allows remote attackers to cause a denial of service (incorrect pointer dereference and application crash) via crafted font data in a compressed data stream, aka bug 691043. | [
"cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:afpl_ghostscript:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2021-25485 | Path traversal vulnerability in FactoryAirCommnadManger prior to SMR Oct-2021 Release 1 allows attackers to write file as system UID via BT remote socket. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2009-0378 | Cross-site scripting (XSS) vulnerability in index.php in the beamospetition (com_beamospetition) 1.0.12 component for Joomla! allows remote attackers to inject arbitrary web script or HTML via the pet parameter in a sign action. | [
"cpe:2.3:a:joomla:com_beamospetition:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2021-44217 | In Ericsson CodeChecker through 6.18.0, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API. | [
"cpe:2.3:a:ericsson:codechecker:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
GHSA-v9q8-4j3p-xvw9 | Cross-site scripting (XSS) vulnerability in webadmin/policy/group_table_ajax.php/ in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. | []
| null | null | null | null |
|
GHSA-mr7q-8c5m-vw8x | A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA or services scanning content of web access on the WSA. More Information: SCvb91473, CSCvc76500. Known Affected Releases: 10.0.0-203 9.9.9-894 WSA10.0.0-233. | []
| null | null | 5.8 | null |
|
GHSA-mfgm-v8rv-75rw | Array index error in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows remote attackers to cause a denial of service (reboot) via a crafted TrueType font file, aka "TrueType Font Parsing Vulnerability," a different vulnerability than CVE-2011-3402. | []
| null | null | null | null |
|
GHSA-93vr-9q9m-pj8p | TensorFlow vulnerable to Out-of-Bounds Read in DynamicStitch | ImpactIf the parameter `indices` for `DynamicStitch` does not match the shape of the parameter `data`, it can trigger an stack OOB read.PatchesWe have patched the issue in GitHub commit [ee004b18b976eeb5a758020af8880236cd707d05](https://github.com/tensorflow/tensorflow/commit/ee004b18b976eeb5a758020af8880236cd707d05).The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis has been reported via Google OSS VRP. | []
| null | 7.5 | null | null |
CVE-2020-9007 | Codoforum 4.8.8 allows self-XSS via the title of a new topic. | [
"cpe:2.3:a:codologic:codoforum:4.8.8:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
GHSA-8rgp-h8v7-xr48 | Cross-Site Request Forgery (CSRF) vulnerability in Dave Kiss Vimeography: Vimeo Video Gallery WordPress Plugin.This issue affects Vimeography: Vimeo Video Gallery WordPress Plugin: from n/a through 2.4.1. | []
| null | 4.3 | null | null |
|
GHSA-wg4g-mgmc-88mm | In Auto-Maskin RP210E Versions 3.7 and prior, DCU210E Versions 3.7 and prior and Marine Observer Pro (Android App), the software contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak. | []
| null | null | null | null |
|
GHSA-4422-2p52-phgf | Apple Mac OS X 10.3.4, 10.4, 10.5, and possibly other versions does not properly clear memory for login (aka Loginwindow.app), Keychain, or FileVault passwords, which could allow the root user or an attacker with physical access to obtain sensitive information by reading memory. | []
| null | null | null | null |
|
GHSA-jgh4-jhhw-f27m | Cross-site scripting (XSS) vulnerability in the Web UI in IBM Spectrum Control (formerly Tivoli Storage Productivity Center) 5.2.x before 5.2.11 allows remote authenticated users to inject arbitrary web script or HTML via an embedded string. | []
| null | null | 5.4 | null |
|
CVE-2023-49375 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/friend_link/update. | [
"cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.