id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-7fj2-qj5r-2prf | An exploitable command injection vulnerability exists in the way Netgate pfSense CE 2.4.4-RELEASE processes the parameters of a specific POST request. The attacker can exploit this and gain the ability to execute arbitrary commands on the system. An attacker needs to be able to send authenticated POST requests to the administration web interface. Command injection is possible in the `powerd_ac_mode` POST parameter parameter. | []
| null | null | 7.2 | null |
|
RHSA-2019:3699 | Red Hat Security Advisory: evolution security and bug fix update | evolution-ews: all certificate errors ignored if error is ignored during initial account setup in gnome-online-accounts | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | null | 8.1 | null |
CVE-2002-0774 | Hosting Controller creates a default user AdvWebadmin with a default password, which could allow remote attackers to gain privileges if the password is not changed. | [
"cpe:2.3:a:hosting_controller:hosting_controller:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.4b:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2011-1205 | Multiple buffer overflows in unspecified COM objects in Rational Common Licensing 7.0 through 7.1.1.4 in IBM Rational ClearCase 7.0.0.4 through 7.1.1.4, ClearQuest 7.0.0.4 through 7.1.1.4, and other products allow local users to gain privileges via a Trojan horse HTML document in the My Computer zone. | [
"cpe:2.3:a:ibm:rational_clearcase:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.0.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearquest:7.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_common_licensing:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_common_licensing:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_common_licensing:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_common_licensing:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_common_licensing:7.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_common_licensing:7.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_common_licensing:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_common_licensing:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_common_licensing:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_common_licensing:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_common_licensing:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_common_licensing:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_common_licensing:7.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_common_licensing:7.1.1.4:*:*:*:*:*:*:*"
]
| null | null | null | 6.9 |
|
CVE-2019-10591 | Null pointer dereference can happen when parsing udta atom which is non-standard and having invalid depth in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8917, MSM8939, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCS405, QCS605, QM215, Rennell, SA6155P, Saipan, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 | [
"cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9207c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9207c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8939_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8939:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 7.8 |
|
CVE-2023-27195 | Trimble TM4Web 22.2.0 allows unauthenticated attackers to access /inc/tm_ajax.msw?func=UserfromUUID&uuid= to retrieve the last registration access code and use this access code to register a valid account. via a PUT /inc/tm_ajax.msw request. If the access code was used to create an Administrator account, attackers are also able to register new Administrator accounts with full privileges. | [
"cpe:2.3:a:trimble:tm4web:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-xm92-v2mq-842q | Apache Struts improper action name cleanup | Apache Struts 2 before 2.3.29 and 2.5.x before 2.5.1 allow attackers to have unspecified impact via vectors related to improper action name clean up. | []
| null | null | 9.8 | null |
GHSA-84wp-p749-mr24 | File Upload Manager allows remote attackers to upload arbitrary files by modifying the test variable to contain a value of '~~~~~~' (six tildes), which bypasses the file extension checks. | []
| null | null | null | null |
|
CVE-2024-5123 | SourceCodester Event Registration System cross site scripting | A vulnerability classified as problematic has been found in SourceCodester Event Registration System 1.0. This affects an unknown part of the file /registrar/. The manipulation of the argument searchbar leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265203. | [
"cpe:2.3:a:event_registration_system_project:event_registration_system:1.0:*:*:*:*:*:*:*"
]
| 6.9 | 4.3 | 4.3 | 5 |
CVE-2015-7072 | dyld in Apple iOS before 9.2, tvOS before 9.1, and watchOS before 2.1 mishandles segment validation, which allows attackers to execute arbitrary code in a privileged context via a crafted app. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-pp3v-3h95-wqgh | The mdp_lut_hw_update function in drivers/video/msm/mdp.c in the MDP display driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain start and length values within an ioctl call, which allows attackers to gain privileges via a crafted application. | []
| null | null | null | null |
|
GHSA-rwjp-w35q-8m5p | An information disclosure vulnerability in the MediaTek driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31528889. References: MT-ALPS02961395. | []
| null | null | 4.7 | null |
|
GHSA-rwch-g2hc-94xv | A vulnerability in the malware detection functionality within Advanced Malware Protection (AMP) of Cisco AsyncOS Software for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause an email attachment containing malware to be delivered to the end user. The vulnerability is due to the failure of AMP to scan certain EML attachments that could contain malware. An attacker could exploit this vulnerability by sending an email with a crafted EML attachment through the targeted device. A successful exploit could allow the attacker to bypass the configured ESA email message and content filtering and allow the malware to be delivered to the end user. Vulnerable Products: This vulnerability affects Cisco AsyncOS Software for Cisco ESA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA. Cisco Bug IDs: CSCuz81533. | []
| null | null | 5.8 | null |
|
CVE-2024-9921 | TEAMPLUS TECHNOLOGY Team+ - SQL Injection | The Team+ from TEAMPLUS TECHNOLOGY does not properly validate specific page parameter, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify and delete database contents. | [
"cpe:2.3:a:teamplus:team\\+:*:*:*:*:*:*:*:*",
"cpe:2.3:a:teamplus:team\\+_pro:*:*:*:*:private_cloud:android:*:*"
]
| null | 9.8 | null | null |
GHSA-qjw4-q3qv-cc24 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to a buffer overflow. An attacker can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the old_ip and old_mac variables. | []
| null | 7.2 | null | null |
|
GHSA-4w4c-cf9c-3rj3 | An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function get_ipv6_l4proto() located at get.c. This can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact. | []
| null | 7.8 | null | null |
|
CVE-2013-4038 | The Intelligent Platform Management Interface (IPMI) implementation in Integrated Management Module (IMM) on IBM BladeCenter, Flex System, System x iDataPlex, and System x3### servers uses cleartext for password storage, which allows context-dependent attackers to obtain sensitive information by reading a file. | [
"cpe:2.3:h:ibm:bladecenter:hs22:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:hs22v:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:hs23:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:hs23e:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:hx5:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:flex_system_x220_compute_node:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:flex_system_x240_compute_node:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:flex_system_x440_compute_node:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x_idataplex_dx360_m2_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x_idataplex_dx360_m3_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x_idataplex_dx360_m4_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3100_m4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3200_m3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3250_m3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3250_m4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3400_m2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3400_m3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3500_m2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3500_m3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3500_m4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3530_m4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3550_m2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3550_m3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3550_m4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3620_m3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3630_m3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3630_m4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3650_m2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3650_m3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3650_m4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3690_x5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3750_m4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3850_x5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:system_x3950_x5:-:*:*:*:*:*:*:*"
]
| null | null | null | 4 |
|
GHSA-6pvj-2c9w-wwrp | SQL injection vulnerability in index.php in phpComasy 0.7.5 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: an examination of the 0.7.5 source code suggests that there is no id parameter being handled directly by index.php. | []
| null | null | null | null |
|
CVE-2021-40924 | Cross-site scripting (XSS) vulnerability in install/index.php in bugs 1.8 and below version allows remote attackers to inject arbitrary web script or HTML via the first_name parameter. | [
"cpe:2.3:a:pixeline:bugs:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
RHSA-2018:2837 | Red Hat Security Advisory: ceph-iscsi-cli security update | ceph-iscsi-cli: rbd-target-api service runs in debug mode allowing for remote command execution | [
"cpe:/a:redhat:ceph_storage:2::el7"
]
| null | null | 9.8 | null |
GHSA-h58x-cvf6-hg3f | PhotoRange Photo Vault 1.2 appends the password to the URI for authorization, which makes it easier for remote attackers to bypass intended GET restrictions via a brute-force approach, as demonstrated by "GET /login.html__passwd1" and "GET /login.html__passwd2" and so on. | []
| null | null | 9.8 | null |
|
GHSA-7fcw-5hqr-7p5h | Stack-based buffer overflow in the VideoCD (VCD) code in xine-lib 1-rc2 through 1-rc5, as derived from libcdio, allows attackers to execute arbitrary code via a VideoCD with an unterminated disk label. | []
| null | null | null | null |
|
GHSA-ph52-fx5w-3g2w | A Stored XSS issue in Student Clearance System v.1.0 allows the injection of arbitrary JavaScript in the Student registration form. | []
| null | 5.4 | null | null |
|
RHSA-2022:0323 | Red Hat Security Advisory: nginx:1.20 security update | nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 8.1 | null | null |
GHSA-5x95-66xj-7chm | An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.) | []
| null | null | 4.9 | null |
|
CVE-2019-15645 | The zoho-salesiq plugin before 1.0.9 for WordPress has CSRF. | [
"cpe:2.3:a:zoho:salesiq:*:*:*:*:*:wordpress:*:*"
]
| null | null | 8.8 | 6.8 |
|
CVE-2022-23303 | The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494. | [
"cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 6.8 |
|
CVE-2023-39916 | Possible path traversal when storing RRDP responses | NLnet Labs’ Routinator 0.9.0 up to and including 0.12.1 contains a possible path traversal vulnerability in the optional, off-by-default keep-rrdp-responses feature that allows users to store the content of responses received for RRDP requests. The location of these stored responses is constructed from the URL of the request. Due to insufficient sanitation of the URL, it is possible for an attacker to craft a URL that results in the response being stored outside of the directory specified for it. | [
"cpe:2.3:a:nlnetlabs:routinator:*:*:*:*:*:*:*:*"
]
| null | 9.3 | null | null |
GHSA-fgh9-wfj4-j5gv | Nginx NJS v0.7.4 was discovered to contain a segmentation violation in njs_promise_reaction_job. | []
| null | 7.5 | null | null |
|
GHSA-999g-vph2-wr2c | An issue was discovered in Arm Mbed TLS before 2.24.0. An attacker can recover a private key (for RSA or static Diffie-Hellman) via a side-channel attack against generation of base blinding/unblinding values. | []
| null | 4.7 | null | null |
|
GHSA-3536-4v83-8gqw | The Admin CP in vBulletin 5.6.3 allows XSS via the admincp/search.php?do=dosearch URI. | []
| null | null | null | null |
|
CVE-2022-28737 | There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables | There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario. | [
"cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
GHSA-p9j3-jrc9-jv9h | An issue was discovered in Couchbase Server before 7.2.4. An attacker can bypass SQL++ N1QL cURL host restrictions. | []
| null | 5.4 | null | null |
|
RHSA-2025:3854 | Red Hat Security Advisory: OpenJDK 17.0.15 Security Update for Windows Builds | openjdk: Better TLS connection support (Oracle CPU 2025-04) openjdk: Improve compiler transformations (Oracle CPU 2025-04) openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04) | [
"cpe:/a:redhat:openjdk:17::windows"
]
| null | 5.6 | null | null |
CVE-2005-3978 | Multiple SQL injection vulnerabilities in NetClassifieds Premium Edition 1.0.1, Professional Edition 1.5.1, Standard Edition 1.9.6.3, and Free Edition 1.0.1 allow remote attackers to execute arbitrary SQL commands via the (1) CatID parameter in (a) ViewCat.php and (b) gallery.php, and the (2) ItemNum parameter in (c) ViewItem.php. | [
"cpe:2.3:a:scriptdevelopers.net:netclassifieds:1.0.1:*:free:*:*:*:*:*",
"cpe:2.3:a:scriptdevelopers.net:netclassifieds:1.0.1:*:premium:*:*:*:*:*",
"cpe:2.3:a:scriptdevelopers.net:netclassifieds:1.5.1:*:professional:*:*:*:*:*",
"cpe:2.3:a:scriptdevelopers.net:netclassifieds:1.9.6.3:*:standard:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
RHSA-2021:4848 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.5.2 security update and bugfix advisory | nodejs-immer: prototype pollution may lead to DoS or remote code execution mig-controller: incorrect namespaces handling may lead to not authorized usage of Migration Toolkit for Containers (MTC) | [
"cpe:/a:redhat:rhmt:1.5::el7",
"cpe:/a:redhat:rhmt:1.5::el8"
]
| null | 6.3 | null | null |
RHSA-2023:5788 | Red Hat Security Advisory: python-reportlab security update | python-reportlab: code injection in paraparser.py allows code execution | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
]
| null | 9.8 | null | null |
CVE-2023-7111 | code-projects Library Management System index.php sql injection | A vulnerability, which was classified as critical, was found in code-projects Library Management System 2.0. Affected is an unknown function of the file index.php. The manipulation of the argument category leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249006 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:fabianros:library_management_system:2.0:*:*:*:*:*:*:*"
]
| null | 6.3 | 6.3 | 6.5 |
GHSA-m9x3-4xc7-wxxp | foomatic-rip filter, all versions, used insecurely creates temporary files for storage of PostScript data by rendering the data when the debug mode was enabled. This flaw may be exploited by a local attacker to conduct symlink attacks by overwriting arbitrary files accessible with the privileges of the user running the foomatic-rip universal print filter. | []
| null | 5.5 | null | null |
|
CVE-2022-44429 | In wlan driver, there is a possible missing bounds check. This could lead to local denial of service in wlan services. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
GHSA-7hxc-hm2f-r4g3 | Opera 8.01 allows remote attackers to cause a denial of service (CPU consumption) via a crafted JPEG image, as demonstrated using random.jpg. | []
| null | null | null | null |
|
GHSA-f33h-gm37-5r83 | The Wordpress Plugin Smart Product Review plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | []
| null | 9.8 | null | null |
|
GHSA-j2wh-mvqj-rmvp | In JetBrains TeamCity before 2025.03.2 stored XSS via GitHub Checks Webhook was possible | []
| null | 4.8 | null | null |
|
GHSA-2788-7prj-r2qv | In the Linux kernel, the following vulnerability has been resolved:PCI/bwctrl: Fix NULL pointer dereference on bus number exhaustionWhen BIOS neglects to assign bus numbers to PCI bridges, the kernel
attempts to correct that during PCI device enumeration. If it runs out
of bus numbers, no pci_bus is allocated and the "subordinate" pointer in
the bridge's pci_dev remains NULL.The PCIe bandwidth controller erroneously does not check for a NULL
subordinate pointer and dereferences it on probe.Bandwidth control of unusable devices below the bridge is of questionable
utility, so simply error out instead. This mirrors what PCIe hotplug does
since commit 62e4492c3063 ("PCI: Prevent NULL dereference during pciehp
probe").The PCI core emits a message with KERN_INFO severity if it has run out of
bus numbers. PCIe hotplug emits an additional message with KERN_ERR
severity to inform the user that hotplug functionality is disabled at the
bridge. A similar message for bandwidth control does not seem merited,
given that its only purpose so far is to expose an up-to-date link speed
in sysfs and throttle the link speed on certain laptops with limited
Thermal Design Power. So error out silently.User-visible messages:pci 0000:16:02.0: bridge configuration invalid ([bus 00-00]), reconfiguring
[...]
pci_bus 0000:45: busn_res: [bus 45-74] end is updated to 74
pci 0000:16:02.0: devices behind bridge are unusable because [bus 45-74] cannot be assigned for them
[...]
pcieport 0000:16:02.0: pciehp: Hotplug bridge without secondary bus, ignoring
[...]
BUG: kernel NULL pointer dereference
RIP: pcie_update_link_speed
pcie_bwnotif_enable
pcie_bwnotif_probe
pcie_port_probe_service
really_probe | []
| null | 5.5 | null | null |
|
GHSA-pwjr-xrcx-fg7p | OpenSource Moddable v10.5.0 was discovered to contain a stack overflow in the fxBinaryExpressionNodeDistribute function at /moddable/xs/sources/xsTree.c. | []
| null | 7.8 | null | null |
|
CVE-2008-5124 | JSCAPE Secure FTP Applet 4.8.0 and earlier does not ask the user to verify a new or mismatched SSH host key, which makes it easier for remote attackers to perform man-in-the-middle attacks. | [
"cpe:2.3:a:jscape:secure_ftp_applet:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jscape:secure_ftp_applet:4.7:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-w545-288r-rf3p | ** UNSUPPPORTED WHEN ASSIGNED **Sending some requests in the web application of the vulnerable device allows information to be obtained due to the lack of security in the authentication process. | []
| null | 7.5 | null | null |
|
GHSA-5m46-qxvp-2456 | The CoreGraphics Window Server in Mac OS X 10.4.1 allows local users with console access to gain privileges by "launching commands into root sessions." | []
| null | null | null | null |
|
CVE-2017-7038 | A DOMParser XSS issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:-:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
GHSA-6cp6-j5p5-x552 | NetBSD 1.6 up to 3.0, when a user has "set record" in .mailrc with the default umask set, creates the record file with 0644 permissions, which allows local users to read the record file. | []
| null | null | null | null |
|
GHSA-6gx3-9944-xmmr | In the Linux kernel, the following vulnerability has been resolved:ASoC: soc-pcm: Add NULL check in BE reparentingAdd NULL check in dpcm_be_reparent API, to handle
kernel NULL pointer dereference error.
The issue occurred in fuzzing test. | []
| null | 5.5 | null | null |
|
GHSA-g48x-6c94-mxpc | Cross-site request forgery (CSRF) vulnerability in Test/WorkArea/DmsMenu/menuActions/MenuActions.aspx in Ektron Content Management System (CMS) before 9.10 SP1 (Build 9.1.0.184.1.120) allows remote attackers to hijack the authentication of content administrators for requests that delete content via a delete action. | []
| null | null | null | null |
|
GHSA-6vvf-9qj9-6mw8 | WEPA Print Away does not verify that a user has authorization to access documents before generating print orders and associated release codes. This could allow an attacker to generate print orders and release codes for documents they don´t own and print hem without authorization. In order to exploit this vulnerability, the user must have an account with wepanow.com or any of the institutions they serve, and be logged in. | []
| null | 5.4 | null | null |
|
GHSA-7rfw-27hp-w56j | OS command injection in the AP mode settings feature in /cgi-bin/luci /api/misystem/set_router_wifiap on Xiaomi R3D before 2.26.4 devices allows an attacker to execute any command via crafted JSON data. | []
| null | null | 9.8 | null |
|
CVE-2004-2391 | Jabber Gadu-Gadu Transport (a.k.a. jabber-gg-transport) 2.0.x before 2.0.8 allows remote attackers to cause a denial of service a message with an empty <priority/> tag. | [
"cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0.7:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2013-0829 | Google Chrome before 24.0.1312.52 does not properly maintain database metadata, which allows remote attackers to bypass intended file-access restrictions via unspecified vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1272.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1272.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1273.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1274.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1275.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1276.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1276.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1277.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1278.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1279.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1280.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1282.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1283.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1286.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1286.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1287.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1287.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1288.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1288.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1289.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1289.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1291.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1292.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1293.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1294.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1295.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1296.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1297.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1298.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1299.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1300.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1302.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1303.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1304.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1304.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1306.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1306.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1307.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1307.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1308.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1309.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1310.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1311.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1311.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.50:*:*:*:*:*:*:*"
]
| null | null | null | 6.4 |
|
GHSA-3gv3-3m2j-wpx7 | A cross-site request forgery (CSRF) vulnerability in Zucchetti InfoBusiness before and including 4.4.1 allows arbitrary file upload. | []
| null | 8.8 | null | null |
|
CVE-2023-22323 | BIG-IP SSL OCSP Authentication profile vulnerability | In BIP-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when OCSP authentication profile is configured on a virtual server, undisclosed requests can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
| [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
GHSA-j7m5-9hhg-47p4 | In createOrUpdate of Permission.java and related code, there is possible permission escalation due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-10, Android-11, Android-8.0, Android-8.1, Android-9; Android ID: A-168319670. | []
| null | 7.8 | null | null |
|
GHSA-4vq7-8699-4xgc | WMAgent arbitrary code execution via a crafted dbs-client package | WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package. | []
| 9.3 | 9.8 | null | null |
GHSA-f9xx-q64p-q4f5 | The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on several functions in versions up to, and including, 3.3.8. This makes it possible for authenticated attackers, with subscriber level permissions and above, to read and modify content such as course questions, post titles, and taxonomies. | []
| null | 6.3 | null | null |
|
GHSA-8r33-7h89-2vmx | ASP.NET Core 1.0. 1.1, and 2.0 allow a cross site request forgery vulnerability due to the ASP.NET Core project templates, aka "ASP.NET Core Cross Site Request Forgery Vulnerability". | []
| null | null | 6.5 | null |
|
GHSA-w88v-pjr8-cmv2 | Mattermost viewing archived public channels permissions vulnerability | Mattermost fails to properly verify the permissions needed for viewing archived public channels, allowing a member of one team to get details about the archived public channels of another team via the GET /api/v4/teams/<team-id>/channels/deleted endpoint. | []
| 5.3 | 4.3 | null | null |
CVE-2019-4165 | IBM StoreIQ 7.6.0.0. through 7.6.0.18 could allow a remote attacker to cause a denial of service attack using repeated requests to the server. IBM X-Force ID: 158698. | [
"cpe:2.3:a:ibm:storediq:*:*:*:*:*:*:*:*"
]
| null | null | 5.3 | null |
|
CVE-2014-3587 | Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1571. | [
"cpe:2.3:a:christos_zoulas:file:*:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.00:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.06:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.07:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.08:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.09:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:christos_zoulas:file:5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.0:beta2:32-bit:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.12:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.12:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.13:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.14:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.15:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.16:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.29:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.30:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.15:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-q82g-jxf6-8qm5 | openITCOCKPIT before 3.7.1 allows code injection, aka RVID 1-445b21. | []
| null | null | null | null |
|
GHSA-xrvc-5f74-4x4x | The CLUEVO LMS, E-Learning Platform WordPress plugin before 1.8.1 does not sanitise and escape Course's module, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed | []
| null | null | null | null |
|
GHSA-w49g-9f3f-c384 | An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server, allowing an attacker to update the title, assignees, and labels of any issue inside a public repository. This was only exploitable inside a public repository. This vulnerability affected GitHub Enterprise Server versions before 3.14 and was fixed in versions 3.13.3, 3.12.8, and 3.11.14. Versions 3.10 of GitHub Enterprise Server are not affected. This vulnerability was reported via the GitHub Bug Bounty program. | []
| 5.3 | 4.3 | null | null |
|
GHSA-cvpp-fv5f-8hch | event.c in acpid (aka acpid2) before 2.0.11 does not have an appropriate umask setting during execution of event-handler scripts, which might allow local users to (1) perform write operations within directories created by a script, or (2) read files created by a script, via standard filesystem system calls. | []
| null | null | null | null |
|
GHSA-66w4-34qw-x386 | ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function. | []
| null | null | 7.5 | null |
|
GHSA-2rmq-m43q-chm7 | The Visualizer: Tables and Charts Manager for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Import Data From File feature in all versions up to, and including, 3.11.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
|
CVE-2017-14330 | Extreme EXOS 16.x, 21.x, and 22.x allows administrators to obtain a root shell via vectors involving a privileged process. | [
"cpe:2.3:o:extremenetworks:extremexos:15.7:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:16.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:16.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:16.2:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:16.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:16.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:16.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:21.1:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:21.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:21.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:21.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:21.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:22.1:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:22.2:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:22.3:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:22.4:*:*:*:*:*:*:*"
]
| null | null | 6.7 | 7.2 |
|
GHSA-p9r2-gghq-hc57 | Jenkins Multijob plugin did not check permissions in the Resume Build action | Jenkins Multijob plugin version 1.25 and earlier did not check permissions in the Resume Build action, allowing anyone with Job/Read permission to resume the build. Multijob plugin 1.26 introduced a permission check requiring Overall/Administer. This was lowered to Job/Build in version 1.27. | []
| null | null | 4.3 | null |
CVE-2014-0647 | The Starbucks 2.6.1 application for iOS stores sensitive information in plaintext in the Crashlytics log file (/Library/Caches/com.crashlytics.data/com.starbucks.mystarbucks/session.clslog), which allows attackers to discover usernames, passwords, and e-mail addresses via an application that reads session.clslog. | [
"cpe:2.3:a:starbucks:starbucks:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
RHSA-2020:4163 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 8.8 | 6.1 | null |
CVE-2023-45705 | HCL BigFix Platform is susceptible to Server Side Request Forgery (SSRF) | An administrative user of WebReports may perform a Server Side Request Forgery (SSRF) exploit through SMTP configuration options.
| []
| null | 3.5 | null | null |
GHSA-wfhw-vq46-fmpc | The mintToken function of a smart contract implementation for sexhdsolo, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | []
| null | null | 7.5 | null |
|
CVE-2021-23364 | Regular Expression Denial of Service (ReDoS) | The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries. | [
"cpe:2.3:a:browserslist_project:browserslist:*:*:*:*:*:node.js:*:*"
]
| null | 5.3 | null | null |
GHSA-wx7r-grcc-7rrf | The ContentProvider in the EPSON iPrint application 6.6.3 for Android does not properly restrict data access. This allows an attacker's application to read scanned documents. | []
| null | null | 7.5 | null |
|
CVE-2010-2220 | Adobe Flash Media Server (FMS) before 3.0.6, and 3.5.x before 3.5.4, allows attackers to cause a denial of service via unspecified vectors, related to an "input validation issue." | [
"cpe:2.3:a:adobe:flash_media_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server_2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server_2:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2015-3906 | The logcat_dump_text function in wiretap/logcat.c in the Android Logcat file parser in Wireshark 1.12.x before 1.12.5 does not properly handle a lack of \0 termination, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted message in a packet, a different vulnerability than CVE-2015-3815. | [
"cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
RHSA-2024:9122 | Red Hat Security Advisory: xorg-x11-server security update | xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 7.8 | null | null |
GHSA-9955-4w5r-942h | A vulnerability was found in WP White Security WP Activity Log Plugin. It has been classified as problematic. This affects an unknown part of the component HTTP Header Handler. The manipulation of the argument X-Forwarded-For leads to improper output neutralization for logs. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-214053 was assigned to this vulnerability. | []
| null | null | null | null |
|
GHSA-xgv7-wccx-23jh | A vulnerability was found in SourceCodester Simple Payroll System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file admin/?page=admin of the component POST Parameter Handler. The manipulation of the argument fullname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222073 was assigned to this vulnerability. | []
| null | 4.8 | null | null |
|
GHSA-8x7r-vpqh-4jm4 | A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 can be used to cause an Integer Overflow. A malicious actor can leverage this vulnerability to cause a crash or read sensitive data, or execute arbitrary code in the context of the current process. | []
| null | 7.8 | null | null |
|
GHSA-vhxc-xrx4-c2rp | SmarterTools SmarterMail 16.x before build 6985 has hardcoded secret keys. An unauthenticated attacker could access other users? emails and file attachments. It was also possible to interact with mailing lists. | []
| null | null | null | null |
|
cisco-sa-ise-file-upload-P4M8vwXY | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | A vulnerability in the API of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to upload files to an affected device.
This vulnerability is due to improper validation of the file copy function. An attacker could exploit this vulnerability by sending a crafted file upload request to a specific API endpoint. A successful exploit could allow the attacker to upload arbitrary files to an affected system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| []
| null | 4.9 | null | null |
CVE-2012-4250 | Stack-based buffer overflow in the RequestScreenOptimization function in the XProcessControl.ocx ActiveX control in msls31.dll in Samsung NET-i viewer 1.37 allows remote attackers to execute arbitrary code via a long string in the first argument. | [
"cpe:2.3:a:samsung:net-i_viewer:1.37:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
CVE-2016-9012 | CloudVision Portal (CVP) before 2016.1.2.1 allows remote authenticated users to gain access to the internal configuration mechanisms via the management plane, related to a request to /web/system/console/bundle. | [
"cpe:2.3:a:arista:cloudvision_portal:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.5 |
|
CVE-2023-6748 | Custom Field Template <= 2.6.1 - Authenticated(Contributor+) Information Exposure | The Custom Field Template plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.6.1 via the 'cft' shortcode. This makes it possible for authenticated attackers with contributor access and above, to extract sensitive data including arbitrary post metadata. | []
| null | 4.3 | null | null |
GHSA-c7jj-cg79-r337 | Buffer overflow in VideoSpirit Pro 1.6.8.1, 1.68, and earlier; and VideoSpirit Lite 1.4.0.1 and possibly other versions; allows user-assisted remote attackers to execute arbitrary code via a VideoSpirit project (.visprj) file containing a valitem element with a long "value" attribute, as demonstrated using a valitem with the mp3 name. | []
| null | null | null | null |
|
GHSA-vf63-29qv-79ch | Missing Authorization vulnerability in ShapedPlugin LLC Category Slider for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Category Slider for WooCommerce: from n/a through 1.4.15. | []
| null | 4.3 | null | null |
|
GHSA-cwxx-gwwj-pqjq | Jenkins Perforce Plugin uses ineffective credentials encryption | An exposure of sensitive information vulnerability exists in Jenkins Perforce Plugin version 1.3.36 and older in PerforcePasswordEncryptor.java that allows attackers with local file system access to obtain encrypted Perforce passwords and decrypt them. | []
| null | null | 6.5 | null |
GHSA-fr4g-hmc7-w66h | A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions from 13.1 prior to 14.7.7, 14.8.0 prior to 14.8.5, and 14.9.0 prior to 14.9.2. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage. | []
| null | 4.3 | null | null |
|
GHSA-p8w6-cvmc-rg5g | A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted HTTP requests. | []
| null | 8.1 | null | null |
|
GHSA-729c-c748-4933 | The Frankly Chat (aka com.chatfrankly.android) application 3.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
| null | null | null | null |
|
GHSA-gw9q-37r7-h423 | Raw Image Extension Remote Code Execution Vulnerability. | []
| null | 7.3 | null | null |
|
CVE-2011-1068 | Microsoft Windows Azure Software Development Kit (SDK) 1.3.x before 1.3.20121.1237, when Full IIS and a Web Role are used with an ASP.NET application, does not properly support the use of cookies for maintaining state, which allows remote attackers to obtain potentially sensitive information by reading an encrypted cookie and performing unspecified other steps. | [
"cpe:2.3:a:microsoft:windows_azure_sdk:1.3:*:*:*:*:*:*:*"
]
| null | null | null | 2.6 |
|
GHSA-vqvc-vrx3-5hgj | Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command. | []
| null | null | null | null |
|
CVE-2001-1429 | Buffer overflow in mcedit in Midnight Commander 4.5.1 allows local users to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted text file. | [
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.1:*:*:*:*:*:*:*"
]
| null | null | null | 4.6 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.