id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-7hrj-g29v-92x3 | Remote Procedure Call Runtime Denial of Service Vulnerability | [] | null | 6.5 | null | null |
|
GHSA-wqpf-2j2m-q8q9 | IBM Cognos Anaytics 11.0 and 11.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 179156. | [] | null | null | null | null |
|
GHSA-pfq7-v4qw-rp8r | A stack overflow vulnerabiltity exist in the AT command interface of ALEOS before 4.11.0. The vulnerability may allow code execution | [] | null | null | null | null |
|
GHSA-4225-4fvr-rghw | Inappropriate implementation in Autofill in Google Chrome prior to 131.0.6778.69 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) | [] | null | 4.3 | null | null |
|
GHSA-5fr5-frrw-m97p | In JetBrains Toolbox App before 2.2 a DoS attack was possible via a malicious SVG image | [] | null | 5.3 | null | null |
|
GHSA-5xqr-grq4-qwgx | Junrar vulnerable to Infinite Loop | Archive.java in Junrar before 1.0.1, as used in Apache Tika and other products, is affected by a denial of service vulnerability due to an infinite loop when handling corrupt RAR files. | [] | null | null | 5.5 | null |
GHSA-xjx5-qphq-p9gj | The Video Url plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'id' parameter in all versions up to, and including, 1.0.0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
|
GHSA-hhv4-j8vf-v2h8 | Certain switch models from PLANET Technology have a Hard-coded community string in the SNMPv1 service, allowing unauthorized remote attackers to use this community string to access the SNMPv1 service with read-write privileges. | [] | null | 8.6 | null | null |
|
ICSA-23-171-01 | Enphase Envoy | Enphase Envoy versions D7.0.88 and prior are vulnerable to a command injection exploit that may allow an attacker to execute root commands. | [] | null | null | 6.3 | null |
GHSA-q2j8-g836-9cv5 | VMware Workstation contains an arbitrary file deletion vulnerability. A malicious actor with local user privileges on the victim's machine may exploit this vulnerability to delete arbitrary files from the file system of the machine on which Workstation is installed. | [] | null | 8.4 | null | null |
|
GHSA-787w-9xwh-m393 | A vulnerability, which was classified as critical, was found in seccome Ehoney. Affected is an unknown function of the file /api/v1/attack/falco. The manipulation of the argument Payload leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-212412. | [] | null | 9.8 | null | null |
|
CVE-2025-20097 | Uncaught exception in OpenBMC Firmware for the Intel(R) Server M50FCP Family and Intel(R) Server D50DNP Family before version R01.02.0002 may allow an authenticated user to potentially enable denial of service via network access. | [] | 5.3 | 4.3 | null | null |
|
GHSA-2896-2qh4-gww9 | Reflected Cross Site Scripting (XSS) vulnerability in Cacti v1.2.25, allows remote attackers to escalate privileges when uploading an xml template file via templates_import.php. | [] | null | 6.1 | null | null |
|
CVE-1999-0181 | The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands. | [
"cpe:2.3:a:rpc.walld:rpc.walld:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
RHSA-2021:3872 | Red Hat Security Advisory: Ansible security and bug fix update (2.9.27) | Ansible: ansible-connection module discloses sensitive info in traceback error message | [
"cpe:/a:redhat:ansible_engine:2::el7",
"cpe:/a:redhat:ansible_engine:2::el8"
] | null | 5.5 | null | null |
GHSA-494v-c9x8-6xcw | Multiple eval injection vulnerabilities in the help function in PHPKIT 1.6.1 R2 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary code on the server via unknown attack vectors involving uninitialized variables. | [] | null | null | null | null |
|
GHSA-vmg2-6m9v-6p4g | Buffer overflow in the IMAP command continuation function in Novell NetMail 3.52 before 3.52C may allow remote attackers to execute arbitrary code. | [] | null | null | null | null |
|
CVE-2023-1029 | The WP Meta SEO plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.3. This is due to missing or incorrect nonce validation on the regenerateSitemaps function. This makes it possible for unauthenticated attackers to regenerate Sitemaps via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:joomunited:wp_meta_seo:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
|
RHSA-2024:3500 | Red Hat Security Advisory: ruby:3.0 security update | ruby/cgi-gem: HTTP response splitting in CGI ruby: ReDoS vulnerability in URI ruby: ReDoS vulnerability in Time ruby: Buffer overread vulnerability in StringIO ruby: RCE vulnerability with .rdoc_options in RDoc ruby: Arbitrary memory address read vulnerability with Regex search | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.6 | null | null |
GHSA-3m53-prxg-5mr2 | Multiple stack-based buffer overflows in the (1) LoadTree and (2) ReadHeader functions in PAISO.DLL 1.7.3.0 (1.7.3 beta) in ConeXware PowerArchiver 2006 9.64.02 allow user-assisted attackers to execute arbitrary code via a crafted ISO file containing a file within several nested directories. | [] | null | null | null | null |
|
CVE-2022-0553 | Possible to retrieve uncrypted firmware image | There is no check to see if slot 0 is being uploaded from the device to the host. When using encrypted images this means the unencrypted firmware can be retrieved easily. | [
"cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2022-41899 | `CHECK` fail via inputs in `SdcaOptimizer` in Tensorflow | TensorFlow is an open source platform for machine learning. Inputs `dense_features` or `example_state_data` not of rank 2 will trigger a `CHECK` fail in `SdcaOptimizer`. We have patched the issue in GitHub commit 80ff197d03db2a70c6a111f97dcdacad1b0babfa. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
CVE-2018-9137 | Open-AudIT before 2.2 has CSV Injection. | [
"cpe:2.3:a:open-audit:open-audit:*:*:*:*:*:*:*:*"
] | null | null | 6.8 | 3.5 |
|
CVE-2018-25078 | man-db before 2.8.5 on Gentoo allows local users (with access to the man user account) to gain root privileges because /usr/bin/mandb is executed by root but not owned by root. (Also, the owner can strip the setuid and setgid bits.) | [
"cpe:2.3:a:man-db_project:man-db:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-ggc2-3j9r-qm5f | In display, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07326216; Issue ID: ALPS07326216. | [] | null | 6.7 | null | null |
|
RHSA-2013:0202 | Red Hat Security Advisory: rubygem-activesupport security update | rubygem-activesupport: json to yaml parsing | [
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
CVE-2024-35555 | idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/share_switch.php?mudi=switch&dataType=newsWeb&fieldName=state&fieldName2=state&tabName=infoWeb&dataID=40. | [
"cpe:2.3:a:idccms_project:idccms:1.35:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
|
CVE-2024-52851 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null |
GHSA-4gvq-c37w-77wr | In affected versions of Octopus Server the help sidebar can be customized to include a Cross-Site Scripting payload in the support link. This was initially resolved in advisory 2022-07 however it was identified that the fix could be bypassed in certain circumstances. A different approach was taken to prevent the possibility of the support link being susceptible to XSS | [] | null | 5.4 | null | null |
|
CVE-2015-2075 | SAP BusinessObjects Edge 4.0 allows remote attackers to delete audit events from the auditee queue via a clearData CORBA operation, aka SAP Note 2011396. | [
"cpe:2.3:a:sap:businessobjects_edge:4.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-jpxm-vh75-qqhj | The SPDY/2 codec in Facebook Proxygen before 2015-11-09 allows remote attackers to conduct hijacking attacks and bypass ACL checks via a crafted host value. | [] | null | null | 7.5 | null |
|
RHSA-2005:104 | Red Hat Security Advisory: mod_python security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:0526 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access | [
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
] | null | 7 | null | null |
GHSA-gccp-28qg-3f7j | An issue was discovered in MISP before 2.4.158. There is XSS in app/Controller/OrganisationsController.php in a situation with a "weird single checkbox page." | [] | null | 6.1 | null | null |
|
CVE-2010-3363 | roarify in roaraudio 0.3 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | [
"cpe:2.3:a:roaraudio:roaraudio:0.3:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-q8c5-8hq3-g4xm | MyCO Guestbook 1.0 stores the admin directory under the web document root with insufficient access control, which allows remote attackers to perform unspecified privileged actions by directly accessing files via a URL. | [] | null | null | null | null |
|
CVE-2023-27328 | Parallels Desktop Toolgate XML Injection Local Privilege Escalation Vulnerability | Parallels Desktop Toolgate XML Injection Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability.
The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of a user-supplied string before using it to construct an XML document. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-19187. | [
"cpe:2.3:a:parallels:parallels_desktop:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
CVE-2018-11908 | In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, improper access control can lead to device node and executable to be run from /data/ which presents a potential issue. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
GHSA-gc8f-p869-6jhm | An issue was discovered in Devid Espenschied PC Analyser through 4.10. The PCADRVX64.SYS kernel driver exposes IOCTL functionality that allows low-privilege users to read and write arbitrary physical memory. This could lead to arbitrary Ring-0 code execution and escalation of privileges. | [] | null | null | null | null |
|
GHSA-964m-5c8q-r3w3 | Multiple SQL injection vulnerabilities in tplSoccerSite 1.0 allow remote attackers to execute arbitrary SQL commands via (1) the opp parameter to tampereunited/opponent.php; or the id parameter to (2) index.php, (3) player.php, (4) matchdetails.php, or (5) additionalpage.php in tampereunited/. | [] | null | null | null | null |
|
GHSA-fv8g-76fc-64v8 | Vulnerability in the PeopleSoft Enterprise FSCM component of Oracle PeopleSoft Products (subcomponent: Staffing Front Office). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FSCM. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise FSCM accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | [] | null | null | 4.3 | null |
|
GHSA-mw4m-m933-3jx3 | SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the role and gender parameters within the /QueryView.php component. | [] | null | 7.5 | null | null |
|
GHSA-5277-qw9c-vxf6 | The D2DownloadService.getDownloadUrls service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors. | [] | null | null | null | null |
|
GHSA-623f-63x5-rq7q | A memory initialization issue was addressed with improved memory handling. This issue affected versions prior to macOS Mojave 10.14.1. | [] | null | null | 7.8 | null |
|
RHSA-2025:7326 | Red Hat Security Advisory: rhc security update | golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
GHSA-j7ww-g7m2-fpcg | A code execution vulnerability exists in the dxfRW::processLType() functionality of LibreCad libdxfrw 2.2.0-rc2-19-ge02f3580. A specially-crafted .dxf file can lead to a use-after-free vulnerability. An attacker can provide a malicious file to trigger this vulnerability. | [] | null | 8.8 | null | null |
|
CVE-2023-1254 | SourceCodester Health Center Patient Record Management System birthing_print.php cross site scripting | A vulnerability has been found in SourceCodester Health Center Patient Record Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file birthing_print.php. The manipulation of the argument birth_id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222484. | [
"cpe:2.3:a:health_center_patient_record_management_system_project:health_center_patient_record_management_system:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 |
CVE-2024-25655 | Insecure storage of LDAP passwords in the authentication functionality of AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS allows members (with read access to the application database) to decrypt the LDAP passwords of users who successfully authenticate to web management via LDAP. | [
"cpe:2.3:a:avsystem:unified_management_platform:23.07.0.16567:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2024-30467 | WordPress Essential Blocks plugin <= 4.4.9 - Broken Access Control vulnerability | Missing Authorization vulnerability in WPDeveloper Essential Blocks for Gutenberg.This issue affects Essential Blocks for Gutenberg: from n/a through 4.4.9. | [
"cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:free:wordpress:*:*"
] | null | 6.5 | null | null |
CVE-2025-27997 | An issue in Blizzard Battle.net v2.40.0.15267 allows attackers to escalate privileges via placing a crafted shell script or executable into the C:\ProgramData directory. | [] | null | 8.4 | null | null |
|
GHSA-h58q-p4c8-6jjr | Uncontrolled search path in some Intel(R) Inspector software before version 2024.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | null | 6.7 | null | null |
|
CVE-2022-49019 | net: ethernet: nixge: fix NULL dereference | In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: nixge: fix NULL dereference
In function nixge_hw_dma_bd_release() dereference of NULL pointer
priv->rx_bd_v is possible for the case of its allocation failure in
nixge_hw_dma_bd_init().
Move for() loop with priv->rx_bd_v dereference under the check for
its validity.
Found by Linux Verification Center (linuxtesting.org) with SVACE. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2021-36603 | Cross Site Scripting (XSS) in Tasmota firmware 6.5.0 allows remote attackers to inject JavaScript code via a crafted string in the field "Friendly Name 1". | [
"cpe:2.3:o:tasmota_project:tasmota:6.5.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2007-3059 | SendCard 3.3.0 allows remote attackers to obtain sensitive information via an invalid sc_language parameter to sendcard.php, which reveals the path in an error message. | [
"cpe:2.3:a:sendcard:sendcard:3.3.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2012-5223 | The proc_deutf function in includes/functions_vbseocp_abstract.php in vBSEO 3.5.0, 3.5.1, 3.5.2, 3.6.0, and earlier allows remote attackers to insert and execute arbitrary PHP code via "complex curly syntax" in the char_repl parameter, which is inserted into a regular expression that is processed by the preg_replace function with the eval switch. | [
"cpe:2.3:a:crawlability:vbseo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.0.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.2.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.2.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.2.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.2.0:rc8:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:crawlability:vbseo:3.6.0:rc2:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2003-0021 | The "screen dump" feature in Eterm 0.9.1 and earlier allows attackers to overwrite arbitrary files via a certain character escape sequence when it is echoed to a user's terminal, e.g. when the user views a file containing the malicious sequence. | [
"cpe:2.3:a:michael_jennings:eterm:0.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_jennings:eterm:0.9.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2019:3887 | Red Hat Security Advisory: kernel-rt security update | hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 8.8 | null |
CVE-2010-1418 | Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to inject arbitrary web script or HTML via a FRAME element with a SRC attribute composed of a javascript: sequence preceded by spaces. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-cmgm-q8hf-p7jc | XXE vulnerability in Jenkins Code Coverage API Plugin | Code Coverage API Plugin 1.1.4 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows a user able to control the input files for the \"Publish Coverage Report\" post-build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.Code Coverage API Plugin 1.1.5 disables external entity resolution for its XML parser. | [] | null | null | 7.1 | null |
CVE-2018-20786 | libvterm through 0+bzr726, as used in Vim and other products, mishandles certain out-of-memory conditions, leading to a denial of service (application crash), related to screen.c, state.c, and vterm.c. | [
"cpe:2.3:a:leonerd:libvterm:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-xvmp-ph78-3222 | Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | [] | null | 6.1 | null | null |
|
CVE-2024-51366 | An arbitrary file upload vulnerability in the component \Roaming\Omega of OmegaT v6.0.1 allows attackers to execute arbitrary code via uploading a crafted .conf file. | [
"cpe:2.3:a:omegat:omegat:6.0.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2023-33786 | A stored cross-site scripting (XSS) vulnerability in the Create Circuit Types (/circuits/circuit-types/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | [
"cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-84rv-5h5j-48fx | IBM DB2 9.7 before FP3 does not perform the expected drops or invalidations of dependent functions upon a loss of privileges by the functions' owners, which allows remote authenticated users to bypass intended access restrictions via calls to these functions, a different vulnerability than CVE-2009-3471. | [] | null | null | null | null |
|
GHSA-225x-44w7-hh2f | A path traversal vulnerability exists in the Java version of CData Sync < 23.4.8843 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain access to sensitive information and perform limited actions. | [] | null | 8.6 | null | null |
|
RHSA-2013:1205 | Red Hat Security Advisory: Red Hat Storage 2.0 security, bug fix, and enhancement update #6 | 2.0: appliance-base / redhat-storage-server /tmp file creation vuln | [
"cpe:/a:redhat:storage:2.0:server:el6"
] | null | null | null | null |
GHSA-729f-rxmp-m7p8 | Uncontrolled search path for some Intel(R) Advisor software may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | 5.4 | 6.7 | null | null |
|
GHSA-xx6x-c9h6-h6fv | A DOM based cross-site scripting (XSS) vulnerability in the component /beep/Beep.Instrument.js of stewdio beep.js before commit ef22ad7 allows attackers to execute arbitrary Javascript via sending a crafted URL. | [] | null | 6.1 | null | null |
|
CVE-2009-4750 | PHP remote file inclusion vulnerability in home.php in Top Paidmailer allows remote attackers to execute arbitrary PHP code via a URL in the page parameter. | [
"cpe:2.3:a:phppower:top_paidmailer:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-7mxj-982j-3px6 | Cisco Sourcefire Snort 3.0 before build 233 has a Buffer Overread related to use of a decoder array. The size was off by one making it possible to read past the end of the array with an ether type of 0xFFFF. Increasing the array size solves this problem. | [] | null | null | 7.5 | null |
|
GHSA-54jh-gr2j-w5jp | phpIPAM 1.4.3 allows Reflected XSS via app/dashboard/widgets/ipcalc-result.php and app/tools/ip-calculator/result.php of the IP calculator. | [] | null | null | null | null |
|
GHSA-f8wx-h5g6-hjg3 | Multiple SQL injection vulnerabilities in pie-register/pie-register.php in the Pie Register plugin before 2.0.19 for WordPress allow remote administrators to execute arbitrary SQL commands via the (1) select_invitaion_code_bulk_option or (2) invi_del_id parameter in the pie-invitation-codes page to wp-admin/admin.php. | [] | null | null | null | null |
|
GHSA-76w6-94xw-vqgv | Buffer overflow in Novell iManager (eMFrame) before 1.5 allows remote attackers to cause a denial of service via an authentication request with a long Distinguished Name (DN) attribute. | [] | null | null | null | null |
|
GHSA-jq6r-jxvv-6c7w | The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 mishandles session objects, which allows local users to hijack sessions, and consequently gain privileges, via a crafted application, aka "Windows Session Object Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-3306. | [] | null | null | 7.8 | null |
|
CVE-2014-3886 | Cross-site scripting (XSS) vulnerability in Webmin before 1.690, when referrer checking is disabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this might overlap CVE-2014-3924. | [
"cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.600:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.610:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.620:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.630:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.640:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.650:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.660:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.670:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
CVE-2015-8936 | Cross-site scripting (XSS) vulnerability in squidGuard.cgi in squidGuard before 1.5 allows remote attackers to inject arbitrary web script or HTML via a blocked site link. | [
"cpe:2.3:a:squidguard:squidguard:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2019-1331 | A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1327. | [
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:mac_os:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_online_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_services:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 |
|
CVE-2020-4447 | IBM FileNet Content Manager 5.5.3 and 5.5.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 181227. | [
"cpe:2.3:a:ibm:filenet_content_manager:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_content_manager:5.5.4:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
|
CVE-2021-33924 | Confluent Ansible (cp-ansible) version 5.5.0, 5.5.1, 5.5.2 and 6.0.0 is vulnerable to Incorrect Access Control via its auxiliary component that allows remote attackers to access sensitive information. | [
"cpe:2.3:a:confluent:ansible:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:confluent:ansible:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:confluent:ansible:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:confluent:ansible:6.0.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-gf9x-6xqh-g38j | A Denial of Service (infinite loop) exists in OpenSIPS before 1.10 in lookup.c. | [] | null | null | null | null |
|
CVE-2021-22242 | Insufficient input sanitization in Mermaid markdown in GitLab CE/EE version 11.4 and up allows an attacker to exploit a stored cross-site scripting vulnerability via a specially-crafted markdown | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 8.7 | null | null |
|
GHSA-4j38-964f-658r | Zoho ManageEngine ADSelfService Plus through 6101 is vulnerable to unauthenticated Remote Code Execution while changing the password. | [] | null | 9.8 | null | null |
|
GHSA-h26f-j4mv-84g7 | Malicious Package in asycn | All versions of `asycn` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.RecommendationRemove the package from your dependencies and always ensure package names are typed correctly upon installation. | [] | null | 9.8 | null | null |
CVE-2008-6593 | SQL injection vulnerability in LightNEasy/lightneasy.php in LightNEasy SQLite 1.2.2 and earlier allows remote attackers to inject arbitrary PHP code into comments.dat via the dlid parameter to index.php. | [
"cpe:2.3:a:lightneasy:lightneasy:1.2.2:*:no_database:*:*:*:*:*",
"cpe:2.3:a:sqlite:sqlite:1.2.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2017-9161 | libautotrace.a in AutoTrace 0.31.1 has a "cannot be represented in type int" issue in autotrace.c:188:23. | [
"cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2007-3218 | Cross-site scripting (XSS) vulnerability in request.php in PHP Live! 3.2.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the pagex parameter. | [
"cpe:2.3:a:php_live:php_live:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2019-13686 | Use after free in offline mode in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-m3jq-gg7x-47cq | PTC’s KEPServerEX Versions 6.0 to 6.14.263 are vulnerable to being made to read a recursively defined object that leads to uncontrolled resource consumption. KEPServerEX uses OPC UA, a protocol which defines various object types that can be nested to create complex arrays. It does not implement a check to see if such an object is recursively defined, so an attack could send a maliciously created message that the decoder would try to decode until the stack overflowed and the device crashed. | [] | null | 7.5 | null | null |
|
GHSA-hchj-593h-jx3r | In the Linux kernel, the following vulnerability has been resolved:efi: fix panic in kdump kernelCheck if get_next_variable() is actually valid pointer before
calling it. In kdump kernel this method is set to NULL that causes
panic during the kexec-ed kernel boot.Tested with QEMU and OVMF firmware. | [] | null | null | null | null |
|
GHSA-f2p7-69mv-9qwj | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932. | [] | null | null | 9.8 | null |
|
GHSA-ffww-3j7j-g93q | Incomplete list of disallowed inputs in Microsoft Office OneNote allows an unauthorized attacker to bypass a security feature locally. | [] | null | 7.8 | null | null |
|
CVE-2021-21946 | Two heap-based buffer overflow vulnerabilities exists in the JPEG-JFIF lossless Huffman image parser functionality of Accusoft ImageGear 19.10. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger these vulnerabilities.This heap-based buffer overflow takes place when the `SOF3` precision is lower than 9. | [
"cpe:2.3:a:accusoft:imagegear:19.10:*:*:*:*:*:*:*"
] | null | null | 9.8 | null |
|
RHSA-2016:1034 | Red Hat Security Advisory: docker security, bug fix, and enhancement update | docker: privilege escalation via confusion of usernames and UIDs | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | null | null |
GHSA-gxqj-2gvr-3p2f | The Image Resizer On The Fly plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'delete' task in all versions up to, and including, 1.1. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | [] | null | 9.1 | null | null |
|
GHSA-f2c7-j9r7-mm93 | Mozilla Mail 1.7.1 and 1.7.3, and Thunderbird before 0.9, when HTML-Mails is enabled, allows remote attackers to determine valid e-mail addresses via an HTML e-mail that references a Cascading Style Sheets (CSS) document on the attacker's server. | [] | null | null | null | null |
|
GHSA-q2pf-f9qr-87mv | A security vulnerability originally reported in the SYNC2101 product, and applicable to specific sub-families of SYNC devices, allows an attacker to download the configuration file used in the device and apply a modified configuration file back to the device. The attack requires network access to the SYNC device and knowledge of its IP address. The attack exploits the unsecured communication channel used between the administration tool Easyconnect and the SYNC device (in the affected family of SYNC products). | [] | null | null | null | null |
|
CVE-2012-1383 | Unspecified vulnerability in the NetEase Reader (com.netease.pris) application 1.1.2 and 1.2.0 for Android has unknown impact and attack vectors. | [
"cpe:2.3:a:netease:netease_reader:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:netease:netease_reader:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-qrqj-c695-3j7q | SystemTap 1.4, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs stack unwinding (aka backtracing). | [] | null | null | null | null |
|
CVE-2018-10875 | A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code. | [
"cpe:2.3:a:redhat:ansible_engine:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_engine:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_engine:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_engine:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:gluster_storage:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
|
GHSA-mp76-mqjp-pxx7 | A vulnerability in the Enhanced Charging Service (ECS) functionality of Cisco ASR 5000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass the traffic classification rules on an affected device. The vulnerability is due to insufficient input validation of user traffic going through an affected device. An attacker could exploit this vulnerability by sending a malformed HTTP request to an affected device. A successful exploit could allow the attacker to bypass the traffic classification rules and potentially avoid being charged for traffic consumption. | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.