id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2021-39230 | Error in JPNS kernel of Butter | Butter is a system usability utility. Due to a kernel error the JPNS kernel is being discontinued. Affected users are recommend to update to the Trinity kernel. There are no workarounds. | [
"cpe:2.3:a:butter_project:butter:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2022-35107 | SWFTools commit 772e55a2 was discovered to contain a stack overflow via vfprintf at /stdio-common/vfprintf.c. | [
"cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2014-3894 | Cross-site scripting (XSS) vulnerability in PHP Kobo Multifunctional MailForm Free 2014/1/28 and earlier allows remote attackers to inject arbitrary web script or HTML via an HTTP Referer header. | [
"cpe:2.3:a:php_kobo:multifunctional_mailform_free:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2020-25059 | An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 software. A service crash may occur because of incorrect input validation. The LG ID is LVE-SMP-200013 (July 2020). | [
"cpe:2.3:o:google:android:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2022-28310 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.034. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16339. | [
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
|
GHSA-m3j9-xfh2-hrgc | A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap. This could allow a local attacker to gain root privileges by bind-mounting their own contents inside the snap's private mount namespace and causing snap-confine to execute arbitrary code and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1 | [] | null | 7.8 | null | null |
|
GHSA-cwgv-r3rp-4jqq | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Bala Krishna, Sergey Yakovlev Category SEO Meta Tags plugin <= 2.5 versions. | [] | null | 5.9 | null | null |
|
CVE-2019-5224 | P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.193(C00E190R1P21) have an out of bounds read vulnerability. The system does not properly validate certain length parameter which an application transports to kernel. An attacker tricks the user to install a malicious application, successful exploit could cause out of bounds read and information disclosure. | [
"cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2013-6490 | The SIMPLE protocol functionality in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a negative Content-Length header, which triggers a buffer overflow. | [
"cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2010-4593 | The Connection Manager in IBM Lotus Mobile Connect before 6.1.4 does not properly maintain a certain reference count, which allows remote authenticated users to cause a denial of service (IP address exhaustion) by making invalid attempts to establish sessions with the same VPN ID from multiple devices. | [
"cpe:2.3:a:ibm:lotus_mobile_connect:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_mobile_connect:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_mobile_connect:6.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_mobile_connect:6.1.2:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2015-3213 | The gesture handling code in Clutter before 1.16.2 allows physically proximate attackers to bypass the lock screen via certain (1) mouse or (2) touch gestures. | [
"cpe:2.3:a:clutter_project:clutter:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-8p93-rmgx-3xq4 | A time-of-check time-of-use race condition could potentially exist in the secure file system in all Android releases from CAF using the Linux kernel. | [] | null | null | 7 | null |
|
GHSA-279f-qwgh-h5mp | Jenkins does not exclude sensitive build variables from search | Jenkins allows filtering builds in the build history widget by specifying an expression that searches for matching builds by name, description, parameter values, etc.Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from this search.This allows attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.Jenkins 2.424, LTS 2.414.2 excludes sensitive variables from this search. | [] | null | 4.3 | null | null |
CVE-2019-13200 | The web application of several Kyocera printers (such as the ECOSYS M5526cdw 2R7_2000.001.701) was affected by Reflected XSS. Successful exploitation of this vulnerability can lead to session hijacking of the administrator in the web application or the execution of unwanted actions. | [
"cpe:2.3:o:kyocera:ecosys_m5526cdw_firmware:2r7_2000.001.701:*:*:*:*:*:*:*",
"cpe:2.3:h:kyocera:ecosys_m5526cdw:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2020-6327 | SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated 3DM file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. | [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
CVE-2015-2099 | Multiple buffer overflows in WebGate Control Center allow remote attackers to execute arbitrary code via unspecified vectors to the (1) GetRecFileInfo function in the FileConverter.FileConverterCtrl.1 control, (2) Login function in the LoginContoller.LoginControllerCtrl.1 control, or (3) GetThumbnail function in the WESPPlayback.WESPPlaybackCtrl.1 control. | [
"cpe:2.3:a:webgateinc:control_center:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-263c-689v-jcfh | IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive calendar information using an expired access token. IBM X-Force ID: 288174. | [] | null | 4.3 | null | null |
|
GHSA-4rmv-m7cx-wvg4 | Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request from the AP to establish a TSpec session. | [] | null | 7.5 | null | null |
|
GHSA-vprp-2v9g-mvjw | Readymade Video Sharing Script 3.2 has SQL Injection via the single-video-detail.php report_videos array parameter. | [] | null | null | 9.8 | null |
|
CVE-2023-40273 | Session fixation in Apache Airflow web interface | The session fixation vulnerability allowed the authenticated user to continue accessing Airflow webserver even after the password of the user has been reset by the admin - up until the expiry of the session of the user. Other than manually cleaning the session database (for database session backend), or changing the secure_key and restarting the webserver, there were no mechanisms to force-logout the user (and all other users with that).
With this fix implemented, when using the database session backend, the existing sessions of the user are invalidated when the password of the user is reset. When using the securecookie session backend, the sessions are NOT invalidated and still require changing the secure key and restarting the webserver (and logging out all other users), but the user resetting the password is informed about it with a flash message warning displayed in the UI. Documentation is also updated explaining this behaviour.
Users of Apache Airflow are advised to upgrade to version 2.7.0 or newer to mitigate the risk associated with this vulnerability.
| [
"cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*"
] | null | 8 | null | null |
RHSA-2013:0826 | Red Hat Security Advisory: acroread security update | acroread: Unspecified vulnerability allows remote attackers to execute arbitrary code (CanSecWest 2013) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: unspecified information leak issue (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
CVE-2019-10886 | An incorrect access control exists in the Sony Photo Sharing Plus application in the firmware before PKG6.5629 version (for the X7500D TV and other applicable TVs). This vulnerability allows an attacker to read arbitrary files without authentication over HTTP when Photo Sharing Plus application is running. This may allow an attacker to browse a particular directory (e.g. images) inside the private network. | [
"cpe:2.3:a:sony:photo_sharing_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:kdl-50w800c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:kdl-50w805c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:kdl-50w807c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:kdl-50w809c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:kdl-50w820c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:kdl-55w800c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:kdl-55w805c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:kdl-65w850c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:kdl-65w855c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:kdl-65w857c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:kdl-75w850c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:kdl-75w855c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:x7500d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-100z9d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-43x800d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-43x800e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-43x830c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-49x700d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-49x800c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-49x800d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-49x800e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-49x830c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-49x835c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-49x835d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-49x837c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-49x839c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-49x900e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55a1e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x700d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x800e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x805c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x806e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x807c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x809c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x810c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x850c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x850d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x855c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x855d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x857c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x857d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x900c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x900e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x905c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x907c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x930d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-55x930e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65a1e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x750d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x800c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x805c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x807c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x809c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x810c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x850c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x850d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x850e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x855c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x855d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x857c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x857d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x900c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x900e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x905c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x907c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x930c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x930d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x930e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x935d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65x937d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-65z9d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-75x850c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-75x850d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-75x850e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-75x855c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-75x855d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-75x857d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-75x900e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-75x910c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-75x940c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-75x940d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-75x940e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-75x945c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-75z9d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-77a1e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-85x850d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-85x855d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:xbr-85x857d:-:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
CVE-2010-2217 | Adobe Flash Media Server (FMS) before 3.0.6, and 3.5.x before 3.5.4, allows attackers to execute arbitrary code via unspecified vectors, related to a "JS method vulnerability." | [
"cpe:2.3:a:adobe:flash_media_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server_2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_media_server_2:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-hcm6-7qq9-x3j3 | An issue was discovered in Zoho ManageEngine Netflow Analyzer Professional 7.0.0.2. XSS exists in the Administration zone /netflow/jspui/scheduleConfig.jsp file via these GET parameters: devSrc, emailId, excWeekModify, filterFlag, getFilter, mailReport, mset, popup, rep_schedule, rep_Type, schDesc, schName, schSource, selectDeviceDone, task, val10, and val11. | [] | null | null | null | null |
|
GHSA-79rc-fcmg-3r4m | An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. Due to insufficient input validation, an attacker can tamper with a runtime-accessible EFI variable to cause a dynamic BAR setting to overlap SMRAM. | [] | null | 5.5 | null | null |
|
CVE-2002-0392 | Apache 1.3 through 1.3.24, and Apache 2.0 through 2.0.36, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a chunk-encoded HTTP request that causes Apache to use an incorrect size. | [
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2010-3687 | Unspecified vulnerability in the powermail extension 1.5.3 and earlier for TYPO3 allows remote attackers to bypass validation have an unspecified impact by "[injecting] arbitrary values into validated fields," as demonstrated using the (1) Email and (2) URL fields. | [
"cpe:2.3:a:alex_kellner:powermail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alex_kellner:powermail:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2019-9721 | A denial of service in the subtitle decoder in FFmpeg 3.2 and 4.1 allows attackers to hog the CPU via a crafted video file in Matroska format, because handle_open_brace in libavcodec/htmlsubtitles.c has a complex format argument to sscanf. | [
"cpe:2.3:a:ffmpeg:ffmpeg:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2013-1463 | Cross-site scripting (XSS) vulnerability in js/tabletools/zeroclipboard.swf in the WP-Table Reloaded module before 1.9.4 for Wordpress allows remote attackers to inject arbitrary web script or HTML via the id parameter. NOTE: this might be the same vulnerability as CVE-2013-1808. If so, it is likely that CVE-2013-1463 will be REJECTed. | [
"cpe:2.3:a:wp-table_reloaded_project:wp-table_reloaded:*:*:*:*:*:wordpress:*:*"
] | null | null | null | 4.3 |
|
GHSA-mrwc-m279-7475 | An information disclosure vulnerability exists when Visual Studio improperly discloses limited contents of uninitialized memory while compiling program database (PDB) files, aka "Microsoft Visual Studio Information Disclosure Vulnerability." This affects Microsoft Visual Studio. | [] | null | null | 4.3 | null |
|
CVE-2014-7650 | The JJA- Juvenile Justice Act 1986 (aka com.felix.jja) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:ashok88:jja-_juvenile_justice_act_1986:1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-r4hv-f4m8-f2vr | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability. | [] | null | null | null | null |
|
RHSA-2013:0247 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) OpenJDK: logging insufficient access control checks (Libraries, 6664509) OpenJDK: logging insufficient access control checks (Libraries, 6664528) OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694) OpenJDK: JMX Introspector missing package access check (JMX, 8000539, SE-2012-01 Issue 52) OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068) OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) OpenJDK: missing serialization restriction (CORBA, 7201066) OpenJDK: insufficient privilege checking issue (AWT, 7192977) OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) OpenJDK: MethodFinder insufficient checks for cached results (Beans, 7200493) OpenJDK: insufficient privilege checking issue (AWT, 8001057) OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50) OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325) | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-9r9r-237v-592p | The admin page in the Banckle Chat module for Drupal does not properly restrict access, which allows remote attackers to bypass intended restrictions via unspecified vectors. | [] | null | null | null | null |
|
CVE-2021-20873 | Yappli is an application development platform which provides the function to access a requested URL using Custom URL Scheme. When Android apps are developed with Yappli versions since v7.3.6 and prior to v9.30.0, they are vulnerable to improper authorization in Custom URL Scheme handler, and may be directed to unintended sites via a specially crafted URL. | [
"cpe:2.3:a:yappli:yappli:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | 5.8 |
|
GHSA-7xj2-pmr5-pppr | A vulnerability has been identified in Parasolid V34.0 (All versions < V34.0.254), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.170), Parasolid V35.1 (All versions < V35.1.150), Solid Edge SE2022 (All versions < V2210Update12). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | [] | null | 7.8 | null | null |
|
CVE-2015-7850 | ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file. | [
"cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*",
"cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*"
] | null | 6.5 | null | 4 |
|
CVE-2015-8597 | Open redirect vulnerability in Blue Coat ProxySG 6.5 before 6.5.8.8 and 6.6 and Advanced Secure Gateway (ASG) 6.6 might allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a base64-encoded URL in conjunction with a "clear text" one in a coaching page, as demonstrated by "http://www.%humbug-URL%.local/bluecoat-splash-API?%BASE64-URL%." | [
"cpe:2.3:a:bluecoat:proxysg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bluecoat:advanced_secure_gateway:6.6:*:*:*:*:*:*:*"
] | null | null | 7.4 | 5.8 |
|
GHSA-49gc-vgp4-6qhm | url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header. | [] | null | 9.8 | null | null |
|
GHSA-gw4h-44cr-6fpj | IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 187870. | [] | null | null | null | null |
|
GHSA-c9wm-h66h-5r4v | IBM Security Directory Suite 8.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 228568. | [] | null | 3.7 | null | null |
|
GHSA-q87v-2f9c-89c7 | In JetBrains YouTrack before 2023.3.22268 authorization check for inline comments inside thread replies was missed | [] | null | 4.3 | null | null |
|
GHSA-mc7p-wjfw-r9hm | SQL injection vulnerability in login.php in Itsourcecode Online Discussion Forum Project in PHP with Source Code 1.0 allows remote attackers to execute arbitrary SQL commands via the email parameter. | [] | null | 8.2 | null | null |
|
GHSA-c6hh-m799-ch2w | Elevation of privilege and/or unauthorized access vulnerability in Micro Focus Identity Manager. Affecting versions prior to 4.7.3 and 4.8.1 hot fix 1. The vulnerability could allow information exposure that can result in an elevation of privilege or an unauthorized access. | [] | null | null | null | null |
|
GHSA-53pp-49v8-q8r5 | Multiple PHP remote file inclusion vulnerabilities in Ay System Solutions CMS 2.6 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the path[ShowProcessHandle] parameter to (1) home.php or (2) impressum.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information. | [] | null | null | null | null |
|
CVE-2010-5164 | Race condition in KingSoft Personal Firewall 9 Plus 2009.05.07.70 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute | [
"cpe:2.3:a:kingsoft:personal_firewall_9:2009.05.07.70:-:plus:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 6.2 |
|
CVE-2020-24901 | The default installation of Krpano Panorama Viewer version <=1.20.8 is vulnerable to Reflected XSS due to insecure remote js load in file viewer/krpano.html, parameter plugin[test].url. | [
"cpe:2.3:a:krpano:krpano:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-3m59-fh79-m7m6 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in creativeon WHMpress allows Reflected XSS.This issue affects WHMpress: from n/a through 6.2-revision-5. | [] | null | 7.1 | null | null |
|
GHSA-723g-x9c7-6562 | System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel. | [] | null | 5.6 | null | null |
|
CVE-2021-20802 | HTTP header injection vulnerability in Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote attacker to alter the information stored in the product. | [
"cpe:2.3:a:cybozu:remote_service_manager:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:remote_service_manager:3.1.9:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2009-1319 | Directory traversal vulnerability in includes/ini.inc.php in GuestCal 2.1 allows remote attackers to include and execute arbitrary files via a .. (dot dot) in the lang parameter to index.php. | [
"cpe:2.3:a:guestcal:guest_cal:2.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-4444-267r-x82x | The HTTP client in Cisco IOS 12.4 and 15.0 allows user-assisted remote attackers to cause a denial of service (device crash) via a malformed HTTP response to a request for service installation, aka Bug ID CSCts12249. | [] | null | null | null | null |
|
GHSA-xjh6-c3wh-vvr4 | The mintToken function of a smart contract implementation for RobotBTC, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] | null | null | 7.5 | null |
|
CVE-2011-3349 | lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation. | [
"cpe:2.3:a:lightdm_project:lightdm:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2021-46986 | usb: dwc3: gadget: Free gadget structure only after freeing endpoints | In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: gadget: Free gadget structure only after freeing endpoints
As part of commit e81a7018d93a ("usb: dwc3: allocate gadget structure
dynamically") the dwc3_gadget_release() was added which will free
the dwc->gadget structure upon the device's removal when
usb_del_gadget_udc() is called in dwc3_gadget_exit().
However, simply freeing the gadget results a dangling pointer
situation: the endpoints created in dwc3_gadget_init_endpoints()
have their dep->endpoint.ep_list members chained off the list_head
anchored at dwc->gadget->ep_list. Thus when dwc->gadget is freed,
the first dwc3_ep in the list now has a dangling prev pointer and
likewise for the next pointer of the dwc3_ep at the tail of the list.
The dwc3_gadget_free_endpoints() that follows will result in a
use-after-free when it calls list_del().
This was caught by enabling KASAN and performing a driver unbind.
The recent commit 568262bf5492 ("usb: dwc3: core: Add shutdown
callback for dwc3") also exposes this as a panic during shutdown.
There are a few possibilities to fix this. One could be to perform
a list_del() of the gadget->ep_list itself which removes it from
the rest of the dwc3_ep chain.
Another approach is what this patch does, by splitting up the
usb_del_gadget_udc() call into its separate "del" and "put"
components. This allows dwc3_gadget_free_endpoints() to be
called before the gadget is finally freed with usb_put_gadget(). | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2019-2966 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
GHSA-c3gq-qcr6-5vj9 | Improper removal of sensitive data in the entry edit feature of Hub Business submodule in Devolutions Remote Desktop Manager PowerShell Module 2022.3.1.5 and earlier allows an authenticated user to access sensitive data on entries that were edited using the affected submodule. | [] | null | 6.5 | null | null |
|
GHSA-654p-55pp-9qjq | libjbig2dec.a in Artifex jbig2dec 0.13, as used in MuPDF and Ghostscript, has a NULL pointer dereference in the jbig2_huffman_get function in jbig2_huffman.c. For example, the jbig2dec utility will crash (segmentation fault) when parsing an invalid file. | [] | null | 6.5 | null | null |
|
GHSA-q89x-f52w-6hj2 | Headers containing newline characters can split messages in hyper | Serializing of headers to the socket did not filter the values for newline bytes (\r or \n), which allowed for header values to split a request or response. People would not likely include newlines in the headers in their own applications, so the way for most people to exploit this is if an application constructs headers based on unsanitized user input.This issue was fixed by replacing all newline characters with a space during serialization of a header value. | [] | null | null | 5.3 | null |
GHSA-p345-jmhp-7wg2 | The Icegram Express formerly known as Email Subscribers WordPress plugin before 5.7.52 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] | null | 3.5 | null | null |
|
GHSA-p938-837q-c8xf | Multiple cross-site scripting (XSS) vulnerabilities in Habari 0.6.5, when register_globals is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) additem_form parameter to system/admin/dash_additem.php and the (2) status_data[] parameter to system/admin/dash_status.php. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-9c95-h326-chqh | automount in Mac OS X 10.4.5 and earlier allows remote file servers to cause a denial of service (unresponsiveness) or execute arbitrary code via unspecified vectors that cause automount to "mount file systems with reserved names". | [] | null | null | null | null |
|
GHSA-wj7w-628g-2cg9 | SurfControl SuperScout only filters packets containing both an HTTP GET request and a Host header, which allows local users to bypass filtering by fragmenting packets so that no packet contains both data elements. | [] | null | null | null | null |
|
GHSA-h99h-x74p-9vw5 | plugins/scmcvs/www/cvsweb.php in the CVSWeb CGI in GForge 4.5.16 before 20070524, aka gforge-plugin-scmcvs, allows remote attackers to execute arbitrary commands via shell metacharacters in the PATH_INFO. | [] | null | null | null | null |
|
GHSA-44vf-8ffm-v2qh | Sensitive Data Exposure in rails-session-decoder | All versions of `rails-session-decoder` are missing verification of the Message Authentication Code appended to the cookies. This may lead to decryption of cipher text thus exposing encrypted information.RecommendationNo fix is currently available. Consider using an alternative module until a fix is made available. | [] | null | null | null | null |
CVE-2022-27790 | Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability | Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of fonts that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] | null | null | 7.8 | null |
CVE-2010-1852 | Microsoft Internet Explorer, when the Invisible Hand extension is enabled, uses cookies during background HTTP requests in a possibly unexpected manner, which might allow remote web servers to identify specific persons and their product searches via HTTP request logging, related to a "cross-site data leakage" issue. | [
"cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-3w4j-cfcj-wj69 | XPDF v4.04 was discovered to contain a stack overflow vulnerability via the Object::Copy class of object.cc files. | [] | null | 7.8 | null | null |
|
CVE-2024-7838 | itsourcecode Online Food Ordering System addcategory.php sql injection | A vulnerability was found in itsourcecode Online Food Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /addcategory.php. The manipulation of the argument cname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:itsourcecode:online_food_ordering_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:kevinwong:online_food_ordering_system:1.0:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2020-15860 | Parallels Remote Application Server (RAS) 17.1.1 has a Business Logic Error causing remote code execution. It allows an authenticated user to execute any application in the backend operating system through the web application, despite the affected application not being published. In addition, it was discovered that it is possible to access any host in the internal domain, even if it has no published applications or the mentioned host is no longer associated with that server farm. | [
"cpe:2.3:a:parallels:remote_application_server:17.1.1:*:*:*:*:*:*:*"
] | null | 9.9 | null | 6.5 |
|
CVE-2023-50894 | In Janitza GridVis through 9.0.66, use of hard-coded credentials in the de.janitza.pasw.feature.impl.activators.PasswordEncryption password encryption function allows remote authenticated administrative users to discover cleartext database credentials contained in error report information. | [
"cpe:2.3:a:janitza:gridvis:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-8rcx-6793-p6gv | An issue was discovered in CutePHP CuteNews 2.1.2. An attacker can infiltrate the server through the avatar upload process in the profile area via the avatar_file field to index.php?mod=main&opt=personal. There is no effective control of $imgsize in /core/modules/dashboard.php. The header content of a file can be changed and the control can be bypassed for code execution. (An attacker can use the GIF header for this.) | [] | null | null | 8.8 | null |
|
CVE-2022-25048 | Command injection vulnerability in CWP v0.9.8.1126 that allows normal users to run commands as the root user. | [
"cpe:2.3:a:control-webpanel:webpanel:0.9.8.1126:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9 |
|
GHSA-5fp9-mpp5-899v | Under certain conditions, SAP Contact Center - version 700, does not sufficiently encode user-controlled inputs. This allows an attacker to exploit a Reflected Cross-Site Scripting (XSS) vulnerability when creating a new email and to execute arbitrary code on the victim's browser. | [] | null | null | null | null |
|
CVE-2024-8780 | The SYSCOM Group OMFLOW - Improper Authorization for Data Query Function | OMFLOW from The SYSCOM Group does not properly restrict the query range of its data query functionality, allowing remote attackers with regular privileges to obtain accounts and password hashes of other users. | [
"cpe:2.3:a:syscomgo:omflow:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2024-51850 | WordPress WoW Guild Armory Roster plugin <= 0.5.5 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bchristopeit WoW Guild Armory Roster allows Stored XSS.This issue affects WoW Guild Armory Roster: from n/a through 0.5.5. | [] | null | 6.5 | null | null |
cisco-sa-utd-snort3-dos-bypas-b4OUEwxD | Cisco Unified Threat Defense Snort Intrusion Prevention System Engine for Cisco IOS XE Software Security Policy Bypass and Denial of Service Vulnerability | A vulnerability in Cisco Unified Threat Defense (UTD) Snort Intrusion Prevention System (IPS) Engine for Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass configured security policies or cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient validation of HTTP requests when they are processed by Cisco UTD Snort IPS Engine. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process. If the action in case of Cisco UTD Snort IPS Engine failure is set to the default, fail-open, successful exploitation of this vulnerability could allow the attacker to bypass configured security policies. If the action in case of Cisco UTD Snort IPS Engine failure is set to fail-close, successful exploitation of this vulnerability could cause traffic that is configured to be inspected by Cisco UTD Snort IPS Engine to be dropped.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 5.8 | null | null |
CVE-2023-39374 | ForeScout NAC SecureConnector – CWE-427: Uncontrolled Search Path Element |
ForeScout NAC SecureConnector version 11.2 - CWE-427: Uncontrolled Search Path Element
| [
"cpe:2.3:a:forescout:secureconnector:11.2:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2021-35569 | Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: Diagnostics). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Applications Manager accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:applications_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:applications_manager:12.1.3:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
CVE-2023-37885 | WordPress RealHomes theme <= 4.0.2 - Broken Access Control vulnerability | Missing Authorization vulnerability in InspiryThemes RealHomes.This issue affects RealHomes: from n/a through 4.0.2.
| [] | null | 4.3 | null | null |
RHBA-2015:0965 | Red Hat Bug Fix Advisory: nss, nss-util, and nspr bug fix and enhancement update | nss: QuickDER decoder length issue | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
CVE-2021-41142 | XSS via the name of a deleted attachment | Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. There is a cross-site scripting vulnerability in Tuleap Community Edition prior to 12.11.99.25 and Tuleap Enterprise Edition 12.11-2. A malicious user with the capability to add and remove attachment to an artifact could force a victim to execute uncontrolled code. Tuleap Community Edition 11.17.99.146 and Tuleap Enterprise Edition 12.11-2 contain a fix for the issue. | [
"cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*",
"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*"
] | null | 5.4 | null | null |
GHSA-xwrh-qxmc-x8c8 | Concrete CMS Cross-site Scripting (XSS) in the Advanced File Search Filter | Concrete CMS versions 9 below 9.2.8 and versions below 8.5.16 are vulnerable to Cross-site Scripting (XSS) in the Advanced File Search Filter. Prior to the fix, a rogue administrator could add malicious code in the file manager because of insufficient validation of administrator provided data. All administrators have access to the File Manager and hence could create a search filter with the malicious code attached. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator . | [] | null | 3.1 | null | null |
GHSA-m2jh-3vm2-49rv | Stack-based buffer overflow in the yyerror function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via a long line in a dot file. | [] | null | null | null | null |
|
RHSA-2010:1002 | Red Hat Security Advisory: mod_auth_mysql security update | mod_auth_mysql: character encoding SQL injection flaw | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2007-2132 | Unspecified vulnerability in the PeopleTools component in Oracle PeopleSoft Enterprise 8.47.12 and 8.48.08 has unknown impact and attack vectors, aka PSE02. | [
"cpe:2.3:a:oracle:peoplesoft_enterprise:8.47.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise:8.48.08:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-qjqc-gw55-mpmx | The Candlepin component of Red Hat Satellite was affected by an improper authentication flaw. Few factors could allow an attacker to use the SCA (simple content access) certificate for authentication with Candlepin. | [] | null | 5.5 | null | null |
|
GHSA-7mxx-3cgm-xxv3 | API Platform Core does not call GraphQl securityAfterResolver | SummaryA security check that gets called after GraphQl resolvers is always replaced by another one as there's no break in this clause: https://github.com/api-platform/core/pull/6444/files#diff-09e3c2cfe12a2ce65bd6c983c7ca6bfcf783f852b8d0554bb938e8ebf5e5fa65R56https://github.com/soyuka/core/blob/7e2e8f9ff322ac5f6eb5f65baf432bffdca0fd51/src/Symfony/Security/State/AccessCheckerProvider.php#L49-L57PoCCreate a graphql endpoint with a security after resolver.ImpactAs this fallsback to `security`, the impact is there only when there's only a security after resolver and none inside security. The test at https://github.com/api-platform/core/pull/6444 is probably broken. | [] | null | 4.4 | null | null |
GHSA-7rw2-3hhp-rc46 | Cross-site Scripting Vulnerability in Statement Browser | ImpactA maliciously crafted xAPI statement could be used to perform script or other tag injection in the LRS Statement Browser.PatchesThe problem is patched in version 1.2.17 of the LRS library and [version 0.7.5 of SQL LRS](https://github.com/yetanalytics/lrsql/releases/tag/v0.7.5).WorkaroundsNo workarounds exist, we recommend upgrading to version 1.2.17 of the library or version 0.7.5 of SQL LRS immediately.References[LRS Tag](https://github.com/yetanalytics/lrs/releases/tag/v1.2.17)[LRS lib on Clojars](https://clojars.org/com.yetanalytics/lrs/versions/1.2.17)[SQL LRS 0.7.5 Release](https://github.com/yetanalytics/lrsql/releases/tag/v0.7.5) | [] | null | 4.6 | null | null |
GHSA-2xh8-rvm9-h559 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | null | null |
|
cisco-sa-ipphone-arbfileread-NPdtE2Ow | Cisco IP Phone Software Arbitrary File Read Vulnerability | A vulnerability in the debug shell of Cisco IP Phone software could allow an authenticated, local attacker to read any file on the device file system.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted input to a debug shell command. A successful exploit could allow the attacker to read any file on the device file system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 5.5 | null | null |
GHSA-p44w-q7f3-xgf6 | Microsoft Windows Media Player 11 (wmplayer.exe) allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted .au file that triggers a divide-by-zero error, as demonstrated by iapetus.au. | [] | null | null | null | null |
|
GHSA-c2hj-c545-q4g6 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in everestthemes Grace Mag allows PHP Local File Inclusion. This issue affects Grace Mag: from n/a through 1.1.5. | [] | null | 7.5 | null | null |
|
GHSA-7h2x-hwcf-f9q6 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | 4.9 | null | null |
|
RHSA-2019:4168 | Red Hat Security Advisory: kernel security and bug fix update | kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 6.5 | null |
GHSA-qhw9-28qw-h5h8 | Research in Motion (RIM) BlackBerry Handheld web browser for BlackBerry Handheld before 4.0.2 allows remote attackers to cause a denial of service (hang) via a Java Application Description (JAD) file with a long application name and vendor string, which prevents a browser dialog from being properly dismissed. | [] | null | null | null | null |
|
GHSA-543r-2767-7774 | Insufficient policy enforcement in WebUI in Google Chrome prior to 87.0.4280.141 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension. | [] | null | null | null | null |
|
GHSA-9m8q-7xwp-9w66 | Buffer overflow in the readstr_upto function in plug-ins/script-fu/tinyscheme/scheme.c in GIMP 2.6.12 and earlier, and possibly 2.6.13, allows remote attackers to execute arbitrary code via a long string in a command to the script-fu server. | [] | null | null | null | null |
|
GHSA-62m2-jrj9-gqh5 | Multiple vulnerabilities exists in Aruba Instate before 4.1.3.0 and 4.2.3.1 due to insufficient validation of user-supplied input and insufficient checking of parameters, which could allow a malicious user to bypass security restrictions, obtain sensitive information, perform unauthorized actions and execute arbitrary code. | [] | null | 9.8 | null | null |
|
GHSA-r4c9-h547-774j | ** DISPUTED ** An issue was discovered in SMA Solar Technology products. By sending nonsense data or setting up a TELNET session to the database port of Sunny Explorer, the application can be crashed. NOTE: the vendor reports that the maximum possible damage is a communication failure. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected. | [] | null | null | 7.5 | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.