id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-q392-pcc3-wq35
|
Windows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34710, CVE-2022-34712.
|
[] | null | 5.5 | null | null | null |
|
CVE-2024-11200
|
Goodlayers Core <= 2.0.7 - Reflected Cross-Site Scripting via 'font-family'
|
The Goodlayers Core plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘font-family’ parameter in all versions up to, and including, 2.0.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
CVE-2020-12787
|
Microchip Atmel ATSAMA5 products in Secure Mode allow an attacker to bypass existing security mechanisms related to applet handling.
|
[
"cpe:2.3:o:microchip:atsama5d21c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d21c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d21c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d21c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d22c-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d22c-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d22c-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d22c-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d22c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d22c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d22c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d22c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d23c-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d23c-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d23c-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d23c-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d23c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d23c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d23c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d23c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d24c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d24c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d24c-cuf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d24c-cuf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d24c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d24c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d26c-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d26c-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d26c-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d26c-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d26c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d26c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d26c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d26c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cnvao_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cnvao:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cnrvao_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cnrvao:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d225c-d1m-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d225c-d1m-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-d5m-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-d5m-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-d5m-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-d5m-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-d1g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-d1g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-d1g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-d1g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-d1g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-d1g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-d1g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-d1g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-ld1g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-ld1g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-ld1g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-ld1g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-ld2g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-ld2g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-ld2g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-ld2g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-ld1g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-ld1g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-ld1g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-ld1g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-ld2g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-ld2g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-ld2g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-ld2g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27-wlsom1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27-wlsom1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27-som1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27-som1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d31a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d31a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d31a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d31a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d31a-cfu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d31a-cfu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d31a-cfur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d31a-cfur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d33a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d33a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d33a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d33a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d34a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d34a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d34a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d34a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d35a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d35a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d35a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d35a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d35a-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d35a-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d35a-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d35a-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d36a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d36a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d36a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d36a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d36a-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d36a-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d36a-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d36a-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d41a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d41a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d41a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d41a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d41b-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d41b-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d41b-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d41b-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d42a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d42a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d42a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d42a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d42b-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d42b-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d42b-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d42b-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d43a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d43a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d43a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d43a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d43b-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d43b-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d43b-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d43b-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d44a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d44a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d44a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d44a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d44b-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d44b-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d44b-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d44b-cur:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 4.3 | null |
|
CVE-2025-30867
|
WordPress SearchIQ plugin <= 4.7 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SearchIQ SearchIQ allows Stored XSS. This issue affects SearchIQ: from n/a through 4.7.
|
[] | null | 6.5 | null | null | null |
GHSA-72rg-w9mr-2x25
|
Apple Safari 4 Beta build 528.16 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a feeds: URI beginning with a (1) % (percent), (2) { (open curly bracket), (3) } (close curly bracket), (4) ^ (caret), (5) ` (backquote), or (6) | (pipe) character, followed by an & (ampersand) character.
|
[] | null | null | null | null | null |
|
GHSA-x5mg-m5gw-qjf7
|
Cross-site scripting (XSS) vulnerability in the search form in the administration/monitoring panel on the Cisco Identity Services Engine (ISE) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCuh87036.
|
[] | null | null | null | null | null |
|
GHSA-x5hh-chcp-7jv5
|
In Wireshark through 2.0.13 and 2.2.x through 2.2.7, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding validation of the relationships between indexes and lengths. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-7702.
|
[] | null | null | 7.5 | null | null |
|
GHSA-2v36-ccwm-6xw3
|
Untrusted search path vulnerability in HIBUN Confidential File Decryption program prior to 10.50.0.5 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. Note this is a separate vulnerability from CVE-2017-10863.
|
[] | null | null | 7.8 | null | null |
|
GHSA-xc3q-g386-79q2
|
Tashcom ASPEdit 2.9 stores the administration password (aka the FTP password) in cleartext in the registry, which might allow local users to view the password.
|
[] | null | null | null | null | null |
|
CVE-2024-22889
|
Due to incorrect access control in Plone version v6.0.9, remote attackers can view and list all files hosted on the website via sending a crafted request.
|
[] | null | 5.5 | null | null | null |
|
CVE-2022-46143
|
Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer that potentially contains previously allocated data.
|
[
"cpe:2.3:o:siemens:ruggedcom_rm1224_lte\\(4g\\)_eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_rm1224_lte\\(4g\\)_eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_rm1224_lte\\(4g\\)_nam_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_rm1224_lte\\(4g\\)_nam:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_m804pb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_m804pb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_m812-1_adsl-router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_m812-1_adsl-router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_m816-1_adsl-router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_m816-1_adsl-router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_m826-2_shdsl-router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_m826-2_shdsl-router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_m874-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_m874-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_m874-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_m874-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_m876-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_m876-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_m876-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_m876-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_mum853-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_mum853-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_mum856-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_mum856-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_s615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_s615_eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_s615_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc622-2c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc622-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc626-2c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc626-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc632-2c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc632-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc636-2c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc636-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc642-2c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc642-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc646-2c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc646-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w721-1_rj45_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w721-1_rj45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w722-1_rj45_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w722-1_rj45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w734-1_rj45_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w734-1_rj45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w738-1_m12_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w738-1_m12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w748-1_m12_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w748-1_m12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w761-1_rj45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w761-1_rj45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w774-1_m12_eec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w774-1_m12_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w774-1_m12_rj45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w774-1_m12_rj45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w774-1_rj45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w774-1_rj45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w778-1_m12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w778-1_m12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w778-1_m12_eec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w778-1_m12_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w786-1_rj45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w786-1_rj45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w786-2_rj45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w786-2_rj45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w786-2_sfp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w786-2_sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w786-2ia_rj45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w786-2ia_rj45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w788-1_m12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w788-1_m12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w788-1_rj45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w788-1_rj45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w788-2_m12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w788-2_m12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w788-2_m12_eec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w788-2_m12_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w1748-1_m12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w1748-1_m12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w1788-1_m12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w1788-1_m12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w1788-2_eec_m12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w1788-2_eec_m12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w1788-2_m12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w1788-2_m12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w1788-2ia_m12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w1788-2ia_m12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_wam763-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_wam763-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_wam766-1_ecc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_wam766-1_ecc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_wum763-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_wum763-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_wum766-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_wum766-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_wum766-1_6ghz_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_wum766-1_6ghz:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xb205-3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xb205-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xb205-3ld_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xb205-3ld:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xb208_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xb208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xb213-3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xb213-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xb213-3ld_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xb213-3ld:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xb216_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xb216:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc206-2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc206-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc206-2g_poe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc206-2g_poe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc206-2g_poe_eec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc206-2g_poe_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc206-2sfp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc206-2sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc206-2sfp_eec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc206-2sfp_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc206-2sfp_g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc206-2sfp_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc206-2sfp_g_eec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc206-2sfp_g_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc208_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc208_eec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc208_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc208_poe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc208_poe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc216_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc216:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc216-3g_poe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc216-3g_poe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc216-4c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc216-4c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc216-4c_g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc216-4c_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc216-4c_g_eec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc216-4c_g_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc216eec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc216eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc224:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc224-4c_g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc224-4c_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xc224-4c_g_eec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xc224-4c_g_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf204_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf204:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf204_dna_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf204_dna:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf204-2ba_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf204-2ba:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf204-2bca_dna_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf204-2bca_dna:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xm408-4c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xm408-4c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xm408-8c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xm408-8c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xm416-4c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xm416-4c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xp208_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xp208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xp208eec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xp208eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xp208poe_eec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xp208poe_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xp216_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xp216:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xp216eec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xp216eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xp216poe_eec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xp216poe_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324wg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324wg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr326-2c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr326-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr326-2c_poe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr326-2c_poe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr328-4c_wg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr328-4c_wg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr524-8c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr524-8c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr526-8c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr526-8c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr528-6m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr528-6m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr552-12m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr552-12m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_net_scalance_xc206-2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_net_scalance_xc206-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_net_scalance_xc206-2sfp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_net_scalance_xc206-2sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_net_scalance_xc208_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_net_scalance_xc208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_net_scalance_xc216-4c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_net_scalance_xc216-4c:-:*:*:*:*:*:*:*"
] | 5.1 | 2.7 | null | null | null |
|
CVE-2014-8307
|
Multiple cross-site scripting (XSS) vulnerabilities in skins/default/outline.tpl in C97net Cart Engine before 4.0 allow remote attackers to inject arbitrary web script or HTML via the (1) path parameter in the "drop down TOP menu (with path)" section or (2) print_this_page variable in the footer_content_block section, as demonstrated by the QUERY_STRING to (a) index.php, (b) checkout.php, (c) contact.php, (d) detail.php, (e) distro.php, (f) newsletter.php, (g) page.php, (h) profile.php, (i) search.php, (j) sitemap.php, (k) task.php, or (l) tell.php.
|
[
"cpe:2.3:a:c97:cart_engine:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2016-6318
|
Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.
|
[
"cpe:2.3:a:cracklib_project:cracklib:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
GHSA-f2r6-hpcq-7fm5
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | 7.2 | null | null | null |
|
CVE-2023-30604
|
Hitron Technologies Inc. CODA-5310 - Broken Access Control
|
It is identified a vulnerability of insufficient authentication in the system configuration interface of Hitron Technologies CODA-5310. An unauthorized remote attacker can exploit this vulnerability to access system configuration interface, resulting in performing arbitrary system operation or disrupt service.
|
[
"cpe:2.3:o:hitrontech:coda-5310_firmware:7.2.4.7.1b3:*:*:*:*:*:*:*",
"cpe:2.3:h:hitrontech:coda-5310:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2018-6168
|
Information leak in media engine in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-fjh2-7f8q-wqm2
|
cPanel before 74.0.8 mishandles account suspension because of an invalid email_accounts.json file (SEC-445).
|
[] | null | null | null | null | null |
|
PYSEC-2014-13
| null |
Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by reading the Authorization header in a redirected request.
|
[] | null | null | null | null | null |
CVE-2022-44393
|
Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/?page=services/view_service&id=.
|
[
"cpe:2.3:a:sanitization_management_system_project:sanitization_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
GHSA-9459-cg27-85v2
|
The Security component in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.35 permits "non-standard http methods," which has unknown impact and remote attack vectors.
|
[] | null | null | null | null | null |
|
GHSA-2wm5-c3g6-vrfw
|
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3069, CVE-2015-3071, CVE-2015-3072, CVE-2015-3073, and CVE-2015-3074.
|
[] | null | null | null | null | null |
|
GHSA-p632-fvpj-4vwp
|
An issue was discovered in O-RAN Software Community ric-plt-e2mgr in the G-Release environment, allows remote attackers to cause a denial of service (DoS) via a crafted request to the E2Manager API component.
|
[] | null | 7.7 | null | null | null |
|
CVE-2020-35196
|
The official rabbitmq docker images before 3.7.13-beta.1-management-alpine (Alpine specific) contain a blank password for a root user. System using the rabbitmq docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
|
[
"cpe:2.3:a:docker:rabbitmq_docker_image:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
GHSA-7379-xh69-jh8v
|
The WPB Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 1.0.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-j4xf-8w42-fqxq
|
Memory corruption Camera kernel when large number of devices are attached through userspace.
|
[] | null | 7.8 | null | null | null |
|
GHSA-4jh9-8gvv-965j
|
The freshmail-newsletter plugin before 1.6 for WordPress has shortcode.php SQL Injection via the 'FM_form id=' substring.
|
[] | null | 8.8 | null | null | null |
|
GHSA-ww3w-592j-5qrw
|
SimpleSAMLphp Incorrect IV generation for encryption
|
The aesEncrypt method in `lib/SimpleSAML/Utils/Crypto.php` in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV).
|
[] | null | null | 5.9 | null | null |
GHSA-r894-c8ph-2pv7
|
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka "Microsoft SharePoint Remote Code Execution Vulnerability." This affects Microsoft SharePoint.
|
[] | null | null | 8.8 | null | null |
|
GHSA-r8xp-52mq-rmm8
|
Apache ServiceComb Service-Center Exposure of Sensitive Information to an Unauthorized Actor vulnerability
|
Exposure of Sensitive Information to an Unauthorized Actor in Apache ServiceComb Service-Center. This issue affects Apache ServiceComb Service-Center before 2.1.0 (included). Users are recommended to upgrade to version 2.2.0, which fixes the issue.
|
[] | 6.9 | 5.8 | null | null | null |
CVE-2017-11842
|
Windows kernel in Windows 8.1 and RT 8.1, Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to log in and run a specially crafted application due to the Windows kernel improperly initializing a memory address, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11849, CVE-2017-11851, and CVE-2017-11853.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] | null | null | 4.7 | 1.9 | null |
|
GHSA-g9qh-rx87-crmv
|
Microsoft Malware Protection Engine before 1.1.6603.0, as used in Microsoft Malicious Software Removal Tool (MSRT), Windows Defender, Security Essentials, Forefront Client Security, Forefront Endpoint Protection 2010, and Windows Live OneCare, allows local users to gain privileges via a crafted value of an unspecified user registry key.
|
[] | null | null | null | null | null |
|
CVE-2018-3185
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 5.5 | null |
|
GHSA-69qj-w566-92r6
|
SQL injection vulnerability in team.php in Posse Softball Director CMS allows remote attackers to execute arbitrary SQL commands via the idteam parameter.
|
[] | null | null | null | null | null |
|
GHSA-95v7-jv4x-23ww
|
VMware Cloud Foundation contains an information disclosure vulnerability due to logging of credentials in plain-text within multiple log files on the SDDC Manager. A malicious actor with root access on VMware Cloud Foundation SDDC Manager may be able to view credentials in plaintext within one or more log files.
|
[] | null | null | null | null | null |
|
GHSA-m8rj-f4jh-9cmx
|
In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed
|
[] | null | 5.5 | null | null | null |
|
CVE-2017-6610
|
A vulnerability in the Internet Key Exchange Version 1 (IKEv1) XAUTH code of Cisco ASA Software could allow an authenticated, remote attacker to cause a reload of an affected system. The vulnerability is due to insufficient validation of the IKEv1 XAUTH parameters passed during an IKEv1 negotiation. An attacker could exploit this vulnerability by sending crafted parameters. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability only affects systems configured in routed firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 or IPv6 traffic. A valid IKEv1 Phase 1 needs to be established to exploit this vulnerability, which means that an attacker would need to have knowledge of a pre-shared key or have a valid certificate for phase 1 authentication. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco ASA for Firepower 9300 Series, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 9.1(7.7) 9.2(4.11) 9.4(4) 9.5(3) 9.6(1.5). Cisco Bug IDs: CSCuz11685.
|
[
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.35:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.37:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.40:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.42:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.104\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(3.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.50\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.105\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.100\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.243\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.0.115:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.3:*:*:*:*:*:*:*"
] | null | null | 7.7 | 6.8 | null |
|
CVE-2024-4198
|
Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully validate role changes which allows an attacker authenticated as team admin to demote users to guest via crafted HTTP requests.
|
[] | null | 2.7 | null | null | null |
|
GHSA-6mrp-w3p5-m293
|
Multiple Vivotek IP Cameras remote authentication bypass that could allow access to the video stream
|
[] | null | null | null | null | null |
|
GHSA-r7x8-hv2q-v9r7
|
A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.
|
[] | null | 6.2 | null | null | null |
|
CVE-2023-21742
|
Microsoft SharePoint Server Remote Code Execution Vulnerability
|
Microsoft SharePoint Server Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-8929-jmq3-999x
|
In YARA 3.7.1 and prior, parsing a specially crafted compiled rule file can cause an out of bounds read vulnerability in yr_execute_code in libyara/exec.c.
|
[] | null | null | 7.8 | null | null |
|
CVE-2025-7834
|
PHPGurukul Complaint Management System cross-site request forgery
|
A vulnerability, which was classified as problematic, was found in PHPGurukul Complaint Management System 2.0. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 4.3 | 4.3 | 5 | null |
GHSA-45g2-wqp2-rh43
|
SQL injection vulnerability in ads.php in Softbiz Ad Management plus Script 1 allows remote authenticated users to execute arbitrary SQL commands via the package parameter.
|
[] | null | null | null | null | null |
|
CVE-2015-0448
|
Unspecified vulnerability in Oracle Sun Solaris 11.2 allows local users to affect confidentiality, integrity, and availability via vectors related to ZFS File system.
|
[
"cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2017-2244
|
Cross-site request forgery (CSRF) vulnerability in MFC-J960DWN firmware ver.D and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
|
[
"cpe:2.3:o:brother:mfc-j960dwn_firmware:d:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-j960dwn:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-565h-44m8-4c2v
|
A vulnerability was found in Xuxueli xxl-job up to 3.1.1 and classified as problematic. Affected by this issue is the function makeToken of the file src/main/java/com/xxl/job/admin/controller/IndexController.java of the component Token Generation. The manipulation leads to password hash with insufficient computational effort. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
|
[] | 2.9 | 3.7 | null | null | null |
|
CVE-2019-9215
|
In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function.
|
[
"cpe:2.3:a:live555:streaming_media:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-x52j-x9wp-ccf5
|
There is a SQL Injection vulnerability in ChurchCRM 4.4.5 via the 'PersonID' field in /churchcrm/WhyCameEditor.php.
|
[] | null | 7.2 | null | null | null |
|
GHSA-6hw8-gq2c-479x
|
Dell DBUtilDrv2.sys driver (versions 2.5 and 2.6) contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required.
|
[] | null | 7.8 | null | null | null |
|
GHSA-3cvw-6mcp-6g5g
|
Simple Client Management System 1.0 is vulnerable to SQL Injection via /cms/classes/Master.php?f=delete_designation.
|
[] | null | 9.8 | null | null | null |
|
CVE-2024-23341
|
TuiTse-TsuSin html injection vulnerability in `tuitse_html` function
|
TuiTse-TsuSin is a package for organizing the comparative corpus of Taiwanese Chinese characters and Roman characters, and extracting sentences of the Taiwanese Chinese characters and the Roman characters. Prior to version 1.3.2, when using `tuitse_html` without quoting the input, there is a html injection vulnerability. Version 1.3.2 contains a patch for the issue. As a workaround, sanitize Taigi input with HTML quotation.
|
[
"cpe:2.3:a:ithuan:tuitse-tsusin:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
CVE-2014-7295
|
The (1) Special:Preferences and (2) Special:UserLogin pages in MediaWiki before 1.19.20, 1.22.x before 1.22.12 and 1.23.x before 1.23.5 allows remote authenticated users to conduct cross-site scripting (XSS) attacks or have unspecified other impact via crafted CSS, as demonstrated by modifying MediaWiki:Common.css.
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.4:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
CVE-2010-0161
|
The nsAuthSSPI::Unwrap function in extensions/auth/nsAuthSSPI.cpp in Mozilla Thunderbird before 2.0.0.24 and SeaMonkey before 1.1.19 on Windows Vista, Windows Server 2008 R2, and Windows 7 allows remote SMTP, IMAP, and POP servers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via crafted data in a session that uses SSPI.
|
[
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-w8v4-5hx2-xq34
|
A vulnerability in the ArubaOS web-based management interface could allow an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
|
[] | null | 8.8 | null | null | null |
|
RHSA-2022:9029
|
Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.5.3-3]
|
krb5: integer overflow vulnerabilities in PAC parsing
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 8.8 | null | null | null |
CVE-2022-0192
|
A DLL search path vulnerability was reported in Lenovo PCManager prior to version 4.0.40.2175 that could allow privilege escalation.
|
[
"cpe:2.3:a:lenovo:pcmanager:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
|
CVE-2025-31400
|
WordPress WS Audio Player plugin <= 1.1.8 - CSRF to Stored XSS vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in icyleaf WS Audio Player allows Stored XSS. This issue affects WS Audio Player: from n/a through 1.1.8.
|
[] | null | 7.1 | null | null | null |
GHSA-37rv-6wmp-jjqr
|
In the Linux kernel, the following vulnerability has been resolved:bpf: Fail verification for sign-extension of packet data/data_end/data_metasyzbot reported a kernel crash due to
commit 1f1e864b6555 ("bpf: Handle sign-extenstin ctx member accesses").
The reason is due to sign-extension of 32-bit load for
packet data/data_end/data_meta uapi field.The original code looks like:
r2 = *(s32 *)(r1 + 76) /* load __sk_buff->data */
r3 = *(u32 *)(r1 + 80) /* load __sk_buff->data_end */
r0 = r2
r0 += 8
if r3 > r0 goto +1
...
Note that __sk_buff->data load has 32-bit sign extension.After verification and convert_ctx_accesses(), the final asm code looks like:
r2 = *(u64 *)(r1 +208)
r2 = (s32)r2
r3 = *(u64 *)(r1 +80)
r0 = r2
r0 += 8
if r3 > r0 goto pc+1
...
Note that 'r2 = (s32)r2' may make the kernel __sk_buff->data address invalid
which may cause runtime failure.Currently, in C code, typically we have
void *data = (void *)(long)skb->data;
void *data_end = (void *)(long)skb->data_end;
...
and it will generate
r2 = *(u64 *)(r1 +208)
r3 = *(u64 *)(r1 +80)
r0 = r2
r0 += 8
if r3 > r0 goto pc+1If we allow sign-extension,
void *data = (void *)(long)(int)skb->data;
void *data_end = (void *)(long)skb->data_end;
...
the generated code looks like
r2 = *(u64 *)(r1 +208)
r2 <<= 32
r2 s>>= 32
r3 = *(u64 *)(r1 +80)
r0 = r2
r0 += 8
if r3 > r0 goto pc+1
and this will cause verification failure since "r2 <<= 32" is not allowed
as "r2" is a packet pointer.To fix this issue for case
r2 = *(s32 *)(r1 + 76) /* load __sk_buff->data */
this patch added additional checking in is_valid_access() callback
function for packet data/data_end/data_meta access. If those accesses
are with sign-extenstion, the verification will fail.[1] https://lore.kernel.org/bpf/[email protected]/
|
[] | null | 5.5 | null | null | null |
|
GHSA-rfp5-6w27-jrq7
|
Incorrect Comparison, Permissive List of Allowed Inputs, and Privilege Context Switching Error in PostgreSQL
|
A flaw was found in the psql interactive terminal of PostgreSQL in versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If an interactive psql session uses \gset when querying a compromised server, the attacker can execute arbitrary code as the operating system account running psql. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
|
[] | null | 7.5 | null | null | null |
CVE-2008-6721
|
SQL injection vulnerability in index.php in AJ Square AJ Article allows remote attackers to execute arbitrary SQL commands via the txtName parameter (aka the username field).
|
[
"cpe:2.3:a:ajsquare:aj_article:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-4q8v-gqw7-8xpx
|
In the Linux kernel, the following vulnerability has been resolved:crypto: arm64/neonbs - fix out-of-bounds access on short inputThe bit-sliced implementation of AES-CTR operates on blocks of 128
bytes, and will fall back to the plain NEON version for tail blocks or
inputs that are shorter than 128 bytes to begin with.It will call straight into the plain NEON asm helper, which performs all
memory accesses in granules of 16 bytes (the size of a NEON register).
For this reason, the associated plain NEON glue code will copy inputs
shorter than 16 bytes into a temporary buffer, given that this is a rare
occurrence and it is not worth the effort to work around this in the asm
code.The fallback from the bit-sliced NEON version fails to take this into
account, potentially resulting in out-of-bounds accesses. So clone the
same workaround, and use a temp buffer for short in/outputs.
|
[] | null | 7.1 | null | null | null |
|
GHSA-j3wp-2v29-wh98
|
Buffer overflow in Ethereal 0.8.5 up to 0.10.14 allows remote attackers to execute arbitrary code via the telnet dissector.
|
[] | null | null | null | null | null |
|
CVE-2025-47984
|
Windows GDI Information Disclosure Vulnerability
|
Protection mechanism failure in Windows GDI allows an unauthorized attacker to disclose information over a network.
|
[] | null | 7.5 | null | null | null |
GHSA-hgq8-fc97-42ff
|
Directory traversal vulnerability in the fmserver servlet in Cisco Prime Data Center Network Manager (DCNM) before 7.1(1) allows remote attackers to read arbitrary files via a crafted pathname, aka Bug ID CSCus00241.
|
[] | null | null | null | null | null |
|
GHSA-mrp7-xwff-9phj
|
The DataPilot feature in IBM Lotus Symphony 3 before FP3 allows user-assisted remote attackers to cause a denial of service (application crash) via a large .xls spreadsheet with an invalid Value reference.
|
[] | null | null | null | null | null |
|
RHSA-2024:7312
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
|
djangorestframework: Cross-site Scripting (XSS) via break_long_headers urllib3: proxy-authorization request header is not stripped during cross-origin redirects python-twisted: Reflected XSS via HTML Injection in Redirect Response
|
[
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9"
] | null | 4.2 | null | null | null |
CVE-2013-1422
|
webcalendar before 1.2.7 shows the reason for a failed login (e.g., "no such user").
|
[
"cpe:2.3:a:webcalendar_project:webcalendar:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
CVE-2022-28286
|
Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
GHSA-jwrc-jxj5-hqh2
|
Zimbra Web Client (ZWC) in Zimbra Collaboration Suite 8.8 before 8.8.8.Patch4 and 8.7 before 8.7.11.Patch4 has Persistent XSS via a contact group.
|
[] | null | null | 6.1 | null | null |
|
GHSA-3mqf-x35g-6j9q
|
HUAWEI P30 Pro smartphone with Versions earlier than 10.1.0.160(C00E160R2P8) has an integer overflow vulnerability. Some functions are lack of verification when they process some messages sent from other module. Attackers can exploit this vulnerability by send malicious message to cause integer overflow. This can compromise normal service.
|
[] | null | null | null | null | null |
|
GHSA-p688-8h8g-h467
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in J.N. Breetvelt a.K.A. OpaJaap WP Photo Album Plus allows Reflected XSS.This issue affects WP Photo Album Plus: from n/a through 8.8.00.002.
|
[] | null | 7.1 | null | null | null |
|
RHSA-2019:0081
|
Red Hat Security Advisory: openvswitch security and bug fix update
|
openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 4.9 | null | null |
CVE-2025-25126
|
WordPress ZMSEO plugin <= 1.14.1 - CSRF to Stored XSS vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in zmseo ZMSEO allows Stored XSS. This issue affects ZMSEO: from n/a through 1.14.1.
|
[] | null | 7.1 | null | null | null |
CVE-2004-1166
|
CRLF injection vulnerability in Microsoft Internet Explorer 6.0.2800.1106 and earlier allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline ("%0a") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command.
|
[
"cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
RHBA-2023:2977
|
Red Hat Bug Fix Advisory: linux-firmware bug fix and enhancement update
|
amd: Return Address Predictor vulnerability leading to information disclosure
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.6 | null | null | null |
CVE-2019-1381
|
An information disclosure vulnerability exists when the Windows Servicing Stack allows access to unprivileged file locations, aka 'Microsoft Windows Information Disclosure Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2006-2361
|
PHP remote file inclusion vulnerability in pafiledb_constants.php in Download Manager (mxBB pafiledb) integration, as used with phpBB, allows remote attackers to execute arbitrary PHP code via a URL in the module_root_path parameter.
|
[
"cpe:2.3:a:mxbb:mxbb_portal:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mxbb:mxbb_portal:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php_arena:pafiledb:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php_arena:pafiledb:2.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-62cw-wm98-px97
|
Dell Secure Connect Gateway (SCG) Policy Manager, all versions, contain(s) a Stored Cross-Site Scripting Vulnerability in the Filters page. An adjacent network high privileged attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.
|
[] | null | 7.6 | null | null | null |
|
RHSA-2020:1185
|
Red Hat Security Advisory: libsndfile security update
|
libsndfile: stack-based buffer overflow in sndfile-deinterleave utility
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null | null |
CVE-2016-1112
|
Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to obtain sensitive information via unspecified vectors.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2020-2243
|
Jenkins Cadence vManager Plugin 3.0.4 and earlier does not escape build descriptions in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission.
|
[
"cpe:2.3:a:jenkins:cadence_vmanager:*:*:*:*:*:jenkins:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-j875-fvf8-9cgw
|
In seninf, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07992786; Issue ID: ALPS07992786.
|
[] | null | 6.7 | null | null | null |
|
CVE-2010-4218
|
Unspecified vulnerability in Web Services in IBM ENOVIA 6 has unknown impact and attack vectors, related to a system that becomes "exposed to the internet."
|
[
"cpe:2.3:a:ibm:enovia:6:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-7j47-pqh4-2284
|
SQL injection vulnerability in diary.php in My Databook allows remote attackers to execute arbitrary SQL commands via the delete parameter.
|
[] | null | null | null | null | null |
|
CVE-2022-24120
|
Certain General Electric Renewable Energy products store cleartext credentials in flash memory. This affects iNET and iNET II before 8.3.0.
|
[
"cpe:2.3:o:ge:inet_900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ge:inet_900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ge:inet_ii_900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ge:inet_ii_900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ge:sd1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ge:sd1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ge:sd2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ge:sd2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ge:sd4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ge:sd4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ge:sd9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ge:sd9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ge:td220max_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ge:td220max:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ge:td220x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ge:td220x:-:*:*:*:*:*:*:*"
] | null | 4.6 | null | null | null |
|
GHSA-2679-jq7r-8cph
|
A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data.
|
[] | null | 6.8 | null | null | null |
|
GHSA-2vcm-447j-6j4j
|
GFI MailEssentials prior to version 21.8 is vulnerable to an XML External Entity (XXE) issue. An authenticated and remote attacker can send crafted HTTP requests to read arbitrary system files.
|
[] | null | 6.5 | null | null | null |
|
GHSA-wcwj-fgp8-wvg8
|
libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.
|
[] | null | null | null | null | null |
|
GHSA-9c64-5jjg-w2cj
|
The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so websetremoteimageinfo function.
|
[] | null | null | null | null | null |
|
CVE-2021-21087
|
ColdFusion Improper neutralization of web input during page generation could lead to arbitrary JavaScript execution in the browser
|
Adobe Coldfusion versions 2016 (update 16 and earlier), 2018 (update 10 and earlier) and 2021.0.0.323925 are affected by an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. An attacker could abuse this vulnerability to execute arbitrary JavaScript code in context of the current user. Exploitation of this issue requires user interaction.
|
[
"cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update11:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update12:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update13:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update14:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update15:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update16:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021.0.0.323925:*:*:*:*:*:*:*"
] | null | null | 5.4 | null | null |
GHSA-9rxx-ff39-wwfv
|
Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 on DDMC contain a relative path traversal vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the application sending over an unauthorized file to the managed system.
|
[] | null | 4.1 | null | null | null |
|
CVE-2003-1071
|
rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header.
|
[
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2024-20143
|
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2069.
|
[] | null | 6.6 | null | null | null |
|
ICSA-22-195-01
|
Siemens SCALANCE X Switch Devices
|
The webserver of affected devices calculates session ids and nonces in an insecure manner. This could allow an unauthenticated remote attacker to brute-force session ids and hijack existing sessions. Affected devices do not properly validate the GET parameter XNo of incoming HTTP requests. This could allow an unauthenticated remote attacker to crash affected devices. Affected devices do not properly validate the URI of incoming HTTP GET requests. This could allow an unauthenticated remote attacker to crash affected devices.
|
[] | null | 9.6 | null | null | null |
CVE-2025-32700
|
AbuseFilter log interfaces expose global private and hidden filters when central DB is not available
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation AbuseFilter. This vulnerability is associated with program files includes/Api/QueryAbuseLog.Php, includes/Pager/AbuseLogPager.Php, includes/Special/SpecialAbuseLog.Php, includes/View/AbuseFilterViewExamine.Php.
This issue affects AbuseFilter: from >= 1.43.0 before 1.43.1.
|
[] | 2.3 | null | null | null | null |
CVE-2016-2065
|
sound/soc/msm/qdsp6v2/msm-audio-effects-q6-v2.c in the MSM QDSP6 audio driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (out-of-bounds write and memory corruption) or possibly have unspecified other impact via a crafted application that makes an ioctl call triggering incorrect use of a parameters pointer.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
GHSA-j8jq-cv4q-c5x6
|
Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 9.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to eCompensation Manager Desktop.
|
[] | null | null | null | null | null |
|
GHSA-r6c7-73ch-fhc5
|
Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Event Management). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).
|
[] | null | 6 | null | null | null |
|
CVE-2025-3733
|
baguetteBox.js - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-034
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal baguetteBox.Js allows Cross-Site Scripting (XSS).This issue affects baguetteBox.Js: from 0.0.0 before 2.0.4, from 3.0.0 before 3.0.1.
|
[] | null | 6.5 | null | null | null |
PYSEC-2014-112
| null |
The instance rescue mode in OpenStack Compute (Nova) 2013.2 before 2013.2.3 and Icehouse before 2014.1, when using libvirt to spawn images and use_cow_images is set to false, allows remote authenticated users to read certain compute host files by overwriting an instance disk with a crafted image.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.