id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2024-39927
|
Out-of-bounds write vulnerability exists in Ricoh MFPs and printers. If a remote attacker sends a specially crafted request to the affected products, the products may be able to cause a denial-of-service (DoS) condition and/or user's data may be destroyed.
|
[
"cpe:2.3:h:ricoh:im_c3510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c3010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c6010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c5510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c4510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c2510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c2010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c7010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_460f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_460ftl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:370f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c8500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c8510m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:im_c8500m:-:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
|
GHSA-8r7f-pjwj-ww9c
|
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel function where a lack of checks allows the exploitation of an integer overflow on the size parameter of the tz_map_shared_mem function.
|
[] | null | null | null | null | null |
|
GHSA-mxmv-pjj2-646c
|
WebCore on Apple Mac OS X 10.3.9 and 10.4.10 retains properties of certain global objects when a new URL is visited in the same window, which allows remote attackers to conduct cross-site scripting (XSS) attacks.
|
[] | null | null | null | null | null |
|
CVE-2018-7707
|
Cross-site scripting (XSS) vulnerability in SecurEnvoy SecurMail before 9.2.501 allows remote attackers to inject arbitrary web script or HTML via an HTML-formatted e-mail message.
|
[
"cpe:2.3:a:securenvoy:securmail:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2006-3798
|
DeluxeBB 1.07 and earlier allows remote attackers to overwrite the (1) _GET, (2) _POST, (3) _ENV, and (4) _SERVER variables via the _COOKIE (aka COOKIE) variable, which can overwrite the other variables during an extract function call, probably leading to multiple security vulnerabilities, aka "pollution of the global namespace."
|
[
"cpe:2.3:a:deluxebb:deluxebb:1.05:*:*:*:*:*:*:*",
"cpe:2.3:a:deluxebb:deluxebb:1.06:*:*:*:*:*:*:*",
"cpe:2.3:a:deluxebb:deluxebb:1.07:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2023-7208
|
Totolink X2000R_V2 boa formTmultiAP buffer overflow
|
A vulnerability classified as critical was found in Totolink X2000R_V2 2.0.0-B20230727.10434. This vulnerability affects the function formTmultiAP of the file /bin/boa. The manipulation leads to buffer overflow. VDB-249742 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:totolink:x2000r_firmware:2.0.0-b20230727.10434:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x2000r:v2:*:*:*:*:*:*:*"
] | null | 8 | 8 | 7.7 | null |
GHSA-jch8-wh76-mr97
|
A use after free in ResourceCoordinator in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[] | null | null | 8.8 | null | null |
|
GHSA-v226-92fr-fm36
|
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.
|
[] | 7.3 | 7.8 | null | null | null |
|
CVE-2012-1253
|
Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 0.7, when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via vectors involving an embedded image attachment.
|
[
"cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.5:rc:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.5.4:*:*:*:*:*:*:*"
] | null | null | null | 2.6 | null |
|
GHSA-9fwm-2jcf-cq55
|
The WordPress plugin Be POPIA Compliant exposed sensitive information to unauthenticated users consisting of site visitors emails and usernames via an API route, in versions up to an including 1.1.5.
|
[] | null | 5.3 | null | null | null |
|
GHSA-qjv7-pwwh-5qqj
|
drivers/net/can/usb/gs_usb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.2 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
|
[] | null | null | 7.8 | null | null |
|
GHSA-r3vg-939c-2mrm
|
Rapid7 Insight Agent, versions 3.0.1 to 3.1.2.34, suffer from a local privilege escalation due to an uncontrolled DLL search path. Specifically, when Insight Agent versions 3.0.1 to 3.1.2.34 start, the Python interpreter attempts to load python3.dll at "C:\DLLs\python3.dll," which normally is writable by locally authenticated users. Because of this, a malicious local user could use Insight Agent's startup conditions to elevate to SYSTEM privileges. This issue was fixed in Rapid7 Insight Agent 3.1.2.35. This vulnerability is a regression of CVE-2019-5629.
|
[] | null | null | null | null | null |
|
CVE-2024-11432
|
SuevaFree Essential Kit <= 1.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting
|
The SuevaFree Essential Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'counter' shortcode in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
CVE-2019-9598
|
An issue was discovered in Cscms 4.1.0. There is an admin.php/pay CSRF vulnerability that can change the payment account to redirect funds.
|
[
"cpe:2.3:a:chshcms:cscms:4.1:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-c5cc-h8q8-m9hw
|
Buffer overflow in Check Point SmartDashboard in Check Point NG AI R54 and R55 allows remote authenticated users to cause a denial of service (server disconnect) and possibly execute arbitrary code via a large filter on a column when using SmartView Tracker.
|
[] | null | null | null | null | null |
|
CVE-2024-21823
|
Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access
|
[] | null | 7.5 | null | null | null |
|
GHSA-7m6w-6686-g729
|
The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's SiteOrigin Blog Widget in all versions up to, and including, 1.61.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-hfpc-f259-2f2x
|
The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, which allows physically proximate attackers to obtain a user password by reading the lockscreen.
|
[] | null | null | null | null | null |
|
CVE-2024-13124
|
Photo Gallery by 10Web < 1.8.33 - Admin+ Stored XSS
|
The Photo Gallery by 10Web WordPress plugin before 1.8.33 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] | null | 3.5 | null | null | null |
GHSA-259m-5hcr-j7f3
|
AlstraSoft Affiliate Network Pro 7.2 allows remote attackers to obtain sensitive information via a direct request to scripts such as (1) togateway.php and (2) other unspecified scripts.
|
[] | null | null | null | null | null |
|
CVE-2024-45540
|
Use After Free in HLOS
|
Memory corruption while invoking IOCTL map buffer request from userspace.
|
[] | null | 6.6 | null | null | null |
CVE-2025-46986
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
CVE-2024-10396
|
An authenticated user can provide a malformed ACL to the fileserver's StoreACL RPC, causing the fileserver to crash
|
An authenticated user can provide a malformed ACL to the fileserver's StoreACL
RPC, causing the fileserver to crash, possibly expose uninitialized memory, and
possibly store garbage data in the audit log.
Malformed ACLs provided in responses to client FetchACL RPCs can cause client
processes to crash and possibly expose uninitialized memory into other ACLs
stored on the server.
|
[] | 7.1 | null | null | null | null |
CVE-2009-3289
|
The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.
|
[
"cpe:2.3:a:gnome:glib:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:-:*:*:*:*:*:*"
] | null | 7.8 | null | 4.4 | null |
|
cisco-sa-iosxe-cswsh-FKk9AzT5
|
Cisco IOS XE Software Web UI Cross-Site WebSocket Hijacking Vulnerability
|
A vulnerability in the web UI feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site WebSocket hijacking (CSWSH) attack and cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient HTTP protections in the web UI on an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the web UI to follow a crafted link. A successful exploit could allow the attacker to corrupt memory on the affected device, forcing it to reload and causing a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the March 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74408"].
|
[] | null | 7.4 | null | null | null |
GHSA-vcph-gcr2-hgch
|
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to denial of service with a specially crafted SQL statement using External Tables. IBM X-Force ID: 263499.
|
[] | null | 5.3 | null | null | null |
|
CVE-2020-8845
|
This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of watermarks in AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9358.
|
[
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
|
GHSA-j2cw-j27w-3f6m
|
The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.4. Processing a file may lead to a denial-of-service or potentially disclose memory contents.
|
[] | null | 6.2 | null | null | null |
|
CVE-2018-11203
|
A division by zero was discovered in H5D__btree_decode_key in H5Dbtree.c in the HDF HDF5 1.10.2 library. It could allow a remote denial of service attack.
|
[
"cpe:2.3:a:hdfgroup:hdf5:1.10.2:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2022-27261
|
An arbitrary file write vulnerability in Express-FileUpload v1.3.1 allows attackers to upload multiple files with the same name, causing an overwrite of files in the web application server.
|
[
"cpe:2.3:a:express-fileupload_project:express-fileupload:1.3.1:*:*:*:*:node.js:*:*"
] | null | 7.5 | null | 4.3 | null |
|
CVE-2022-45824
|
WordPress Advanced Booking Calendar Plugin <= 1.7.1 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in Advanced Booking Calendar plugin <= 1.7.1 on WordPress.
|
[
"cpe:2.3:a:elbtide:advanced_booking_calendar:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
RHSA-2018:3157
|
Red Hat Security Advisory: curl and nss-pem security and bug fix update
|
curl: HTTP authentication leak in redirects curl: FTP path trickery leads to NIL byte out of bounds write curl: LDAP NULL pointer dereference curl: RTSP RTP buffer over-read curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.4 | null | null |
CVE-2019-20678
|
Certain NETGEAR devices are affected by stored XSS. This affects RBR20 before 2.3.5.26, RBS20 before 2.3.5.26, RBK20 before 2.3.5.26, RBR40 before 2.3.5.30, RBS40 before 2.3.5.30, RBK40 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and RBK50 before 2.3.5.30.
|
[
"cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*"
] | null | null | 6 | null | null |
|
GHSA-x765-chv2-8q2p
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 26 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to SAAJ.
|
[] | null | null | null | null | null |
|
GHSA-hvw5-crqv-jhw4
|
Opera before 11.00, when Opera Turbo is enabled, does not display a page's security indication, which makes it easier for remote attackers to spoof trusted content via a crafted web site.
|
[] | null | null | null | null | null |
|
RHSA-2020:2210
|
Red Hat Security Advisory: ksh security update
|
ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7.4 | null | null | null |
GHSA-vgjq-3m42-w385
|
IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.20, 7.1 through 7.1.2.16, 7.2 through 7.2.3.9, 7.3 through 7.3.2.4, and 8.0 through 8.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 285654.
|
[] | null | 5.4 | null | null | null |
|
CVE-2020-0909
|
A denial of service vulnerability exists when Hyper-V on a Windows Server fails to properly handle specially crafted network packets.To exploit the vulnerability, an attacker would send specially crafted network packets to the Hyper-V Server.The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to properly handle these network packets., aka 'Windows Hyper-V Denial of Service Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2022-21199
|
An information disclosure vulnerability exists due to the hardcoded TLS key of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted man-in-the-middle attack can lead to a disclosure of sensitive information. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.
|
[
"cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*",
"cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | null | null |
|
CVE-2019-20144
|
An issue was discovered in GitLab Community Edition (CE) and Enterprise Edition (EE) 10.8 through 12.6.1. It has Incorrect Access Control.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 4.3 | null | 4 | null |
|
CVE-2016-9158
|
A vulnerability has been identified in SIMATIC S7-300 CPU family (All versions), SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-400 V6 and earlier CPU family (All versions), SIMATIC S7-400 V7 CPU family (All versions). Specially crafted packets sent to port 80/tcp could cause the affected devices to go into defect mode. A cold restart is required to recover the system.
|
[
"cpe:2.3:o:siemens:simatic_s7-300_cpu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-300_cpu_312:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-300_cpu_314:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-300_cpu_315-2_dp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-300_cpu_315-2_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-300_cpu_317-_2_dp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-300_cpu_317-2_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-300_cpu_319-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-400_cpu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400_cpu_412-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400_cpu_412-2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400_cpu_412-2_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400_cpu_414-2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400_cpu_414-3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400_cpu_414-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400_cpu_416-2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400_cpu_416-3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400_cpu_416-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400_cpu_416f-2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400_cpu_416f-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-400_cpu_417-4:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 | null |
|
GHSA-qg26-364g-r67q
|
Cross-site scripting (XSS) vulnerability in the Dashboard in Splunk Enterprise 6.2.x before 6.2.4 and Splunk Light 6.2.x before 6.2.4 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2023-2252
|
Directorist < 7.5.4 - Admin+ LFI
|
The Directorist WordPress plugin before 7.5.4 is vulnerable to Local File Inclusion as it does not validate the file parameter when importing CSV files.
|
[
"cpe:2.3:a:wpwax:directorist:*:*:*:*:*:wordpress:*:*"
] | null | 2.7 | null | null | null |
CVE-2013-6626
|
The WebContentsImpl::AttachInterstitialPage function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 31.0.1650.48 does not cancel JavaScript dialogs upon generating an interstitial warning, which allows remote attackers to spoof the address bar via a crafted web site.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2021-24230
|
Patreon WordPress < 1.7.0 - CSRF to Overwrite/Create User Meta
|
The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged in user overwrite or create arbitrary user metadata on the victim’s account once visited. If exploited, this bug can be used to overwrite the “wp_capabilities” meta, which contains the affected user account’s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content.
|
[
"cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*"
] | null | 8.1 | null | 5.8 | null |
CVE-2022-21744
|
In Modem 2G RR, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighbouring cell size with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00810064; Issue ID: ALPS06641626.
|
[
"cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:lr12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:lr9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6725:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2009-0845
|
The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3, when SPNEGO is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via invalid ContextFlags data in the reqFlags field in a negTokenInit token.
|
[
"cpe:2.3:a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-vfc6-mrqm-f3vr
|
The Symantec Advanced Secure Gateway (ASG) 6.6, ASG 6.7 (prior to 6.7.2.1), ProxySG 6.5 (prior to 6.5.10.6), ProxySG 6.6, and ProxySG 6.7 (prior to 6.7.2.1) management console is susceptible to a reflected XSS vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to inject arbitrary JavaScript code into the management console web client application. This is a separate vulnerability from CVE-2016-10256.
|
[] | null | null | 6.1 | null | null |
|
GHSA-g2m6-f6m6-qjg5
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
|
[] | null | null | null | null | null |
|
GHSA-6q8c-8rxm-f6fh
|
In the Linux kernel, the following vulnerability has been resolved:mm: clear uffd-wp PTE/PMD state on mremap()When mremap()ing a memory region previously registered with userfaultfd as
write-protected but without UFFD_FEATURE_EVENT_REMAP, an inconsistency in
flag clearing leads to a mismatch between the vma flags (which have
uffd-wp cleared) and the pte/pmd flags (which do not have uffd-wp
cleared). This mismatch causes a subsequent mprotect(PROT_WRITE) to
trigger a warning in page_table_check_pte_flags() due to setting the pte
to writable while uffd-wp is still set.Fix this by always explicitly clearing the uffd-wp pte/pmd flags on any
such mremap() so that the values are consistent with the existing clearing
of VM_UFFD_WP. Be careful to clear the logical flag regardless of its
physical form; a PTE bit, a swap PTE bit, or a PTE marker. Cover PTE,
huge PMD and hugetlb paths.
|
[] | null | 5.5 | null | null | null |
|
CVE-2017-17384
|
ISPConfig 3.x before 3.1.9 allows remote authenticated users to obtain root access by creating a crafted cron job.
|
[
"cpe:2.3:a:ispconfig:ispconfig:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.2.2:b1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.3:b1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.3.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.3.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.3.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.3.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.4:b1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.4.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.4.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.4.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5:b1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5:rc2:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.4:b1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.4:p1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.4:p2:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.4:p3:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.4:p4:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.4:p5:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.4:p6:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.4:p7:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.4:p8:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.4:p9:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.0.5.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.1.1:p1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.1.7:p1:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.1.8:p1:*:*:*:*:*:*"
] | null | null | 8.8 | 9 | null |
|
CVE-2021-36978
|
QPDF 9.x through 9.1.1 and 10.x through 10.0.4 has a heap-based buffer overflow in Pl_ASCII85Decoder::write (called from Pl_AES_PDF::flush and Pl_AES_PDF::finish) when a certain downstream write fails.
|
[
"cpe:2.3:a:qpdf_project:qpdf:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
GHSA-wch4-vg96-7wgw
|
Sun StorEdge 6130 Array Controllers with firmware 06.12.10.11 and earlier allow remote attackers to cause a denial of service (controller reboot) via a flood of traffic on the LAN.
|
[] | null | null | null | null | null |
|
CVE-2012-4399
|
The Xml class in CakePHP 2.1.x before 2.1.5 and 2.2.x before 2.2.1 allows remote attackers to read arbitrary files via XML data containing external entity references, aka an XML external entity (XXE) injection attack.
|
[
"cpe:2.3:a:cakefoundation:cakephp:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-ffrc-jg98-8v39
|
The National Payments Corporation of India BHIM application 1.3 for Android does not properly restrict use of the OTP feature, which makes it easier for attackers to bypass authentication.
|
[] | null | null | 9.8 | null | null |
|
GHSA-7xh8-5gm5-5q2f
|
The “List View” function of ShinHer StudyOnline System is not under authority control. After logging in with user’s privilege, remote attackers can access the content of other users’ message boards by crafting URL parameters.
|
[] | null | 4.3 | null | null | null |
|
GHSA-p88p-j9px-cq4j
|
In the Linux kernel, the following vulnerability has been resolved:class: fix use-after-free in class_register()The lock_class_key is still registered and can be found in
lock_keys_hash hlist after subsys_private is freed in error
handler path.A task who iterate over the lock_keys_hash
later may cause use-after-free.So fix that up and unregister
the lock_class_key before kfree(cp).On our platform, a driver fails to kset_register because of
creating duplicate filename '/class/xxx'.With Kasan enabled,
it prints a invalid-access bug report.KASAN bug report:BUG: KASAN: invalid-access in lockdep_register_key+0x19c/0x1bc
Write of size 8 at addr 15ffff808b8c0368 by task modprobe/252
Pointer tag: [15], memory tag: [fe]CPU: 7 PID: 252 Comm: modprobe Tainted: G W
6.6.0-mainline-maybe-dirty #1Call trace:
dump_backtrace+0x1b0/0x1e4
show_stack+0x2c/0x40
dump_stack_lvl+0xac/0xe0
print_report+0x18c/0x4d8
kasan_report+0xe8/0x148
__hwasan_store8_noabort+0x88/0x98
lockdep_register_key+0x19c/0x1bc
class_register+0x94/0x1ec
init_module+0xbc/0xf48 [rfkill]
do_one_initcall+0x17c/0x72c
do_init_module+0x19c/0x3f8
...
Memory state around the buggy address:
ffffff808b8c0100: 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a
ffffff808b8c0200: 8a 8a 8a 8a 8a 8a 8a 8a fe fe fe fe fe fe fe feffffff808b8c0300: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
^
ffffff808b8c0400: 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03As CONFIG_KASAN_GENERIC is not set, Kasan reports invalid-access
not use-after-free here.In this case, modprobe is manipulating
the corrupted lock_keys_hash hlish where lock_class_key is already
freed before.It's worth noting that this only can happen if lockdep is enabled,
which is not true for normal system.
|
[] | null | 7.8 | null | null | null |
|
ICSMA-21-313-01
|
Philips MRI 1.5T and 3T
|
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.CVE-2021-26262 has been assigned to this vulnerability.A CVSS v3 base score of 6.2 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The software assigns an owner who is outside the intended control sphere to a resource.CVE-2021-26248has been assigned to this vulnerability.A CVSS v3 base score of 6.2 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The product exposes sensitive information to an actor not explicitly authorized to have access.CVE-2021-42744has been assigned to this vulnerability.A CVSS v3 base score of 6.2 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[] | null | null | 6.2 | null | null |
GHSA-f345-3pvh-8x7v
|
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.2.0 and 8.3.5.0 allows context-dependent attackers to affect confidentiality, integrity, and availability via unknown vectors related to Outside In Filters. NOTE: the previous information was obtained from the July 2011 CPU. Oracle has not commented on claims from a reliable third party that this is a stack-based buffer overflow in the imcdr2.flt library for the CorelDRAW parser.
|
[] | null | null | null | null | null |
|
GHSA-9j45-cjg7-r8w4
|
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
|
[] | null | 5.3 | null | null | null |
|
CVE-2022-0709
|
Booking Package < 1.5.29 - Unauthenticated Sensitive Data Disclosure
|
The Booking Package WordPress plugin before 1.5.29 requires a token for exporting the ical representation of it's booking calendar, but this token is returned in the json response to unauthenticated users performing a booking, leading to a sensitive data disclosure vulnerability.
|
[
"cpe:2.3:a:saasproject:booking_package:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | 5 | null |
GHSA-3rgx-xp66-8w52
|
Cross-site scripting (XSS) vulnerability in Compaq Insight Management Agents 2.0, 2.1, 3.6.0, 4.2 and 4.3.7 allows remote attackers to inject arbitrary web script or HTML via a URL, which inserts the script into the resulting error message.
|
[] | null | null | null | null | null |
|
CVE-2019-20013
|
An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in decode_3dsolid in dwg.spec.
|
[
"cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2005-0839
|
Linux kernel 2.6 before 2.6.11 does not restrict access to the N_MOUSE line discipline for a TTY, which allows local users to gain privileges by injecting mouse or keyboard events into other user sessions.
|
[
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2024-27370
|
An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_config_get_nl_params(), there is no input validation check on hal_req->num_config_discovery_attr coming from userspace, which can lead to a heap overwrite.
|
[
"cpe:2.3:o:samsung:exynos_1280_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_980_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
GHSA-75q7-w2qw-h3pc
|
Buffer overflow in SlimFTPd 3.15 and earlier allows local users to execute arbitrary code via a long command, such as (1) CWD, (2) STOR, (3) MKD, and (4) STAT.
|
[] | null | null | null | null | null |
|
GHSA-jgx6-9qjv-9pxc
|
Escalation of privilege in all versions of the Intel Remote Keyboard allows a local attacker to inject keystrokes into another remote keyboard session.
|
[] | null | null | 7.8 | null | null |
|
CVE-2006-7055
|
PHP remote file inclusion vulnerability in index.php in TotalCalendar 2.30 and earlier allows remote attackers to execute arbitrary code via a URL in the inc_dir parameter, a different vector than CVE-2006-1922.
|
[
"cpe:2.3:a:sweetphp:totalcalendar:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2018-14529
|
Invoxia NVX220 devices allow access to /bin/sh via escape from a restricted CLI, leading to disclosure of password hashes.
|
[
"cpe:2.3:o:invoxia:nvx220_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:invoxia:nvx220:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-h7j5-7jvc-77f7
|
An issue was discovered in Nagios XI before 5.5.8. The rss_url parameter of rss_dashlet/magpierss/scripts/magpie_slashbox.php is not filtered, resulting in an XSS vulnerability.
|
[] | null | null | 6.1 | null | null |
|
CVE-2023-37199
|
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that
could cause remote code execution when an admin user on DCE tampers with backups which
are then manually restored.
|
[
"cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
|
CVE-2020-1786
|
HUAWEI Mate 20 Pro smartphones versions earlier than 10.0.0.175(C00E69R3P8) have an improper authentication vulnerability. The software does not sufficiently validate the name of apk file in a special condition which could allow an attacker to forge a crafted application as a normal one. Successful exploit could allow the attacker to bypass digital balance function.
|
[
"cpe:2.3:o:huawei:mate_20_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*"
] | null | 4.6 | null | 2.1 | null |
|
CVE-2017-14729
|
The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, do not ensure a unique PLT entry for a symbol, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.
|
[
"cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
CVE-2024-0593
|
The Simple Job Board plugin for WordPress is vulnerable to unauthorized access of data| due to insufficient authorization checking on the fetch_quick_job() function in all versions up to, and including, 2.10.8. This makes it possible for unauthenticated attackers to fetch arbitrary posts, which can be password protected or private and contain sensitive information.
|
[
"cpe:2.3:a:presstigers:simple_job_board:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-22vx-j9g4-5q8f
|
It was found that the superexec operator was available in the internal dictionary in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
|
[] | null | 5.5 | null | null | null |
|
GHSA-f76r-jqp9-73vv
|
Directory traversal vulnerability in scr/form.php in openElec 3.01 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the obj parameter.
|
[] | null | null | null | null | null |
|
GHSA-r98g-chcp-r3q5
|
The CLI in Cisco IOS XR allows remote authenticated users to obtain sensitive information via unspecified commands, aka Bug IDs CSCuq42336, CSCuq76853, CSCuq76873, and CSCuq45383.
|
[] | null | null | null | null | null |
|
CVE-2023-47612
|
A CWE-552: Files or Directories Accessible to External Parties vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to obtain a read/write access to any files and directories on the targeted system, including hidden files and directories.
|
[
"cpe:2.3:a:telit_cinterion:bgs5:*:*:*:*:*:*:*:*",
"cpe:2.3:a:telit_cinterion:ehs5:*:*:*:*:*:*:*:*",
"cpe:2.3:a:telit_cinterion:ehs6:*:*:*:*:*:*:*:*",
"cpe:2.3:a:telit_cinterion:ehs8:*:*:*:*:*:*:*:*",
"cpe:2.3:a:telit_cinterion:pds5:*:*:*:*:*:*:*:*",
"cpe:2.3:a:telit_cinterion:pds6:pds6:*:*:*:*:*:*:*",
"cpe:2.3:a:telit_cinterion:pds8:*:*:*:*:*:*:*:*",
"cpe:2.3:a:telit_cinterion:els61:*:*:*:*:*:*:*:*",
"cpe:2.3:a:telit_cinterion:els81:*:*:*:*:*:*:*:*",
"cpe:2.3:a:telit_cinterion:pls62:*:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:bgs5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:bgs5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:ehs5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:ehs5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:ehs6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:ehs6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:ehs8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:ehs8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:pds5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:pds5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:pds6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:pds6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:pds8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:pds8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:els61_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:els61:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:els81_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:els81:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telit:pls62_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:telit:pls62:-:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
|
CVE-2022-2978
|
A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2021-25908
|
An issue was discovered in the fil-ocl crate through 2021-01-04 for Rust. From<EventList> can lead to a double free.
|
[
"cpe:2.3:a:fil-ocl_project:fil-ocl:*:*:*:*:*:rust:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2018-7796
|
A Buffer Error vulnerability exists in PowerSuite 2, all released versions (VW3A8104 & Patches), which could cause an overflow in the memcpy function, leading to corruption of data and program instability.
|
[
"cpe:2.3:a:schneider-electric:powersuite_2:*:*:*:*:*:*:*:*"
] | null | null | 6.3 | 6.8 | null |
|
CVE-2022-35068
|
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e420d.
|
[
"cpe:2.3:a:otfcc_project:otfcc:2022-06-03:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2014-5825
|
The Guess The Movie (aka com.june.guessthemovie) application 2.982 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:jinfra:guess_the_movie:2.982:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
GHSA-4q4f-x5q2-qx7m
|
A remote code execution vulnerability in the Android media framework (libmpeg2). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37203196.
|
[] | null | null | 7.8 | null | null |
|
RHSA-2022:8098
|
Red Hat Security Advisory: toolbox security and bug fix update
|
golang: net/http: improper sanitization of Transfer-Encoding header golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null | null |
GHSA-53xr-44wj-pxch
|
Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 3.0.1 through 3.0.3 allow remote attackers to inject arbitrary web script or HTML via an ftp:// URL for an HTML document within a (1) JPG, (2) PDF, or (3) TXT file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2023-28227
|
Windows Bluetooth Driver Remote Code Execution Vulnerability
|
Windows Bluetooth Driver Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-cch6-wcwh-5wcc
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mindvalley MindValley Super PageMash allows SQL Injection.This issue affects MindValley Super PageMash: from n/a through 1.1.
|
[] | null | 7.6 | null | null | null |
|
CVE-2018-20641
|
PHP Scripts Mall Entrepreneur Job Portal Script 3.0.1 has Cross-Site Request Forgery (CSRF) via the Edit Profile feature.
|
[
"cpe:2.3:a:entrepreneur_job_portal_script_project:entrepreneur_job_portal_script:3.0.1:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-8xrh-xm7x-87v9
|
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, D7800 before 1.0.1.28, R7500v2 before 1.0.3.24, R7800 before 1.0.2.40, and R9000 before 1.0.3.6.
|
[] | null | null | null | null | null |
|
GHSA-cc5w-cgc4-9qf7
|
Apache does not filter terminal escape sequences from its error logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences.
|
[] | null | null | null | null | null |
|
RHSA-2024:3763
|
Red Hat Security Advisory: nghttp2 security update
|
nghttp2: CONTINUATION frames DoS
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 5.3 | null | null | null |
CVE-2016-1016
|
Use-after-free vulnerability in the Transform object implementation in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via a flash.geom.Matrix callback, a different vulnerability than CVE-2016-1011, CVE-2016-1013, CVE-2016-1017, and CVE-2016-1031.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
GHSA-8qqr-2rqp-44m3
|
An authentication bypass vulnerability was reported in Lenovo ThinkPad Stack Wireless Router firmware version 1.1.3.4 that could allow escalation of privilege.
|
[] | null | null | null | null | null |
|
CVE-2023-25155
|
Integer Overflow in several Redis commands can lead to denial of service.
|
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem affects all Redis versions. Patches were released in Redis version(s) 6.0.18, 6.2.11 and 7.0.9.
|
[
"cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2013-7334
|
Cross-site request forgery (CSRF) vulnerability in ImageCMS before 4.2 allows remote attackers to hijack the authentication of administrators for requests that conduct SQL injection attacks via the q parameter, related to CVE-2012-6290.
|
[
"cpe:2.3:a:imagecms:imagecms:*:b:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2024-41238
|
A SQL injection vulnerability in /smsa/student_login.php in Kashipara Responsive School Management System v1.0 allows an attacker to execute arbitrary SQL commands via the "username" parameter.
|
[
"cpe:2.3:a:kashipara:responsive_school_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lopalopa:responsive_school_management_system:3.2.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
|
CVE-2021-27413
|
Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.
|
[
"cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*",
"cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2021-24320
|
Bello < 1.6.0 - Unauthenticated Reflected XSS & XFS
|
The Bello - Directory & Listing WordPress theme before 1.6.0 did not properly sanitise and escape its listing_list_view, bt_bb_listing_field_my_lat, bt_bb_listing_field_my_lng, bt_bb_listing_field_distance_value, bt_bb_listing_field_my_lat_default, bt_bb_listing_field_keyword, bt_bb_listing_field_location_autocomplete, bt_bb_listing_field_price_range_from and bt_bb_listing_field_price_range_to parameter in ints listing page, leading to reflected Cross-Site Scripting issues.
|
[
"cpe:2.3:a:bold-themes:bello:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 | null |
GHSA-3mvr-vp9h-cr29
|
A vulnerability was identified in Firefox where XPath parsing could trigger undefined behavior due to missing null checks during attribute access. This could lead to out-of-bounds read access and potentially, memory corruption. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Thunderbird < 138, and Thunderbird ESR < 128.10.
|
[] | null | 6.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.