id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-c956-q3cq-8j7r | Missing Authorization vulnerability in wp-buy Visitors Traffic Real Time Statistics allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Visitors Traffic Real Time Statistics: from n/a through 7.2. | [] | null | 4.3 | null | null |
|
GHSA-wm4g-hw88-g25h | Infinite loop in the RTMPT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file | [] | null | 7.5 | null | null |
|
CVE-2017-3217 | CalAmp LMU 3030 series OBD-II CDMA and GSM devices has an SMS (text message) interface that can be deployed where no password is configured for this interface by the integrator / reseller | CalAmp LMU 3030 series OBD-II CDMA and GSM devices has an SMS (text message) interface that can be deployed where no password is configured for this interface by the integrator / reseller. This interface must be password protected, otherwise, the attacker only needs to know the phone number of the device (via an IMSI Catcher, for example) to send administrative commands to the device. These commands can be used to provide ongoing, real-time access to the device and can configure parameters such as IP addresses, firewall rules, and passwords. | [
"cpe:2.3:o:calamp:lmu_3030_obd-ii_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:calamp:lmu_3030_obd-ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:calamp:lmu_3030_cdma_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:calamp:lmu_3030_cdma:-:*:*:*:*:*:*:*",
"cpe:2.3:o:calamp:lmu_3030_gsm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:calamp:lmu_3030_gsm:-:*:*:*:*:*:*:*"
] | null | null | 8.1 | 9.3 |
GHSA-cpmx-w293-837f | Improper Input Validation in some Intel(R) VROC software before version 8.6.0.2003 may allow an authenticated user to potentially enable denial of service via local access. | [] | 2.4 | 3.9 | null | null |
|
GHSA-94q4-28cq-xq66 | An issue was discovered in Cscms V4.1.8. There is a CSRF vulnerability that can modify a website's basic configuration via upload/admin.php/setting/save. | [] | null | null | 6.5 | null |
|
GHSA-3jvh-pgp8-6866 | A vulnerability has been found in Campcodes Online Laundry Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file manage_user.php of the component HTTP Request Parameter Handler. The manipulation of the argument id leads to improper control of resource identifiers. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-263938 is the identifier assigned to this vulnerability. | [] | 5.3 | 6.3 | null | null |
|
GHSA-6c3p-42w5-vj8q | The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_fix_royal_compatibility' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to deactivate every plugin on the site unless it is part of an extremely limited hardcoded selection. This also switches the site to the 'royal-elementor-kit' theme, potentially resulting in availability issues. | [] | null | 6.5 | null | null |
|
CVE-2024-27390 | ipv6: mcast: remove one synchronize_net() barrier in ipv6_mc_down() | In the Linux kernel, the following vulnerability has been resolved:
ipv6: mcast: remove one synchronize_net() barrier in ipv6_mc_down()
As discussed in the past (commit 2d3916f31891 ("ipv6: fix skb drops
in igmp6_event_query() and igmp6_event_report()")) I think the
synchronize_net() call in ipv6_mc_down() is not needed.
Under load, synchronize_net() can last between 200 usec and 5 ms.
KASAN seems to agree as well. | [] | null | null | null | null |
GHSA-6fxm-3vcm-r45p | An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit." | [] | null | null | null | null |
|
CVE-2024-8124 | Inefficient Regular Expression Complexity in GitLab | An issue was discovered in GitLab CE/EE affecting all versions starting from 16.4 prior to 17.1.7, starting from 17.2 prior to 17.2.5, starting from 17.3 prior to 17.3.2 which could cause Denial of Service via sending a specific POST request. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 7.5 | null | null |
CVE-2021-32550 | apport read_file() function could follow maliciously constructed symbolic links | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-14 package apport hooks, it could expose private data to other local users. | [
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
CVE-2024-29157 | HDF5 through 1.14.3 contains a heap buffer overflow in H5HG_read, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution. | [
"cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-9h4x-2mmw-9488 | Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point. | [] | null | 5.3 | null | null |
|
CVE-2017-1113 | IBM Rational Team Concert (RTC) 4.0, 5.0 and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 121151. | [
"cpe:2.3:a:ibm:rational_team_concert:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.3:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-4gq5-9fxc-cv49 | Cross-site scripting (XSS) vulnerability in Twilight CMS 5.17 and possibly earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the gallery/ page. | [] | null | null | null | null |
|
GHSA-qqpv-m393-pw8r | Cross-Site Request Forgery (CSRF) vulnerability in Muntasir Rahman Custom Dashboard Page allows Cross Site Request Forgery. This issue affects Custom Dashboard Page: from n/a through 1.0. | [] | null | 4.3 | null | null |
|
CVE-2024-30962 | Buffer Overflow vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the nav2_amcl process | [
"cpe:2.3:o:open_robotics:ros2_navigation2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:open_robotics:ros2_humble:*:*:*:*:*:*:*:*",
"cpe:2.3:a:open_robotics:nav2_humble:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"cpe:2.3:a:openrobotics:robot_operating_system:2:iron:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-4pvh-2q6p-wgf2 | Cross-site scripting (XSS) vulnerability in the Web Action Quarantine Release feature in the WebGUI in Fortinet FortiMail before 4.3.9, 5.0.x before 5.0.8, 5.1.x before 5.1.5, and 5.2.x before 5.2.3 allows remote attackers to inject arbitrary web script or HTML via the release parameter to module/releasecontrol. | [] | null | null | null | null |
|
GHSA-4x5q-cj52-g86w | An issue was discovered in Navigate CMS through 2.8.7. It allows XSS because of a lack of purify calls in lib/packages/websites/website.class.php. | [] | null | null | null | null |
|
GHSA-p484-h86r-hvj6 | In Package Manager Service, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 5.5 | null | null |
|
CVE-2008-5803 | SQL injection vulnerability in admin/login.php in E-topbiz Online Store 1.0 allows remote attackers to execute arbitrary SQL commands via the user parameter (aka username field). NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:e-topbiz:online_store:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-8fcx-xffr-7978 | An elevation of privilege vulnerability exists in the Windows redirected drive buffering system (rdbss.sys) when the operating system improperly handles specific local calls within Windows 7 for 32-bit systems, aka 'Windows Redirected Drive Buffering System Elevation of Privilege Vulnerability'. | [] | null | 5.5 | null | null |
|
GHSA-c4wh-vx9c-g273 | Memory leak in Cisco AsyncOS 8.5 through 9.0 before 9.0.1-162 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via an HTTP file-range request for cached content, aka Bug ID CSCuw97270. | [] | null | null | 7.5 | null |
|
RHSA-2024:0861 | Red Hat Security Advisory: gimp:2.8 security update | gimp: PSD buffer overflow RCE gimp: psp off-by-one RCE | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
CVE-2022-21381 | Vulnerability in the Oracle Enterprise Session Border Controller product of Oracle Communications (component: WebUI). Supported versions that are affected are 8.4 and 9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Session Border Controller. While the vulnerability is in Oracle Enterprise Session Border Controller, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Enterprise Session Border Controller accessible data as well as unauthorized read access to a subset of Oracle Enterprise Session Border Controller accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:enterprise_session_border_controller:8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_session_border_controller:9.0:*:*:*:*:*:*:*"
] | null | 6.4 | null | null |
|
CVE-2017-6078 | FastStone MaxView 3.0 and 3.1 allows user-assisted attackers to cause a denial of service (application crash) via a malformed BMP image with a crafted biSize field in the BITMAPINFOHEADER section. | [
"cpe:2.3:a:faststone:maxview:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:faststone:maxview:3.1:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-8gp2-gg9w-fxjr | SQL injection vulnerability in index.php in ProQuiz 1.0 allows remote attackers to execute arbitrary SQL commands via the username parameter. | [] | null | null | null | null |
|
CVE-2025-22276 | WordPress Related Post Shortcode Plugin <= 1.2 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Enguerran Weiss Related Post Shortcode allows Stored XSS. This issue affects Related Post Shortcode: from n/a through 1.2. | [] | null | 5.9 | null | null |
GHSA-43x4-rqpq-prmp | In ASQ in Stormshield Network Security (SNS) 1.0.0 through 2.7.8, 2.8.0 through 2.16.0, 3.0.0 through 3.7.20, 3.8.0 through 3.11.8, and 4.0.1 through 4.2.2, mishandling of memory management can lead to remote code execution. | [] | null | 9.8 | null | null |
|
CVE-2022-30984 | A buffer overflow vulnerability in the Rubrik Backup Service (RBS) Agent for Linux or Unix-based systems in Rubrik CDM 7.0.1, 7.0.1-p1, 7.0.1-p2 or 7.0.1-p3 before CDM 7.0.2-p2 could allow a local attacker to obtain root privileges by sending a crafted message to the RBS agent. | [
"cpe:2.3:a:rubrik:cdm:7.0.1:-:*:*:*:*:*:*",
"cpe:2.3:a:rubrik:cdm:7.0.1:p1:*:*:*:*:*:*",
"cpe:2.3:a:rubrik:cdm:7.0.1:p2:*:*:*:*:*:*",
"cpe:2.3:a:rubrik:cdm:7.0.1:p3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2023-3361 | S3 credentials included when exporting elyra notebook | A flaw was found in Red Hat OpenShift Data Science. When exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML, it reads S3 credentials from the cluster (ds pipeline server) and saves them in plain text in the generated output instead of an ID for a Kubernetes secret. | [
"cpe:/a:redhat:openshift_data_science",
"cpe:2.3:a:opendatahub:open_data_hub_dashboard:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*"
] | null | 7.7 | null | null |
CVE-2009-2663 | libvorbis before r16182, as used in Mozilla Firefox 3.5.x before 3.5.2 and other products, allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .ogg file. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2008-2956 | Memory leak in Pidgin 2.0.0, and possibly other versions, allows remote attackers to cause a denial of service (memory consumption) via malformed XML documents. NOTE: this issue has been disputed by the upstream vendor, who states: "I was never able to identify a scenario under which a problem occurred and the original reporter wasn't able to supply any sort of reproduction details." | [
"cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-c722-pv5w-cfg2 | Malicious Package in github-jquery-widgets | Version 0.1.2 of `github-jquery-widgets` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`RecommendationRemove the package from your environment and evaluate your application to determine whether or not user data was compromised.Users may consider downgrading to version 0.1.1 | [] | null | null | null | null |
CVE-2017-16038 | `f2e-server` 1.12.11 and earlier is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. This is compounded by `f2e-server` requiring elevated privileges to run. | [
"cpe:2.3:a:f2e-server_project:f2e-server:*:*:*:*:*:node.js:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2023-21859 | Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: Authentication Engine). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Access Manager executes to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Access Manager accessible data. CVSS 3.1 Base Score 4.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:access_manager:12.2.1.4.0:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
CVE-2023-3698 | A Command injection vulnerability was found on Printer service of ADM | Printer service fails to adequately handle user input, allowing an remote unauthorized users to navigate beyond the intended directory structure and delete files. Affected products and versions include: ADM 4.0.6.RIS1, 4.1.0 and below as well as ADM 4.2.2.RI61 and below.
| [
"cpe:2.3:o:asustor:data_master:*:*:*:*:*:*:*:*"
] | null | 8.5 | null | null |
GHSA-rcqq-5h75-3j53 | The WP Meta SEO plugin for WordPress is vulnerable to unauthorized options update due to a missing capability check on the wpmsGGSaveInformation function in versions up to, and including, 4.5.3. This makes it possible for authenticated attackers with subscriber-level access to update google analytics options maintained by the plugin. This vulnerability occurred as a result of the plugin relying on nonce checks as a means of access control, and that nonce being accessible to all authenticated users regardless of role. | [] | null | 4.3 | null | null |
|
CVE-2021-29978 | Multiple low security issues were discovered and fixed in a security audit of Mozilla VPN 2.x branch as part of a 3rd party security audit. This vulnerability affects Mozilla VPN < 2.3. | [
"cpe:2.3:a:mozilla:mozilla_vpn:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2005-2540 | CRLF injection vulnerability in FlatNuke 2.5.5 and possibly earlier versions allows remote attackers to execute arbitrary PHP commands via an ASCII char 13 (carriage return) in the signature field, which is injected into a PHP script without a preceding comment character, which can then be executed by a direct request. | [
"cpe:2.3:a:flatnuke:flatnuke:2.5.5:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2010:0155 | Red Hat Security Advisory: java-1.4.2-ibm security and bug fix update | TLS: MITM attacks via session renegotiation | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
CVE-2017-8703 | The Microsoft Windows Subsystem for Linux on Microsoft Windows 10 1703 allows a denial of service vulnerability when it improperly handles objects in memory, aka "Windows Subsystem for Linux Denial of Service Vulnerability". | [
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 |
|
GHSA-hcjf-mh94-fp2w | In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A malicious auto-downloaded file can contain configuration defaults that override the user's. Executable bytecode in a malicious auto-downloaded file can set configuration variables to values that will result in unwanted native code DLLs being loaded, resulting in sandbox escape. | [] | null | null | 7.8 | null |
|
GHSA-cm5r-32jj-r385 | Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 8.0.x before 8.0.0.1 CF20 and 8.5.x before 8.5.0.0 CF09 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. | [] | null | null | 6.1 | null |
|
CVE-2022-32330 | Fast Food Ordering System v1.0 is vulnerable to SQL Injection via /ffos/classes/Master.php?f=delete_menu. | [
"cpe:2.3:a:fast_food_ordering_system_project:fast_food_ordering_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 |
|
CVE-2006-1443 | Integer underflow in CoreFoundation in Apple Mac OS X 10.3.9 and 10.4.6 allows context-dependent attackers to execute arbitrary code via unspecified vectors involving conversions from string to file system representation within (1) CFStringGetFileSystemRepresentation or (2) getFileSystemRepresentation:maxLength:withPath in NSFileManager, and possibly other similar API functions. | [
"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2024-0508 | The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Pricing Table Elementor Widget in all versions up to, and including, 2.10.27 due to insufficient input sanitization and output escaping on the user supplied link URL. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:themeisle:orbit_fox:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
|
CVE-2012-5635 | The GlusterFS functionality in Red Hat Storage Management Console 2.0, Native Client, and Server 2.0 allows local users to overwrite arbitrary files via a symlink attack on multiple temporary files created by (1) tests/volume.rc, (2) extras/hook-scripts/S30samba-stop.sh, and possibly other vectors, different vulnerabilities than CVE-2012-4417. | [
"cpe:2.3:a:gluster:glusterfs:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:storage_management_console:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:storage_native_client:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:storage_server:2.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-4vxg-jp55-crg9 | In nci_proc_rf_management_ntf of nci_hrcv.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-221856662 | [] | null | 7.5 | null | null |
|
CVE-2021-37688 | Null pointer dereference in TensorFlow Lite | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service. The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L268-L285) unconditionally dereferences a pointer. We have patched the issue in GitHub commit 15691e456c7dc9bd6be203b09765b063bf4a380c. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.6.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.6.0:rc2:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2015-9362 | The Post Connector plugin before 1.0.4 for WordPress has XSS via add_query_arg() and remove_query_arg(). | [
"cpe:2.3:a:never5:post_connector:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 |
|
RHSA-2024:2180 | Red Hat Security Advisory: runc security update | golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
GHSA-5xmq-mwgg-pjp2 | A reachable assertion in the nas_eps_send_emm_to_esm function of Open5GS <= 2.6.4 allows attackers to cause a Denial of Service (DoS) via a crafted NGAP packet. | [] | null | 8.6 | null | null |
|
CVE-2020-2024 | Kata Containers - Guests can trick the kata-runtime into unmounting any mount point on the host | An improper link resolution vulnerability affects Kata Containers versions prior to 1.11.0. Upon container teardown, a malicious guest can trick the kata-runtime into unmounting any mount point on the host and all mount points underneath it, potentiality resulting in a host DoS. | [
"cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-6f55-8mp8-93rv | BIRD Internet Routing Daemon before 1.6.4 allows local users to cause a denial of service (stack consumption and daemon crash) via BGP mask expressions in birdc. | [] | null | null | 5.5 | null |
|
CVE-2020-7477 | A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Quantum Ethernet Network module 140NOE771x1 (Versions 7.0 and prior), Quantum processors with integrated Ethernet – 140CPU65xxxxx (all Versions), and Premium processors with integrated Ethernet (all Versions), which could cause a Denial of Service when sending a specially crafted command over Modbus. | [
"cpe:2.3:o:schneider-electric:140noe77101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:140noe77101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:140noe77111_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:140noe77111:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxh5744m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxh5744m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxh5724m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxh5724m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp576634m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp576634m_:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp57554m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp57554m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp575634m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp575634m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp57454m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp57454m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp574634m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp574634m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp573634m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp573634m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp57304m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp57304m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp57254m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp57254m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp572634m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp572634m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp57204m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp57204m_:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp571634m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp571634m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp57154m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp57154m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp57104m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp57104m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:140cpu65150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:140cpu65150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:140cpu65160_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:140cpu65160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:140cpu65260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:140cpu65260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:140cpu67261_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:140cpu67261:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:140cpu67060_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:140cpu67060:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:140cpu67160_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:140cpu67160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:140cpu67260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:140cpu67260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:140cpu65860_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:140cpu65860:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:140cpu67861_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:140cpu67861:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:140cpu65160s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:140cpu65160s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:140cpu67160s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:140cpu67160s:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2022-1576 | WP Maintenance Mode & Coming Soon < 2.4.5 - Subscribed Users Deletion via CSRF | The WP Maintenance Mode & Coming Soon WordPress plugin before 2.4.5 is lacking CSRF when emptying the subscribed users list, which could allow attackers to make a logged in admin perform such action via a CSRF attack | [
"cpe:2.3:a:themeisle:wp_maintenance_mode_\\&_coming_soon:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | 4.3 |
GHSA-6mjj-vx26-x966 | Unspecified vulnerability in winmm.dll in Windows Multimedia Library in Windows Media Player (WMP) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows remote attackers to execute arbitrary code via a crafted MIDI file, aka "MIDI Remote Code Execution Vulnerability." | [] | null | 8.1 | null | null |
|
CVE-2020-20626 | lara-google-analytics.php in Lara Google Analytics plugin through 2.0.4 for WordPress allows authenticated stored XSS. | [
"cpe:2.3:a:lara\\'s_google_analytics_project:lara\\'s_google_analytics:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2009-4372 | AlienVault Open Source Security Information Management (OSSIM) 2.1.5, and possibly other versions before 2.1.5-4, allows remote attackers to execute arbitrary commands via shell metacharacters in the uniqueid parameter to (1) wcl.php, (2) storage_graphs.php, (3) storage_graphs2.php, (4) storage_graphs3.php, and (5) storage_graphs4.php in sem/. | [
"cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-1:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-2:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-mgr3-48vv-j39x | NETGEAR WNR1000v3 devices with firmware 1.0.2.68 use the same source port number for every DNS query, which makes it easier for remote attackers to spoof responses by selecting that number for the destination port. | [] | null | null | 8.6 | null |
|
PYSEC-2021-365 | null | Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions when performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. This issue has been resolved in version 0.3.0. | [] | null | null | null | null |
GHSA-822q-fv8f-rv6w | Unspecified vulnerability in Opera before 11.60 has unknown impact and attack vectors, related to a "moderately severe issue." | [] | null | null | null | null |
|
CVE-2022-37290 | GNOME Nautilus 42.2 allows a NULL pointer dereference and get_basename application crash via a pasted ZIP archive. | [
"cpe:2.3:a:gnome:nautilus:42.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2024-31986 | XWiki Platform CSRF remote code execution through scheduler job's document reference | XWiki Platform is a generic wiki platform. Starting in version 3.1 and prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, by creating a document with a special crafted documented reference and an `XWiki.SchedulerJobClass` XObject, it is possible to execute arbitrary code on the server whenever an admin visits the scheduler page or the scheduler page is referenced, e.g., via an image in a comment on a page in the wiki. The vulnerability has been fixed in XWiki 14.10.19, 15.5.5, and 15.9. As a workaround, apply the patch manually by modifying the `Scheduler.WebHome` page. | [
"cpe:2.3:a:xwiki:xwiki:3.1:-:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:15.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:15.6:rc1:*:*:*:*:*:*"
] | null | 9.1 | null | null |
GHSA-f66h-6w2v-hxhr | Cross-site scripting (XSS) vulnerability in book.cfm in Magic Book Personal and Professional 2.0 allows remote attackers to inject arbitrary web script or HTML via the StartRow parameter. | [] | null | null | null | null |
|
GHSA-9cr9-cw7v-qh46 | Multiple SQL injection vulnerabilities in Etiko CMS allow remote attackers to execute arbitrary SQL commands via the (1) page_id parameter to loja/index.php or (2) article_id parameter to index.php. | [] | null | null | null | null |
|
CVE-2005-4345 | Adobe (formerly Macromedia) ColdFusion MX 7.0 exposes the password hash of the Administrator in an API call, which allows local developers to obtain the hash and gain privileges. | [
"cpe:2.3:a:macromedia:coldfusion:7.0:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
RHSA-2016:1939 | Red Hat Security Advisory: kernel security and bug fix update | kernel: challenge ACK counter information disclosure. | [
"cpe:/o:redhat:rhel_eus:6.6::computenode",
"cpe:/o:redhat:rhel_eus:6.6::server"
] | null | null | 4.8 | null |
CVE-2007-6062 | irc-channel.c in ngIRCd before 0.10.3 allows remote attackers to cause a denial of service (crash) via a JOIN command without a channel argument. | [
"cpe:2.3:a:ngircd:ngircd:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-ccv4-6623-442v | Unspecified vulnerability in the WebLogic Workshop component in BEA Product Suite WLW 8.1SP5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to "some NetUI pageflows." | [] | null | null | null | null |
|
GHSA-hmqx-j4fj-9gcq | D-link DIR-825AC G1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. In order to transfer data from the host network to the guest network, the sender joins and then leaves an IGMP group. After it leaves, the router (following the IGMP protocol) creates an IGMP Membership Query packet with the Group IP and sends it to both the Host and the Guest networks. The data is transferred within the Group IP field, which is completely controlled by the sender. | [] | null | null | 8.8 | null |
|
GHSA-9724-33jf-7mj5 | The official adminer docker images before 4.7.0-fastcgi contain a blank password for a root user. System using the adminer docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password. | [] | null | null | null | null |
|
RHSA-2023:3536 | Red Hat Security Advisory: OpenShift Container Platform 4.13.3 packages and security update | golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters flask: Possible disclosure of permanent session cookie due to missing Vary: Cookie header | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9",
"cpe:/a:redhat:openshift_ironic:4.13::el9"
] | null | 7.5 | null | null |
CVE-2024-2249 | The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the LinkWrapper attribute found in several widgets in all versions up to, and including, 1.3.7.4 due to insufficient input sanitization and output escaping the user supplied attribute. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2007-6733 | The nfs_lock function in fs/nfs/file.c in the Linux kernel 2.6.9 does not properly remove POSIX locks on files that are setgid without group-execute permission, which allows local users to cause a denial of service (BUG and system crash) by locking a file on an NFS filesystem and then changing this file's permissions, a related issue to CVE-2010-0727. | [
"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*"
] | null | null | null | 4.7 |
|
GHSA-w2q8-6j3f-ccxf | A PHP injection vulnerability in Spip before v3.2.8 allows attackers to execute arbitrary PHP code via the _oups parameter at /ecrire. | [] | null | 8.8 | null | null |
|
GHSA-c7j7-p5jq-26ff | Insecure use of temporary files in passenger | Phusion Passenger before 4.0.38 allows local users to write to certain files and directories via a symlink attack on`control_process.pid` ora generation-* file. | [] | null | null | null | null |
GHSA-28ww-p6p6-8629 | A vulnerability was found in Academy LMS 6.2 on Windows. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /academy/tutor/filter of the component GET Parameter Handler. The manipulation of the argument searched_word/searched_tution_class_type[]/searched_price_type[]/searched_duration[] leads to cross site scripting. The attack can be launched remotely. The identifier VDB-239749 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | null | 3.5 | null |
|
GHSA-x7jh-595q-wq82 | Incorrect Permission Assignment for Critical Resource in Ansible | A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This could lead to the disclosure of sensitive data. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable. | [] | 4.8 | 3.3 | null | null |
CVE-2022-42327 | x86: unintended memory sharing between guests On Intel systems that support the "virtualize APIC accesses" feature, a guest can read and write the global shared xAPIC page by moving the local APIC out of xAPIC mode. Access to this shared page bypasses the expected isolation that should exist between two guests. | [
"cpe:2.3:o:xen:xen:4.16:*:*:*:*:*:x86:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
|
CVE-2020-35347 | CXUUCMS V3 3.1 has a CSRF vulnerability that can add an administrator account via admin.php?c=adminuser&a=add. | [
"cpe:2.3:a:cxuu:cxuucms:3.1:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-rhff-fp69-774x | Multiple cross-site scripting (XSS) vulnerabilities in index.php in Dan Jensen Travelsized CMS 0.4.1 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) page, (2) page_id, or (3) language parameter. | [] | null | null | null | null |
|
CVE-2024-47881 | OpenRefine's SQLite integration allows filesystem access, remote code execution (RCE) | OpenRefine is a free, open source tool for working with messy data. Starting in version 3.4-beta and prior to version 3.8.3, in the `database` extension, the "enable_load_extension" property can be set for the SQLite integration, enabling an attacker to load (local or remote) extension DLLs and so run arbitrary code on the server. The attacker needs to have network access to the OpenRefine instance. Version 3.8.3 fixes this issue. | [
"cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
GHSA-33gr-vm8m-gj5m | arm-wt-22k/lib_src/eas_mdls.c in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-09-01 allows remote attackers to cause a denial of service (NULL pointer dereference, and device hang or reboot) via a crafted media file, aka internal bug 29770686. | [] | null | null | 5.5 | null |
|
GHSA-5jqg-gvvc-h9h2 | Cross-site scripting vulnerability in Easy Forum 2.5 allows remote attackers to inject arbitrary web script or HTML via the image variable. | [] | null | null | null | null |
|
GHSA-hggm-r8hf-gwj5 | The convertCommentToAnswer resource in Atlassian Confluence Questions before version 2.6.6, the bundled version of Confluence Questions was updated to a fixed version in Confluence version 6.9.0, allows remote attackers to modify a comment into an answer via a Cross-site request forgery (CSRF) vulnerability. | [] | null | null | 6.5 | null |
|
GHSA-j8jm-xpp4-34xm | An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.3, watchOS 6.1.2. A remote attacker may be able to cause unexpected application termination or arbitrary code execution. | [] | null | null | null | null |
|
CVE-2024-54252 | WordPress Pinpoint Booking System Plugin <= 2.9.9.5.2 - Broken Access Control vulnerability | Missing Authorization vulnerability in PINPOINT.WORLD Pinpoint Booking System allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Pinpoint Booking System: from n/a through 2.9.9.5.2. | [] | null | 6.3 | null | null |
CVE-2015-3012 | Multiple cross-site scripting (XSS) vulnerabilities in WebODF before 0.5.5, as used in ownCloud, allow remote attackers to inject arbitrary web script or HTML via a (1) style or (2) font name or (3) javascript or (4) data URI. | [
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kogmbh:webodf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-wrxp-79xj-m6mj | An issue was discovered in Foxit PhantomPDF before 8.3.7. It allows NTLM credential theft via a GoToE or GoToR action. | [] | null | null | null | null |
|
CVE-2021-29645 | Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system. | [
"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1\\/remote_control_feature:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7 | null | null |
|
CVE-2015-8778 | Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access. | [
"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*",
"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*",
"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-9pq2-v987-f9hr | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. | [] | null | null | null | null |
|
CVE-2017-12352 | A vulnerability in certain system script files that are installed at boot time on Cisco Application Policy Infrastructure Controllers could allow an authenticated, local attacker to gain elevated privileges and execute arbitrary commands with root privileges on an affected host operating system. The vulnerability is due to insufficient validation of user-controlled input that is supplied to certain script files of an affected system. An attacker could exploit this vulnerability by submitting crafted input to a script file on an affected system. A successful exploit could allow the attacker to gain elevated privileges and execute arbitrary commands with root privileges on the affected system. To exploit this vulnerability, the attacker would need to authenticate to the affected system by using valid administrator credentials. Cisco Bug IDs: CSCvf57274. | [
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1f\\):*:*:*:*:*:*:*"
] | null | null | 6.7 | 7.2 |
|
CVE-2024-49896 | drm/amd/display: Check stream before comparing them | In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Check stream before comparing them
[WHAT & HOW]
amdgpu_dm can pass a null stream to dc_is_stream_unchanged. It is
necessary to check for null before dereferencing them.
This fixes 1 FORWARD_NULL issue reported by Coverity. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2022-2553 | The authfile directive in the booth config file is ignored, preventing use of authentication in communications from node to node. As a result, nodes that do not have the correct authentication key are not prevented from communicating with other nodes in the cluster. | [
"cpe:2.3:a:clusterlabs:booth:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2018-5329 | ZUUSE BEIMS ContractorWeb .NET 5.18.0.0 is vulnerable to Cross-Site Request Forgery (CSRF) on /CWEBNET/* authenticated pages. A successful CSRF attack can force the user to modify state: creating users, changing an email address, and so forth. If the victim is an administrative account, CSRF can compromise the entire web application. | [
"cpe:2.3:a:beims:contractorweb.net:5.18.0.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2022-46883 | Mozilla developers Gabriele Svelto, Yulia Startsev, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 106. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.<br />*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 107. This vulnerability affects Firefox < 107. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2017-3873 | A vulnerability in the Plug-and-Play (PnP) subsystem of the Cisco Aironet 1800, 2800, and 3800 Series Access Points running a Lightweight Access Point (AP) or Mobility Express image could allow an unauthenticated, adjacent attacker to execute arbitrary code with root privileges. The vulnerability is due to insufficient validation of PnP server responses. The PnP feature is only active while the device does not contain a configuration, such as a first time boot or after a factory reset has been issued. An attacker with the ability to respond to PnP configuration requests from the affected device can exploit the vulnerability by returning malicious PnP responses. If a Cisco Application Policy Infrastructure Controller - Enterprise Module (APIC-EM) is available on the network, the attacker would need to exploit the issue in the short window before a valid PnP response was received. If successful, the attacker could gain the ability to execute arbitrary code with root privileges on the underlying operating system of the device. Cisco has confirmed that the only vulnerable software version is 8.3.102.0. Cisco Bug IDs: CSCvb42386. | [
"cpe:2.3:o:cisco:aironet_access_point_firmware:8.3_102.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.9 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.