id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-42562 | Pharmacy Management System commit a2efc8 was discovered to contain a SQL injection vulnerability via the invoice_number parameter at preview.php. | [
"cpe:2.3:a:krishna9772:pharmacy_management_system:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2018-12399 | When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4.3 |
|
CVE-2017-16127 | The module pandora-doomsday infects other modules. It's since been unpublished from the registry. | [
"cpe:2.3:a:pandora-doomsday_project:pandora-doomsday:0.0.1:*:*:*:*:node.js:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-cxmr-8vfq-vhfr | Cisco IOS XR 4.2.0, 4.3.0, 5.0.0, 5.1.0, 5.2.0, 5.2.2, 5.2.4, 5.3.0, and 5.3.2 does not properly restrict the number of Path Computation Elements (PCEs) for OSPF LSA opaque area updates, which allows remote attackers to cause a denial of service (device reload) via a crafted update, aka Bug ID CSCuw83486. | [] | null | null | 7.5 | null |
|
CVE-2017-1189 | IBM WebSphere Portal and Web Content Manager 6.1, 7.0, and 8.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 123558. | [
"cpe:2.3:a:ibm:websphere_portal:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.0:cf001:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf002:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf003:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf004:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf005:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf006:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf007:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf008:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf009:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf010:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf019:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf011:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf012:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf013:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf014:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf015:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf016:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf017:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf018:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf019:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf020:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf021:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf022:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf23:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf24:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf25:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf26:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf27:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf01:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf02:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf03:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf04:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf05:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf04:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf05:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf06:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf07:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf08:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf09:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf12:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-x2j2-wmj4-cgv8 | Buffer overflow in Solaris netpr program allows local users to execute arbitrary commands via a long -p option. | [] | null | null | null | null |
|
GHSA-5fpj-jg29-mxc5 | IBM InfoSphere Master Data Management Collaborative Edition 9.1, 10.1, 11.0, 11.3, and 11.4 before FP03 allows remote authenticated users to conduct clickjacking attacks via unspecified vectors. | [] | null | null | null | null |
|
CVE-2024-50955 | An issue in how XINJE XD5E-24R and XL5E-16T v3.5.3b handles TCP protocol messages allows attackers to cause a Denial of Service (DoS) via a crafted TCP message. | [
"cpe:2.3:o:xinje:xd5e-24r-e_firmware:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
RHSA-2011:1244 | Red Hat Security Advisory: seamonkey security update | Updated seamonkey packages that fix one security issue are now available
for Red Hat Enterprise Linux 4.
The Red Hat Security Response Team has rated this update as having
important security impact. | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2015-1593 | The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*"
] | null | null | null | 5 |
|
GHSA-4vcm-mfhr-grqg | Ruckus SmartZone (formerly Virtual SmartCell Gateway or vSCG) 3.5.0, 3.5.1, 3.6.0, and 3.6.1 (Essentials and High Scale) on vSZ, SZ-100, SZ-300, and SCG-200 devices allows remote attackers to obtain sensitive information or modify data. | [] | null | null | 9.1 | null |
|
CVE-2006-1116 | The CBC-MAC integrity functions in the nCipher nCore API before 2.18 transmit the initialization vector IV as part of a message when the implementation uses a non-zero IV, which allows remote attackers to bypass integrity checks and modify messages without being detected. | [
"cpe:2.3:a:ncipher:ncore:2.17:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-vjg4-89hq-mj6f | Multiple cross-site scripting (XSS) vulnerabilities in txtForum 1.0.4-dev and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) prev, (2) next, and (3) rand5 parameters in (a) index.php; the (4) r_username and (5) r_loc parameters in (b) new_topic.php; the (6) r_num, (7) r_family_name, (8) r_icq, (9) r_yahoo, (10) r_aim, (11) r_homepage, (12) r_interests, (13) r_about, (14) selected1, (15) selected0, (16) signature_selected1, (17) signature_selected0, (18) smile_selected1, (19) smile_selected0, (20) ubb_selected1, and (21) ubb_selected0 parameters in (c) profile.php; the (22) quote and (23) tid parameters in (d) reply.php; and the (24) tid, (25) sticked, and (26) mid parameters in (e) view_topic.php. | [] | null | null | null | null |
|
CVE-2024-20779 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null |
GHSA-ccr3-73xp-v8c7 | Microsoft SQL Server 2008 SP3, 2008 R2 SP2, and 2012 SP1 does not properly control use of stack memory for processing of T-SQL batch commands, which allows remote authenticated users to cause a denial of service (daemon hang) via a crafted T-SQL statement, aka "Microsoft SQL Server Stack Overrun Vulnerability." | [] | null | null | null | null |
|
GHSA-76cj-38jr-6rg5 | The Alojapro Widget WordPress plugin through 1.1.15 doesn't properly sanitise its Custom CSS settings, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed | [] | null | null | null | null |
|
RHSA-2009:1163 | Red Hat Security Advisory: seamonkey security update | Mozilla Browser engine crashes Mozilla Base64 decoding crash Mozilla JavaScript engine crashes Mozilla data corruption with SOCKS5 reply | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
GHSA-rpq3-5j25-3mcj | This issue affects: Secomea GateManager Version 9.6.621421014 and all prior versions. Improper Limitation of a Pathname to restricted directory, allows logged in GateManager admin to delete system Files or Directories. | [] | null | 8.7 | null | null |
|
RHSA-2024:8124 | Red Hat Security Advisory: java-17-openjdk security update | giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 4.8 | null | null |
CVE-2019-0683 | An elevation of privilege vulnerability exists in Active Directory Forest trusts due to a default setting that lets an attacker in the trusting forest request delegation of a TGT for an identity from the trusted forest, aka 'Active Directory Elevation of Privilege Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"
] | null | null | 5.9 | 4.3 |
|
CVE-2021-41193 | Use of Externally-Controlled Format String in wire-avs | wire-avs is the audio visual signaling (AVS) component of Wire, an open-source messenger. A remote format string vulnerability in versions prior to 7.1.12 allows an attacker to cause a denial of service or possibly execute arbitrary code. The issue has been fixed in wire-avs 7.1.12. There are currently no known workarounds. | [
"cpe:2.3:a:wire:wire-audio_video_signaling:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2024-1183 | SSRF Vulnerability in gradio-app/gradio | An SSRF (Server-Side Request Forgery) vulnerability exists in the gradio-app/gradio repository, allowing attackers to scan and identify open ports within an internal network. By manipulating the 'file' parameter in a GET request, an attacker can discern the status of internal ports based on the presence of a 'Location' header or a 'File not allowed' error in the response. | [
"cpe:2.3:a:gradio_project:gradio:-:*:*:*:*:python:*:*"
] | null | null | 6.5 | null |
CVE-2007-3359 | Multiple PHP remote file inclusion vulnerabilities in SerWeb 0.9.6 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the _SERWEB[serwebdir] parameter to (1) html/load_apu.php or (2) html/mail_prepend.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:iptel:serweb:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-7m5g-q9fx-rh4c | rsh in the remote_cmds component in Apple OS X before 10.11 allows local users to obtain root privileges via vectors involving environment variables. | [] | null | null | null | null |
|
GHSA-c2pq-pfgc-q2g7 | In HP LaserJet Enterprise, HP PageWide Enterprise, HP LaserJet Managed, and HP OfficeJet Enterprise Printers, solution application signature checking may allow potential execution of arbitrary code. | [] | null | null | 9.8 | null |
|
CVE-2024-13118 | IP Based Login < 2.4.1 - Log Deletion via CSRF | The IP Based Login WordPress plugin before 2.4.1 does not have CSRF checks in some places, which could allow attackers to make logged in users delete all logs via a CSRF attack | [] | null | 4.3 | null | null |
CVE-2019-11351 | TeamSpeak 3 Client before 3.2.5 allows remote code execution in the Qt framework. | [
"cpe:2.3:a:teamspeak:teamspeak:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 |
|
CVE-2021-24544 | Responsive WordPress Slider <= 2.2.0 - Subscriber+ Stored Cross-Site Scripting | The Responsive WordPress Slider WordPress plugin through 2.2.0 does not sanitise and escape some of the Slider options, allowing Cross-Site Scripting payloads to be set in them. Furthermore, as by default any authenticated user is allowed to create Sliders (https://wordpress.org/support/topic/slider-can-be-changed-from-any-user-even-subscriber/, such settings can be changed in the plugin's settings), this would allow user with a role as low as subscriber to perform Cross-Site Scripting attacks against logged in admins viewing the slider list and could lead to privilege escalation by creating a rogue admin account for example. | [
"cpe:2.3:a:motopress:motopress-slider-lite:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 |
PYSEC-2019-157 | null | Jupyter Notebook before 5.5.0 does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG document. | [] | null | null | null | null |
CVE-2022-32453 | HTTP header injection vulnerability in Cybozu Office 10.0.0 to 10.8.5 may allow a remote attacker to obtain and/or alter the data of the product via unspecified vectors. | [
"cpe:2.3:a:cybozu:office:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-rhc9-w9j2-xc59 | esRunCommand in IBM OmniFind Enterprise Edition before 9.1 allows local users to gain privileges by specifying an arbitrary command name as the first argument. | [] | null | null | null | null |
|
GHSA-q857-rfgj-pfxm | RICOH Interactive Whiteboard D2200 V1.1 to V2.2, D5500 V1.1 to V2.2, D5510 V1.1 to V2.2, the display versions with RICOH Interactive Whiteboard Controller Type1 V1.1 to V2.2 attached (D5520, D6500, D6510, D7500, D8400), and the display versions with RICOH Interactive Whiteboard Controller Type2 V3.0 to V3.1.10137.0 attached (D5520, D6510, D7500, D8400) uses hard-coded credentials, which may allow an attacker on the same network segments to login to the administrators settings screen and change the configuration. | [] | null | null | 8.8 | null |
|
GHSA-rgx6-rjj4-c388 | ckeditor4 vulnerable to cross-site scripting | A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because `--!>` is mishandled. | [] | null | 6.1 | null | null |
GHSA-5ccj-qrf4-3667 | The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows. | [] | null | null | null | null |
|
GHSA-4q4v-f9v3-qpr3 | Unspecified vulnerability in the Oracle Containers for J2EE component in Oracle Fusion Middleware 10.1.3.5.0 allows remote attackers to affect integrity via unknown vectors related to Servlet Runtime. | [] | null | null | null | null |
|
GHSA-5792-v2q3-5rmq | An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3. An app may be able to disclose kernel memory. | [] | null | 5.5 | null | null |
|
CVE-2024-21191 | Vulnerability in the Oracle Enterprise Manager Fusion Middleware Control product of Oracle Fusion Middleware (component: FMW Control Plugin). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Manager Fusion Middleware Control. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Enterprise Manager Fusion Middleware Control, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Enterprise Manager Fusion Middleware Control accessible data as well as unauthorized update, insert or delete access to some of Oracle Enterprise Manager Fusion Middleware Control accessible data. CVSS 3.1 Base Score 7.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:enterprise_manager_fusion_middleware_control:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:*"
] | null | 7.6 | null | null |
|
CVE-2018-7950 | The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have a JSON injection vulnerability due to insufficient input validation. An authenticated, remote attacker can launch a JSON injection to modify the password of administrator. Successful exploit may allow attackers to obtain the management privilege of the system. | [
"cpe:2.3:o:huawei:1288h_v5_firmware:100r005c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:1288h_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:2288h_v5_firmware:100r005c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:2288h_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:2488_v5_firmware:100r005c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:2488_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch121_v3_firmware:100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch121_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch121l_v3_firmware:100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch121l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch121l_v5_firmware:100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch121l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch121_v5_firmware:100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch121_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch140_v3_firmware:100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch140_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch140l_v3_firmware:100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch140l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch220_v3_firmware:100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch220_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch222_v3_firmware:100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch222_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch242_v3_firmware:100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch242_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ch242_v5_firmware:100r001c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ch242_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:rh1288_v3_firmware:100r003c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:rh1288_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:rh2288_v3_firmware:100r003c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:rh2288_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:xh310_v3_firmware:100r003c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:xh310_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:xh321_v3_firmware:100r003c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:xh321_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:xh321_v5_firmware:100r005c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:xh321_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:rh2288h_v3_firmware:100r003c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:rh2288h_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:xh620_v3_firmware:100r003c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:xh620_v3:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
CVE-2018-6003 | An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS. | [
"cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-7mhp-cw37-gmxg | A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. | [] | null | null | 8.8 | null |
|
CVE-2025-0272 | HCL DevOps Deploy / HCL Launch is susceptible to an HTML injection vulnerability | HCL DevOps Deploy / HCL Launch is vulnerable to HTML injection. This vulnerability may allow a user to embed arbitrary HTML tags in the Web UI potentially leading to sensitive information disclosure. | [] | null | 5.4 | null | null |
RHSA-2012:0310 | Red Hat Security Advisory: nfs-utils security, bug fix, and enhancement update | nfs-utils: mount.nfs fails to anticipate RLIMIT_FSIZE | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2014-6470 | Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Archive Utility. | [
"cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2024-13417 | Specifically crafted payloads sent to the RFID reader could cause DoS of RFID reader. After the device is restarted, it gets back to fully working state.
2N has released an updated version 2.46 of 2N OS, where this vulnerability is mitigated. It is recommended that all customers update their devices to the latest 2N OS. | [] | null | 4.6 | null | null |
|
CVE-2024-1735 | A vulnerability has been identified in armeria-saml versions less than 1.27.2, allowing the use of malicious SAML messages to bypass authentication. All users who rely on armeria-saml older than version 1.27.2 must upgrade to 1.27.2 or later. | [
"cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
|
GHSA-3g8q-mgqw-7ch3 | Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 5.5 | null | null |
|
GHSA-55vq-xpjf-r2xc | Lightbend Alpakka Kafka logs credentials on debug level | Lightbend Alpakka Kafka before 4.0.2 logs its configuration as debug information, and thus log files may contain credentials (if plain cleartext login is configured). This occurs in akka.kafka.internal.KafkaConsumerActor. | [] | null | 5.5 | null | null |
CVE-2021-38152 | index.php/appointment/insert_patient_add_appointment in Chikitsa Patient Management System 2.0.0 allows XSS. | [
"cpe:2.3:a:chikitsa:patient_management_system:2.0.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2024-7301 | WordPress File Upload <= 4.24.8 - Unauthenticated Stored Cross-Site Scripting via SVG File Upload | The WordPress File Upload plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 4.24.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. | [
"cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
GHSA-h94w-644h-qmgq | Unspecified vulnerability in Oracle Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Kernel. | [] | null | null | null | null |
|
GHSA-92cr-w5rv-f249 | Adobe Dimension version 3.4.8 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 5.5 | null | null |
|
GHSA-hv7g-93g6-w87h | Buffer overflow in the wmcdplay CD player program for the WindowMaker desktop allows local users to gain root privileges via a long parameter. | [] | null | null | null | null |
|
CVE-2023-39736 | The leakage of the client secret in Fukunaga_memberscard Line 13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages. | [
"cpe:2.3:a:linecorp:fukunaga_memberscard:13.6.1:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
|
GHSA-frh8-cgp4-p7vp | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themify Icons allows Stored XSS.This issue affects Themify Icons: from n/a through 2.0.1. | [] | null | 6.5 | null | null |
|
GHSA-2phq-jg7h-ghf4 | Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 before beta 2; and Sourcefire Intrusion Sensor; allows remote attackers to execute arbitrary code via crafted SMB traffic. | [] | null | null | null | null |
|
CVE-2004-0500 | Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call. | [
"cpe:2.3:a:rob_flynn:gaim:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.53:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.55:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.56:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.57:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.58:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.59:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.59.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.61:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.62:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.64:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.65:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.66:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.68:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.69:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.73:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.74:*:*:*:*:*:*:*",
"cpe:2.3:a:rob_flynn:gaim:0.75:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2008-4924 | Multiple insecure method vulnerabilities in MW6 Technologies 1D Barcode ActiveX control (BARCODELib.MW6Barcode, Barcode.dll) 3.0.0.1 allow remote attackers to overwrite arbitrary files via a full pathname argument to the (1) SaveAsBMP and (2) SaveAsWMF methods. | [
"cpe:2.3:a:mw6_technologies:1d_barcode_decoder_activex:3.0.0.1:*:*:*:*:*:*:*"
] | null | null | null | 9 |
|
CVE-2022-3315 | Type confusion in Blink in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2023-37349 | Kofax Power PDF PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | Kofax Power PDF PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20451. | [
"cpe:2.3:a:kofax:power_pdf:5.0.0.19:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
GHSA-c93r-j7wq-w4x8 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Moveaddons Move Addons for Elementor allows Stored XSS.This issue affects Move Addons for Elementor: from n/a through 1.2.9. | [] | null | 6.5 | null | null |
|
GHSA-q7r2-c6mw-rgwr | Improper initialization for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable information disclosure via local access. | [] | null | 4 | null | null |
|
GHSA-82pv-jqw9-hwx5 | The Medical Addon for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.6.2 via the 'namedical_elementor_template' shortcode due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the content of draft, pending, and private posts. | [] | null | 4.3 | null | null |
|
GHSA-r5m9-xhw7-f4vr | The mxml_write_node function in mxml-file.c in mxml 2.9, 2.7, and possibly earlier allows remote attackers to cause a denial of service (stack consumption) via crafted xml file. | [] | null | 5.5 | null | null |
|
GHSA-xvg5-c6vg-6mfp | Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341. | [] | null | null | null | null |
|
CVE-2019-1184 | Windows Elevation of Privilege Vulnerability | An elevation of privilege vulnerability exists when Windows Core Shell COM Server Registrar improperly handles COM calls. An attacker who successfully exploited this vulnerability could potentially set certain items to run at a higher level and thereby elevate permissions.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
The update addresses this vulnerability by correcting unprotected COM calls.
| [
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_1803:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
RHSA-2024:1937 | Red Hat Security Advisory: thunderbird security update | Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
GHSA-2jcf-hjwv-mmmw | NVIDIA DGX A100 SBIOS contains a vulnerability where an attacker may cause an SMI callout vulnerability that could be used to execute arbitrary code at the SMM level. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, and information disclosure. | [] | null | 7.5 | null | null |
|
GHSA-xx3v-pjx9-qmj7 | Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The affected controllers utilize hard-coded credentials which may allow an attacker gain unauthorized access to the maintenance functions and obtain or modify information. This attack can be executed only during maintenance work. | [] | null | null | 8.1 | null |
|
GHSA-qrv3-jc3h-f3m6 | Frappe vulnerable to information disclosure leading to account takeover | ImpactMaking crafted requests could lead to information disclosure that could further lead to account takeover.WorkaroundsThere's no workaround to fix this without upgrading.CreditsThanks to Thanh of Calif.io for reporting the issue | [] | 8 | null | null | null |
GHSA-xrv7-w6wq-5f4g | The "http-client" egg always used a HTTP_PROXY environment variable to determine whether HTTP traffic should be routed via a proxy, even when running as a CGI process. Under several web servers this would mean a user-supplied "Proxy" header could allow an attacker to direct all HTTP requests through a proxy (also known as a "httpoxy" attack). This affects all versions of http-client before 0.10. | [] | null | null | 7.5 | null |
|
RHSA-2017:3269 | Red Hat Security Advisory: procmail security update | procmail: Heap-based buffer overflow in loadbuf function in formisc.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
GHSA-fh4c-rwgp-mc5v | This vulnerability allows remote attackers to escalate privileges on affected installations of Centreon. Authentication is required to exploit this vulnerability. The specific flaw exists within the contact groups configuration page. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to the level of an administrator. Was ZDI-CAN-18541. | [] | null | 8.8 | null | null |
|
GHSA-xg9w-79qq-wr22 | In l2c_lcc_proc_pdu of l2c_fcr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-120665616 | [] | null | null | 8.8 | null |
|
GHSA-55fj-g6xw-c867 | IBM Lotus Notes Traveler before 8.5.1.2 allows remote authenticated users to cause a denial of service (daemon crash) by accepting a meeting invitation with an iNotes client and then accepting this meeting invitation with an iPhone client. | [] | null | null | null | null |
|
RHSA-2018:1713 | Red Hat Security Advisory: unboundid-ldapsdk security update | unboundid-ldapsdk: Incorrect Access Control vulnerability in process function in SimpleBindRequest class | [
"cpe:/a:redhat:rhev_manager:4"
] | null | null | 7 | null |
CVE-2011-2747 | Google Picasa before 3.6 Build 105.67 does not properly handle invalid properties in JPEG images, which allows remote attackers to execute arbitrary code via a crafted image file. | [
"cpe:2.3:a:google:picasa:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:picasa:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:picasa:3.5_build_79.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:picasa:3.5_build_79.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:picasa:3.5_build_79.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:picasa:3.5_build_79.81:*:*:*:*:*:*:*",
"cpe:2.3:a:google:picasa:3.5_build_95.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:picasa:3.6_build_95.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:picasa:3.6_build_105.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:picasa:3.6_build_105.61:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2012-6041 | Double free vulnerability in GreenBrowser before 6.0.1002, when the keyword search bar (F6) is activated, allows remote attackers to execute arbitrary code via a crafted iframe. | [
"cpe:2.3:a:morequick:greenbrowser:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-6p5m-4qm2-x723 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | [] | null | null | null | null |
|
GHSA-vcgf-4q4f-3267 | An iframe sandbox element with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1. | [] | null | 6.5 | null | null |
|
RHSA-2024:0894 | Red Hat Security Advisory: mysql:8.0 security update | zstd: mysql: buffer overrun in util.c mysql: InnoDB unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: JSON unspecified vulnerability (CPU Apr 2023) mysql: Server: DML unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Client programs unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: InnoDB unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Jul 2023) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2023) mysql: Client programs unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: Server: DDL unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: UDF unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: DML unspecified vulnerability (CPU Oct 2023) mysql: Server: RAPID unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2024) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Replication unspecified vulnerability (CPU Jan 2024) mysql: Server: Options unspecified vulnerability (CPU Jan 2024) mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: DML unspecified vulnerability (CPU Jan 2024) mysql: Server : Security : Firewall unspecified vulnerability (CPU Jan 2024) mysql: Server: UDF unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2024) mysql: Optimizer unspecified vulnerability (CPU Jul 2024) mysql: Optimizer unspecified vulnerability (CPU Oct 2024) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.9 | null | null |
CVE-2014-3668 | Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_type function or (2) a crafted argument to the xmlrpc_decode function, related to an out-of-bounds read operation. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.12:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.12:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.13:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.14:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.15:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.16:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.29:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.30:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-x4qm-mcjq-v2gf | Overflow in prost-types | Affected versions of this crate contained a bug in which untrusted input could cause an overflow and panic when converting a Timestamp to SystemTime. It is recommended to upgrade to prost-types v0.8 and switch the usage of From<Timestamp> for SystemTime to TryFrom<Timestamp> for SystemTime. | [] | null | 7.5 | null | null |
GHSA-p9xj-vr8q-cxmp | A vulnerability classified as critical has been found in SourceCodester Online Exam System 1.0. This affects an unknown part of the file adminpanel/admin/facebox_modal/updateCourse.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228771. | [] | null | null | 6.3 | null |
|
GHSA-fh33-v9vq-826f | In the Linux kernel, the following vulnerability has been resolved:NFC: digital: fix possible memory leak in digital_in_send_sdd_req()'skb' is allocated in digital_in_send_sdd_req(), but not free when
digital_in_send_cmd() failed, which will cause memory leak. Fix it
by freeing 'skb' if digital_in_send_cmd() return failed. | [] | null | 5.5 | null | null |
|
CVE-2022-0570 | Heap-based Buffer Overflow in mruby/mruby | Heap-based Buffer Overflow in Homebrew mruby prior to 3.2. | [
"cpe:2.3:a:mruby:mruby:*:*:*:*:*:*:*:*"
] | null | null | 8.4 | null |
GHSA-3c6v-c67v-hx4q | UltraLog Express device management interface does not properly perform access authentication in some specific pages/functions. Any user can access the privileged page to manage accounts through specific system directory. | [] | null | 8.1 | null | null |
|
GHSA-7mvm-mjfh-j28w | NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in the user mode video driver trace logger component. When an attacker has access to the system and creates a hard link, the software does not check for hard link attacks. This behavior may lead to code execution, denial of service, or escalation of privileges. | [] | null | null | null | null |
|
GHSA-85vj-ffxc-x8w8 | An issue has been discovered in GitLab affecting all versions starting from 15.10 before 16.1, leading to a ReDoS vulnerability in the Jira prefix | [] | null | 6.5 | null | null |
|
GHSA-59pr-89vx-c4r9 | register.php in Ultimate PHP Board (UPB) 1.9.6 and earlier allows remote attackers to create arbitrary accounts via the "[NR]" sequence in the signature field, which is used to separate multiple records. | [] | null | null | null | null |
|
CVE-2008-7118 | WeBid auction script 0.5.4 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain SQL query logs via a direct request for logs/cron.log. | [
"cpe:2.3:a:webidsupport:webid:0.5.4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2009-2141 | Multiple cross-site scripting (XSS) vulnerabilities in TBDev.NET 01-01-08 allow remote attackers to inject arbitrary web script or HTML via (1) the returnto parameter to makepoll.php, (2) the returnto parameter in a delete action to polls.php, or the (3) Info or (4) Avatar field to my.php. | [
"cpe:2.3:a:tbdev:tbdev.net:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2004-1851 | Dameware Mini Remote Control 4.1.0.0 uses insufficiently random data to create the encryption key, which makes it easier for remote attackers to obtain sensitive information via brute force guessing. | [
"cpe:2.3:a:dameware_development:mini_remote_control_server:4.1_.0.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2018-6221 | An unvalidated software update vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow a man-in-the-middle attacker to tamper with an update file and inject their own. | [
"cpe:2.3:a:trendmicro:email_encryption_gateway:5.5:*:*:*:*:*:*:*"
] | null | null | 8.1 | 9.3 |
|
GHSA-j982-5jv7-v43r | Silverstripe Form field validation message XSS vulnerability | A high level XSS risk has been identified in the encoding of validation messages in certain FormField classes.Certain fields such as the NumericField and DropdownField have been identified, but any form field which presents any invalid content as a part of its validation response will be at risk. | [] | null | 6.1 | null | null |
CVE-2018-0864 | SharePoint Project Server 2013 and SharePoint Enterprise Server 2016 allow an information disclosure vulnerability due to how web requests are handled, aka "Microsoft SharePoint Information Disclosure Vulnerability". | [
"cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
CVE-2025-3143 | SourceCodester Apartment Visitor Management System visitor-entry.php sql injection | A vulnerability classified as critical has been found in SourceCodester Apartment Visitor Management System 1.0. Affected is an unknown function of the file /visitor-entry.php. The manipulation of the argument visname/address leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2021-25003 | WPCargo < 6.9.0 - Unauthenticated RCE | The WPCargo Track & Trace WordPress plugin before 6.9.0 contains a file which could allow unauthenticated attackers to write a PHP file anywhere on the web server, leading to RCE | [
"cpe:2.3:a:wptaskforce:wpcargo_track_\\&_trace:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | 7.5 |
ICSA-21-350-04 | Mitsubishi Electric GX Works2 | If an attacker tampers with a program file in a Mitsubishi Electric PLC by sending malicious crafted packets to the PLC, reading the program file into GX Works2, the engineering software incorrectly handles a length field that is inconsistent with the actual length of the associated data, which could result in a denial-of-service condition in the software.CVE-2021-20608 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H). | [] | null | null | 5.3 | null |
GHSA-pv66-8fqr-94c7 | A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 16. An app may be able to execute arbitrary code with kernel privileges | [] | null | 9.8 | null | null |
|
GHSA-28h6-qj9x-44jv | Parallels Desktop Updater Improper Initialization Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability.The specific flaw exists within the Updater service. The issue results from the lack of proper initialization of environment variables. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-18253. | [] | null | null | 7.8 | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.