id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-47041
|
In valid_address of syscall.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.4 | null | null |
|
CVE-2020-7631
|
diskusage-ng through 0.2.4 is vulnerable to Command Injection.It allows execution of arbitrary commands via the path argument.
|
[
"cpe:2.3:a:diskusage-ng_project:diskusage-ng:*:*:*:*:*:node.js:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-4grq-85p9-vpjp
|
Multiple cross-site scripting (XSS) vulnerabilities in IBM Connections Portlets 4.x before 4.5.1 FP1 for IBM WebSphere Portal 7.0.0.2 and 8.0.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null |
|
CVE-2016-2861
|
IBM WebSphere eXtreme Scale 7.1.0 before 7.1.0.3, 7.1.1 before 7.1.1.1, 8.5 before 8.5.0.3, and 8.6 before 8.6.0.8 does not properly encrypt data, which makes it easier for remote attackers to obtain sensitive information by sniffing the network.
|
[
"cpe:2.3:a:ibm:websphere_extreme_scale:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_extreme_scale:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_extreme_scale:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_extreme_scale:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_extreme_scale:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_extreme_scale:8.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_extreme_scale:8.6.0.7:*:*:*:*:*:*:*"
] | null | null | 3.7 | 4.3 |
|
GHSA-h5p3-7352-mh38
|
There is an issue in all samba 4.11.x versions before 4.11.5, all samba 4.10.x versions before 4.10.12 and all samba 4.9.x versions before 4.9.18, where the removal of the right to create or modify a subtree would not automatically be taken away on all domain controllers.
|
[] | null | 5.4 | null | null |
|
GHSA-7pqv-vffj-rhrq
|
IBM PureApplication System 2.2.3.0 through 2.2.5.3 weakness in the implementation of locking feature in pattern editor. An attacker by intercepting the subsequent requests can bypass business logic to modify the pattern to unlocked state. IBM X-Force ID: 159416.
|
[] | null | 4.3 | null | null |
|
CVE-2025-45424
|
Incorrect access control in Xinference before v1.4.0 allows attackers to access the Web GUI without authentication.
|
[] | null | 5.3 | null | null |
|
CVE-2021-38389
|
Advantech WebAccess
|
Advantech WebAccess versions 9.02 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code.
|
[
"cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2006-0023
|
Microsoft Windows XP SP1 and SP2 before August 2004, and possibly other operating systems and versions, uses insecure default ACLs that allow the Authenticated Users group to gain privileges by modifying critical configuration information for the (1) Simple Service Discovery Protocol (SSDP), (2) Universal Plug and Play Device Host (UPnP), (3) NetBT, (4) SCardSvr, (5) DHCP, and (6) DnsCache services, aka "Permissive Windows Services DACLs." NOTE: the NetBT, SCardSvr, DHCP, DnsCache already require privileged access to exploit.
|
[
"cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2025-30169
|
Admin Authorized File Upload and Execute PHP
|
File upload and execute vulnerabilities in ASPECT allow PHP script injection if session administrator credentials become compromised.
This issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03.
|
[] | 6 | 6.7 | null | null |
ICSA-21-040-09
|
SIMATIC WinCC Graphics Designer
|
Due to an insecure password verification process, an attacker could bypass the password protection set on protected files, thus being granted access to the protected content, circumventing authentication.
|
[] | null | 6.2 | null | null |
CVE-2019-10111
|
An issue was discovered in GitLab Community and Enterprise Edition before 11.7.8, 11.8.x before 11.8.4, and 11.9.x before 11.9.2. It allows persistent XSS in the merge request "resolve conflicts" page.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-4rvp-mxg2-gwpf
|
Race condition in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to worker processes.
|
[] | null | null | null | null |
|
GHSA-87jx-4wq7-9wr5
|
Directory traversal vulnerability in the true_path function in private.py for Mailman 2.1.5 and earlier allows remote attackers to read arbitrary files via ".../....///" sequences, which are not properly cleansed by regular expressions that are intended to remove "../" and "./" sequences.
|
[] | null | null | null | null |
|
CVE-2025-29094
|
Cross Site Scripting vulnerability in Motivian Content Mangment System v.41.0.0 allows a remote attacker to execute arbitrary code via the Marketing/Forms, Marketing/Offers and Content/Pages components.
|
[] | null | 6.1 | null | null |
|
CVE-2023-0245
|
SourceCodester Online Flight Booking Management System add_contestant.php sql injection
|
A vulnerability, which was classified as critical, has been found in SourceCodester Online Flight Booking Management System. This issue affects some unknown processing of the file add_contestant.php. The manipulation of the argument add_contestant leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-218153 was assigned to this vulnerability.
|
[
"cpe:2.3:a:online_flight_booking_management_system_project:online_flight_booking_management_system:-:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
GHSA-h9hc-mxg8-47g8
|
A Reflected Cross-site scripting (XSS) vulnerability in Sourcecodester Task Reminder System 1.0 allows an authenticated user to inject malicious javascript into the page parameter.
|
[] | null | 5.4 | null | null |
|
GHSA-jhwq-fpc4-43ff
|
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Updates Change Assistant). The supported version that is affected is 8.54. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[] | null | null | 5.9 | null |
|
GHSA-4633-w3xc-3953
|
On PTX Series and QFX10k Series devices with the "inline-jflow" feature enabled, a use after free weakness in the Packet Forwarding Engine (PFE) microkernel architecture of Juniper Networks Junos OS may allow an attacker to cause a Denial of Service (DoS) condition whereby one or more Flexible PIC Concentrators (FPCs) may restart. As this is a race condition situation this issue become more likely to be hit when network instability occurs, such as but not limited to BGP/IGP reconvergences, and/or further likely to occur when more active "traffic flows" are occurring through the device. When this issue occurs, it will cause one or more FPCs to restart unexpectedly. During FPC restarts core files will be generated. While the core file is generated traffic will be disrupted. Sustained receipt of large traffic flows and reconvergence-like situations may sustain the Denial of Service (DoS) situation. This issue affects: Juniper Networks Junos OS: 18.1 version 18.1R2 and later versions prior to 18.1R3-S10 on PTX Series, QFX10K Series.
|
[] | null | null | null | null |
|
CVE-2011-2864
|
Google Chrome before 14.0.835.163 does not properly handle Tibetan characters, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-jc69-mj42-hw2j
|
Pidgin before 2.10.8 allows remote MSN servers to cause a denial of service (NULL pointer dereference and crash) via a crafted (1) SOAP response, (2) OIM XML response, or (3) Content-Length header.
|
[] | null | null | null | null |
|
CVE-2021-30629
|
Use after free in Permissions in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2025-6686
|
Magic Buttons for Elementor <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via magic-button Shortcode
|
The Magic Buttons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's magic-button shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null |
CVE-2022-4819
|
HotCRP cross site scripting
|
A vulnerability was found in HotCRP. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is d4ffdb0ef806453c54ddca7fdda3e5c60356285c. It is recommended to apply a patch to fix this issue. VDB-216998 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:hotcrp:hotcrp:-:*:*:*:*:*:*:*"
] | null | 2.4 | 2.4 | null |
CVE-2023-1605
|
Denial of Service in radareorg/radare2
|
Denial of Service in GitHub repository radareorg/radare2 prior to 5.8.6.
|
[
"cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
CVE-2017-0411
|
An elevation of privilege vulnerability in the Framework APIs could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 7.0, 7.1.1. Android ID: A-33042690.
|
[
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2015-5849
|
The filtering implementation in AppleEvents in Apple OS X before 10.11 mishandles attempts to send events to a different user, which allows attackers to bypass intended access restrictions by leveraging a screen-sharing connection.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2024-21430
|
Windows USB Attached SCSI (UAS) Protocol Remote Code Execution Vulnerability
|
Windows USB Attached SCSI (UAS) Protocol Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 5.7 | null | null |
CVE-2014-4192
|
The Dual_EC_DRBG implementation in EMC RSA BSAFE-C Toolkits (aka Share for C and C++) processes certain requests for output bytes by considering only the requested byte count and not the use of cached bytes, which makes it easier for remote attackers to obtain plaintext from TLS sessions by recovering the algorithm's inner state, a different issue than CVE-2007-6755.
|
[
"cpe:2.3:a:dell:bsafe_share:-:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2019-7608
|
Kibana versions before 5.6.15 and 6.6.1 had a cross-site scripting (XSS) vulnerability that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.
|
[
"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
RHBA-2021:0959
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.4 extras update
|
golang: crypto/elliptic: incorrect operations on the P-224 curve
|
[
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 6.5 | null | null |
GHSA-4pmv-pvww-7wmr
|
The Traffic Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'page' parameter in the 'UserWebStat' AJAX function in all versions up to, and including, 1.4.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 7.2 | null | null |
|
GHSA-fqr7-4324-59j5
|
SAP S/4HANA (Financial Products Subledger), version 100, uses an incorrect authorization object in some reports. Although the affected reports are protected with other authorization objects, exploitation of the vulnerability would allow an authenticated attacker to view, change, or delete data, thereby preventing the proper segregation of duties in the system.
|
[] | null | null | null | null |
|
RHSA-2025:0637
|
Red Hat Security Advisory: rsync security update
|
rsync: Info Leak via Uninitialized Stack Contents
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 7.5 | null | null |
CVE-2024-47766
|
Permissions are incorrectly verified for project administrators in the cross tracker search widget
|
Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, administrators of a project can access the content of trackers with permissions restrictions of project they are members of but not admin via the cross tracker search widget. Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue.
|
[
"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*"
] | null | 4.9 | null | null |
CVE-2016-0402
|
Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect integrity via unknown vectors related to Networking.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2013-3345
|
Adobe Flash Player before 11.7.700.232 and 11.8.x before 11.8.800.94 on Windows and Mac OS X, before 11.2.202.297 on Linux, before 11.1.111.64 on Android 2.x and 3.x, and before 11.1.115.69 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.111.44:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.111.50:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.111.54:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.115.48:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.115.54:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.115.58:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.275:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.280:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.285:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.270:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.4.402.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.5.502.136:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.5.502.146:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.5.502.149:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.6.602.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.6.602.168:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.6.602.171:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.6.602.180:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.7.700.169:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.7.700.202:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.7.700.224:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-2xf8-83rw-66f8
|
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the JavaScript engine. The mismatch between an old and a new object can provide an attacker with unintended memory access. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | 8.8 | null |
|
CVE-2024-9203
|
Enpass Password Manager sensitive information in memory
|
A vulnerability, which was classified as problematic, has been found in Enpass Password Manager up to 6.9.5 on Windows. This issue affects some unknown processing. The manipulation leads to cleartext storage of sensitive information in memory. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 6.10.1 is able to address this issue. It is recommended to upgrade the affected component.
|
[] | 2 | 2.5 | 2.5 | 1 |
GHSA-vg65-j6rw-4575
|
In createNameCredentialDialog of CertInstaller.java, there exists the possibility of improperly installed certificates due to a logic error. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-163413737
|
[] | null | null | null | null |
|
GHSA-5fqv-vrx3-3h8m
|
Meteocontrol WEB'log Basic 100, Light, Pro, and Pro Unlimited allows remote attackers to execute arbitrary commands via an "access command shell-like feature."
|
[] | null | null | 9.4 | null |
|
CVE-2016-0103
|
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0102, CVE-2016-0106, CVE-2016-0108, CVE-2016-0109, and CVE-2016-0114.
|
[
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
CVE-2005-0862
|
Multiple PHP remote file inclusion vulnerabilities in PHPOpenChat 3.0.1 and earlier allow remote attackers to execute arbitrary PHP code via the phpbb_root_path parameter to (1) poc_loginform.php or (2) phpbb/poc.php, the poc_root_path parameter to (3) phpbb/poc.php, (4) phpnuke/ENGLISH_poc.php, (5) phpnuke/poc.php, or (6) yabbse/poc.php, or (7) the sourcedir parameter to yabbse/poc.php.
|
[
"cpe:2.3:a:phpopenchat:phpopenchat:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpopenchat:phpopenchat:3.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-pm7j-hcwj-f489
|
IBM Cognos Analytics 11.0 could produce results in temporary files that contain highly sensitive information that can be read by a local user. IBM X-Force ID: 136858.
|
[] | null | null | 5.5 | null |
|
GHSA-r87q-q7hx-24jg
|
Integer overflow in the Binary File Descriptor (BFD) library for gdb before 6.3, binutils, elfutils, and possibly other packages, allows user-assisted attackers to execute arbitrary code via a crafted object file that specifies a large number of section headers, leading to a heap-based buffer overflow.
|
[] | null | null | null | null |
|
CVE-2021-34521
|
Raw Image Extension Remote Code Execution Vulnerability
|
Raw Image Extension Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1679:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1110:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1110:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-hx33-mww2-6mf5
|
tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.
|
[] | null | null | null | null |
|
CVE-2006-3393
|
Papyrus NASCAR Racing 4 4.1.3.1.6 and earlier, 2002 Season 1.1.0.2 and earlier, and 2003 Season 1.2.0.1 and earlier allows remote attackers to cause a denial of service (CPU consumption) by sending an empty UDP datagram, which is not properly discarded due to use of the FIONREAD asynchronous socket.
|
[
"cpe:2.3:a:electronic_arts:nascar_racing:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-vmv8-xm76-mq23
|
User enumeration is found in PHPJabbers Fundraising Script v1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.
|
[] | null | 9.8 | null | null |
|
GHSA-8p93-rmgx-3xq4
|
A time-of-check time-of-use race condition could potentially exist in the secure file system in all Android releases from CAF using the Linux kernel.
|
[] | null | null | 7 | null |
|
CVE-2024-7904
|
DedeBIZ File Extension file_manage_control.php unrestricted upload
|
A vulnerability was found in DedeBIZ 6.3.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file admin/file_manage_control.php of the component File Extension Handler. The manipulation of the argument upfile1 leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:dedebiz:dedebiz:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dedebiz:dedebiz:6.3.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-g3px-cpxh-v7xc
|
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free.
|
[] | null | 4.3 | null | null |
|
GHSA-qg3q-8fxm-jvxp
|
An issue in Automatic Systems SOC FL9600 FastLine v.lego_T04E00 allows a remote attacker to obtain sensitive information via the admin login credentials.
|
[] | null | 7.5 | null | null |
|
GHSA-53q7-x4c6-g4jg
|
Multiple cross-site scripting (XSS) vulnerabilities in PBLang 4.65 allow remote attackers to inject arbitrary web script or HTML via (1) the search string to search.php, (2) the subject of a PM, which is processed by pm.php, or (3) the body of a PM, which is processed by pmpshow.php.
|
[] | null | null | null | null |
|
GHSA-6cmv-m333-v5r3
|
Use after free in OS Inputs in Google Chrome on ChromeOS prior to 113.0.5672.63 allowed a remote attacker who convinced a user to enage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium)
|
[] | null | 8.8 | null | null |
|
CVE-2021-28458
|
Azure ms-rest-nodeauth Library Elevation of Privilege Vulnerability
|
Azure ms-rest-nodeauth Library Elevation of Privilege Vulnerability
|
[
"cpe:2.3:a:microsoft:ms-rest-nodeauth:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:microsoft:ms-rest-nodeauth:-:*:*:*:*:node.js:*:*"
] | null | 7.8 | null | null |
CVE-2022-2345
|
Use After Free in vim/vim
|
Use After Free in GitHub repository vim/vim prior to 9.0.0046.
|
[
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
GHSA-mr5m-2385-2vcp
|
xdlocalstorage does not verify request origin
|
An issue was discovered in xdLocalStorage through 2.0.5. The `postData()` function in `xdLocalStoragePostMessageApi.js` specifies the wildcard (`*`) as the targetOrigin when calling the `postMessage()` function on the parent object. Therefore any domain can load the application hosting the "magical iframe" and receive the messages that the "magical iframe" sends.
|
[] | null | 8.8 | null | null |
CVE-2011-4822
|
Multiple cross-site scripting (XSS) vulnerabilities in the user profile feature in Atlassian FishEye before 2.5.5 allow remote attackers to inject arbitrary web script or HTML via (1) snippets in a user comment, which is not properly handled in a Confluence page, or (2) the user profile display name, which is not properly handled in a FishEye page.
|
[
"cpe:2.3:a:atlassian:fisheye:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.6.5.a:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:2.5.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-cc95-94rx-4f96
|
Directory traversal vulnerability in the web interface on the D-Link DWR-116 device with firmware before V1.05b09 allows remote attackers to read arbitrary files via a .. (dot dot) in a "GET /uir/" request.
|
[] | null | null | 7.5 | null |
|
GHSA-vwq4-8mj9-pfmh
|
Trusty contains a vulnerability in the HDCP service TA where bounds checking in command 11 is missing. Improper restriction of operations within the bounds of a memory buffer might lead to information disclosure, denial of service, or escalation of privileges.
|
[] | null | null | null | null |
|
CVE-2020-7807
|
DLL Hijacking Vulnerabilities During Installation of LG Electronics Software
|
A vulnerability that can hijack a DLL file that is loaded during products(LGPCSuite_Setup, IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup) installation into a DLL file that the hacker wants. Missing Support for Integrity Check vulnerability in ____COMPONENT____ of LG Electronics (LGPCSuite_Setup), (IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup) allows ____ATTACKER/ATTACK____ to cause ____IMPACT____. This issue affects: LG Electronics; LGPCSuite_Setup : 1.0.0.3 on Windows(x86, x64); IPSFULLHD, LG_ULTRAWIDE, ULTRA_HD_Driver Setup : 1.0.0.9 on Windows(x86, x64).
|
[
"cpe:2.3:a:lg:ipsfullhd:1.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lg:lg_ultrawide:1.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lg:lgpcsuite_setup:1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:lg:ultra_hd_driver_setup:1.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.6 | null | null |
CVE-2022-47126
|
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wrlEn parameter at /goform/WifiBasicSet.
|
[
"cpe:2.3:o:tenda:a15_firmware:15.13.07.13:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:a15:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2000-0660
|
The WDaemon web server for WorldClient 2.1 allows remote attackers to read arbitrary files via a .. (dot dot) attack.
|
[
"cpe:2.3:a:alt-n:worldclient:2.1:*:standard:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2019-19757
|
An internal product security audit of Lenovo XClarity Administrator (LXCA) discovered a Document Object Model (DOM) based cross-site scripting vulnerability in versions prior to 2.6.6 that could allow JavaScript code to be executed in the user's web browser if a specially crafted link is visited. The JavaScript code is executed on the user's system, not executed on LXCA itself.
|
[
"cpe:2.3:a:lenovo:xclarity_administrator:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-3rqf-vgwx-39xx
|
The `add_llm` function in `llm_app.py` in infiniflow/ragflow version 0.11.0 contains a remote code execution (RCE) vulnerability. The function uses user-supplied input `req['llm_factory']` and `req['llm_name']` to dynamically instantiate classes from various model dictionaries. This approach allows an attacker to potentially execute arbitrary code due to the lack of comprehensive input validation or sanitization. An attacker could provide a malicious value for 'llm_factory' that, when used as an index to these model dictionaries, results in the execution of arbitrary code.
|
[] | null | null | 9.8 | null |
|
GHSA-666g-rfc5-c9jv
|
Apache Airflow Celery provider Insertion of Sensitive Information into Log File vulnerability
|
Insertion of Sensitive Information into Log File vulnerability in Apache Airflow Celery provider, Apache Airflow.Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend
Note: the vulnerability is about the information exposed in the logs not about accessing the logs.This issue affects Apache Airflow Celery provider: from 3.3.0 through 3.4.0; Apache Airflow: from 1.10.0 through 2.6.3.Users are recommended to upgrade Airflow Celery provider to version 3.4.1 and Apache Airlfow to version 2.7.0 which fixes the issue.
|
[] | null | 7.5 | null | null |
CVE-2024-45406
|
Craft CMS stored XSS in breadcrumb list and title fields
|
Craft is a content management system (CMS). Craft CMS 5 stored XSS can be triggered by the breadcrumb list and title fields with user input.
|
[
"cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2022-31583
|
The sravaniboinepelli/AutomatedQuizEval repository through 2020-04-27 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
|
[
"cpe:2.3:a:automatedquizeval_project:automatedquizeval:*:*:*:*:*:*:*:*"
] | null | 9.3 | null | 6.4 |
|
GHSA-33mg-w6qx-r88m
|
Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have a out-of-bounds read vulnerability. Due to insufficient input validation, an authenticated, remote attacker could send malformed SOAP packets to the target device. Successful exploit could make the device access invalid memory and might reset a process.
|
[] | null | null | 4.3 | null |
|
GHSA-gcx9-rwpp-wvvr
|
In the Linux kernel, the following vulnerability has been resolved:drm: xlnx: zynqmp_disp: layer may be null while releasinglayer->info can be null if we have an error on the first layer in
zynqmp_disp_create_layers
|
[] | null | 5.5 | null | null |
|
GHSA-7rwx-5c38-47x9
|
Cross-site scripting (XSS) vulnerability in status_image.php in PHP Live! 3.0 allows remote attackers to inject arbitrary web script or HTML via the base_url parameter.
|
[] | null | null | null | null |
|
GHSA-pjpc-87mp-4332
|
Cross-site Scripting vulnerability in Mautic's tracking pixel functionality
|
ImpactMautic allows you to track open rates by using tracking pixels.
The tracking information is stored together with extra metadata of the tracking request.The output isn't sufficiently filtered when showing the metadata of the tracking information, which may lead to a vulnerable situation.PatchesPlease upgrade to 4.3.0WorkaroundsNone.ReferencesInternally tracked under MST-38For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])
|
[] | null | 9.6 | null | null |
CVE-2021-31660
|
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.
|
[
"cpe:2.3:o:riot-os:riot:2021.01:-:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-qcqr-cxwj-882p
|
Implicit intent hijacking vulnerability in Firewall application prior to versions 12.1.00.24 in Android 11, 13.1.00.16 in Android 12 and 14.1.00.7 in Android 13 allows 3rd party application to tamper the database of Firewall.
|
[] | null | 3.3 | null | null |
|
CVE-2000-0238
|
Buffer overflow in the web server for Norton AntiVirus for Internet Email Gateways allows remote attackers to cause a denial of service via a long URL.
|
[
"cpe:2.3:a:symantec:norton_antivirus:1.0:*:internet_email_gateways:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2017-9807
|
An issue was discovered in the OpenWebif plugin through 1.2.4 for E2 open devices. The saveConfig function of "plugin/controllers/models/config.py" performs an eval() call on the contents of the "key" HTTP GET parameter. This allows an unauthenticated remote attacker to execute arbitrary Python code or OS commands via api/saveconfig.
|
[
"cpe:2.3:a:openwebif_project:openwebif:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2010-0502
|
iChat Server in Apple Mac OS X Server before 10.6.3, when group chat is used, does not perform logging for all types of messages, which might allow remote attackers to avoid message auditing via an unspecified selection of message type.
|
[
"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2019-8664
|
An input validation issue was addressed with improved input validation. This issue is fixed in iOS 12.3, watchOS 5.2.1. Processing a maliciously crafted message may lead to a denial of service.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-64c5-r2h5-c2fg
|
Jenkins docker-build-step Plugin Cross-Site Request Forgery vulnerability
|
A cross-site request forgery (CSRF) vulnerability in Jenkins docker-build-step Plugin 2.11 and earlier allows attackers to connect to an attacker-specified TCP or Unix socket URL, and to reconfigure the plugin using the provided connection test parameters, affecting future build step executions.
|
[] | 5.3 | 6.3 | null | null |
CVE-2023-46356
|
In the module "CSV Feeds PRO" (csvfeeds) before 2.6.1 from Bl Modules for PrestaShop, a guest can perform SQL injection. The method `SearchApiCsv::getProducts()` has sensitive SQL call that can be executed with a trivial http call and exploited to forge a SQL injection.
|
[
"cpe:2.3:a:blmodules:csv_feeds_pro:*:*:*:*:*:prestashop:*:*"
] | null | 9.8 | null | null |
|
CVE-2022-37888
|
There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address these security vulnerabilities.
|
[
"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-103:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-114:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-115:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-121:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-130:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-135:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-204:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-205:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-207:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-214:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-215:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-224:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-225:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-303:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-304:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-305:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-314:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-315:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-318:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-324:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-325:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-334:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-340:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-505:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-514:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-515:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-534:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-535:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-555:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-635:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:ap-655:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-103:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-114:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-115:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-204:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-205:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-207:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-224:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-225:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-304:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-305:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-314:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-315:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-318:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-324:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-325:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:iap-334:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:rap-108:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:rap-109:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-prgj-fx3q-8ffq
|
A CSRF vulnerability exists in the Web File Manager's Network Setting functionality of Rumpus FTP Server 8.2.9.1. By exploiting it, an attacker can manipulate the SMTP setting and other network settings via RAPR/NetworkSettingsSet.html.
|
[] | null | null | null | null |
|
CVE-2010-3955
|
pubconv.dll (aka the Publisher Converter DLL) in Microsoft Publisher 2002 SP3 does not properly perform array indexing, which allows remote attackers to execute arbitrary code via a crafted Publisher file that uses an old file format, aka "Array Indexing Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:publisher:2002:sp3:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2019-0926
|
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka 'Microsoft Edge Memory Corruption Vulnerability'.
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
RHSA-2006:0159
|
Red Hat Security Advisory: httpd security update
|
security flaw httpd cross-site scripting flaw in mod_imap security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2005-2038
|
Fortibus CMS 4.0.0 allows remote attackers to modify information of other users, including Admin, via the "My info" page.
|
[
"cpe:2.3:a:fortibus:fortibus_cms:4.0.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2020-6832
|
An issue was discovered in GitLab Enterprise Edition (EE) 8.9.0 through 12.6.1. Using the project import feature, it was possible for someone to obtain issues from private projects.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 5.3 | null | 5 |
|
GHSA-cv59-pqrm-746v
|
A reflected cross-site scripting (XSS) vulnerability in ePO prior to 5.10 SP1 Update 1allows a remote unauthenticated attacker to potentially obtain access to an ePO administrator's session by convincing the authenticated ePO administrator to click on a carefully crafted link. This would lead to limited access to sensitive information and limited ability to alter some information in ePO.
|
[] | null | 5.4 | null | null |
|
GHSA-xj6r-wv4q-mrm6
|
In JetBrains TeamCity before 2021.2, a logout action didn't remove a Remember Me cookie.
|
[] | null | null | null | null |
|
GHSA-m4c4-wqx2-xxcw
|
Several OS command injection vulnerabilities exist in the m2m binary of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is reachable through the m2m's DOWNLOAD_AD command.
|
[] | null | 9.8 | null | null |
|
GHSA-xp2j-75cr-2mjj
|
The Premium Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Wrapper Link Widget in all versions up to, and including, 4.10.16 due to insufficient input sanitization and output escaping on user supplied URLs. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null |
|
GHSA-4chr-gmf7-m368
|
PHP remote file inclusion vulnerability in mod_weather.php in the Antonis Ventouris Weather module for Mambo and Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the absolute_path parameter.
|
[] | null | null | null | null |
|
GHSA-fwr7-55rh-9m99
|
Cross-site request forgery (CSRF) vulnerability in administration.cgi on the Cisco Linksys WRT54GC router with firmware 1.05.7 allows remote attackers to hijack the intranet connectivity of arbitrary users for requests that change the administrator password via the sysPasswd and sysConfirmPasswd parameters.
|
[] | null | null | null | null |
|
GHSA-hhx5-rpwh-x4j9
|
PHP Scripts Mall Car Rental Script 2.0.8 has XSS via the User Name field in an Edit Profile action.
|
[] | null | null | 5.4 | null |
|
CVE-2010-3346
|
Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Element Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-fpfg-rp56-r3cr
|
Kolab stores OpenLDAP passwords in plaintext in the slapd.conf file, which may be installed world-readable, which allows local users to gain privileges.
|
[] | null | null | null | null |
|
GHSA-7wvc-54wp-pv8x
|
The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to access user-sensitive data.
|
[] | null | 5.5 | null | null |
|
GHSA-v4h8-rwfj-mm33
|
SQL injection vulnerability in admin/data_files/move.php in Maian Uploader 4.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] | null | null | null | null |
|
GHSA-m955-8c8p-f9h8
|
In MediaProvider, there is a possible permissions bypass due to SQL injection. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-132074310
|
[] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.