id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-5pj4-v6mv-3mf3 | D-Link DAP-1353 H/W vers. B1 3.15 and earlier, D-Link DAP-2553 H/W ver. A1 1.31 and earlier, and D-Link DAP-3520 H/W ver. A1 1.16 and earlier reveal wireless passwords and administrative usernames and passwords over SNMP. | []
| null | null | 8.1 | null |
|
GHSA-c3x4-42jc-832x | Windows Hyper-V Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40461. | []
| null | 8 | null | null |
|
GHSA-jfgc-3h88-627p | Cross-Site Request Forgery (CSRF) vulnerability in vgstef WP User Stylesheet Switcher allows Stored XSS. This issue affects WP User Stylesheet Switcher: from n/a through v2.2.0. | []
| null | 7.1 | null | null |
|
CVE-2020-16014 | Use after free in PPAPI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | 9.6 | null | 6.8 |
|
GHSA-6q93-7ff8-58mr | mt-wizard.cgi in Six Apart Movable Type before 4.261, when global templates are not initialized, allows remote attackers to bypass access restrictions and (1) send e-mail to arbitrary addresses or (2) obtain sensitive information via unspecified vectors. | []
| null | null | null | null |
|
CVE-2023-2047 | Campcodes Advanced Online Voting System login.php sql injection | A vulnerability was found in Campcodes Advanced Online Voting System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument voter leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225932. | [
"cpe:2.3:a:advanced_online_voting_system_project:advanced_online_voting_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:campcodes_advanced_online_voting_system_project:campcodes_advanced_online_voting_system:1.0:*:*:*:*:*:*:*"
]
| null | 6.3 | 6.3 | 6.5 |
CVE-2021-21913 | An information disclosure vulnerability exists in the WiFi Smart Mesh functionality of D-LINK DIR-3040 1.13B03. A specially-crafted network request can lead to command execution. An attacker can connect to the MQTT service to trigger this vulnerability. | [
"cpe:2.3:o:dlink:dir-3040_firmware:1.13b03:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-3040:-:*:*:*:*:*:*:*"
]
| null | null | 10 | null |
|
GHSA-f688-x29c-c844 | Cross-site scripting (XSS) vulnerability in WordPress before 3.1.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | []
| null | null | null | null |
|
GHSA-h8qv-gx54-w2g5 | SQL Injection exists in the Staff Master through 1.0 RC 1 component for Joomla! via the name parameter in a view=staff request. | []
| null | null | 9.8 | null |
|
CVE-2010-2214 | Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2213, and CVE-2010-2216. | [
"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:9.0.151.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:10.0.15.3:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
ICSA-17-355-02 | Schneider Electric Pelco VideoXpert Enterprise | By sniffing communications, an unauthorized person can execute a directory traversal attack resulting in authentication bypass or session hijack.CVE-2017-9964 has been assigned to this vulnerability. A CVSS v3 base score of 6.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N). Using a directory traversal attack, an unauthorized person can view web server files.CVE-2017-9965 has been assigned to this vulnerability. A CVSS v3 base score of 5.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N). By replacing certain files, an authorized user can obtain system privileges and the inserted code would execute at an elevated privilege level.CVE-2017-9966 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H). | []
| null | null | 7.1 | null |
CVE-2021-33464 | An issue was discovered in yasm version 1.3.0. There is a heap-buffer-overflow in inc_fopen() in modules/preprocs/nasm/nasm-pp.c. | [
"cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
GHSA-wh4c-fpvw-r5xc | The SULly WordPress plugin before 4.3.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack | []
| null | 5.9 | null | null |
|
cisco-sa-20190501-frpwr-cmd-inj | Cisco Firepower Threat Defense Software Command Injection Vulnerability | A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to perform a command injection attack.
The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting commands into arguments for a specific command. A successful exploit could allow the attacker to execute commands with root privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-cmd-inj ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-cmd-inj"] | []
| null | null | 6 | null |
RHSA-2014:1265 | Red Hat Security Advisory: Red Hat OpenShift Enterprise 1.2 - 75 Day Retirement Notice | This is the 75 day notification for the retirement of Red Hat OpenShift
Enterprise 1.2. | []
| null | null | null | null |
GHSA-cwcx-rxgc-cmw3 | Prototype pollution in 101 | Prototype pollution vulnerability in '101' versions 1.0.0 through 1.6.3 allows an attacker to cause a denial of service and may lead to remote code execution. | []
| null | 9.8 | null | null |
CVE-2017-10160 | Vulnerability in the Primavera P6 Enterprise Project Portfolio Management component of Oracle Primavera Products Suite (subcomponent: Web Access). Supported versions that are affected are 8.3, 8.4, 15.1, 15.2, 16.1 and 16.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:16.2:*:*:*:*:*:*:*"
]
| null | null | 4.3 | 4 |
|
GHSA-6crc-x5g7-hpmc | Emerson XWEB 300D EVO 3.0.7--3ee403 is affected by: unauthenticated arbitrary file deletion due to path traversal. An attacker can browse and delete files without any authentication due to incorrect access control and directory traversal. | []
| null | null | null | null |
|
GHSA-2vj6-p9c5-8h3v | main/translate.c in Sangoma Asterisk 13.28.0 and 16.5.0 allows a remote attacker to send a specific RTP packet during a call and cause a crash in a specific scenario. | []
| null | 7.5 | null | null |
|
CVE-2018-10502 | This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Galaxy Apps Fixed in version 4.2.18.2. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of a staging mode. The issue lies in the ability to change the configuration based on the presence of a file in an user-controlled location. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the application. Was ZDI-CAN-5359. | [
"cpe:2.3:a:samsung:galaxy_apps:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 4.6 |
|
GHSA-3fr5-8rrj-9rf2 | A vulnerability was found in Smart Office up to 20240405. It has been classified as problematic. Affected is an unknown function of the file Main.aspx. The manipulation of the argument New Password/Confirm Password with the input 1 leads to weak password requirements. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-260574 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | []
| 6.3 | 3.7 | null | null |
|
CVE-2006-4878 | Directory traversal vulnerability in footer.php in David Bennett PHP-Post (PHPp) 1.0 and earlier allows remote attackers to read and include arbitrary local files via a .. (dot dot) sequence in the template parameter. NOTE: this was later reported to affect 1.0.1, and demonstrated for code execution by uploading and accessing an avatar file. | [
"cpe:2.3:a:david_bennett:php-post:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2002-0814 | Buffer overflow in VMware Authorization Service for VMware GSX Server 2.0.0 build-2050 allows remote authenticated users to execute arbitrary code via a long GLOBAL argument. | [
"cpe:2.3:a:vmware:gsx_server:2.0.0_build_2050:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2008-2611 | Unspecified vulnerability in the Core RDBMS component in Oracle Database 9.0.1.5 FIPS+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.6 has unknown impact and remote authenticated attack vectors. | [
"cpe:2.3:a:oracle:core_rdbms_component:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle_database:9.0.1.5:*:fips\\+:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle_database:9.2.0.8:dv:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle_database:10.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle_database:11.1.0.6:*:*:*:*:*:*:*"
]
| null | null | null | 4 |
|
GHSA-c49w-rjjr-xgxf | A vulnerability was found in Campcodes Beauty Salon Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/del_category.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235241 was assigned to this vulnerability. | []
| null | null | 6.3 | null |
|
RHSA-2024:2882 | Red Hat Security Advisory: firefox security update | Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
]
| null | 6.1 | null | null |
CVE-2018-8169 | An elevation of privilege vulnerability exists when the (Human Interface Device) HID Parser Library driver improperly handles objects in memory, aka "HIDParser Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:itanium:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:itanium:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*"
]
| null | null | 7 | 6.9 |
|
CVE-2022-49280 | NFSD: prevent underflow in nfssvc_decode_writeargs() | In the Linux kernel, the following vulnerability has been resolved:
NFSD: prevent underflow in nfssvc_decode_writeargs()
Smatch complains:
fs/nfsd/nfsxdr.c:341 nfssvc_decode_writeargs()
warn: no lower bound on 'args->len'
Change the type to unsigned to prevent this issue. | []
| null | 5.5 | null | null |
GHSA-7hjm-px29-rv4v | Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts. | []
| null | null | null | null |
|
GHSA-vmhp-2g3x-cwwq | In readBlock of MatroskaExtractor.cpp, there is a possible denial of service due to resource exhaustion. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-156819528 | []
| null | null | null | null |
|
CVE-2022-34834 | An issue was discovered in VERMEG AgileReporter 21.3. Attackers can gain privileges via an XSS payload in an Add Comment action to the Activity log. | [
"cpe:2.3:a:vermeg:agile_reporter:21.3:*:*:*:*:*:*:*"
]
| null | 4.8 | null | null |
|
GHSA-g3wf-mc3p-8357 | Untrusted search path vulnerability in the Mozilla Updater in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allows local users to gain privileges via a Trojan horse DLL file in an unspecified directory. | []
| null | null | null | null |
|
CVE-2024-11489 | 115cms file.html cross site scripting | A vulnerability was found in 115cms up to 20240807. It has been classified as problematic. Affected is an unknown function of the file /index.php/admin/web/file.html. The manipulation of the argument ks leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:115cms:115cms:*:*:*:*:*:*:*:*"
]
| 5.3 | 3.5 | 3.5 | 4 |
GHSA-w987-g8v2-g8rg | Certain NETGEAR devices are affected by stored XSS. This affects D6200 before 1.1.00.40, D7000 before 1.0.1.78, R6020 before 1.0.0.48, R6080 before 1.0.0.48, R6120 before 1.0.0.66, R6260 before 1.1.0.78, R6700v2 before 1.2.0.76, R6800 before 1.2.0.76, R6900v2 before 1.2.0.76, R6850 before 1.1.0.78, R7200 before 1.2.0.76, R7350 before 1.2.0.76, R7400 before 1.2.0.76, R7450 before 1.2.0.76, AC2100 before 1.2.0.76, AC2400 before 1.2.0.76, AC2600 before 1.2.0.76, RAX35 before 1.0.3.62, and RAX40 before 1.0.3.62. | []
| null | null | null | null |
|
CVE-2018-5728 | Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potentially sensitive information via a /cgi-bin/getSysStatus request, as demonstrated by the Latitude/Longitude of the ship, or satellite details. | [
"cpe:2.3:o:cobham:seatel_121_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cobham:seatel_121:-:*:*:*:*:*:*:*"
]
| null | null | 5.3 | 5 |
|
CVE-2017-7035 | An issue was discovered in certain Apple products. macOS before 10.12.6 is affected. The issue involves the "Intel Graphics Driver" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 9.3 |
|
GHSA-hxmr-8629-frhp | A condition for session fixation vulnerability [CWE-384] in the session management of FortiWeb versions 6.4 all versions, 6.3.0 through 6.3.16, 6.2.0 through 6.2.6, 6.1.0 through 6.1.2, 6.0.0 through 6.0.7, 5.9.0 through 5.9.1 may allow a remote, unauthenticated attacker to infer the session identifier of other users and possibly usurp their session. | []
| null | 9.8 | null | null |
|
CVE-2021-27933 | pfSense 2.5.0 allows XSS via the services_wol_edit.php Description field. | [
"cpe:2.3:a:pfsense:pfsense:2.5.0:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2008-1878 | Stack-based buffer overflow in the demux_nsf_send_chunk function in src/demuxers/demux_nsf.c in xine-lib 1.1.12 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long NSF title. | [
"cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2000-0274 | The Linux trustees kernel patch allows attackers to cause a denial of service by accessing a file or directory with a long name. | [
"cpe:2.3:o:bray_systems:linux_trustees:1.5:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
CVE-2025-23100 | An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400. The absence of a NULL check leads to a Denial of Service. | []
| null | 7.5 | null | null |
|
GHSA-w754-gq8r-pf5f | MiniMagick Gem for Ruby URI Handling Arbitrary Command Injection | `lib/mini_magick.rb` in the MiniMagick Gem 1.3.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL. | []
| null | null | null | null |
CVE-2022-1171 | Vertical scroll recent post < 14.0 - Reflected Cross-Site Scripting | The Vertical scroll recent post WordPress plugin before 14.0 does not sanitise and escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting | [
"cpe:2.3:a:vertical_scroll_recent_post_project:vertical_scroll_recent_post:*:*:*:*:*:wordpress:*:*"
]
| null | 6.1 | null | 4.3 |
CVE-2015-5455 | Cross-site scripting (XSS) vulnerability in X-Cart 4.5.0 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors to install/. | [
"cpe:2.3:a:qualiteam:x-cart:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-pp35-5943-78rv | A stored-self XSS exists in web/skins/classic/views/controlcaps.php of ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in a vulnerable field via a long NAME or PROTOCOL to the index.php?view=controlcaps URI. | []
| null | null | 6.1 | null |
|
RHSA-2022:0826 | Red Hat Security Advisory: .NET 6.0 security and bugfix update | dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 6.3 | null | null |
GHSA-m2x6-ffx8-32q3 | Missing Authorization vulnerability in websoudan MW WP Form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects MW WP Form: from n/a through 4.4.5. | []
| null | 5.3 | null | null |
|
GHSA-pvw4-9q37-8pfv | Directory traversal vulnerability in index.php in Archangel Weblog 0.90.02 allows remote attackers to read arbitrary files via a .. (dot dot) in the index parameter. | []
| null | null | null | null |
|
CVE-2017-7834 | A "data:" URL loaded in a new tab did not inherit the Content Security Policy (CSP) of the original page, allowing for bypasses of the policy including the execution of JavaScript. In prior versions when "data:" documents also inherited the context of the original page this would allow for potential cross-site scripting (XSS) attacks. This vulnerability affects Firefox < 57. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
GHSA-8w8q-fcp2-6wqf | The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to time-based SQL Injection via the ‘course_id’ parameter in all versions up to, and including, 2.7.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with admin access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | []
| null | 7.2 | null | null |
|
CVE-2021-34779 | Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities | Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities. | [
"cpe:2.3:o:cisco:business_220-8t-e-2g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-8t-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-8p-e-2g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-8p-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-8fp-e-2g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-8fp-e-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-16t-2g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-16t-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-16p-2g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-16p-2g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-24t-4g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-24t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-24p-4g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-24p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-24fp-4g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-24fp-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-48t-4g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-48t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-48p-4g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-48p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-24t-4x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-24t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-24p-4x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-24p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-24fp-4x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-24fp-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-48t-4x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-48t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-48p-4x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-48p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:business_220-48fp-4x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:business_220-48fp-4x:-:*:*:*:*:*:*:*"
]
| null | 4.3 | null | null |
GHSA-4gjv-5jjp-rcgh | HashBrown CMS RCE | A remote code execution issue was discovered in HashBrown CMS through 1.3.3. `Server/Entity/Deployer/GitDeployer.js` has a `Service.AppService.exec call` that mishandles the URL, repository, username, and password. | []
| null | 9.8 | null | null |
GHSA-97hp-rfmm-2c7w | An issue was discovered in Barrier before 2.3.4. An unauthenticated attacker can cause a segmentation fault in the barriers component (aka the server-side implementation of Barrier) by quickly opening and closing TCP connections while sending a Hello message for each TCP session. | []
| null | null | null | null |
|
RHSA-2023:4416 | Red Hat Security Advisory: iperf3 security update | iperf3: memory allocation hazard and crash | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
]
| null | 7.5 | null | null |
CVE-2009-1507 | The Node Access User Reference module 5.x before 5.x-2.0-beta4 and 6.x before 6.x-2.0-beta6, a module for Drupal, interprets an empty CCK user reference as a reference to the anonymous user, which might allow remote attackers to bypass intended access restrictions to read or modify a node. | [
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:5.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:5.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:5.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:5.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:5.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:5.x-2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:5.x-2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:5.x-2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:6.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:6.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:6.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:6.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:6.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:6.x-1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:6.x-1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:6.x-2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:6.x-2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:6.x-2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:6.x-2.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodeaccess_userreference:6.x-2.0:beta5:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-qxcq-52f6-pv7g | Adobe After Effects versions 24.0.3 (and earlier) and 23.6.0 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
| null | 7.8 | null | null |
|
CVE-2023-44156 | Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. | [
"cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 5.7 | null |
|
GHSA-72cx-5ff9-4hhc | Cross-site scripting in markdown2 for python | python-markdown2 before 1.0.1.14 has multiple cross-site scripting (XSS) issues. | []
| 5.3 | 6.1 | null | null |
GHSA-vw56-2pmm-v9m9 | A information disclosure vulnerability in the Android framework (aosp email application). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-71814449. | []
| null | null | 5.3 | null |
|
CVE-2024-37271 | WordPress Print My Blog plugin <= 3.27.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael Nelson Print My Blog allows Stored XSS.This issue affects Print My Blog: from n/a through 3.27.0. | [
"cpe:2.3:a:print_my_blog_project:print_my_blog:*:*:*:*:*:wordpress:*:*"
]
| null | 5.9 | null | null |
GHSA-38c3-4g28-2w4g | Implicit Intent hijacking vulnerability in Samsung Account prior to version 13.2.00.6 allows attackers to get email ID. | []
| null | 5.3 | null | null |
|
GHSA-92f8-4rq9-x3m2 | A vulnerability was found in Intergard SGS 8.7.0. It has been declared as problematic. This vulnerability affects unknown code of the component SQL Query Handler. The manipulation leads to cleartext transmission of sensitive information. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-234448. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | []
| null | null | 3.7 | null |
|
CVE-2022-3190 | Infinite loop in the F5 Ethernet Trailer protocol dissector in Wireshark 3.6.0 to 3.6.7 and 3.4.0 to 3.4.15 allows denial of service via packet injection or crafted capture file | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
]
| null | 6.3 | null | null |
|
CVE-2018-1002001 | There is a reflected XSS vulnerability in WordPress Arigato Autoresponder and News letter v2.5.1.8 This vulnerability requires administrative privileges to exploit. | [
"cpe:2.3:a:kibokolabs:arigato_autoresponder_and_newsletter:2.5.1.8:*:*:*:*:wordpress:*:*"
]
| null | null | 4.8 | 3.5 |
|
GHSA-7cm4-vmf2-8wf2 | Dolibarr vulnerable to Eval Injection | Dolibarr ERP & CRM <=15.0.3 are vulnerable to Eval injection. By default, any administrator can be added to the installation page of dolibarr, and if successfully added, malicious code can be inserted into the database and then execute it by eval. | []
| null | 9.8 | null | null |
GHSA-hxq4-v53v-rh4h | in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through improper preservation of permissions. | []
| null | 4 | null | null |
|
CVE-2008-2335 | Cross-site scripting (XSS) vulnerability in search_results.php in Vastal I-Tech phpVID 1.1 and 1.2 allows remote attackers to inject arbitrary web script or HTML via the query parameter. NOTE: some of these details are obtained from third party information. NOTE: it was later reported that 1.2.3 is also affected. | [
"cpe:2.3:a:vastal:phpvid:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vastal:phpvid:1.2:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2016-8827 | NVIDIA GeForce Experience 3.x before GFE 3.1.0.52 contains a vulnerability in NVIDIA Web Helper.exe where a local web API endpoint, /VisualOPS/v.1.0./, lacks proper access control and parameter validation, allowing for information disclosure via a directory traversal attack. | [
"cpe:2.3:a:nvidia:geforce_experience:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 5 |
|
CVE-2019-6778 | In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow. | [
"cpe:2.3:a:qemu:qemu:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 4.6 |
|
GHSA-rp5m-xq4p-5f64 | Palantir discovered a software bug in a recently released version of Foundry’s Lime2 service, one of the services backing the Ontology. The software bug has been fixed and the fix has been deployed to your hosted Foundry environment. The vulnerability allowed authenticated users within a Foundry organization to potentially bypass discretionary or mandatory access controls under certain circumstances. | []
| null | 7.6 | null | null |
|
RHSA-2022:0114 | Red Hat Security Advisory: OpenShift Container Platform 4.7.41 security update | haproxy: an HTTP method name may contain a space followed by the name of a protected resource haproxy: request smuggling attack or response splitting via duplicate content-length header | [
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
]
| null | 7.5 | null | null |
CVE-2021-24807 | Support Board < 3.3.5 - Agent+ Stored Cross-Site Scripting | The Support Board WordPress plugin before 3.3.5 allows Authenticated (Agent+) users to perform Cross-Site Scripting attacks by placing a payload in the notes field, when an administrator or any authenticated user go to the chat the XSS will be automatically executed. | [
"cpe:2.3:a:schiocco:support_board:*:*:*:*:*:wordpress:*:*"
]
| null | 5.4 | null | 3.5 |
CVE-2020-12494 | Beckhoff: Etherleak in TwinCAT RT network driver | Beckhoff's TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if their payload is less than the minimum Ethernet frame size. Instead, arbitrary memory content is transmitted within in the padding bytes of the frame. Most likely this memory contains slices from previously transmitted or received frames. By this method, memory content is disclosed, however, an attacker can hardly control which memory content is affected. For example, the disclosure can be provoked with small sized ICMP echo requests sent to the device. | [
"cpe:2.3:a:beckhoff:twincat_driver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:beckhoff:twincat:3.1:build_4024:*:*:*:*:*:*",
"cpe:2.3:h:intel:82540em:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:82540ep:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:82541ei:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:82541er:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:82541gi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:82541pi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:82544ei:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:82544gc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:82545em:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:82545gm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:82546eb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:82546gb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:82547ei:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:82547gi:-:*:*:*:*:*:*:*",
"cpe:2.3:a:beckhoff:twincat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:beckhoff:twincat:3.1:build_4022:*:*:*:*:*:*",
"cpe:2.3:h:intel:82547ei_:-:*:*:*:*:*:*:*",
"cpe:2.3:a:beckhoff:twincat:2.11:build_2350:*:*:*:*:*:*",
"cpe:2.3:a:beckhoff:twincat:3.1:build_402:*:*:*:*:*:*",
"cpe:2.3:h:intel:82557:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:82558:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:82559:-:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
RHSA-2025:9491 | Red Hat Security Advisory: kernel security update | kernel: ndisc: use RCU protection in ndisc_alloc_skb() | [
"cpe:/a:redhat:rhel_e4s:9.2::appstream",
"cpe:/o:redhat:rhel_e4s:9.2::baseos"
]
| null | 7 | null | null |
GHSA-fm6f-p7x5-jw7x | Multiple SQL injection vulnerabilities in SaralBlog 1.0 allow remote attackers to execute arbitrary SQL commands via the search parameter to search.php. NOTE: the id/viewprofile.php issue is already covered by CVE-2005-4058. | []
| null | null | null | null |
|
CVE-2023-30410 | Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component ecma_op_function_construct at /operations/ecma-function-object.c. | [
"cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
GHSA-x3w8-63xm-cwmm | The KRandom::random function in KDE Paste Applet after 4.10.5 in kdeplasma-addons uses the GNU C Library rand function's linear congruential generator, which makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms by predicting the generator output. | []
| null | 5.5 | null | null |
|
GHSA-4vvg-656r-c25j | Specially crafted PROFINET DCP broadcast packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected. | []
| 7.1 | 6.5 | null | null |
|
CVE-2024-24023 | A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior. An attacker can pass specially crafted offset, limit, and sort parameters to perform SQL injection via /novel/bookContent/list. | [
"cpe:2.3:a:xxyopen:novel-plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xxyopen:novel-plus:4.3.0:rc1:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-r78p-68cf-g4q9 | Tollgrade SmartGrid LightHouse Sensor Management System (SMS) Software EMS before 5.1, and 4.1.0 Build 16, allows remote attackers to obtain sensitive report and username information via unspecified vectors. | []
| null | null | 5.3 | null |
|
ICSA-21-357-01 | Moxa MGate Protocol Gateways | The affected products contain vulnerable firmware, which could allow an attacker to sniff the traffic and decrypt login credential details. This could give an attacker admin rights through the HTTP web server.CVE-2021-4161has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | []
| null | null | 9.8 | null |
CVE-2006-3288 | Unspecified vulnerability in the TFTP server in Cisco Wireless Control System (WCS) for Linux and Windows before 3.2(51), when configured to use a directory path name that contains a space character, allows remote authenticated users to read and overwrite arbitrary files via unspecified vectors. | [
"cpe:2.3:h:cisco:wireless_control_system:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-prwq-fx78-ppf8 | Power management (Powermanagement) on Solaris 2.4 through 2.6 does not start the xlock process until after the sys-suspend has completed, which allows an attacker with physical access to input characters to the last active application from the keyboard for a short period after the system is restoring, which could lead to increased privileges. | []
| null | null | null | null |
|
GHSA-7g62-fhrq-8725 | A vulnerability classified as critical has been found in SourceCodester Payroll Management System 1.0. This affects the function login of the file main. The manipulation leads to buffer overflow. The exploit has been disclosed to the public and may be used. | []
| 5.3 | 6.3 | null | null |
|
GHSA-r75f-cj9v-2727 | The WordPress File Sharing Plugin WordPress plugin before 2.0.5 does not check authorization before displaying files and folders, allowing users to gain access to those filed by manipulating IDs which can easily be brute forced | []
| null | 4.3 | null | null |
|
GHSA-wx53-3c9r-58r2 | A stack-based buffer overflow in the Command Centre Server allows an attacker to cause a denial of service attack via assigning cardholders to an Access Group.This issue affects Command Centre: vEL8.80 prior to vEL8.80.1192 (MR2) | []
| null | 6.5 | null | null |
|
CVE-2020-6114 | An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. | [
"cpe:2.3:a:icehrm:icehrm:26.6.0.os:*:*:*:*:*:*:*"
]
| null | null | 6.6 | null |
|
GHSA-g4x6-6pvc-599g | An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves the "ImageIO" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted JPEG file. | []
| null | null | 7.8 | null |
|
GHSA-53r8-8fv7-2f9c | The KASKUS (aka com.kaskus.android) application 2.13.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
| null | null | null | null |
|
cisco-sa-20191016-airo-pptp-dos | Cisco Aironet Access Points Point-to-Point Tunneling Protocol Denial of Service Vulnerability | A vulnerability in the Point-to-Point Tunneling Protocol (PPTP) VPN packet processing functionality in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.
The vulnerability is due to insufficient validation of Generic Routing Encapsulation (GRE) frames that pass through the data plane of an affected AP. An attacker could exploit this vulnerability by associating to a vulnerable AP, initiating a PPTP VPN connection to an arbitrary PPTP VPN server, and sending a malicious GRE frame through the data plane of the AP. A successful exploit could allow the attacker to cause an internal process of the targeted AP to crash, which in turn would cause the AP to reload. The AP reload would cause a DoS condition for clients that are associated with the AP.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-airo-pptp-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-airo-pptp-dos"] | []
| null | null | 8.6 | null |
cisco-sa-nxos-mpls-oam-dos-sGO9x5GM | Cisco NX-OS Software MPLS OAM Denial of Service Vulnerability | A vulnerability in the MPLS Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper input validation when an affected device is processing an MPLS echo-request or echo-reply packet. An attacker could exploit this vulnerability by sending malicious MPLS echo-request or echo-reply packets to an interface that is enabled for MPLS forwarding on the affected device. A successful exploit could allow the attacker to cause the MPLS OAM process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the August 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: August 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74640"]. | []
| null | 8.6 | null | null |
GHSA-xqww-pvrp-pccm | The Import any XML or CSV File to WordPress plugin before 3.6.3 does not escape the Import's Title and Unique Identifier fields before outputting them in admin pages, which could allow high privilege users to perform Cross-Site attacks even when the unfiltered_html capability is disallowed. | []
| null | null | null | null |
|
GHSA-xxfm-q6cq-gcwc | Buffer overflow in O'Reilly WebSite Professional web server 2.4 and earlier allows remote attackers to execute arbitrary commands via a long GET request or Referrer header. | []
| null | null | null | null |
|
RHSA-2024:4873 | Red Hat Security Advisory: Apicurio Registry (container images) release and security update [ 2.6.1 GA ] | jose4j: denial of service via specially crafted JWE quarkus-core: Leak of local configuration properties into Quarkus applications jetty: stop accepting new connections from valid clients express: cause malformed URLs to be evaluated webpack-dev-middleware: lack of URL validation may lead to file leak | [
"cpe:/a:redhat:apicurio_registry:2.6"
]
| null | 7.4 | null | null |
CVE-2023-35883 | WordPress Core Web Vitals & PageSpeed Booster Plugin <= 1.0.12 is vulnerable to Open Redirection | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Magazine3 Core Web Vitals & PageSpeed Booster.This issue affects Core Web Vitals & PageSpeed Booster: from n/a through 1.0.12.
| [
"cpe:2.3:a:magazine3:core_web_vitals_\\&_pagespeed_booster:*:*:*:*:*:wordpress:*:*"
]
| null | 4.7 | null | null |
GHSA-98mf-qrx3-4856 | Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. | []
| null | 5.7 | null | null |
|
CVE-2015-6416 | Cross-site scripting (XSS) vulnerability in Cisco Unified Email Interaction Manager and Unified Web Interaction Manager 11.0(1) allows remote attackers to inject arbitrary web script or HTML a crafted URL, aka Bug ID CSCuw24479. | [
"cpe:2.3:a:cisco:unified_web_and_e-mail_interaction_manager:11.0\\(1\\):*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-7qpw-2j9m-rw8c | usememos/memos has Insufficient Granularity of Access Control | An Insufficient Granularity of Access Control in usememos/memos prior to 0.9.0 can allow an attacker to delete a memo from the archives. | []
| null | 4.3 | null | null |
ICSA-14-189-02 | Innominate mGuard Unauthorized Leakage of System Data | Innominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request. | []
| null | null | null | null |
GHSA-33g4-2m49-x49h | The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to SQL Injection via shortcode in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor level access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | []
| null | 8.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.