id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
RHSA-2019:1821 | Red Hat Security Advisory: rh-nodejs8-nodejs security update | nodejs: HTTP request splitting nodejs: Denial of Service with large HTTP headers nodejs: Slowloris HTTP Denial of Service nodejs: Hostname spoofing in URL parser for javascript protocol nodejs-tar: Arbitrary file overwrites when extracting tarballs containing a hard-link nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | null | 5.3 | null |
CVE-2021-1389 | Cisco IOS XR and Cisco NX-OS Software IPv6 Access Control List Bypass Vulnerability | A vulnerability in the IPv6 traffic processing of Cisco IOS XR Software and Cisco NX-OS Software for certain Cisco devices could allow an unauthenticated, remote attacker to bypass an IPv6 access control list (ACL) that is configured for an interface of an affected device. The vulnerability is due to improper processing of IPv6 traffic that is sent through an affected device. An attacker could exploit this vulnerability by sending crafted IPv6 packets that traverse the affected device. A successful exploit could allow the attacker to access resources that would typically be protected by the interface ACL. | [
"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_540:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5501-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5502-se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ncs_560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9500_r:-:*:*:*:*:*:*:*"
]
| null | 5.8 | null | null |
CVE-2023-38531 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.184), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. | [
"cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*"
]
| 7.3 | 7.8 | null | null |
|
GHSA-84mh-m38q-m9vh | A vulnerability, which was classified as problematic, was found in spa-cartcms 1.9.0.6. Affected is an unknown function of the file /login of the component Username Handler. The manipulation of the argument email leads to observable behavioral discrepancy. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268896. | []
| 6.3 | 3.7 | null | null |
|
GHSA-r3p5-rg8r-jfcj | SQL injection vulnerability in the do_mmod function in mod.php in Invision Community Blog (ICB) 1.1.2 final through 1.2 allows remote attackers with moderator privileges to execute arbitrary SQL commands via the selectedbids parameter. | []
| null | null | null | null |
|
GHSA-fc4r-fxrx-hcf5 | In versions 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and 13.1.x before 13.1.5.1, When the Advanced WAF / ASM module is provisioned, an authenticated remote code execution vulnerability exists in the BIG-IP iControl REST interface. | []
| null | 7.2 | null | null |
|
CVE-2019-14497 | ModuleEditor::convertInstrument in tracker/ModuleEditor.cpp in MilkyTracker 1.02.00 has a heap-based buffer overflow. | [
"cpe:2.3:a:milkytracker_project:milkytracker:1.02.00:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 6.8 |
|
CVE-2025-25683 | AlekSIS-Core is vulnerable to Incorrect Access Control. Unauthenticated users can access all PDF files. This affects AlekSIS-Core 3.0, 3.1, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.2.0 and 3.2.1. | []
| null | 5.6 | null | null |
|
CVE-2024-22145 | WordPress InstaWP Connect plugin <= 0.1.0.8 - Arbitrary Option Update to Privilege Escalation vulnerability | Improper Privilege Management vulnerability in InstaWP Team InstaWP Connect allows Privilege Escalation.This issue affects InstaWP Connect: from n/a through 0.1.0.8. | [
"cpe:2.3:a:instawp:instawp_connect:*:*:*:*:*:wordpress:*:*"
]
| null | 8.8 | null | null |
GHSA-c5p3-3427-5gqc | The Kubernetes integration in GitLab Enterprise Edition 11.x before 11.2.8, 11.3.x before 11.3.9, and 11.4.x before 11.4.4 has SSRF. | []
| null | null | 10 | null |
|
GHSA-m6p3-qgmc-f6gj | Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via parameter openvpn_server_ip. | []
| null | 9.8 | null | null |
|
CVE-2024-2302 | The Easy Digital Downloads – Sell Digital Files & Subscriptions (eCommerce Store + Payments Made Easy) plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.2.9. This makes it possible for unauthenticated attackers to download the debug log via Directory Listing. This file may include PII. | [
"cpe:2.3:a:easydigitaldownloads:easy_digital_downloads:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
|
CVE-2015-8434 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2025-6555 | Use after free in Animation in Google Chrome prior to 138.0.7204.49 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) | []
| null | 5.4 | null | null |
|
GHSA-7j7q-rhh5-35vh | Directory traversal vulnerability in SimpleCam 1.2 allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the URL. | []
| null | null | null | null |
|
CVE-2022-31195 | Path traversal vulnerability in Simple Archive Format package import in DSpace | DSpace open source software is a repository application which provides durable access to digital resources. In affected versions the ItemImportServiceImpl is vulnerable to a path traversal vulnerability. This means a malicious SAF (simple archive format) package could cause a file/directory to be created anywhere the Tomcat/DSpace user can write to on the server. However, this path traversal vulnerability is only possible by a user with special privileges (either Administrators or someone with command-line access to the server). This vulnerability impacts the XMLUI, JSPUI and command-line. Users are advised to upgrade. As a basic workaround, users may block all access to the following URL paths: If you are using the XMLUI, block all access to /admin/batchimport path (this is the URL of the Admin Batch Import tool). Keep in mind, if your site uses the path "/xmlui", then you'd need to block access to /xmlui/admin/batchimport. If you are using the JSPUI, block all access to /dspace-admin/batchimport path (this is the URL of the Admin Batch Import tool). Keep in mind, if your site uses the path "/jspui", then you'd need to block access to /jspui/dspace-admin/batchimport. Keep in mind, only an Administrative user or a user with command-line access to the server is able to import/upload SAF packages. Therefore, assuming those users do not blindly upload untrusted SAF packages, then it is unlikely your site could be impacted by this vulnerability. | [
"cpe:2.3:a:duraspace:dspace:*:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
GHSA-4fqx-74rv-638w | Pivotal Concourse SQL Injection Vulnerability | Pivotal Concourse version 5.0.0, contains an API that is vulnerable to SQL injection. An Concourse resource can craft a version identifier that can carry a SQL injection payload to the Concourse server, allowing the attacker to read privileged data. | []
| null | null | 7.5 | null |
CVE-2018-10404 | An issue was discovered in Objective-See KnockKnock, LuLu, TaskExplorer, WhatsYourSign, and procInfo. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute. | [
"cpe:2.3:a:objective-see:knockknock:*:*:*:*:*:*:*:*",
"cpe:2.3:a:objective-see:lulu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:objective-see:procinfo:-:*:*:*:*:*:*:*",
"cpe:2.3:a:objective-see:taskexplorer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:objective-see:whatsyoursign:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 6.8 |
|
CVE-2007-5635 | Multiple unspecified vulnerabilities in Salford Software Support Incident Tracker (SiT!) before 3.30 have unknown impact and attack vectors. | [
"cpe:2.3:a:sitracker:support_incident_tracker:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:1.8.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:2.8.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.00:beta1:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.03:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.03a:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.04a:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.05:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.06:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.07:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.07.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.07.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.07.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.08:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.08.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.09:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.19:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.22pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.23:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.24:beta-2:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:3.24:beta2:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:10.8.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:11.8.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:14.8.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:16.8.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:17.8.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:18.8.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sitracker:support_incident_tracker:21.8.00:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-w9hq-895r-49wg | A vulnerability was found in SourceCodester Apartment Visitor Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /add-apartment.php. The manipulation of the argument buildingno leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected. | []
| 5.3 | 6.3 | null | null |
|
GHSA-hqr5-32x6-7hw9 | The REST API | Custom API Generator For Cross Platform And Import Export In WP plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the process_handler() function in versions 1.0.0 to 2.0.3. This makes it possible for unauthenticated attackers to POST an arbitrary import_api URL, import specially crafted JSON, and thereby create a new user with full Administrator privileges. | []
| null | 9.8 | null | null |
|
CVE-2016-9311 | ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet. | [
"cpe:2.3:a:ntp:ntp:*:p8:*:*:*:*:*:*"
]
| null | null | 5.9 | 7.1 |
|
CVE-2021-24820 | Cost Calculator <= 1.6 - Authenticated Local File Inclusion | The Cost Calculator WordPress plugin through 1.6 allows authenticated users (Contributor+ in versions < 1.5, and Admin+ in versions <= 1.6) to perform path traversal and local PHP file inclusion on Windows Web Servers via the Cost Calculator post's Layout | [
"cpe:2.3:a:bold-themes:cost_calculator:*:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | 4 |
GHSA-ff2j-rwgx-m3hr | Improper Privilege Management vulnerability in eyecix JobSearch allows Privilege Escalation.This issue affects JobSearch: from n/a through 2.3.4. | []
| null | 9.8 | null | null |
|
CVE-2022-3715 | A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems. | [
"cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
CVE-2014-9453 | Multiple cross-site scripting (XSS) vulnerabilities in simple-visitor-stat.php in the Simple visitor stat plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) HTTP User-Agent or (2) HTTP Referer header. | [
"cpe:2.3:a:simple_visitor_stat_project:simple_visitor_stat:-:*:*:*:*:wordpress:*:*"
]
| null | null | null | 4.3 |
|
CVE-2017-9967 | A security misconfiguration vulnerability exists in Schneider Electric's IGSS SCADA Software versions 12 and prior. Security configuration settings such as Address Space Layout Randomization (ASLR) and Data Execution prevention (DEP) were not properly configured resulting in weak security. | [
"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 4.6 |
|
CVE-2015-4612 | SQL injection vulnerability in the "FAQ - Frequently Asked Questions" (js_faq) extension before 1.2.1 for TYPO3 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:faq-frequenty_asked_questions_project:faq-frequently_asked_questions:*:*:*:*:*:typo3:*:*"
]
| null | null | null | 6.5 |
|
CVE-2023-38690 | matrix-appservice-irc IRC command injection via admin commands containing newlines | matrix-appservice-irc is a Node.js IRC bridge for Matrix. Prior to version 1.0.1, it is possible to craft a command with newlines which would not be properly parsed. This would mean you could pass a string of commands as a channel name, which would then be run by the IRC bridge bot. Versions 1.0.1 and above are patched. There are no robust workarounds to the bug. One may disable dynamic channels in the config to disable the most common execution method but others may exist. | [
"cpe:2.3:a:matrix-org:matrix-appservice-irc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:matrix:matrix_irc_bridge:*:*:*:*:*:node.js:*:*"
]
| null | 5.8 | null | null |
CVE-2023-34321 | arm32: The cache may not be properly cleaned/invalidated | Arm provides multiple helpers to clean & invalidate the cache
for a given region. This is, for instance, used when allocating
guest memory to ensure any writes (such as the ones during scrubbing)
have reached memory before handing over the page to a guest.
Unfortunately, the arithmetics in the helpers can overflow and would
then result to skip the cache cleaning/invalidation. Therefore there
is no guarantee when all the writes will reach the memory.
| [
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*"
]
| null | 3.3 | null | null |
GHSA-wjwq-mx92-m26p | SQL injection vulnerability in charts.php in the Chart mod for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter. | []
| null | null | null | null |
|
GHSA-cw7w-cfpj-r652 | In the Linux kernel, the following vulnerability has been resolved:PM: EM: Fix potential division-by-zero error in em_compute_costs()When the device is of a non-CPU type, table[i].performance won't be
initialized in the previous em_init_performance(), resulting in division
by zero when calculating costs in em_compute_costs().Since the 'cost' algorithm is only used for EAS energy efficiency
calculations and is currently not utilized by other device drivers, we
should add the _is_cpu_device(dev) check to prevent this division-by-zero
issue. | []
| null | null | null | null |
|
CVE-2022-49921 | net: sched: Fix use after free in red_enqueue() | In the Linux kernel, the following vulnerability has been resolved:
net: sched: Fix use after free in red_enqueue()
We can't use "skb" again after passing it to qdisc_enqueue(). This is
basically identical to commit 2f09707d0c97 ("sch_sfb: Also store skb
len before calling child enqueue"). | []
| null | 7.8 | null | null |
CVE-2020-5310 | libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc. | [
"cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
GHSA-7pwx-q393-6cwf | Improper Privilege Management vulnerability in upKeeper Solutions upKeeper Instant Privilege Access allows Privilege Abuse.This issue affects upKeeper Instant Privilege Access: before 1.4.0. | []
| 8.6 | null | null | null |
|
RHSA-2021:3934 | Red Hat Security Advisory: OpenShift Container Platform 4.9.4 packages and security update | coreos-installer: incorrect signature verification on gzip-compressed install images | [
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
]
| null | 7.5 | null | null |
GHSA-wp3w-g939-hq9w | IBM QRadar Suite Products 1.10.12.0 through 1.10.18.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could disclose sensitive information using man in the middle techniques due to not correctly enforcing all aspects of certificate validation in some circumstances. IBM X-Force ID: 272533. | []
| null | 5.9 | null | null |
|
CVE-2006-5964 | choShilA.bpl in PentaZip 8.5.1.190 and PentaSuite-PRO 8.5.1.221 allows local users, and user-assisted remote attackers to cause a denial of service (system crash) by right clicking on a file with a long filename. | [
"cpe:2.3:a:pentaware:pentasuite-pro:8.5.1.221:*:*:*:*:*:*:*",
"cpe:2.3:a:pentaware:pentazip:8.5.1.190:*:*:*:*:*:*:*"
]
| null | null | null | 7.1 |
|
GHSA-vwc8-vmvr-qqcf | An issue was discovered in Couchbase Server 6.6.x through 7.2.0, before 7.1.5 and 7.2.1. Unauthenticated users may cause memcached to run out of memory via large commands. | []
| null | 7.5 | null | null |
|
CVE-2006-6287 | Stack-based buffer overflow in AtomixMP3 2.3 and earlier allows remote attackers to execute arbitrary code via a long pathname in an M3U file. | [
"cpe:2.3:a:atomix_productions:atomixmp3:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-3875-qp8f-c4m6 | Adobe Experience Manager versions 6.5, 6.4, 6.3, 6.2, 6.1, and 6.0 have a reflected cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure. | []
| null | null | null | null |
|
CVE-2016-0526 | Unspecified vulnerability in the Oracle CRM Technical Foundation component in Oracle E-Business Suite 11.5.10.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect integrity via unknown vectors related to Wireless Framework. | [
"cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.5:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-ffgr-2fqr-wrm5 | The Rules Service in Websense Email Security before 7.1 allows remote attackers to cause a denial of service (service crash) via an attachment with a crafted size. | []
| null | null | null | null |
|
CVE-2023-45320 | Uncontrolled search path element in some Intel(R) VTune(TM) Profiler software before version 2024.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:*"
]
| null | 6.7 | null | null |
|
GHSA-6785-cq9h-6279 | SQL injection vulnerability in print.php in SimpleNews 1.0.0 FINAL allows remote attackers to execute arbitrary SQL commands via the news_id parameter. | []
| null | null | null | null |
|
CVE-2022-37410 | Improper access control for some Intel(R) Thunderbolt driver software before version 89 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:thunderbolt_dch_driver:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:thunderbolt_non-dch_driver:-:*:*:*:*:windows:*:*"
]
| null | 7 | null | null |
|
CVE-2009-2517 | The kernel in Microsoft Windows Server 2003 SP2 does not properly handle unspecified exceptions when an error condition occurs, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Exception Handler Vulnerability." | [
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*"
]
| null | null | null | 4.9 |
|
GHSA-wx8q-4gm9-rj2g | Fluid vulnerable to OS Command Injection for Fluid Users with JuicefsRuntime | ImpactOS command injection vulnerability within the Fluid project's JuicefsRuntime can potentially allow an authenticated user, who has the authority to create or update the K8s CRD Dataset/JuicefsRuntime, to execute arbitrary OS commands within the juicefs related containers. This could lead to unauthorized access, modification or deletion of data.PatchesFor users who're using version < 0.9.3 with JuicefsRuntime, upgrade to v0.9.3.References_Are there any links users can visit to find out more?_CreditsSpecial thanks to the discovers of this issue:Xiaozheng Zhang [[email protected]]([email protected]) | []
| null | 4 | null | null |
GHSA-m5cv-jfxj-8vmh | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.22 and prior to 7.1.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L). | []
| null | 5.3 | null | null |
|
GHSA-4wp8-c9m8-94qj | The RSVP feature in Cisco IOS 15.0 and 15.1 and IOS XE 3.2.xS through 3.4.xS before 3.4.2S, when a VRF interface is configured, allows remote attackers to cause a denial of service (interface queue wedge and service outage) via crafted RSVP packets, aka Bug ID CSCts80643. | []
| null | null | null | null |
|
GHSA-483m-372f-vxc5 | In Octopus Deploy 2018.8.0 through 2018.9.x before 2018.9.1, an authenticated user with permission to modify deployment processes could upload a maliciously crafted YAML configuration, potentially allowing for remote execution of arbitrary code, running in the same context as the Octopus Server (for self-hosted installations by default, SYSTEM). | []
| null | null | 8.8 | null |
|
CVE-2020-5234 | Untrusted data can lead to DoS attack in MessagePack for C# and Unity | MessagePack for C# and Unity before version 1.9.11 and 2.1.90 has a vulnerability where untrusted data can lead to DoS attack due to hash collisions and stack overflow. Review the linked GitHub Security Advisory for more information and remediation steps. | [
"cpe:2.3:a:messagepack:messagepack:*:*:*:*:*:c\\#:*:*",
"cpe:2.3:a:messagepack:messagepack:2.0.94:alpha:*:*:*:c\\#:*:*",
"cpe:2.3:a:messagepack:messagepack:2.0.110:alpha:*:*:*:c\\#:*:*",
"cpe:2.3:a:messagepack:messagepack:2.0.119:beta:*:*:*:c\\#:*:*",
"cpe:2.3:a:messagepack:messagepack:2.0.123:beta:*:*:*:c\\#:*:*",
"cpe:2.3:a:messagepack:messagepack:2.0.204:beta:*:*:*:c\\#:*:*",
"cpe:2.3:a:messagepack:messagepack:2.0.270:rc:*:*:*:c\\#:*:*",
"cpe:2.3:a:messagepack:messagepack:2.0.299:rc:*:*:*:c\\#:*:*"
]
| null | 4.8 | null | null |
GHSA-mpwj-mvw9-22cp | Multiple cross-site scripting (XSS) vulnerabilities in (1) dojox/form/resources/uploader.swf (aka upload.swf), (2) dojox/form/resources/fileuploader.swf (aka fileupload.swf), (3) dojox/av/resources/audio.swf, and (4) dojox/av/resources/video.swf in the IBM Dojo Toolkit, as used in IBM Social Media Analytics 1.3 before IF11 and other products, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | []
| null | null | null | null |
|
GHSA-4q5x-pccq-f9fq | In Bluetooth, there is a possible information disclosure due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-110166350 | []
| null | 5.5 | null | null |
|
RHSA-2015:0042 | Red Hat Security Advisory: cloud-init security, bug fix, and enhancement update | python: ssl.match_hostname() DoS via certificates with specially crafted hostname wildcard patterns | [
"cpe:/a:redhat:rhel_common:6::el6"
]
| null | null | null | null |
GHSA-ghc2-hx3w-jqmp | SaltStack Salt command injection in the Salt-API when using the Salt-SSH client | An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in `salt.utils.thin.gen_thin()` command injection because of different handling of single versus double quotes. This is related to `salt/utils/thin.py`. | []
| null | 9.8 | null | null |
GHSA-32qx-3229-j5m2 | The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client that has this server mounted, because an empty TargetInfo field in an NTLMSSP setup negotiation response is mishandled during session recovery. | []
| null | null | 6.5 | null |
|
CVE-2024-39325 | aimeos/ai-controller-frontend doesn't reset payment status in basket | aimeos/ai-controller-frontend is the Aimeos frontend controller. Prior to versions 2024.04.2, 2023.10.9, 2022.10.8, 2021.10.8, and 2020.10.15, aimeos/ai-controller-frontend doesn't reset the payment status of a user's basket after the user completes a purchase. Versions 2024.04.2, 2023.10.9, 2022.10.8, 2021.10.8, and 2020.10.15 fix this issue.
| [
"cpe:2.3:a:aimeos:aimeos_frontend_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aimeos:aimeos_frontend_controller:2024.04.1:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
GHSA-64q2-22wj-96q3 | Cross-site scripting (XSS) vulnerability in mime/handle.html in cPanel 10 allows remote attackers to inject arbitrary web script or HTML via the (1) file extension or (2) mime-type. | []
| null | null | null | null |
|
GHSA-g6mm-82rq-qf9m | Cross-site scripting (XSS) vulnerability in the REST API in IBM Business Process Manager (BPM) 7.5.x through 7.5.1.2, 8.0.x through 8.0.1.3, 8.5.0 through 8.5.0.1, 8.5.5 through 8.5.5.0, and 8.5.6 through 8.5.6.0 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. | []
| null | null | null | null |
|
GHSA-4f5c-56m7-ww92 | Windows Bluetooth Service Remote Code Execution Vulnerability. | []
| null | 7.5 | null | null |
|
GHSA-294r-xq83-57q9 | The server in Apple FileMaker before 14.0.4 on OS X allows remote attackers to read PHP source code via unspecified vectors. | []
| null | null | 7.5 | null |
|
CVE-2024-6380 | Reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x | A reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session. | [
"cpe:2.3:a:dassult:enovia_collaborative_industry_innovator:*:*:*:*:*:*:*:*"
]
| null | 8.7 | null | null |
CVE-2009-2107 | Multiple cross-site scripting (XSS) vulnerabilities in index.php in Webmedia Explorer (webmex) 5.09 and 5.10 allow remote attackers to inject arbitrary web script or HTML via event handlers such as onmouseover in the (1) search or (2) tag parameters; (3) arbitrary invalid parameter names that are not properly handled when triggered on a column; (4) bookmark parameter in an edit action; or (5) email parameter in a remember action. | [
"cpe:2.3:a:webmediaexplorer:webmedia_explorer:5.09:*:*:*:*:*:*:*",
"cpe:2.3:a:webmediaexplorer:webmedia_explorer:5.10:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
RHSA-2011:1249 | Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update | cumin: broker username/password appears in the log file | [
"cpe:/a:redhat:enterprise_mrg:2::el5"
]
| null | null | null | null |
GHSA-r4gx-p9fr-2xmf | Stack overflow vulnerability in parse_comparison Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file. | []
| null | 5.5 | null | null |
|
GHSA-ffp5-h78m-wj7q | IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX NFS kernel extension to cause a denial of service. IBM X-Force ID: 238640. | []
| null | 6.2 | null | null |
|
CVE-2007-0762 | PHP remote file inclusion vulnerability in includes/functions.php in phpBB++ Build 100 allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | [
"cpe:2.3:a:phpbb\\+\\+:phpbb\\+\\+:build_100:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2008-2336 | SQL injection vulnerability in category.php in 68 Classifieds 4.0.1 allows remote attackers to execute arbitrary SQL commands via the cat parameter. | [
"cpe:2.3:a:68_classifieds:68_classifieds:4.0.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2025-53372 | node-code-sandbox-mcp has a Sandbox Escape via Command Injection | node-code-sandbox-mcp is a Node.js–based Model Context Protocol server that spins up disposable Docker containers to execute arbitrary JavaScript. Prior to 1.3.0, a command injection vulnerability exists in the node-code-sandbox-mcp MCP Server. The vulnerability is caused by the unsanitized use of input parameters within a call to child_process.execSync, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges on the host machine, bypassing the sandbox protection of running code inside docker. This vulnerability is fixed in 1.3.0. | []
| null | 7.5 | null | null |
GHSA-mrqf-9666-2wqm | Deserialization of Untrusted Data vulnerability in MagePeople Team Taxi Booking Manager for WooCommerce allows Object Injection. This issue affects Taxi Booking Manager for WooCommerce: from n/a through 1.1.8. | []
| null | 9.8 | null | null |
|
CVE-2019-4545 | IBM QRadar SIEM 7.3 and 7.4 when configured to use Active Directory Authentication may be susceptible to spoofing attacks. IBM X-Force ID: 165877. | [
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:general_availability:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | null |
|
CVE-2024-38857 | Reflected links in visuals facilitate phishing attacks | Improper neutralization of input in Checkmk before versions 2.3.0p8, 2.2.0p28, 2.1.0p45, and 2.0.0 (EOL) allows attackers to craft malicious links that can facilitate phishing attacks. | [
"cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p43:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p44:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*"
]
| null | 4.3 | null | null |
GHSA-pxj4-mqxm-qxmg | Buffer overflows in extended stored procedures for Microsoft SQL Server 7.0 and 2000 allow remote attackers to cause a denial of service or execute arbitrary code via a database query with certain long arguments. | []
| null | null | null | null |
|
GHSA-j29m-vxg5-4rp2 | Stack-based buffer overflow in Mini-stream Ripper 3.0.1.1 allows remote attackers to execute arbitrary code via a long URI in a playlist (.m3u) file. | []
| null | null | null | null |
|
CVE-2021-2362 | Vulnerability in the Oracle Field Service product of Oracle E-Business Suite (component: Wireless). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Field Service. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Field Service accessible data as well as unauthorized access to critical data or complete access to all Oracle Field Service accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:field_service:*:*:*:*:*:*:*:*"
]
| null | 8.1 | null | null |
|
RHSA-2021:4088 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
]
| null | 8.8 | null | null |
cisco-sa-20180718-sdwan-cmdinj | Cisco SD-WAN Solution VPN Subsystem Command Injection Vulnerability | A vulnerability in the VPN subsystem configuration in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges.
The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected parameter in a web page.
The attacker must be authenticated to access the affected parameter. A successful exploit could allow the attacker to execute commands with root privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj"] | []
| null | null | 7.2 | null |
GHSA-ppcr-4hqj-9vmf | Heap-based buffer overflow in the SendLogAction method in the UUPlayer ActiveX control 6.0.0.1 in UUSee 2010 6.11.0609.2 might allow remote attackers to execute arbitrary code via a long argument. | []
| null | null | null | null |
|
CVE-2025-23197 | matrix-hookshot has a Potential Denial of Service when Hookshot is configured with GitHub support | matrix-hookshot is a Matrix bot for connecting to external services like GitHub, GitLab, JIRA, and more. When Hookshot 6 version 6.0.1 or below, or Hookshot 5 version 5.4.1 or below, is configured with GitHub support, it is vulnerable to a Denial of Service (DoS) whereby it can crash on restart due to a missing check. The impact is greater to you untrusted users can add their own GitHub organizations to Hookshot in order to connect their room to a repository. This vulnerability is fixed in 6.0.2 and 5.4.2. | []
| null | 6.5 | null | null |
CVE-2025-1481 | Shortcode Cleaner Lite <= 1.0.9 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Options Export | The Shortcode Cleaner Lite plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the download_backup() function in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export arbitrary options. | []
| null | 6.5 | null | null |
RHSA-2023:5837 | Red Hat Security Advisory: nghttp2 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 7.5 | null | null |
CVE-2024-35085 | J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the findPage function in ProcessDefinitionMapper.xml. | [
"cpe:2.3:a:j2eefast:j2eefast:*:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
|
CVE-2025-41361 | Uncontrolled resource consumption vulnerability in IDF and ZLF | Uncontrolled resource consumption vulnerability in IDF v0.10.0-0C03-03 and ZLF v0.10.0-0C03-04. The devices improperly handle TLS requests associated with PROCOME sockets, so TLS requests sent to those PROCOME ports could cause the device to reboot and result in a denial of service. To exploit this vulnerability, PROCOME ports must be configured and active, with communications encryption active. | []
| 8.3 | null | null | null |
GHSA-wf68-w3c3-xjhm | Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to 2D. NOTE: the previous information is from the April 2016 CPU. Oracle has not commented on third-party claims that this issue allows remote attackers to obtain sensitive information via crafted font data, which triggers an out-of-bounds read. | []
| null | null | 9.6 | null |
|
GHSA-j7f7-q8v6-4476 | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H). | []
| null | null | 7.3 | null |
|
ICSA-17-152-02 | NXP i.MX Product Family | When the device is configured in security enabled configuration. SDP could be used to download a small section of code to an unprotected region of memory.CVE-2017-7936 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L). When the device is configured in security enabled configuration, under certain conditions it is possible to bypass the signature verification by using a specially crafted certificate leading to the execution of an unsigned image.CVE-2017-7932 has been assigned to this vulnerability. A CVSS v3 base score of 6.0 has been assigned; the CVSS vector string is (AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H). | []
| null | null | 6 | null |
CVE-2013-3086 | Cross-site request forgery (CSRF) vulnerability in util_system.html in Belkin N900 router allows remote attackers to hijack the authentication of administrators for requests that change configuration settings including passwords and remote management ports. | [
"cpe:2.3:o:belkin:n900_firmware:1.00.23:*:*:*:*:*:*:*",
"cpe:2.3:h:belkin:n900:-:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-qxrm-rjv7-w3rx | A vulnerability classified as critical was found in Tenda W15E 15.11.0.14. Affected by this vulnerability is the function formSetDebugCfg of the file /goform/setDebugCfg. The manipulation of the argument enable/level/module leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261865 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | []
| null | 8.8 | null | null |
|
CVE-2025-0729 | TP-Link TL-SG108E clickjacking | A vulnerability was found in TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to clickjacking. The attack may be initiated remotely. Upgrading to version 1.0.0 Build 20250124 Rel. 54920(Beta) is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early. They reacted very professional and provided a pre-fix version for their customers. | []
| 6.9 | 4.3 | 4.3 | 5 |
CVE-2017-18800 | Certain NETGEAR devices are affected by reflected XSS. This affects R6700v2 before 1.1.0.42 and R6800 before 1.1.0.42. | [
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*"
]
| null | null | 6.1 | null |
|
GHSA-c5qp-pp8g-h6fg | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function Edit_BasicSSID. | []
| null | 9.8 | null | null |
|
CVE-2023-0723 | The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_move_object function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. | [
"cpe:2.3:a:wickedplugins:wicked_folders:*:*:*:*:*:wordpress:*:*"
]
| null | 5.4 | null | null |
|
CVE-2023-21568 | Microsoft SQL Server Integration Service (VS extension) Remote Code Execution Vulnerability | Microsoft SQL Server Integration Service (VS extension) Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:sql_server_2019_integration_services:-:*:*:*:*:visual_studio:*:*",
"cpe:2.3:a:microsoft:sql_server_2022_integration_services:-:*:*:*:*:visual_studio:*:*"
]
| null | 7.3 | null | null |
CVE-2025-29838 | Windows ExecutionContext Driver Elevation of Privilege Vulnerability | Null pointer dereference in Windows Drivers allows an unauthorized attacker to elevate privileges locally. | []
| null | 7.4 | null | null |
CVE-2006-4781 | Heap-based buffer overflow in FutureSoft TFTP Server Multithreaded (MT) 1.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code by sending a crafted packet to port 69/UDP, which triggers the overflow when constructing an absolute path name. NOTE: Some details are obtained from third party information. | [
"cpe:2.3:a:futuresoft:tftp_server_multithreaded:1.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2024-12189 | WDesignKit – Elementor & Gutenberg Starter Templates, Patterns, Cloud Workspace & Widget Builder <= 1.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting | The WDesignKit – Elementor & Gutenberg Starter Templates, Patterns, Cloud Workspace & Widget Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom widgets in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
RHSA-2020:3984 | Red Hat Security Advisory: freeradius security and bug fix update | freeradius: privilege escalation due to insecure logrotate configuration freeradius: eap-pwd: Information leak due to aborting when needing more than 10 iterations freeradius: eap-pwd: DoS issues due to multithreaded BN_CTX access | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 7.5 | 5.3 | null |
GHSA-xjw3-5r5c-m5ph | typo3 Security fix for Flow Swift Mailer package | A remote code execution vulnerability has been found in the Swift Mailer library (swiftmailer/swiftmailer) recently. See this advisory for details. If you are not using the default mail() transport, this particular problem does not affect you. Upgrading is of course still recommended! | []
| null | null | null | null |
CVE-2024-34046 | The O-RAN E2T I-Release Prometheus metric Increment function can crash in sctpThread.cpp for message.peerInfo->sctpParams->e2tCounters[IN_SUCC][MSG_COUNTER][ProcedureCode_id_RICsubscription]->Increment(). | [
"cpe:2.3:a:o-ran-sc:e2:g-release:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.