id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2023-4712 | Xintian Smart Table Integrated Management System AddUpdateRole.aspx sql injection | A vulnerability, which was classified as critical, was found in Xintian Smart Table Integrated Management System 5.6.9. This affects an unknown part of the file /SysManage/AddUpdateRole.aspx. The manipulation of the argument txtRoleName leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-238575. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:suntront:smart_table_integrated_management_system:5.6.9:*:*:*:*:*:*:*"
]
| null | 5.5 | 5.5 | 5.2 |
CVE-2023-4035 | Simple Blog Card < 1.31 - Contributor+ Stored XSS via Shortcode | The Simple Blog Card WordPress plugin before 1.31 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks | [
"cpe:2.3:a:riverforest-wp:simple_blog_card:*:*:*:*:*:wordpress:*:*"
]
| null | 5.4 | null | null |
CVE-2019-9170 | An issue was discovered in GitLab Community and Enterprise Edition before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It has Incorrect Access Control. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
]
| null | null | 5.3 | 5 |
|
GHSA-r5cm-rxgc-r6wf | IBM Data Studio Web Console 3.x before 3.2, Optim Performance Manager 5.x before 5.2, InfoSphere Optim Configuration Manager 2.x before 2.2, and DB2 Recovery Expert 2.x do not have an off autocomplete attribute for the login-password field, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation. | []
| null | null | null | null |
|
CVE-2024-4444 | LearnPress – WordPress LMS Plugin <= 4.2.6.5 - Unauthenticated Bypass to User Registration | The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to bypass to user registration in versions up to, and including, 4.2.6.5. This is due to missing checks in the 'create_account' function in the checkout. This makes it possible for unauthenticated attackers to register as the default role on the site, even if registration is disabled. | []
| null | 5.3 | null | null |
CVE-2021-46336 | There is an Assertion 'opts & PARSER_CLASS_LITERAL_CTOR_PRESENT' failed at /parser/js/js-parser-expr.c(parser_parse_class_body) in JerryScript 3.0.0. | [
"cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 4.3 |
|
GHSA-536p-rfrq-jwj4 | Buffer overflow in EMC RSA SecurID Software Token Converter before 2.6.1 allows remote attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors. | []
| null | null | null | null |
|
CVE-2020-18964 | Cross Site Request Forgery (CSRF) Vulnerability in ForestBlog latest version via the website Management background, which could let a remote malicious gain privileges. | [
"cpe:2.3:a:forestblog_project:forestblog:2019-04-04:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
CVE-2024-2469 | Remote Code Execution in GitHub Enterprise Server Allowed Administrators to gain SSH access to the appliance | An attacker with an Administrator role in GitHub Enterprise Server could gain SSH root access via remote code execution. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.17, 3.9.12, 3.10.9, 3.11.7 and 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program. | [
"cpe:2.3:a:github:enterprise_server:-:*:*:*:*:*:*:*"
]
| null | 8 | null | null |
GHSA-x469-9qwg-89hw | A vulnerability in the web-based management interface of Cisco Small Business RV042 Dual WAN VPN Routers and Cisco Small Business RV042G Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device.
The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. | []
| null | 6.1 | null | null |
|
GHSA-vrjq-5hcv-6mhv | Race condition in the inet_frag_intern function in net/ipv4/inet_fragment.c in the Linux kernel through 3.13.6 allows remote attackers to cause a denial of service (use-after-free error) or possibly have unspecified other impact via a large series of fragmented ICMP Echo Request packets to a system with a heavy CPU load. | []
| null | null | null | null |
|
CVE-2023-48945 | A stack overflow in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | [
"cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*"
]
| null | 7.5 | null | null |
|
RHBA-2012:0881 | Red Hat Bug Fix Advisory: freeradius bug fix and enhancement update | freeradius: does not respect expired passwords when using the unix module | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
RHSA-2024:0948 | Red Hat Security Advisory: OpenShift Container Platform 4.13.35 security update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
]
| null | 7.5 | null | null |
CVE-2015-6937 | The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
]
| null | null | null | 4.9 |
|
CVE-2024-39682 | WordPress Cooked Plugin - Authenticated (Contributor+) HTML Injection via Recipe Excerpt | Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to HTML Injection in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary HTML in pages that will be shown whenever a user accesses a compromised page. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:xjsv:cooked:*:*:*:*:*:*:*:*"
]
| null | 6.4 | null | null |
GHSA-8h9g-g25c-xm92 | There are multiple ways an unauthenticated attacker could perform SQL injection on WebAccess/NMS (versions prior to 3.0.2) to gain access to sensitive information. | []
| null | null | null | null |
|
GHSA-6wxx-qjpx-w665 | Multiple unknown "other problems" in the KINK dissector in Ethereal before 0.10.11 have unknown impact and attack vectors. | []
| null | null | null | null |
|
CVE-2023-6515 | IDOR in Mia Technology's Mia-Med | Authorization Bypass Through User-Controlled Key vulnerability in Mia Technology Inc. MİA-MED allows Authentication Abuse.This issue affects MİA-MED: before 1.0.7.
| [
"cpe:2.3:a:miateknoloji:mia-med:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
GHSA-mw3w-3jx9-mhff | In ProFTPD through 1.3.8b before cec01cc, supplemental group inheritance grants unintended access to GID 0 because of the lack of supplemental groups from mod_sql. | []
| null | 7.5 | null | null |
|
GHSA-rqrm-gm9j-f8px | The d8s-xml for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-utility package. The affected version of d8s-htm is 0.1.0. | []
| null | 9.8 | null | null |
|
GHSA-v3wf-9r8f-h42x | An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. The Ticket creation form allows users to upload files along with queries. It was found that the file-upload functionality has fewer (or no) mitigations implemented for file content checks; also, the output is not handled properly, causing persistent XSS that leads to cookie stealing or malicious actions. For example, a non-agent user can upload a .html file, and Content-Disposition will be set to inline instead of attachment. | []
| null | null | 5.4 | null |
|
CVE-2022-24171 | Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a command injection vulnerability in the function formSetPppoeServer. This vulnerability allows attackers to execute arbitrary commands via the pppoeServerIP, pppoeServerStartIP, and pppoeServerEndIP parameters. | [
"cpe:2.3:o:tendacn:g1_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tendacn:g3_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:g3:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-hf67-q588-8m5m | STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at STDUJBIG2File!DllGetClassObject+0x000000000000384b." | []
| null | null | 7.8 | null |
|
GHSA-jhqx-5v5g-mpf3 | Classpath resource disclosure in GWC Web Resource API on Windows / Tomcat | ImpactIf GeoServer is deployed in the Windows operating system using an Apache Tomcat web application server, it is possible to bypass existing input validation in the GeoWebCache ByteStreamController class and read arbitrary classpath resources with specific file name extensions.If GeoServer is also deployed as a web archive using the data directory embedded in the geoserver.war file (rather than an external data directory), it will likely be possible to read specific resources to gain administrator privileges. However, it is very unlikely that production environments will be using the embedded data directory since, depending on how GeoServer is deployed, it will be erased and re-installed (which would also reset to the default password) either every time the server restarts or every time a new GeoServer WAR is installed and is therefore difficult to maintain. An external data directory will always be used if GeoServer is running in standalone mode (via an installer or a binary).Patcheshttps://github.com/GeoWebCache/geowebcache/pull/1211WorkaroundsChange environment:Change from Windows operating system. This vulnerability depends on Windows file paths so Linux and Mac OS are not vulnerable.Change from Apache Tomcat application server. Jetty and WildFly are confirmed to not be vulnerable. Other application servers have not been tested and may be vulnerable.Disable anonymous access to the embeded GeoWebCache administration and status pages:Navigate to **Security > Authentication** PageLocate **Filter Chains** headingSelect the ``web`` filter filter chain (ant pattern ``/web/**,/gwc/rest/web/**,/``)Remove ``,/gwc/rest/web/**`` from the pattern (so that ``/web/**,/`` is left).Save the changesReferencesCVE-Pending | []
| null | 7.5 | null | null |
GHSA-xm22-8c3w-j34x | A vulnerability was found in EyouCms up to 1.6.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /yxcms/index.php?r=admin/extendfield/mesedit&tabid=12&id=4 of the component HTTP POST Request Handler. The manipulation of the argument web_ico leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225943. | []
| null | 6.1 | null | null |
|
CVE-2019-2211 | In createProjectionMapForQuery of TvProvider.java, there is possible SQL injection. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-135269669 | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 7.8 |
|
GHSA-7gh9-pp96-5wvx | A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getImageMP4.php is vulnerable to a command injection attack. | []
| null | 9.8 | null | null |
|
GHSA-qf5q-fm5c-hc2p | In the Linux kernel, the following vulnerability has been resolved:bpftool: Fix undefined behavior in qsort(NULL, 0, ...)When netfilter has no entry to display, qsort is called with
qsort(NULL, 0, ...). This results in undefined behavior, as UBSan
reports:net.c:827:2: runtime error: null pointer passed as argument 1, which is declared to never be nullAlthough the C standard does not explicitly state whether calling qsort
with a NULL pointer when the size is 0 constitutes undefined behavior,
Section 7.1.4 of the C standard (Use of library functions) mentions:"Each of the following statements applies unless explicitly stated
otherwise in the detailed descriptions that follow: If an argument to a
function has an invalid value (such as a value outside the domain of
the function, or a pointer outside the address space of the program, or
a null pointer, or a pointer to non-modifiable storage when the
corresponding parameter is not const-qualified) or a type (after
promotion) not expected by a function with variable number of
arguments, the behavior is undefined."To avoid this, add an early return when nf_link_info is NULL to prevent
calling qsort with a NULL pointer. | []
| null | 5.5 | null | null |
|
CVE-2024-11033 | Denial of Service (DoS) in binary-husky/gpt_academic | A Denial of Service (DoS) vulnerability exists in the file upload feature of binary-husky/gpt_academic version 3.83. The vulnerability is due to improper handling of form-data with a large filename in the file upload request. An attacker can exploit this vulnerability by sending a payload with an excessively large filename, causing the server to become overwhelmed and unavailable for legitimate users. | []
| null | null | 6.5 | null |
CVE-2022-21439 | Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 4.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H). | [
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*"
]
| null | 4.2 | null | null |
|
GHSA-mjwj-vr8g-j6xc | YzmCMS 3.7 has Stored XSS via the title parameter to advertisement/adver/edit.html. | []
| null | null | 5.4 | null |
|
GHSA-8pr6-wgpr-wmvq | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR750 before 4.6.3.6, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, and RBK852 before 3.2.17.12. | []
| null | null | null | null |
|
GHSA-v5q2-22xg-c4g4 | Multiple SQL injection vulnerabilities in RunCMS 1.4.1 allow remote attackers to execute arbitrary SQL commands via the (1) uid parameter in (a) class/sessions.class.php, and the (2) timezone_offset and (3) umode parameters in (b) class/xoopsuser.php. | []
| null | null | null | null |
|
GHSA-7phr-5m9x-rw9q | Directory traversal in fast-http | This affects all versions of package fast-http. There is no path sanitization in the path provided at fs.readFile in index.js. | []
| null | 7.5 | null | null |
GHSA-2cmj-fj8p-q47f | Due to missing authorization checks, any authenticated user is able to list, upload, or delete attachments to password safe entries in Pleasant Password Server before 7.8.3. To perform those actions on an entry, the user needs to know the corresponding "CredentialId" value, which uniquely identifies a password safe entry. Since "CredentialId" values are implemented as GUIDs, they are hard to guess. However, if for example an entry's owner grants read-only access to a malicious user, the value gets exposed to the malicious user. The same holds true for temporary grants. | []
| null | null | 8.1 | null |
|
GHSA-cj77-3g7m-8jfm | Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | []
| null | null | 6.5 | null |
|
CVE-2024-57912 | iio: pressure: zpa2326: fix information leak in triggered buffer | In the Linux kernel, the following vulnerability has been resolved:
iio: pressure: zpa2326: fix information leak in triggered buffer
The 'sample' local struct is used to push data to user space from a
triggered buffer, but it has a hole between the temperature and the
timestamp (u32 pressure, u16 temperature, GAP, u64 timestamp).
This hole is never initialized.
Initialize the struct to zero before using it to avoid pushing
uninitialized information to userspace. | []
| null | 7.1 | null | null |
CVE-2019-15514 | The Privacy > Phone Number feature in the Telegram app 5.10 for Android and iOS provides an incorrect indication that the access level is Nobody, because attackers can find these numbers via the Group Info feature, e.g., by adding a significant fraction of a region's assigned phone numbers. | [
"cpe:2.3:a:telegram:telegram:5.10.0:*:*:*:*:android:*:*",
"cpe:2.3:a:telegram:telegram:5.10.0:*:*:*:*:iphone_os:*:*"
]
| null | null | 5.3 | 5 |
|
CVE-2024-29116 | WordPress WooThumbs for WooCommerce by Iconic plugin <= 5.5.3 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in IconicWP WooThumbs for WooCommerce by Iconic allows Reflected XSS.This issue affects WooThumbs for WooCommerce by Iconic: from n/a through 5.5.3.
| []
| null | 7.1 | null | null |
GHSA-c52r-r6j6-x3c5 | IBM Cloud Pak System 2.3.3.6, 2.3.36 iFix1, 2.3.3.6 iFix2, 2.3.3.7, 2.3.3.7 iFix1, and 2.3.4.0 could disclose sensitive information about the system that could aid in further attacks against the system. | []
| null | 5.3 | null | null |
|
GHSA-vcjj-9vg7-vf68 | Null pointer dereference in TFLite | ImpactAn attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service:The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L268-L285) unconditionally dereferences a pointer.PatchesWe have patched the issue in GitHub commit [15691e456c7dc9bd6be203b09765b063bf4a380c](https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c).The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Yakun Zhang of Baidu Security. | []
| 8.5 | 7.8 | null | null |
RHSA-2020:2014 | Red Hat Security Advisory: sqlite security update | sqlite: fts3: improve shadow table corruption detection | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
]
| null | 8.8 | null | null |
GHSA-f679-g5v6-6qqr | Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-34449. | []
| null | 7.8 | null | null |
|
GHSA-cgmp-2p2c-jgf9 | Stored Cross-Site Scripting (XSS) vulnerabilities have been identified in OpenText ArcSight Logger. The vulnerabilities could be remotely exploited. | []
| null | 8.1 | null | null |
|
ICSA-24-142-01 | LCDS LAquis SCADA | There are multiple ways in LAquis SCADA for an attacker to access locations outside of their own directory. | []
| null | 7.8 | null | null |
GHSA-rwcp-qrwg-56cg | Casdoor Cross-Site Request Forgery vulnerability | Casdoor v1.331.0 and below was discovered to contain a Cross-Site Request Forgery (CSRF) in the endpoint `/api/set-password`. This vulnerability allows attackers to arbitrarily change the victim user's password via supplying a crafted URL. | []
| null | 6.5 | null | null |
GHSA-3xgj-vqg4-h895 | In MITRE Caldera through 4.2.0 and 5.0.0 before 35bc06e, a Remote Code Execution (RCE) vulnerability was found in the dynamic agent (implant) compilation functionality of the server. This allows remote attackers to execute arbitrary code on the server that Caldera is running on via a crafted web request to the Caldera server API used for compiling and downloading of Caldera's Sandcat or Manx agent (implants). This web request can use the gcc -extldflags linker flag with sub-commands. | []
| null | 10 | null | null |
|
GHSA-c9fv-v7xm-mfrf | NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer, where an out-of-bounds write can lead to denial of service, information disclosure, and data tampering. | []
| null | 7.8 | null | null |
|
GHSA-3f8h-c4rw-wc8f | A validation issue existed in the handling of symlinks and was addressed with improved validation of symlinks. This issue is fixed in macOS Monterey 12.4. An app may be able to gain elevated privileges. | []
| null | 7.8 | null | null |
|
CVE-2020-1033 | Windows Kernel Information Disclosure Vulnerability | <p>An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.</p>
<p>An authenticated attacker could exploit this vulnerability by running a specially crafted application.</p>
<p>The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.</p>
| [
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
]
| null | 4 | null | null |
GHSA-rx2j-whx7-3jv5 | A vulnerability has been found in Campcodes Online Laundry Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /manage_receiving.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263893 was assigned to this vulnerability. | []
| 5.3 | 6.3 | null | null |
|
CVE-2020-5809 | A stored XSS vulnerability exists in Umbraco CMS <= 8.9.1 or current. An authenticated user can inject arbitrary JavaScript code into iframes when editing content using the TinyMCE rich-text editor, as TinyMCE is configured to allow iframes by default in Umbraco CMS. | [
"cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
CVE-2002-1495 | Cross-site scripting (XSS) vulnerability in JAWmail 1.0-rc1 allows remote attackers to insert arbitrary script or HTML via (1) attached file names in the Read Mail feature, (2) text/html mails that are displayed in a pop-up window, and (3) certain malicious attributes within otherwise safe tags, such as onMouseOver. | [
"cpe:2.3:a:rudi_benkovic:jawmail:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rudi_benkovic:jawmail:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rudi_benkovic:jawmail:1.0_rc1:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2025-50065 | Vulnerability in the Oracle GraalVM for JDK product of Oracle Java SE (component: Native Image). The supported version that is affected is Oracle GraalVM for JDK: 24.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle GraalVM for JDK. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). | []
| null | 3.7 | null | null |
|
CVE-2022-44463 | AEM Reflected XSS Arbitrary code execution | Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
CVE-2024-25168 | SQL injection vulnerability in snow snow v.2.0.0 allows a remote attacker to execute arbitrary code via the dataScope parameter of the system/role/list interface. | [
"cpe:2.3:a:qimingjin:snow:2.0.0:*:*:*:*:*:*:*"
]
| null | 6.3 | null | null |
|
RHSA-2020:3981 | Red Hat Security Advisory: samba security, bug fix, and enhancement update | samba: Crash after failed character conversion at log level 3 or above | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 6.5 | null | null |
GHSA-hp6r-93x9-m75r | Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3629. | []
| null | null | null | null |
|
CVE-2007-2332 | Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 6_05.140 uses a fixed DES key to encrypt passwords, which allows remote authenticated users to obtain a password via a brute force attack on a hash from the LDAP store. | [
"cpe:2.3:h:nortel:vpn_router_1010:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:vpn_router_1050:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:vpn_router_1100:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:vpn_router_1700:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:vpn_router_1740:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:vpn_router_1750:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:vpn_router_2700:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortel:vpn_router_5000:*:*:*:*:*:*:*:*"
]
| null | null | null | 9 |
|
CVE-2009-4136 | PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230. | [
"cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*"
]
| null | null | null | 6.5 |
|
CVE-2024-41997 | An issue was discovered in version of Warp Terminal prior to 2024.07.18 (v0.2024.07.16.08.02). A command injection vulnerability exists in the Docker integration functionality. An attacker can create a specially crafted hyperlink using the `warp://action/docker/open_subshell` intent that when clicked by the victim results in command execution on the victim's machine. | [
"cpe:2.3:a:warp_terminal:warp_terminal:*:*:*:*:*:*:*:*"
]
| null | 6.6 | null | null |
|
CVE-2021-33459 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in nasm_parser_directive() in modules/parsers/nasm/nasm-parse.c. | [
"cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
GHSA-5xh6-wwgj-xqh4 | Insufficiently protected credentials in the Intel(R) Team Blue mobile application in all versions may allow an authenticated user to potentially enable information disclosure via local access. | []
| null | 5.5 | null | null |
|
GHSA-55gw-qcg5-xjrx | client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file. | []
| null | null | null | null |
|
GHSA-cmc8-222c-vqp9 | Mattermost failed to properly validate that the channel that comes from the sync message is a shared channel | Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5 and 9.8.x <= 9.8.1 fail to properly validate that the channel that comes from the sync message is a shared channel, when shared channels are enabled, which allows a malicious remote to add users to arbitrary teams and channels | []
| 9.3 | 8.7 | null | null |
GHSA-84v3-8746-q3rg | Man-in-the-middle (MitM) attack vulnerability in non-Mac OS agents in McAfee (now Intel Security) Agent (MA) 4.8.0 patch 2 and earlier allows attackers to make a McAfee Agent talk with another, possibly rogue, ePO server via McAfee Agent migration to another ePO server. | []
| null | null | 5.3 | null |
|
GHSA-j63r-9mhq-4rr3 | In deliverOnFlushComplete of LocationProviderManager.java, there is a possible way to bypass background activity launch restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-235823542 | []
| null | 7.8 | null | null |
|
GHSA-q2jc-h887-p28w | Cross-Site Request Forgery (CSRF) vulnerability in Swashata WP Category Post List Widget.This issue affects WP Category Post List Widget: from n/a through 2.0.3. | []
| null | 4.3 | null | null |
|
CVE-2005-3267 | Integer overflow in Skype client before 1.4.x.84 on Windows, before 1.3.x.17 on Mac OS, before 1.2.x.18 on Linux, and 1.1.x.6 and earlier allows remote attackers to cause a denial of service (crash) via crafted network data with a large Object Counter value, which leads to a resultant heap-based buffer overflow. | [
"cpe:2.3:a:skype_technologies:skype:0.92.0.12:*:linux:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:0.93.0.3:*:linux:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:0.98.0.04:*:*:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:1.0.0.1:*:linux:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:1.0.0.7:*:linux:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:1.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:1.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:1.0.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:1.0.0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:1.0.0.97:*:*:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:1.0.0.100:*:*:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:1.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:1.1.0.20:*:linux:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:1.1.06:*:pocket_pc:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:1.2.0.17:*:linux:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:1.3.0.16:*:mac_os_x:*:*:*:*:*",
"cpe:2.3:a:skype_technologies:skype:1.4.0.83:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2025-46530 | WordPress Hacklog Remote Attachment <= 1.3.2 - Cross Site Request Forgery (CSRF) Vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in HuangYe WuDeng Hacklog Remote Attachment allows Stored XSS. This issue affects Hacklog Remote Attachment: from n/a through 1.3.2. | []
| null | 7.1 | null | null |
CVE-2023-49256 | Predictable encryption passphrase used in publicly accessible configuration file | It is possible to download the configuration backup without authorization and decrypt included passwords using hardcoded static key. | [
"cpe:2.3:o:hongdian:h8951-4g-esp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hongdian:h8951-4g-esp:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
CVE-2022-47975 | The DUBAI module has a double free vulnerability. Successful exploitation of this vulnerability may affect system availability. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
GHSA-94v7-5fr6-w7f8 | A Cross-site Scripting issue was discovered in Geovap Reliance SCADA Version 4.7.3 Update 2 and prior. This vulnerability could allow an unauthenticated attacker to inject arbitrary code. | []
| null | 6.1 | null | null |
|
GHSA-4xv9-3gx8-hvhx | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ioannup Code Generate allows Reflected XSS.This issue affects Code Generate: from n/a through 1.0. | []
| null | 7.1 | null | null |
|
CVE-2015-1060 | Open redirect vulnerability in lib/Cake/Controller/Controller.php in AdaptCMS 3.0.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the HTTP Referer header. | [
"cpe:2.3:a:insanevisions:adaptcms:3.0.3:*:*:*:*:*:*:*"
]
| null | null | null | 5.8 |
|
RHSA-2013:0733 | Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.2 security update | Portal: Cross Site Request Forgery | [
"cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2"
]
| null | null | null | null |
GHSA-w9p3-2qgf-68g5 | Unknown vulnerability in the AUTH_DES authentication for RPC in Solaris 2.5.1, 2.6, and 7, SGI IRIX 6.5 to 6.5.19f, and possibly other platforms, allows remote attackers to gain privileges. | []
| null | null | null | null |
|
RHSA-2008:0860 | Red Hat Security Advisory: ipa security update | IPA Kerberos master password disclosure | [
"cpe:/a:redhat:enterprise_ipa:1.0"
]
| null | null | null | null |
GHSA-rfhm-xwgj-v2q9 | Several XML External Entity (XXE) vulnerabilities in the Moog EXO Series EXVF5C-2 and EXVP7C2-3 units allow remote unauthenticated users to read arbitrary files via a crafted Document Type Definition (DTD) in an XML request. | []
| null | null | null | null |
|
CVE-2025-2832 | mingyuefusu 明月复苏 tushuguanlixitong 图书管理系统 cross-site request forgery | A vulnerability was found in mingyuefusu 明月复苏 tushuguanlixitong 图书管理系统 up to d4836f6b49cd0ac79a4021b15ce99ff7229d4694 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | []
| 5.3 | 4.3 | 4.3 | 5 |
CVE-2016-5349 | The high level operating systems (HLOS) was not providing sufficient memory address information to ensure that secure applications inside Qualcomm Secure Execution Environment (QSEE) only write to legitimate memory ranges related to the QSEE secure application's HLOS client. When secure applications inside Qualcomm Secure Execution Environment (QSEE) receive memory addresses from a high level operating system (HLOS) such as Linux Android, those address have previously been verified as belonging to HLOS memory space rather than QSEE memory space, but they were not verified to be from HLOS user space rather than kernel space. This lack of verification could lead to privilege escalation within the HLOS. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 4.3 |
|
CVE-2023-42046 | PDF-XChange Editor J2K File Parsing Uninitialized Variable Information Disclosure Vulnerability | PDF-XChange Editor J2K File Parsing Uninitialized Variable Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of J2K files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-20907. | [
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:-:*:*:*:*:*:*:*"
]
| null | null | 3.3 | null |
CVE-2019-18859 | Digi AnywhereUSB 14 allows XSS via a link for the Digi Page. | [
"cpe:2.3:o:digi:anywhereusb\\/14_firmware:1.93.21.19:*:*:*:*:*:*:*",
"cpe:2.3:h:digi:anywhereusb\\/14:-:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2022-20770 | ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022 | On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available. | [
"cpe:2.3:a:clamav:clamav:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | 8.6 | null | null |
GHSA-qpwp-g5pp-85x7 | An elevation of privilege vulnerability in Mediaserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32660278. | []
| null | null | 7.8 | null |
|
CVE-2005-4009 | Multiple SQL injection vulnerabilities in PHP Lite Calendar Express 2.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) cid and (2) catid parameters to (a) day.php, (b) week.php, (c) month.php, and (d) year.php. | [
"cpe:2.3:a:php_lite:calendar_express:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php_lite:calendar_express:2.2:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-9cx7-5w9f-75jq | Cross-site scripting (XSS) vulnerability in censura.php in Censura 1.16.04 allows remote attackers to inject arbitrary web script or HTML via the itemid parameter in a details action. | []
| null | null | null | null |
|
GHSA-7v9h-r86q-xxf7 | GoodTech SMTP Server 5.14 allows remote attackers to cause a denial of service (application crash) via a RCPT TO command with an invalid argument, as demonstrated using an "A" character. | []
| null | null | null | null |
|
CVE-2022-0852 | There is a flaw in convert2rhel. convert2rhel passes the Red Hat account password to subscription-manager via the command line, which could allow unauthorized users locally on the machine to view the password via the process command line via e.g. htop or ps. The specific impact varies upon the privileges of the Red Hat account in question, but it could affect the integrity, availability, and/or data confidentiality of other systems that are administered by that account. This occurs regardless of how the password is supplied to convert2rhel. | [
"cpe:2.3:a:convert2rhel_project:convert2rhel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
RHSA-2008:0210 | Red Hat Security Advisory: java-1.5.0-ibm security update | java-1.5.0 Privilege escalation via unstrusted applet and application Untrusted applet and application XSLT processing privilege escalation Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Java Plugin same-origin-policy bypass JRE image parsing library allows privilege escalation (CVE-2008-1194) JRE image parsing library allows privilege escalation (CVE-2008-1194) Java-API calls in untrusted Javascript allow network privilege escalation Buffer overflow security vulnerabilities in Java Web Start | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
]
| null | null | null | null |
GHSA-fvg9-44pc-6w5x | platform/graphics/filters/FEColorMatrix.cpp in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, does not properly handle an insufficient number of values in an feColorMatrix filter, which allows remote attackers to cause a denial of service (container overflow) or possibly have unspecified other impact via a crafted document. | []
| null | null | null | null |
|
CVE-2021-42699 | AzeoTech DAQFactory | The affected product is vulnerable to cookie information being transmitted as cleartext over HTTP. An attacker can capture network traffic, obtain the user’s cookie and take over the account. | [
"cpe:2.3:a:azeotech:daqfactory:*:*:*:*:*:*:*:*",
"cpe:2.3:a:azeotech:daqfactory:18.1:build_2347:*:*:*:*:*:*"
]
| null | 5.7 | null | null |
GHSA-8h9m-8gm6-f3r9 | PY Software Active Webcam WebServer (webcam.exe) 5.5 allows remote attackers to determine the existence of files via an HTTP request with a full pathname, which produces different messages whether the file exists or not. | []
| null | null | null | null |
|
GHSA-xj4g-c5mp-4x9c | Microsoft Host Integration Server (HIS) 2004 SP1, 2006 SP1, 2009, and 2010 allows remote attackers to cause a denial of service (SNA Server service outage) via crafted TCP or UDP traffic, aka "Endless Loop DoS in snabase.exe Vulnerability." | []
| null | null | null | null |
|
CVE-2021-43804 | Out-of-bounds read when parsing RTCP BYE message in PJSIP | PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds. | [
"cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
]
| null | 7.3 | null | null |
CVE-2020-2728 | Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: OIM - LDAP user and role Synch). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Identity Manager accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:identity_manager:12.2.1.3.0:*:*:*:*:*:*:*"
]
| null | null | 7.5 | null |
|
CVE-2011-0751 | Directory traversal vulnerability in nhttpd (aka Nostromo webserver) before 1.9.4 allows remote attackers to execute arbitrary programs or read arbitrary files via a ..%2f (encoded dot dot slash) in a URI. | [
"cpe:2.3:a:nazgul:nostromo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nazgul:nostromo:1.9.2:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2021-20027 | A buffer overflow vulnerability in SonicOS allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls. | [
"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_9250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_9450:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsa_9650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz300p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz300w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz350:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz350w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz400w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz500w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz600p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_1600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_50:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nssp_12400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nssp_12800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:supermassive_9800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:supermassive_9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:supermassive_9400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:supermassive_9600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:supermassive_e10200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:supermassive_e10400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:supermassive_e10800:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-qjf7-48q3-r5pp | An issue was discovered in the endpoint protection agent in Zoho ManageEngine Device Control Plus 10.1.2228.15. Despite configuring complete restrictions on USB pendrives, USB HDD devices, memory cards, USB connections to mobile devices, etc., it is still possible to bypass the USB restrictions by booting into Safe Mode. This allows a file to be exchanged outside the laptop/system. Safe Mode can be launched by any user (even without admin rights). Data exfiltration can occur, and also malware might be introduced onto the system. | []
| null | 7.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.