id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2022-25471 | An Insecure Direct Object Reference (IDOR) vulnerability in OpenEMR 6.0.0 allows any authenticated attacker to access and modify unauthorized areas via a crafted POST request to /modules/zend_modules/public/Installer/register. | [
"cpe:2.3:a:open-emr:openemr:6.0.0:*:*:*:*:*:*:*"
]
| null | 8.1 | null | 5.5 |
|
RHSA-2007:0348 | Red Hat Security Advisory: php security update | php libxmlrpc library overflow php CRLF injection php make_http_soap_request flaw | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
CVE-2022-28830 | Adobe FrameMaker Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Adobe Framemaker versions 2029u8 (and earlier) and 2020u4 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
CVE-2017-6466 | F-Secure Software Updater 2.20, as distributed in several F-Secure products, downloads installation packages over plain http and does not perform file integrity validation after download. Man-in-the-middle attackers can replace the file with their own executable which will be executed under the SYSTEM account. Note that when Software Updater is configured to install updates automatically, it checks if the downloaded file is digitally signed by default, but does not check the author of the signature. When running in manual mode (default), no signature check is performed. | [
"cpe:2.3:a:f-secure:software_updater:2.20:*:*:*:*:*:*:*"
]
| null | null | 8.1 | 9.3 |
|
GHSA-2hf2-xw27-m59v | SQL injection vulnerability in login.php in Allomani Audio & Video Library (Songs & Clips version) 2.7.0 allows remote attackers to execute arbitrary SQL commands via the username parameter in a login action. | []
| null | null | null | null |
|
GHSA-vw8g-gwgr-767g | A SQL injection vulnerability in TopicMapper.xml of PybbsCMS v5.2.1 allows attackers to access sensitive database information. | []
| null | 7.5 | null | null |
|
CVE-2024-51247 | In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doPPPo function. | [
"cpe:2.3:o:draytek:vigor3900_firmware:1.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*"
]
| null | 8 | null | null |
|
ICSA-23-353-01 | Subnet Solutions Inc. PowerSYSTEM Center | Subnet Solutions PowerSYSTEM Center versions 2020 v5.0.x through 5.16.x contain a vulnerability that could allow an authorized local user to insert arbitrary code into the unquoted service path and escalate privileges. | []
| null | null | 7.8 | null |
CVE-2017-16844 | Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618. | [
"cpe:2.3:a:procmail:procmail:3.22:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
GHSA-7537-7q22-h2h7 | The issue was addressed with improved checks. This issue is fixed in iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4. Processing web content may lead to a denial-of-service. | []
| null | 6.5 | null | null |
|
GHSA-jphw-p3m6-pj3c | Data races in multiqueue2 | Affected versions of this crate unconditionally implemented Send for types used in queue implementations (InnerSend<RW, T>, InnerRecv<RW, T>, FutInnerSend<RW, T>, FutInnerRecv<RW, T>).This allows users to send non-Send types to other threads, which can lead to data race bugs or other undefined behavior.The flaw was corrected in v0.1.7 by adding T: Send bound to to the Send impl of four data types explained above. | []
| null | 5.9 | null | null |
RHSA-2006:0117 | Red Hat Security Advisory: vixie-cron security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
]
| null | null | null | null |
GHSA-rjvr-pf2g-7rjx | An exploitable command execution vulnerability exists in Information Builders WebFOCUS Business Intelligence Portal 8.1 . A specially crafted web parameter can cause a command injection. An authenticated attacker can send a crafted web request to trigger this vulnerability. | []
| null | null | 8.8 | null |
|
GHSA-rgcp-mhcw-f6jx | Missing Authorization vulnerability in Sparkle WP Editorialmag editorialmag.This issue affects Editorialmag: from n/a through 1.1.9. | []
| null | 4.3 | null | null |
|
CVE-2019-17130 | vBulletin through 5.5.4 mishandles external URLs within the /core/vb/vurl.php file and the /core/vb/vurl directories. | [
"cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 6.4 |
|
GHSA-3f6q-pc55-vgqv | The Search & Filter WordPress plugin before 1.2.16 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin. | []
| null | 5.4 | null | null |
|
GHSA-6w9f-qwfr-4pw9 | Cross Site Scripting vulnerability in Hewlett Packard Enterprise Integrated Lights-Out 5. | []
| null | 6.1 | null | null |
|
CVE-2014-5247 | The _UpgradeBeforeConfigurationChange function in lib/client/gnt_cluster.py in Ganeti 2.10.0 before 2.10.7 and 2.11.0 before 2.11.5 uses world-readable permissions for the configuration backup file, which allows local users to obtain SSL keys, remote API credentials, and other sensitive information by reading the file, related to the upgrade command. | [
"cpe:2.3:a:spi-inc:ganeti:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.10.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.10.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.10.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.11.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.11.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:spi-inc:ganeti:2.11.4:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
GHSA-m3qm-rr8v-rfj3 | cPanel before 68.0.15 allows code execution in the context of the root account because of weak permissions on incremental backups (SEC-322). | []
| null | null | 7.8 | null |
|
RHSA-2023:3564 | Red Hat Security Advisory: thunderbird security update | Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
]
| null | 9.8 | null | null |
GHSA-pgcj-52hg-vjr8 | Biscom Secure File Transfer (SFT) before 5.1.1082 and 6.x before 6.0.1011 allows user credential theft. | []
| null | null | null | null |
|
CVE-2022-21847 | Windows Hyper-V Denial of Service Vulnerability | Windows Hyper-V Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
CVE-2022-46812 | WordPress Thank You Page Customizer for WooCommerce – Increase Your Sales Plugin <= 1.0.13 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in VillaTheme Thank You Page Customizer for WooCommerce – Increase Your Sales plugin <= 1.0.13 versions. | [
"cpe:2.3:a:villatheme:thank_you_page_customizer_for_woocommerce:*:*:*:*:*:wordpress:*:*"
]
| null | 4.3 | null | null |
CVE-2025-30543 | WordPress Menu Duplicator plugin <= 1.0 - Broken Access Control vulnerability | Missing Authorization vulnerability in swayam.tejwani Menu Duplicator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Menu Duplicator: from n/a through 1.0. | []
| null | 4.3 | null | null |
CVE-2022-38668 | HTTP applications (servers) based on Crow through 1.0+4 may reveal potentially sensitive uninitialized data from stack memory when fulfilling a request for a static file smaller than 16 KB. | [
"cpe:2.3:a:crowcpp:crow:1.0\\+4:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
RHSA-2018:3854 | Red Hat Security Advisory: ntp security update | ntp: Stack-based buffer overflow in ntpq and ntpdc allows denial of service or code execution | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | 7 | null |
CVE-2013-0253 | The default configuration of Apache Maven 3.0.4, when using Maven Wagon 2.1, disables SSL certificate checks, which allows remote attackers to spoof servers via a man-in-the-middle (MITM) attack. | [
"cpe:2.3:a:apache:maven:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:maven_wagon:2.1:*:*:*:*:*:*:*"
]
| null | null | null | 5.8 |
|
CVE-2014-7876 | Unspecified vulnerability in HP Integrated Lights-Out (iLO) firmware 2 before 2.27 and 4 before 2.03 and iLO Chassis Management (CM) firmware before 1.30 allows remote attackers to gain privileges, execute arbitrary code, or cause a denial of service via unknown vectors. | [
"cpe:2.3:o:hp:integrated_lights-out_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:integrated_lights-out_4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:integrated_lights-out_chassis_management_firmware:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2018-3852 | An exploitable denial of service vulnerability exists in the Ocularis Recorder functionality of Ocularis 5.5.0.242. A specially crafted TCP packet can cause a process to terminate resulting in denial of service. An attacker can send a crafted TCP packet to trigger this vulnerability. | [
"cpe:2.3:a:onssi:ocularis:5.5.0.242:*:*:*:*:*:*:*"
]
| null | null | 7.5 | null |
|
CVE-2014-4067 | Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2796, CVE-2014-2808, CVE-2014-2825, CVE-2014-4050, and CVE-2014-4055. | [
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-6rr7-wj8c-j9rh | The Recetas de Tragos (aka com.wRecetasdeTragos) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
| null | null | null | null |
|
RHSA-2007:0132 | Red Hat Security Advisory: libXfont security update | Multiple font integer overflows (CVE-2007-1352) Multiple font integer overflows (CVE-2007-1352) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
CVE-2013-6034 | The firmware on GateHouse; Harris BGAN RF-7800B-VU204 and BGAN RF-7800B-DU204; Hughes Network Systems 9201, 9450, and 9502; Inmarsat; Japan Radio JUE-250 and JUE-500; and Thuraya IP satellite terminals has hardcoded credentials, which makes it easier for attackers to obtain unspecified login access via unknown vectors. | [
"cpe:2.3:h:gatehouse:gatehouse:-:*:*:*:*:*:*:*",
"cpe:2.3:h:harris:bgan:rf-7800b-du204:*:*:*:*:*:*:*",
"cpe:2.3:h:harris:bgan:rf-7800b-vu204:*:*:*:*:*:*:*",
"cpe:2.3:h:hughes_network_systems:9201:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hughes_network_systems:9450:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hughes_network_systems:9502:-:*:*:*:*:*:*:*",
"cpe:2.3:h:inmarsat:inmarsat:-:*:*:*:*:*:*:*",
"cpe:2.3:h:japan_radio:jue-250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:japan_radio:jue-500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:thuraya_telecommunications:ip:-:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2023-5018 | SourceCodester Lost and Found Information System POST Parameter sql injection | A vulnerability classified as critical has been found in SourceCodester Lost and Found Information System 1.0. This affects an unknown part of the file /classes/Master.php?f=save_category of the component POST Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-239859. | [
"cpe:2.3:a:oretnom23:lost_and_found_information_system:1.0:*:*:*:*:*:*:*"
]
| null | 6.3 | 6.3 | 6.5 |
GHSA-jqqj-j2ch-3qv8 | Atmail v6.6.0 was discovered to contain a SQL injection vulnerability via the username parameter on the login page. | []
| null | 9.8 | null | null |
|
RHSA-2019:1591 | Red Hat Security Advisory: OpenShift Container Platform 4.1 image security update | openshift: OAuth access tokens written in plaintext to API server audit logs | [
"cpe:/a:redhat:openshift:4.1::el7"
]
| null | null | 2.3 | null |
CVE-2025-39439 | WordPress wpLike2Get plugin <= 1.2.9 - Sensitive Data Exposure vulnerability | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Markus Drubba wpLike2Get allows Retrieve Embedded Sensitive Data. This issue affects wpLike2Get: from n/a through 1.2.9. | []
| null | 5.3 | null | null |
GHSA-qcqw-xq86-g95h | A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5. | []
| null | null | 7.8 | null |
|
CVE-2015-8340 | The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling. | [
"cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"
]
| null | null | null | 4.7 |
|
CVE-2024-1814 | Spectra – WordPress Gutenberg Blocks <= 2.12.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Testimonial Block | The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Testimonial block in all versions up to, and including, 2.12.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
GHSA-prhq-c3gx-jhwg | A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution. | []
| null | 7 | null | null |
|
CVE-2024-39525 | Junos OS and Junos OS Evolved: When BGP traceoptions is enabled, receipt of specially crafted BGP packet causes RPD crash | An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specific BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.
This issue only affects systems with BGP traceoptions enabled and
requires a BGP session to be already established. Systems without BGP traceoptions enabled are not affected by this issue.
This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.
This issue affects:
Junos OS:
* All versions before 21.2R3-S8,
* from 21.4 before 21.4R3-S8,
* from 22.2 before 22.2R3-S4,
* from 22.3 before 22.3R3-S4,
* from 22.4 before 22.4R3-S3,
* from 23.2 before 23.2R2-S1,
* from 23.4 before 23.4R2;
Junos OS Evolved:
* All versions before 21.2R3-S8-EVO,
* from 21.4-EVO before 21.4R3-S8-EVO,
* from 22.2-EVO before 22.2R3-S4-EVO,
* from 22.3-EVO before 22.3R3-S4-EVO,
* from 22.4-EVO before 22.4R3-S3-EVO,
* from 23.2-EVO before 23.2R2-S1-EVO,
* from 23.4-EVO before 23.4R2-EVO. | [
"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*"
]
| 8.7 | 7.5 | null | null |
CVE-2012-4272 | Multiple cross-site scripting (XSS) vulnerabilities in the 2 Click Social Media Buttons plugin before 0.34 for WordPress allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the "processing of the buttons of Xing and Pinterest". | [
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.1:-:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.11:r1:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.11:r2:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.27.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.31.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.31.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.31.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.32.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ppfeufer:2-click-social-media-buttons:0.32.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-j9vc-vw64-7f9w | FreeSWITCH through 1.8.2, when mod_xml_rpc is enabled, allows remote attackers to execute arbitrary commands via the api/system or txtapi/system (or api/bg_system or txtapi/bg_system) query string on TCP port 8080, as demonstrated by an api/system?calc URI. This can also be exploited via CSRF. Alternatively, the default password of works for the freeswitch account can sometimes be used. | []
| null | null | 7.5 | null |
|
CVE-2019-1734 | Cisco FXOS and NX-OS Software Sensitive File Read Information Disclosure Vulnerability | A vulnerability in the implementation of a CLI diagnostic command in Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to view sensitive system files that should be restricted. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to incomplete role-based access control (RBAC) verification. An attacker could exploit this vulnerability by authenticating to the device and issuing a specific CLI diagnostic command with crafted user-input parameters. An exploit could allow the attacker to perform an arbitrary read of a file on the device, and the file may contain sensitive information. The attacker needs valid device credentials to exploit this vulnerability. | [
"cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6300:-:*:*:*:*:*:*:*"
]
| null | null | 5.5 | null |
GHSA-r3cc-j9xh-27gw | nopCommerce 4.50.1 is vulnerable to Cross Site Scripting (XSS). An attacker (role customer) can inject javascript code to First name or Last name at Customer Info. | []
| null | 5.4 | null | null |
|
CVE-2011-5287 | Multiple cross-site scripting (XSS) vulnerabilities in HESK before 2.4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) hesk_settings[tmp_title] or (2) hesklang[ENCODING] parameter to inc/header.inc.php; the hesklang[attempt] parameter to (3) inc/assignment_search.inc.php, (4) inc/attachments.inc.php, (5) inc/common.inc.php, (6) inc/database.inc.php, (7) inc/prepare_ticket_search.inc.php, (8) inc/print_tickets.inc.php, (9) inc/show_admin_nav.inc.php, (10) inc/show_search_form.inc.php, or (11) inc/ticket_list.inc.php; or (12) the PATH_INFO to language/en/text.php. | [
"cpe:2.3:a:hesk:hesk:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-2f64-gg3p-pvr3 | Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. | []
| null | null | null | null |
|
GHSA-6cr4-3hv4-9r69 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in snstheme SNS Vicky allows PHP Local File Inclusion. This issue affects SNS Vicky: from n/a through 3.7. | []
| null | 8.1 | null | null |
|
CVE-2011-2784 | Google Chrome before 13.0.782.107 allows remote attackers to obtain sensitive information via a request for the GL program log, which reveals a local path in an unspecified log entry. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
CVE-2025-22097 | drm/vkms: Fix use after free and double free on init error | In the Linux kernel, the following vulnerability has been resolved:
drm/vkms: Fix use after free and double free on init error
If the driver initialization fails, the vkms_exit() function might
access an uninitialized or freed default_config pointer and it might
double free it.
Fix both possible errors by initializing default_config only when the
driver initialization succeeded. | []
| null | 7.8 | null | null |
RHSA-2011:1356 | Red Hat Security Advisory: openswan security update | openswan: IKE invalid key length allows remote unauthenticated user to crash openswan | [
"cpe:/o:redhat:enterprise_linux:6::server"
]
| null | null | null | null |
CVE-2017-18697 | Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R7800 before 1.0.2.40 and R9000 before 1.0.2.52. | [
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*"
]
| null | null | 6.8 | null |
|
CVE-2006-5939 | Grisoft AVG Anti-Virus before 7.1.407 allows remote attackers to cause a denial of service (crash) via a crafted DOC file that triggers a divide-by-zero error. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:grisoft:avg_antivirus:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:grisoft:avg_antivirus:7.0.251:*:*:*:*:*:*:*",
"cpe:2.3:a:grisoft:avg_antivirus:7.0.323:*:*:*:*:*:*:*",
"cpe:2.3:a:grisoft:avg_antivirus:7.1.308:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
GHSA-x3j8-g4v9-67jq | Downloads Resources over HTTP in pennyworth | Affected versions of `pennyworth` insecurely downloads resources over HTTP.In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.RecommendationNo patch is currently available for this vulnerability.The best mitigation is currently to avoid using this package, using a different package if available.Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | []
| null | null | null | null |
GHSA-rhjv-54vx-5mjg | In QEMU 3.1, scsi_handle_inquiry_reply in hw/scsi/scsi-generic.c allows out-of-bounds write and read operations. | []
| null | null | 5.5 | null |
|
GHSA-8vqf-p95r-7frg | OMFLOW from The SYSCOM Group has a vulnerability involving the exposure of sensitive data. This allows remote attackers who have logged into the system to obtain password hashes of all users and administrators. | []
| null | 6.5 | null | null |
|
CVE-2024-24805 | WordPress WP Dummy Content Generator plugin <= 3.1.2 - Broken Access Control vulnerability | Missing Authorization vulnerability in Deepak anand WP Dummy Content Generator.This issue affects WP Dummy Content Generator: from n/a through 3.1.2.
| []
| null | 4.3 | null | null |
cisco-sa-dnac-info-disc-6xsCyDYy | Cisco Digital Network Architecture Center Information Disclosure Vulnerability | A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to view sensitive information in clear text.
The vulnerability is due to insecure storage of certain unencrypted credentials on an affected device. An attacker could exploit this vulnerability by viewing the network device configuration and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to use those credentials to discover and manage network devices.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| []
| null | null | 6.5 | null |
GHSA-vwm2-rj6m-p924 | Dnsmasq 2.86 has a heap-based buffer overflow in check_bad_address (called from check_for_bogus_wildcard and FuzzCheckForBogusWildcard). | []
| null | 9.8 | null | null |
|
GHSA-prv2-xwr7-hr57 | Uncontrolled Resource Consumption in rdf-graph-array | rdf-graph-array through 0.3.0-rc6 manipulation of JavaScript objects resutling in Prototype Pollution. The rdf.Graph.prototype.add method could be tricked into adding or modifying properties of Object.prototype. | []
| null | 5.3 | null | null |
GHSA-r5x3-q74r-h7hq | An issue was discovered in MP4Box in GPAC 0.7.1. The function urn_Read in isomedia/box_code_base.c has a heap-based buffer over-read. | []
| null | null | 9.8 | null |
|
GHSA-jx3q-74x5-vgj6 | A design error in Opera 8.01 and earlier allows user-assisted attackers to execute arbitrary code by overlaying a malicious new window above a file download dialog box, then tricking the user into double-clicking on the "Run" button, aka "link hijacking". | []
| null | null | null | null |
|
CVE-2023-50444 | By default, .ZED containers produced by PRIMX ZED! for Windows before Q.2020.3 (ANSSI qualification submission); ZED! for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before 2023.5; ZEDMAIL for Windows before 2023.5; and ZED! for Windows, Mac, Linux before 2023.5 include an encrypted version of sensitive user information, which could allow an unauthenticated attacker to obtain it via brute force. | [
"cpe:2.3:a:primx:zed\\!:*:*:*:*:enterprise:windows:*:*",
"cpe:2.3:a:primx:zedmail:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:primx:zonecentral:*:*:*:*:*:windows:*:*"
]
| null | 7.5 | null | null |
|
CVE-2016-7659 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Audio" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted file. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
GHSA-rf74-mqqr-qwqc | XnView Classic for Windows Version 2.40 allows user-assisted remote attackers to execute code via a crafted .mkv file that is mishandled during the opening of a directory in "Browser" mode, because of a "User Mode Write AV near NULL" in XnView.exe. | []
| null | null | 7.8 | null |
|
CVE-2023-51324 | PHPJabbers Shared Asset Booking System v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file. | []
| null | 6.5 | null | null |
|
GHSA-8cfj-7pmq-h9m9 | Signed integer vulnerability in libnasl in Nessus before 2.0.6 allows local users with plugin upload privileges to cause a denial of service (core dump) and possibly execute arbitrary code by causing a negative argument to be provided to the insstr function as used in a NASL script. | []
| null | null | null | null |
|
GHSA-9rm7-7m57-m6gm | A vulnerability in Cisco Intercloud Fabric for Business and Cisco Intercloud Fabric for Providers could allow an unauthenticated, remote attacker to connect to the database used by these products. More Information: CSCus99394. Known Affected Releases: 7.3(0)ZN(0.99). | []
| null | null | 8.8 | null |
|
RHSA-2018:2402 | Red Hat Security Advisory: rhvm-appliance security update | Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF) kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
]
| null | null | 7.5 | null |
GHSA-wg5j-5hmx-g6c3 | A Type Confusion (CWE-843) vulnerability exists in Eurotherm by Schneider Electric GUIcon V2.0 (Gold Build 683.0) on pcwin.dll which could cause remote code to be executed when parsing a GD1 file | []
| null | null | 7.8 | null |
|
GHSA-prc3-79c5-8h62 | lunary-ai/lunary is vulnerable to a session reuse attack, allowing a removed user to change the organization name without proper authorization. The vulnerability stems from the lack of validation to check if a user is still part of an organization before allowing them to make changes. An attacker can exploit this by using an old authorization token to send a PATCH request, modifying the organization's name even after being removed from the organization. This issue is due to incorrect synchronization and affects the orgs.patch route. | []
| null | null | 7.5 | null |
|
CVE-2017-14008 | GE Centricity PACS RA1000, diagnostic image analysis, all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices. | [
"cpe:2.3:a:ge:centricity_pacs_ra1000:-:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
CVE-2024-13732 | Responsive Blocks – WordPress Gutenberg Blocks <= 1.9.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via section_tag Parameter | The Responsive Blocks – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘section_tag’ parameter in all versions up to, and including, 1.9.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
GHSA-6qm2-c6m9-24vc | Authenticated Insecure Direct Object References (IDOR) vulnerability in WordPress uListing plugin (versions <= 2.0.5). | []
| null | null | null | null |
|
CVE-2003-0784 | Format string vulnerability in tsm for the bos.rte.security fileset on AIX 5.2 allows remote attackers to gain root privileges via login, and local users to gain privileges via login, su, or passwd, with a username that contains format string specifiers. | [
"cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
PYSEC-2018-44 | null | Ansible "User" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list. | []
| null | null | null | null |
CVE-2024-52530 | GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header. | [
"cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2013-2431 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to bypassing the Java sandbox using "method handle intrinsic frames." | [
"cpe:2.3:a:oracle:jre:*:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:*:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2006-5145 | Multiple SQL injection vulnerabilities in OlateDownload 3.4.0 allow remote attackers to execute arbitrary SQL commands via the (1) page parameter in details.php or the (2) query parameter in search.php. | [
"cpe:2.3:a:olate:olatedownload:3.4.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2014-3646 | arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"
]
| null | 5.5 | null | 4.7 |
|
RHSA-2018:1852 | Red Hat Security Advisory: kernel security update | Kernel: FPU state information leakage via lazy FPU restore | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 5.6 | null |
GHSA-g6cp-4pc8-6jfr | Race condition in the kernel in Sun Solaris 8 through 10 allows local users to cause a denial of service (panic) via unspecified vectors related to "the handling of thread contexts." | []
| null | null | null | null |
|
RHSA-2022:0495 | Red Hat Security Advisory: .NET 5.0 security and bugfix update | dotnet: ASP.NET Core Krestel HTTP headers pooling denial of service | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | 7.5 | null | null |
GHSA-76r7-w36h-q737 | Multiple PHP remote file inclusion vulnerabilities in Grayscale BandSite CMS 1.1.1, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the root_path parameter to (1) includes/content/contact_content.php; multiple files in adminpanel/includes/add_forms/ including (2) addbioform.php, (3) addfliersform.php, (4) addgenmerchform.php, (5) addinterviewsform.php, (6) addlinksform.php, (7) addlyricsform.php, (8) addmembioform.php, (9) addmerchform.php, (10) addmerchpicform.php, (11) addnewsform.php, (12) addphotosform.php, (13) addreleaseform.php, (14) addreleasepicform.php, (15) addrelmerchform.php, (16) addreviewsform.php, (17) addshowsform.php, (18) addwearmerchform.php; (19) adminpanel/includes/mailinglist/disphtmltbl.php, and (20) adminpanel/includes/mailinglist/dispxls.php. | []
| null | null | null | null |
|
GHSA-gp69-gv9q-c6wx | Cross Site Scripting (XSS) vulnerability exists in YUNUCMS 1.1.9 via the upurl function in Page.php. | []
| null | null | null | null |
|
CVE-2022-28670 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of AcroForms. Crafted data in an AcroForm can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-16523. | [
"cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 3.3 | null |
|
RHSA-2024:2211 | Red Hat Security Advisory: tcpdump security update | tcpslice: use-after-free in extract_slice() | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 5.5 | null | null |
RHSA-2018:3833 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 firefox: Memory corruption in Angle Mozilla: Use-after-free with select element Mozilla: Buffer overflow in accelerated 2D canvas with Skia Mozilla: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs Mozilla: Integer overflow when calculating buffer sizes for images | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 9.8 | null |
CVE-2007-1736 | Mozilla Firefox 2.0.0.3 does not check URLs embedded in (1) object or (2) iframe HTML tags against the phishing site blacklist, which allows remote attackers to bypass phishing protection. | [
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2023-21254 | In getCurrentState of OneTimePermissionUserManager.java, there is a possible way to hold one-time permissions after the app is being killed due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
| [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
GHSA-cg34-cm8x-3w46 | The Simple Download Monitor plugin before 3.5.4 for WordPress has XSS via the sdm_upload_thumbnail (aka File Thumbnail) parameter in an edit action to wp-admin/post.php. | []
| null | null | 5.4 | null |
|
CVE-2020-5775 | Server-Side Request Forgery in Canvas LMS 2020-07-29 allows a remote, unauthenticated attacker to cause the Canvas application to perform HTTP GET requests to arbitrary domains. | [
"cpe:2.3:a:instructure:canvas_learning_management_service:2020-07-29:*:*:*:*:*:*:*"
]
| null | 5.8 | null | 5 |
|
GHSA-qfh9-xg32-rp5p | Toshiba printers provides API without authentication for internal access. A local attacker can bypass authentication in applications, providing administrative access. As for the affected products/models/versions, see the reference URL. | []
| null | 8.4 | null | null |
|
GHSA-g9mg-8h2c-h9ch | Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. | []
| null | null | null | null |
|
GHSA-fhjj-6gr2-w5wg | The UpdateHub module disables DTLS peer checking, which allows for a man in the middle attack. This is mitigated by firmware images requiring valid signatures. However, there is no benefit to using DTLS without the peer checking. See NCC-ZEP-018 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. | []
| null | null | null | null |
|
CVE-2013-4159 | ctdb before 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, and (5) include/ctdb_private.h. | [
"cpe:2.3:a:ctdb_project:ctdb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ctdb_project:ctdb:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ctdb_project:ctdb:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-fc7r-qxmj-ff6j | In Single Sign-On for Pivotal Cloud Foundry (PCF) 1.3.x versions prior to 1.3.4 and 1.4.x versions prior to 1.4.3, an XXE (XML External Entity) attack was discovered in the Single Sign-On service dashboard. Privileged users can in some cases upload malformed XML leading to exposure of data on the Single Sign-On service broker file system. | []
| null | 6.5 | null | null |
|
CVE-2020-28917 | An issue was discovered in the view_statistics (aka View frontend statistics) extension before 2.0.1 for TYPO3. It saves all GET and POST data of TYPO3 frontend requests to the database. Depending on the extensions used on a TYPO3 website, sensitive data (e.g., cleartext passwords if ext:felogin is installed) may be saved. | [
"cpe:2.3:a:view_frontend_statistics_project:view_frontend_statistics:*:*:*:*:*:typo3:*:*"
]
| null | 6.5 | null | 4 |
|
CVE-2021-0922 | In enforceCrossUserOrProfilePermission of PackageManagerService.java, there is a possible bypass of INTERACT_ACROSS_PROFILES permission due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-195630721 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 4.6 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.