id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-jmj7-mv84-mqc2 | OX App Suite before 7.10.3-rev32 and 7.10.4 before 7.10.4-rev18 allows XSS via a code snippet (user-generated content) when a sharing link is created and the dl parameter is used. | [] | null | null | null | null |
|
CVE-2019-20458 | An issue was discovered on Epson Expression Home XP255 20.08.FM10I8 devices. By default, the device comes (and functions) without a password. The user is at no point prompted to set up a password on the device (leaving a number of devices without a password). In this case, anyone connecting to the web admin panel is capable of becoming admin without using any credentials. | [
"cpe:2.3:h:epson:xp-255:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-v42c-5jq2-7p9m | Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files. | [] | null | 5.5 | null | null |
|
CVE-2023-29157 | Improper access control in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:one_boot_flash_update:*:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
|
GHSA-f6qm-c27v-qr5c | mp4v2 v2.1.3 was discovered to contain a memory leak via MP4SdpAtom::Read() at atom_sdp.cpp | [] | null | 5.5 | null | null |
|
GHSA-v78w-74x8-ppvv | Unspecified vulnerability in the %XML.Utils.SchemaServer class in InterSystems Cache' 5.0 allows attackers to access arbitrary files on a server. | [] | null | null | null | null |
|
GHSA-mj64-372q-86h2 | Multiple cross-site scripting (XSS) vulnerabilities in Cholod MySQL Based Message Board allow remote attackers to inject arbitrary web script or HTML via unknown vectors. NOTE: the provenance of this information is unknown; the details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-hp8g-c523-6r48 | A maliciously crafted 3DM file when parsed in atf_api.dll through Autodesk AutoCAD can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process. | [] | null | 7.8 | null | null |
|
GHSA-jc6g-647j-w9g6 | The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a path traversal vulnerability in libifc.so webdeletesolvideofile function. | [] | null | null | null | null |
|
GHSA-5652-xgcr-p786 | The Magic Stamp (aka vn.avagame.apotatem) application 2.8 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
CVE-2023-4499 | A potential security vulnerability has been identified in the HP ThinUpdate utility (also known as HP Recovery Image and Software Download Tool) which may lead to information disclosure. HP is releasing mitigation for the potential vulnerability. | [
"cpe:2.3:a:hp:thinupdate:-:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:thinupdate:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_mt645:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt21:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt22:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt31:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt32:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt43:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt44:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt45:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt46:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_mt440_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t530:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t540:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t628:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t638:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t640:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t730:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t740:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-jchx-wq68-4727 | Unspecified vulnerability in SAP SAPLPD and SAPSPRINT allows remote attackers to cause a denial of service (application crash) via a certain print job request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
CVE-2024-5941 | GiveWP – Donation Plugin and Fundraising Platform <= 3.14.1 - Missing Authorization to Authenticated (Subscriber+) Limited File Deletion | The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized access and deletion of data due to a missing capability check on the 'handle_request' function in all versions up to, and including, 3.14.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read attachment paths and delete attachment files. | [
"cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
CVE-2018-20253 | In WinRAR versions prior to and including 5.60, There is an out-of-bounds write vulnerability during parsing of a crafted LHA / LZH archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user. | [
"cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2017-1000029 | Oracle, GlassFish Server Open Source Edition 3.0.1 (build 22) is vulnerable to Local File Inclusion vulnerability, that makes it possible to include arbitrary files on the server, this vulnerability can be exploited without any prior authentication. | [
"cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:open_source:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-gm85-c692-g62r | This issue was addressed with improved data protection. This issue is fixed in macOS Monterey 12.6.8, macOS Ventura 13.5, macOS Big Sur 11.7.9. An app may be able to modify protected parts of the file system. | [] | null | 5.5 | null | null |
|
CVE-2018-1788 | IBM Spectrum Protect Server 7.1 and 8.1 could disclose highly sensitive information via trace logs to a local privileged user. IBM X-Force ID: 148873. | [
"cpe:2.3:a:ibm:spectrum_protect_server:*:*:*:*:*:*:*:*"
] | null | null | 4.1 | null |
|
CVE-2022-21446 | Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). The supported version that is affected is 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Solaris accessible data as well as unauthorized read access to a subset of Oracle Solaris accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N). | [
"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
|
GHSA-9jh6-pjcx-gh47 | The Export Users With Meta WordPress plugin before 0.6.5 did not escape the list of roles to export before using them in a SQL statement in the export functionality, available to admins, leading to an authenticated SQL Injection. | [] | null | null | null | null |
|
GHSA-7x9q-8q38-89cr | A logic issue was addressed with improved state management. This issue is fixed in iTunes 12.12.4 for Windows. A local attacker may be able to elevate their privileges. | [] | null | 7.8 | null | null |
|
GHSA-v927-32pv-88x8 | A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931. | [] | null | 5.5 | null | null |
|
GHSA-jx8h-cfqr-f26f | In the Linux kernel, the following vulnerability has been resolved:powerpc/bpf/32: Fix Oops on tail call teststest_bpf tail call tests end up as:test_bpf: #0 Tail call leaf jited:1 85 PASS
test_bpf: #1 Tail call 2 jited:1 111 PASS
test_bpf: #2 Tail call 3 jited:1 145 PASS
test_bpf: #3 Tail call 4 jited:1 170 PASS
test_bpf: #4 Tail call load/store leaf jited:1 190 PASS
test_bpf: #5 Tail call load/store jited:1
BUG: Unable to handle kernel data access on write at 0xf1b4e000
Faulting instruction address: 0xbe86b710
Oops: Kernel access of bad area, sig: 11 [#1]
BE PAGE_SIZE=4K MMU=Hash PowerMac
Modules linked in: test_bpf(+)
CPU: 0 PID: 97 Comm: insmod Not tainted 6.1.0-rc4+ #195
Hardware name: PowerMac3,1 750CL 0x87210 PowerMac
NIP: be86b710 LR: be857e88 CTR: be86b704
REGS: f1b4df20 TRAP: 0300 Not tainted (6.1.0-rc4+)
MSR: 00009032 <EE,ME,IR,DR,RI> CR: 28008242 XER: 00000000
DAR: f1b4e000 DSISR: 42000000
GPR00: 00000001 f1b4dfe0 c11d2280 00000000 00000000 00000000 00000002 00000000
GPR08: f1b4e000 be86b704 f1b4e000 00000000 00000000 100d816a f2440000 fe73baa8
GPR16: f2458000 00000000 c1941ae4 f1fe2248 00000045 c0de0000 f2458030 00000000
GPR24: 000003e8 0000000f f2458000 f1b4dc90 3e584b46 00000000 f24466a0 c1941a00
NIP [be86b710] 0xbe86b710
LR [be857e88] __run_one+0xec/0x264 [test_bpf]
Call Trace:
[f1b4dfe0] [00000002] 0x2 (unreliable)
Instruction dump:
XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
---[ end trace 0000000000000000 ]---This is a tentative to write above the stack. The problem is encoutered
with tests added by commit 38608ee7b690 ("bpf, tests: Add load store
test case for tail call")This happens because tail call is done to a BPF prog with a different
stack_depth. At the time being, the stack is kept as is when the caller
tail calls its callee. But at exit, the callee restores the stack based
on its own properties. Therefore here, at each run, r1 is erroneously
increased by 32 - 16 = 16 bytes.This was done that way in order to pass the tail call count from caller
to callee through the stack. As powerpc32 doesn't have a red zone in
the stack, it was necessary the maintain the stack as is for the tail
call. But it was not anticipated that the BPF frame size could be
different.Let's take a new approach. Use register r4 to carry the tail call count
during the tail call, and save it into the stack at function entry if
required. This means the input parameter must be in r3, which is more
correct as it is a 32 bits parameter, then tail call better match with
normal BPF function entry, the down side being that we move that input
parameter back and forth between r3 and r4. That can be optimised later.Doing that also has the advantage of maximising the common parts between
tail calls and a normal function exit.With the fix, tail call tests are now successfull:test_bpf: #0 Tail call leaf jited:1 53 PASS
test_bpf: #1 Tail call 2 jited:1 115 PASS
test_bpf: #2 Tail call 3 jited:1 154 PASS
test_bpf: #3 Tail call 4 jited:1 165 PASS
test_bpf: #4 Tail call load/store leaf jited:1 101 PASS
test_bpf: #5 Tail call load/store jited:1 141 PASS
test_bpf: #6 Tail call error path, max count reached jited:1 994 PASS
test_bpf: #7 Tail call count preserved across function calls jited:1 140975 PASS
test_bpf: #8 Tail call error path, NULL target jited:1 110 PASS
test_bpf: #9 Tail call error path, index out of range jited:1 69 PASS
test_bpf: test_tail_calls: Summary: 10 PASSED, 0 FAILED, [10/10 JIT'ed] | [] | null | 7.8 | null | null |
|
GHSA-xgjv-9929-vw26 | Loftware Spectrum through 4.6 has unprotected JMX Registry. | [] | null | 7.5 | null | null |
|
GHSA-jfcq-6qwc-xqvx | A improper verification of cryptographic signature vulnerability in plugin management in iota C.ai Conversational Platform from 1.0.0 through 2.1.3 allows remote authenticated users to load a malicious DLL via upload plugin function. | [] | 9.3 | null | null | null |
|
CVE-2019-1010205 | LINAGORA hublin latest (commit 72ead897082403126bf8df9264e70f0a9de247ff) is affected by: Directory Traversal. The impact is: The vulnerability allows an attacker to access any file (with a fixed extension) on the server. The component is: A web-view renderer; details here: https://lgtm.com/projects/g/linagora/hublin/snapshot/af9f1ce253b4ee923ff8da8f9d908d02a8e95b7f/files/backend/webserver/views.js?sort=name&dir=ASC&mode=heatmap&showExcluded=false#xb24eb0101d2aec21:1. The attack vector is: Attacker sends a specially crafted HTTP request. | [
"cpe:2.3:a:linagora:hublin:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2024-9360 | code-projects Restaurant Reservation System updatebal.php sql injection | A vulnerability was found in code-projects Restaurant Reservation System 1.0. It has been classified as critical. This affects an unknown part of the file /updatebal.php. The manipulation of the argument company leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2024-5654 | CF7 Google Sheets Connector <= 5.0.9 - Missing Authorization to Limited Site Configuration Update | The CF7 Google Sheets Connector plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'execute_post_data_cg7_free' function in all versions up to, and including, 5.0.9. This makes it possible for unauthenticated attackers to toggle site configuration settings, including WP_DEBUG, WP_DEBUG_LOG, SCRIPT_DEBUG, and SAVEQUERIES. | [
"cpe:2.3:a:gsheetconnector:cf7_google_sheets_connector:*:*:*:*:free:wordpress:*:*"
] | null | 6.5 | null | null |
CVE-2009-5142 | Cross-site scripting (XSS) vulnerability in timthumb.php in TimThumb 1.09 and earlier, as used in Mimbo Pro 2.3.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the src parameter. | [
"cpe:2.3:a:binarymoon:timthumb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:prothemedesign:mimbo_pro:2.3.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2019-15248 | Cisco SPA100 Series Analog Telephone Adapters Remote Code Execution Vulnerabilities | Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default. | [
"cpe:2.3:o:cisco:spa112_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:-:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr2:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr3:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr4:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa112:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:-:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr2:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr3:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr4:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa122:-:*:*:*:*:*:*:*"
] | null | null | 8 | null |
CVE-2013-1868 | Multiple buffer overflows in VideoLAN VLC media player 2.0.4 and earlier allow remote attackers to cause a denial of service (crash) and execute arbitrary code via vectors related to the (1) freetype renderer and (2) HTML subtitle parser. | [
"cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2012-0443 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | [
"cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta4:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2022-32204 | There is an improper input verification vulnerability in Huawei printer product. Successful exploitation of this vulnerability may cause service abnormal. (Vulnerability ID: HWPSIRT-2022-87185)
This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2022-32204. | [
"cpe:2.3:o:huawei:cv81-wdm_firmware:01.70.49.29.46:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cv81-wdm:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-h6q3-p324-w6wf | Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H). | [] | null | null | 8.3 | null |
|
PYSEC-2018-124 | null | In Exiv2 0.26, there is an integer overflow leading to a heap-based buffer over-read in the Exiv2::getULong function in types.cpp. Remote attackers can exploit the vulnerability to cause a denial of service via a crafted image file. Note that this vulnerability is different from CVE-2017-14864, which is an invalid memory address dereference. | [] | null | null | 6.5 | null |
GHSA-f699-hchg-47fv | A vulnerability in Cisco Prime Data Center Network Manager (DCNM) Software could allow an unauthenticated, remote attacker to log in to the administrative console of a DCNM server by using an account that has a default, static password. The account could be granted root- or system-level privileges. The vulnerability exists because the affected software has a default user account that has a default, static password. The user account is created automatically when the software is installed. An attacker could exploit this vulnerability by connecting remotely to an affected system and logging in to the affected software by using the credentials for this default user account. A successful exploit could allow the attacker to use this default user account to log in to the affected software and gain access to the administrative console of a DCNM server. This vulnerability affects Cisco Prime Data Center Network Manager (DCNM) Software releases prior to Release 10.2(1) for Microsoft Windows, Linux, and Virtual Appliance platforms. Cisco Bug IDs: CSCvd95346. | [] | null | null | 9.8 | null |
|
CVE-2008-7180 | del_query1.php in Telephone Directory 2008 allows remote attackers to delete arbitrary contacts via a direct request with a modified id variable. | [
"cpe:2.3:a:rittwick_banerjee:telephone_directory_2008:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2025-27607 | Python JSON Logger has a Potential RCE via missing `msgspec-python313-pre` dependency | Python JSON Logger is a JSON Formatter for Python Logging. Between 30 December 2024 and 4 March 2025 Python JSON Logger was vulnerable to RCE through a missing dependency. This occurred because msgspec-python313-pre was deleted by the owner leaving the name open to being claimed by a third party. If the package was claimed, it would allow them RCE on any Python JSON Logger user who installed the development dependencies on Python 3.13 (e.g. pip install python-json-logger[dev]). This issue has been resolved with 3.3.0. | [] | null | 8.8 | null | null |
GHSA-p882-vv46-4qp2 | An exploitable denial of service vulnerability exists within the handling of security data in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability. | [] | null | null | 5.9 | null |
|
CVE-2023-6494 | The WPC Smart Quick View for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 4.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [
"cpe:2.3:a:wpclever:wpc_smart_quick_view_for_woocommerce:*:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
CVE-2022-47092 | GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is contains an Integer overflow vulnerability in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8316 | [
"cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
|
GHSA-p42c-v7q9-397h | An security agent resource exhaustion denial-of-service vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow an attacker to flood a temporary log location and consume all disk space on affected installations. | [] | null | null | null | null |
|
GHSA-rwjg-mw9f-v928 | Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer. | [] | null | null | null | null |
|
GHSA-2h6w-rcrp-4x6j | An elevation of privilege vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions, aka 'Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability'. | [] | null | null | null | null |
|
CVE-2024-50014 | ext4: fix access to uninitialised lock in fc replay path | In the Linux kernel, the following vulnerability has been resolved:
ext4: fix access to uninitialised lock in fc replay path
The following kernel trace can be triggered with fstest generic/629 when
executed against a filesystem with fast-commit feature enabled:
INFO: trying to register non-static key.
The code is fine but needs lockdep annotation, or maybe
you didn't initialize this object before use?
turning off the locking correctness validator.
CPU: 0 PID: 866 Comm: mount Not tainted 6.10.0+ #11
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-prebuilt.qemu.org 04/01/2014
Call Trace:
<TASK>
dump_stack_lvl+0x66/0x90
register_lock_class+0x759/0x7d0
__lock_acquire+0x85/0x2630
? __find_get_block+0xb4/0x380
lock_acquire+0xd1/0x2d0
? __ext4_journal_get_write_access+0xd5/0x160
_raw_spin_lock+0x33/0x40
? __ext4_journal_get_write_access+0xd5/0x160
__ext4_journal_get_write_access+0xd5/0x160
ext4_reserve_inode_write+0x61/0xb0
__ext4_mark_inode_dirty+0x79/0x270
? ext4_ext_replay_set_iblocks+0x2f8/0x450
ext4_ext_replay_set_iblocks+0x330/0x450
ext4_fc_replay+0x14c8/0x1540
? jread+0x88/0x2e0
? rcu_is_watching+0x11/0x40
do_one_pass+0x447/0xd00
jbd2_journal_recover+0x139/0x1b0
jbd2_journal_load+0x96/0x390
ext4_load_and_init_journal+0x253/0xd40
ext4_fill_super+0x2cc6/0x3180
...
In the replay path there's an attempt to lock sbi->s_bdev_wb_lock in
function ext4_check_bdev_write_error(). Unfortunately, at this point this
spinlock has not been initialized yet. Moving it's initialization to an
earlier point in __ext4_fill_super() fixes this splat. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-rxj2-pmxv-j3x6 | Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected. | [] | null | null | null | null |
|
RHSA-2024:2820 | Red Hat Security Advisory: varnish security update | varnish: HTTP/2 Broken Window Attack may result in denial of service | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
GHSA-mwjc-697v-r7m7 | A vulnerability has been identified in SIMATIC PCS neo (Administration Console) V4.0 (All versions), SIMATIC PCS neo (Administration Console) V4.0 Update 1 (All versions). The affected application leaks Windows admin credentials. An attacker with local access to the Administration Console could get the credentials, and impersonate the admin user, thereby gaining admin access to other Windows systems. | [] | null | 5.5 | null | null |
|
CVE-2008-2625 | Unspecified vulnerability in the Core RDBMS component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.2 allows remote attackers to affect confidentiality and integrity via unknown vectors. NOTE: the previous information was obtained from the Oracle October 2008 CPU. Oracle has not commented on reliable researcher claims that this issue involves an authentication bypass by establishing a TNS connection and impersonating a user session via a crafted authentication message during proxy authentication mode. | [
"cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_10g:10.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_9i:9.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_9i:9.2.0.8dv:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2021-0654 | In isRealSnapshot of TaskThumbnailView.java, there is possible data exposure due to a missing permission check. This could lead to local information disclosure from locked profiles with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-168802517References: N/A | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2023-1209 | Cross-Site Scripting (XSS) vulnerabilities exist in ServiceNow records allowing an authenticated attacker to inject arbitrary scripts. | [
"cpe:2.3:a:servicenow:servicenow:rome:-:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_1_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_1_hotfix_1a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_1_hotfix_1b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_1_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_10:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_10_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_10_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_10_hotfix_2a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_10_hotfix_2b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_10_hotfix_3b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_3:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_3_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_4:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_4_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_4_hotfix_1a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_4_hotfix_1b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_5:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_5_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_5_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_6:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_6_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_6_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_7_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_7a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_7b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_8:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_8_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_8_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_9:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_9_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_9a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:rome:patch_9b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:-:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_2_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_3:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_3:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_4:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_4:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_4a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_6:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_7:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_7_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_7_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_7_hottix_3:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_7a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_7b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_8:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_8_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_8_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:san_diego:patch_9:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:-:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:patch_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:patch_1_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:patch_1a:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:patch_1b:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:patch_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_3:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_4:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:patch_3:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_1:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_2:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_3:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_4:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:tokyo:patch_4:*:*:*:*:*:*",
"cpe:2.3:a:servicenow:servicenow:utah:-:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
GHSA-3g9j-3prp-r5vg | BilboBlog 0.2.1 allows remote attackers to obtain sensitive information via (1) an enable_cache=false query string to footer.php or (2) a direct request to pagination.php, which reveals the installation path in an error message. | [] | null | null | null | null |
|
CVE-2011-3365 | The KDE SSL Wrapper (KSSL) API in KDE SC 4.6.0 through 4.7.1, and possibly earlier versions, does not use a certain font when rendering certificate fields in a security dialog, which allows remote attackers to spoof the common name (CN) of a certificate via rich text. | [
"cpe:2.3:a:kde:kde_sc:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:kde_sc:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:kde_sc:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:kde_sc:4.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:kde_sc:4.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:kde_sc:4.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:kde_sc:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:kde_sc:4.7.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-v6pq-9wmc-r634 | An XML External Entity (XXE) vulnerability was discovered in /api/notify.php in S-CMS 3.0 which allows attackers to read arbitrary files. | [] | null | null | null | null |
|
CVE-2023-5160 | Full name disclosure via team top membership with Show Full Name option disabled | Mattermost fails to check the Show Full Name option at the /api/v4/teams/TEAM_ID/top/team_members endpoint allowing a member to get the full name of another user even if the Show Full Name option was disabled
| [
"cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
CVE-2023-42897 | The issue was addressed with improved checks. This issue is fixed in iOS 17.2 and iPadOS 17.2. An attacker with physical access may be able to use Siri to access sensitive user data. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 4.6 | null | null |
|
CVE-2015-6785 | The CSPSource::hostMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts an x.y hostname as a match for a *.x.y pattern, which might allow remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a policy that was intended to be specific to subdomains. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2007-5582 | Cross-site scripting (XSS) vulnerability in the login page in Cisco CiscoWorks Server (CS), possibly 2.6 and earlier, when using CiscoWorks Common Services 3.0.x and 3.1, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:cisco:ciscoworks_server:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-vv2x-p796-632v | Perl in Apple OS X before 10.12 allows local users to bypass the taint-mode protection mechanism via a crafted environment variable. | [] | null | null | 5.3 | null |
|
CVE-2021-42545 | Insufficient Session Expiration in TopEase | An insufficient session expiration vulnerability exists in Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27, which allows a remote attacker to reuse, spoof, or steal other user and admin sessions. | [
"cpe:2.3:a:business-dnasolutions:topease:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
GHSA-xqfm-73wx-f547 | A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8. A remote attacker may be able to cause a denial of service. | [] | null | 7.5 | null | null |
|
CVE-2017-15665 | In Flexense DiskBoss Enterprise 8.5.12, the Control Protocol suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 8094. | [
"cpe:2.3:a:flexense:diskboss:8.5.12:*:*:*:enterprise:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-m2gc-ff6x-q3hw | SQL injection vulnerability in admin/categories.php in Dotclear before 2.6.3 allows remote authenticated users with the manage categories permission to execute arbitrary SQL commands via the categories_order parameter. | [] | null | null | null | null |
|
GHSA-gh4c-22p8-f7pp | A stored cross-site scripting (XSS) vulnerability in TotalJS messenger commit b6cf1c9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the channel description field. | [] | null | 5.4 | null | null |
|
GHSA-m565-4qwf-5j4g | Cross-site scripting (XSS) vulnerability in Symantec SecurityExpressions Audit and Compliance Server 4.1.1, 4.1, and earlier allows remote attackers to inject arbitrary web script or HTML via vectors that trigger an error message in a response, related to an "HTML Injection issue." | [] | null | null | null | null |
|
CVE-2021-33224 | File upload vulnerability in Umbraco Forms v.8.7.0 allows unauthenticated attackers to execute arbitrary code via a crafted web.config and asp file. | [
"cpe:2.3:a:umbraco:umbraco_forms:8.7.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2019-5683 | NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in the user mode video driver trace logger component. When an attacker has access to the system and creates a hard link, the software does not check for hard link attacks. This behavior may lead to code execution, denial of service, or escalation of privileges. | [
"cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2020-5665 | Improper check or handling of exceptional conditions in MELSEC iQ-F series FX5U(C) CPU unit firmware version 1.060 and earlier allows an attacker to cause a denial-of-service (DoS) condition on program execution and communication by sending a specially crafted ARP packet. | [
"cpe:2.3:o:mitsubishielectric:melsec_iq-f_fx5u_cpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:melsec_iq-f_fx5u_cpu:-:*:*:*:*:*:*:*"
] | null | 7.4 | null | 3.3 |
|
GHSA-hf43-rrhm-263f | ZyXEL VMG3312-B10B DSL-491HNU-B1B v2 devices allow login/login-page.cgi CSRF. | [] | null | null | 8.8 | null |
|
GHSA-8hjr-66w2-mg84 | The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter. | [] | null | null | 9.8 | null |
|
CVE-2024-9263 | WP Timetics- AI-powered Appointment Booking Calendar and Online Scheduling Plugin <= 1.0.25 - Insecure Direct Object Reference to Unauthenticated Arbitrary User Password/Email Reset/Account Takeover | The WP Timetics- AI-powered Appointment Booking Calendar and Online Scheduling Plugin plugin for WordPress is vulnerable to Account Takeover/Privilege Escalation via Insecure Direct Object Reference in all versions up to, and including, 1.0.25 via the save() due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to reset the emails and passwords of arbitrary user accounts, including administrators, which makes account takeover and privilege escalation possible. | [
"cpe:2.3:a:arraytics:timetics:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-6384-7cj8-j27c | In fixNotification of NotificationManagerService.java, there is a possible bypass of notification hide preference due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-269738057 | [] | null | 7.8 | null | null |
|
CVE-2014-8010 | The web framework in Cisco Unified Communications Domain Manager 8 allows remote authenticated administrators to execute arbitrary OS commands via crafted values, aka Bug ID CSCuq50205. | [
"cpe:2.3:a:cisco:unified_communications_domain_manager:8.0:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
GHSA-hqqj-g6mv-rw46 | A denial-of-service vulnerability in the Mattermost Playbooks plugin allows an authenticated user to crash the server via multiple large requests to one of the Playbooks API endpoints. | [] | null | 6.5 | null | null |
|
CVE-2013-7017 | libavcodec/jpeg2000.c in FFmpeg before 2.1 allows remote attackers to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via crafted JPEG2000 data. | [
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:2.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-3647-wp34-wwxg | In ytnef 1.9.2, the MAPIPrint function in lib/ytnef.c allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file. | [] | null | null | 5.5 | null |
|
GHSA-gp73-j6p3-fx9w | OTFCC v0.10.4 was discovered to contain a segmentation violation via /release-x64/otfccdump+0x4fe954. | [] | null | 6.5 | null | null |
|
GHSA-h645-7253-pp3x | An issue in H3C Technologies Co., Limited H3C Magic RC3000 RC3000V100R009 allows a remote attacker to execute arbitrary code via the Routing functionality. | [] | null | 8.8 | null | null |
|
CVE-2023-1486 | Lespeed WiseCleaner Wise Force Deleter IoControlCode WiseUnlock64.sys 0x220004 access control | A vulnerability classified as problematic was found in Lespeed WiseCleaner Wise Force Deleter 1.5.3.54. This vulnerability affects the function 0x220004 in the library WiseUnlock64.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223372. | [
"cpe:2.3:a:wisecleaner:wise_force_deleter:1.5.3.54:*:*:*:*:*:*:*"
] | null | 4.4 | 4.4 | 3.2 |
CVE-2021-21895 | A directory traversal vulnerability exists in the Web Manager FsTFtp functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to FsTFtp file overwrite. An attacker can make an authenticated HTTP request to trigger this vulnerability. | [
"cpe:2.3:o:lantronix:premierwave_2050_firmware:8.9.0.0:r4:*:*:*:*:*:*",
"cpe:2.3:h:lantronix:premierwave_2050:-:*:*:*:*:*:*:*"
] | null | null | 9.1 | null |
|
GHSA-2859-3xrw-r77c | D-Link DIR-605L v2.13B01 was discovered to contain a hardcoded password vulnerability in /etc/passwd, which allows attackers to log in as root. | [] | null | 8.8 | null | null |
|
CVE-2015-8789 | Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document. | [
"cpe:2.3:a:matroska:libebml:*:*:*:*:*:*:*:*"
] | null | null | 9.6 | 9.3 |
|
CVE-2023-23819 | WordPress itemprop WP for SERP/SEO Rich snippets Plugin <= 3.5.201706131 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Rolands Umbrovskis itemprop WP for SERP/SEO Rich snippets plugin <= 3.5.201706131 versions. | [
"cpe:2.3:a:itemprop_wp_for_serp\\/seo_rich_snippets_project:itemprop_wp_for_serp\\/seo_rich_snippets:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
GHSA-734q-j98p-2ffh | nphpd.php in newsPHP 216 and earlier allows remote attackers to bypass authentication via an HTTP request with a modified nphp_users array, which is used for authentication. | [] | null | null | null | null |
|
GHSA-whpp-mq64-qp2q | Adobe Robohelp version 2020.0.3 (and earlier) is affected by an uncontrolled search path element vulnerability that could lead to privilege escalation. An attacker with permissions to write to the file system could leverage this vulnerability to escalate privileges. | [] | null | null | null | null |
|
CVE-2019-13709 | Insufficient policy enforcement in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-w782-gjg9-cjx6 | The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line resolution allowing them to break the cache-line-level protection. For details on the attack refer to: https://doi.org/10.46586/tches.v2024.i1.457-500 | [] | null | 4.1 | null | null |
|
GHSA-qmx6-x96x-xp97 | Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections. | [] | null | null | null | null |
|
GHSA-jxh4-4p8g-j4j8 | A vulnerability was found in Ruijie RG-UAC up to 20240428 and classified as critical. This issue affects some unknown processing of the file /view/IPV6/ipv6StaticRoute/static_route_add_ipv6.php. The manipulation of the argument text_prefixlen/text_gateway/devname leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263111. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | 4.7 | null | null |
|
GHSA-9qwx-qvm3-h6gg | Missing Authorization vulnerability in Analytify.This issue affects Analytify: from n/a through 4.2.3. | [] | null | 6.5 | null | null |
|
RHSA-2024:3411 | Red Hat Security Advisory: glibc security update | glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 4 | null | null |
CVE-2014-1356 | Heap-based buffer overflow in launchd in Apple iOS before 7.1.2, Apple OS X before 10.9.4, and Apple TV before 6.1.2 allows attackers to execute arbitrary code via a crafted application that sends IPC messages. | [
"cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2013-0616 | Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-1530, CVE-2013-0601, CVE-2013-0605, CVE-2013-0619, CVE-2013-0620, and CVE-2013-0623. | [
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.2:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.4:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.1:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.2:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.3:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.4:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.5:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.6:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2020-36623 | Pengu index.js runApp cross-site request forgery | A vulnerability was found in Pengu. It has been declared as problematic. Affected by this vulnerability is the function runApp of the file src/index.js. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The name of the patch is aea66f12b8cdfc3c8c50ad6a9c89d8307e9d0a91. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216475. | [
"cpe:2.3:a:pengu_project:pengu:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
CVE-2022-36953 | In Veritas NetBackup OpsCenter, certain endpoints could allow an unauthenticated remote attacker to gain sensitive information. This affects 8.x through 8.3.0.2, 9.x through 9.0.0.1, 9.1.x through 9.1.0.1, and 10. | [
"cpe:2.3:a:veritas:netbackup:*:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup:9.1.0.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
CVE-2007-4561 | Heap-based buffer overflow in the RTSP service in Helix DNA Server before 11.1.4 allows remote attackers to execute arbitrary code via an RSTP command containing multiple Require headers. | [
"cpe:2.3:a:realnetworks:helix_dna_server:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:helix_dna_server:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:helix_dna_server:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:helix_dna_server:11.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:helix_dna_server:11.1.3:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-w6g6-83gc-85hx | An improper privilege management vulnerability in the debug CLI command of the Zyxel ATP series firmware versions 4.32 through 5.37, USG FLEX series firmware versions 4.50 through 5.37, USG FLEX 50(W) series firmware versions 4.16 through 5.37, USG20(W)-VPN series firmware versions 4.16 through 5.37, VPN series firmware versions 4.30 through 5.37, NWA50AX firmware version 6.29(ABYW.2), WAC500 firmware version 6.65(ABVS.1), WAX300H firmware version 6.60(ACHF.1), and WBE660S firmware version 6.65(ACGG.1), could allow an authenticated local attacker to access system files on an affected device. | [] | null | 5.5 | null | null |
|
GHSA-hx3v-wmpr-r7fv | The icegram plugin before 1.10.29 for WordPress has ig_cat_list XSS. | [] | null | null | 5.4 | null |
|
CVE-2024-0238 | EventON (Free < 2.2.8, Premium < 4.5.6) - Unauthenticated Arbitrary Post Metadata Update | The EventON Premium WordPress plugin before 4.5.6, EventON WordPress plugin before 2.2.8 do not have authorisation in an AJAX action, and does not ensure that the post to be updated belong to the plugin, allowing unauthenticated users to update arbitrary post metadata. | [
"cpe:2.3:a:myeventon:eventon:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null |
CVE-2024-54109 | Read/Write vulnerability in the image decoding module
Impact: Successful exploitation of this vulnerability will affect availability. | [
"cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2023-1158 | Hitachi Vantara Pentaho Business Analytics Server - Incorrect Authorization |
Hitachi Vantara Pentaho Business Analytics Server versions before 9.4.0.1 and 9.3.0.3, including 8.3.x expose dashboard prompts to users who are not part of the authorization list.
| [
"cpe:2.3:a:hitachi:vantara_pentaho:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:vantara_pentaho_business_analytics_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:vantara_pentaho_business_analytics_server:9.4.0.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
Subsets and Splits