id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-96mv-2w64-8xpw | Integer overflow in the license_read_scope_list function in libfreerdp/core/license.c in FreeRDP through 1.0.2 allows remote RDP servers to cause a denial of service (application crash) or possibly have unspecified other impact via a large ScopeCount value in a Scope List in a Server License Request packet. | [] | null | null | null | null |
|
CVE-2019-4314 | IBM Security Guardium Big Data Intelligence (SonarG) 4.0 stores sensitive information in cleartext within a resource that might be accessible to another control sphere. IBM X-Force ID: 1610141. | [
"cpe:2.3:a:ibm:security_guardium_big_data_intelligence:4.0:*:*:*:*:*:*:*"
] | null | null | 5.9 | null |
|
GHSA-373f-8cjq-6rp7 | Cross-site scripting (XSS) vulnerability in a calendar component in Cybozu Garoon before 3.7.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
CVE-2017-5481 | Trend Micro OfficeScan 11.0 before SP1 CP 6325 and XG before CP 1352 allows remote authenticated users to gain privileges by leveraging a leak of an encrypted password during a web-console operation. | [
"cpe:2.3:a:trendmicro:officescan:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:officescan:12.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 4 |
|
GHSA-2rfv-rvpp-5prp | Multiple unspecified vulnerabilities in Oracle Database 10.1.0.5 and 10.2.0.2 have unknown impact and remote authenticated attack vectors, related to (1) Change Data Capture (CDC), aka DB08, and (2) Oracle Instant Client, aka DB11. NOTE: as of 20070424, oracle has not disputed reliable claims that these issues are buffer overflows using a long CHANGE_TABLE_NAME parameter to the DBMS_CDC_IPUBLISH.CHGTAB_CACHE procedure (DB08) and Oracle Instant Client genezi utility (DB11). | [] | null | null | null | null |
|
CVE-2014-3374 | Multiple cross-site scripting (XSS) vulnerabilities in the CCM admin interface in the Server in Cisco Unified Communications Manager allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuq90582. | [
"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-96qm-hwhp-2rm8 | Improper Authentication in CraftCMS two factor authentication plugin | The CraftCMS plugin Two-Factor Authentication through 3.3.3 allows reuse of TOTP tokens multiple times within the validity period. | [] | null | 4.8 | null | null |
CVE-2025-0301 | code-projects Online Book Shop subcat.php cross site scripting | A vulnerability, which was classified as problematic, has been found in code-projects Online Book Shop 1.0. Affected by this issue is some unknown functionality of the file /subcat.php. The manipulation of the argument catnm leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 3.5 | 3.5 | 4 |
GHSA-h8j3-gq64-h6q7 | Secure Webserver 1.1 in Raptor 6.5 and Symantec Enterprise Firewall 6.5.2 allows remote attackers to identify IP addresses of hosts on the internal network via a CONNECT request, which generates different error messages if the host is present. | [] | null | null | null | null |
|
CVE-2022-24032 | Adenza AxiomSL ControllerView through 10.8.1 is vulnerable to user enumeration. An attacker can identify valid usernames on the platform because a failed login attempt produces a different error message when the username is valid. | [
"cpe:2.3:a:adenza:axiomsl_controllerview:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
GHSA-cq2w-vhhm-7v5j | Application Access Server (A-A-S) 2.0.48 has "wildbat" as its default password for the admin account, which makes it easier for remote attackers to obtain access. | [] | null | null | null | null |
|
GHSA-7fg8-fwgf-g9x2 | An issue in Olive VLE allows an attacker to obtain sensitive information via the reset password function. | [] | null | 9.8 | null | null |
|
GHSA-993c-4hx4-cg4r | The Inventory module of the 1E Client 5.0.0.745 doesn't handle an unquoted path when executing %PROGRAMFILES%\1E\Client\Tachyon.Performance.Metrics.exe. This may allow remote authenticated users and local users to gain elevated privileges. | [] | null | null | null | null |
|
GHSA-mfc2-pm34-9x3q | In plugin_extern_func of TBD, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 5.5 | null | null |
|
GHSA-rxm4-rcrf-9vfm | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Martin Gibson IdeaPush allows Stored XSS.This issue affects IdeaPush: from n/a through 8.65. | [] | null | 7.1 | null | null |
|
CVE-2006-4562 | The proxy DNS service in Symantec Gateway Security (SGS) allows remote attackers to make arbitrary DNS queries to third-party DNS servers, while hiding the source IP address of the attacker. NOTE: another researcher has stated that the default configuration does not proxy DNS queries received on the external interface | [
"cpe:2.3:h:symantec:gateway_security:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:gateway_security:320:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:gateway_security:360:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:gateway_security:360r:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:gateway_security:5000_series_2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:gateway_security:5000_series_3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:gateway_security:5110:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:gateway_security:5110_1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:gateway_security:5200:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:gateway_security:5200_1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:gateway_security:5300:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:gateway_security:5300_1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:gateway_security:5310_1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:gateway_security:5400_2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:gateway_security:5400_2.0.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2021-36461 | An Arbitrary File Upload vulnerability exists in Microweber 1.1.3 that allows attackers to getshell via the Settings Upload Picture section by uploading pictures with malicious code, user.ini. | [
"cpe:2.3:a:microweber:microweber:1.1.3:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
CVE-2016-5092 | Directory traversal vulnerability in Fortinet FortiWeb before 5.5.3 allows remote authenticated administrators with read and write privileges to read arbitrary files by leveraging the autolearn feature. | [
"cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*"
] | null | null | 4.9 | 4 |
|
GHSA-74wf-cwjg-9cf2 | xopen is vulnerable to OS Command Injection in Exported Function xopen(filepath) | A command injection vulnerability affects all versions of package xopen. The injection point is located in line 14 in index.js in the exported function `xopen(filepath)`. | [] | null | 9.8 | null | null |
GHSA-cpvh-4gx4-j54g | An issue was discovered in EMC ScaleIO versions before 2.0.1.1. A low-privileged local attacker may cause a denial-of-service by generating a kernel panic in the SCINI driver using IOCTL calls which may render the ScaleIO Data Client (SDC) server unavailable until the next reboot. | [] | null | null | 5.5 | null |
|
CVE-2022-29002 | A Cross-Site Request Forgery (CSRF) in XXL-Job v2.3.0 allows attackers to arbitrarily create administrator accounts via the component /gaia-job-admin/user/add. | [
"cpe:2.3:a:xuxueli:xxl-job:2.3.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-r452-gqxc-g33r | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlParserInputRead+0x00000000000929f5." | [] | null | null | 7.8 | null |
|
GHSA-85wm-66pv-53vh | Dell OS10, version 10.5.3.4, contains an Improper Certificate Validation vulnerability in Support Assist. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to unauthorized access to limited switch configuration data. The vulnerability could be leveraged by attackers to conduct man-in-the-middle attacks to gain access to the Support Assist information. | [] | null | 3.7 | null | null |
|
CVE-2012-5658 | rhc-chk.rb in Red Hat OpenShift Origin before 1.1, when -d (debug mode) is used, outputs the password and other sensitive information in cleartext, which allows context-dependent attackers to obtain sensitive information, as demonstrated by including log files or Bugzilla reports in support channels. | [
"cpe:2.3:a:redhat:openshift:*:-:enterprise:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_origin:1.0.5:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-w598-25hm-jqx3 | RCE vulnerability in Jenkins Pipeline: AWS Steps Plugin | Pipeline: AWS Steps Plugin 1.40 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to Pipeline: AWS Steps Plugin’s build steps.Pipeline: AWS Steps Plugin 1.41 configures its YAML parser to only instantiate safe types. | [] | null | 8.8 | null | null |
GHSA-35xp-mwcf-j33g | In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Do not return negative stream id for array[WHY]
resource_stream_to_stream_idx returns an array index and it return -1
when not found; however, -1 is not a valid array index number.[HOW]
When this happens, call ASSERT(), and return a zero instead.This fixes an OVERRUN and an NEGATIVE_RETURNS issues reported by Coverity. | [] | null | null | null | null |
|
GHSA-hmpc-h8ww-8c7c | Uncontrolled search path in some Intel(R) GPA Framework software before version 2023.4 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | null | 6.7 | null | null |
|
CVE-2018-21120 | Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10. | [
"cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wac505_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wac505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*"
] | null | null | 5.2 | null |
|
GHSA-5g4j-78x8-fff7 | All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s web portal is vulnerable to accepting malicious firmware packages that could provide a backdoor to an attacker and provide privilege escalation to the device. | [] | null | 10 | null | null |
|
RHSA-2009:1067 | Red Hat Security Advisory: Red Hat Application Stack v2.3 security and enhancement update | MySQL: Using an empty binary value leads to server crash mysql: incomplete upstream fix for CVE-2008-2079 perl-DBD-Pg: pg_getline buffer overflow postgresql: potential DoS due to conversion functions perl-DBD-Pg: dequote_bytea memory leak | [
"cpe:/a:redhat:rhel_application_stack:2"
] | null | null | null | null |
CVE-2008-3049 | The PDF Generator 2 (pdf_generator2) extension 0.5.0 and earlier for TYPO3 allows attackers to obtain sensitive information via unspecified vectors. | [
"cpe:2.3:a:typo3:pdf_generator_2_extension:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-67mq-mrh8-wj53 | IBM Security ReaQta 3.12 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | [] | null | 3.1 | null | null |
|
CVE-2005-0349 | The production release of the UniversalAgent for UNIX in BrightStor ARCserve Backup 11.1 contains hard-coded credentials, which allows remote attackers to access the file system and possibly execute arbitrary commands. | [
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-ggpj-mx2f-9w7v | SQL injection vulnerability in uye_profil.asp in Tekman Portal (TR) 1.0 allows remote attackers to execute arbitrary SQL commands via the uye_id parameter. | [] | null | null | null | null |
|
CVE-2025-30575 | WordPress Login Redirect - <= <= 1.0.5 Cross Site Scripting (XSS) Vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arefly Login Redirect allows Stored XSS. This issue affects Login Redirect: from n/a through 1.0.5. | [] | null | 5.9 | null | null |
GHSA-jm3q-4p3v-cv8w | A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V2.0). The affected application is missing general HTTP security headers in the web server. This could allow an attacker to make the servers more prone to clickjacking attack. | [] | 2.1 | 4.2 | null | null |
|
RHSA-2005:517 | Red Hat Security Advisory: HelixPlayer security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
GHSA-mvq3-wvvh-jf93 | SQL injection vulnerability in add_post.php3 in Venom Board 1.22 allows remote attackers to execute arbitrary SQL commands via the (1) parent, (2) root, and (3) topic_id parameters to post.php3. | [] | null | null | null | null |
|
CVE-2021-1076 | NVIDIA GPU Display Driver for Windows and Linux, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys or nvidia.ko) where improper access control may lead to denial of service, information disclosure, or data corruption. | [
"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 6.6 | null | null |
|
GHSA-7v35-v296-2fwg | An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves the "Audio" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted audio file. | [] | null | null | 7.8 | null |
|
CVE-2021-44378 | A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetEnc param is not object. An attacker can send an HTTP request to trigger this vulnerability. | [
"cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*",
"cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*"
] | null | null | 8.6 | null |
|
CVE-2019-15985 | Cisco Data Center Network Manager SQL Injection Vulnerabilities | Multiple vulnerabilities in the REST and SOAP API endpoints of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to execute arbitrary SQL commands on an affected device. To exploit these vulnerabilities, an attacker would need administrative privileges on the DCNM application. For more information about these vulnerabilities, see the Details section of this advisory. Note: The severity of these vulnerabilities is aggravated by the vulnerabilities described in the Cisco Data Center Network Manager Authentication Bypass Vulnerabilities advisory, published simultaneously with this one. | [
"cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | null |
GHSA-vjj2-8h5f-qhf5 | ImageIO in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted TIFF image. | [] | null | null | null | null |
|
CVE-2024-45279 | Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Application Server for ABAP (CRM Blueprint Application Builder Panel) | Due to insufficient input validation, CRM Blueprint Application Builder Panel of SAP NetWeaver Application Server for ABAP allows an unauthenticated attacker to craft a URL link which could embed a malicious JavaScript. When a victim clicks on this link, the script will be executed in the victim's browser giving the attacker the ability to access and/or modify information with no effect on availability of the application. | [] | null | 6.1 | null | null |
GHSA-843h-74ff-22vf | In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: Fix even more out of bound writes from debugfsCVE-2021-42327 was fixed by:commit f23750b5b3d98653b31d4469592935ef6364ad67
Author: Thelford Williams <[email protected]>
Date: Wed Oct 13 16:04:13 2021 -0400but amdgpu_dm_debugfs.c contains more of the same issue so fix the
remaining ones.v2:
* Add missing fix in dp_max_bpc_write (Harry Wentland) | [] | null | 7.8 | null | null |
|
CVE-2019-20617 | An issue was discovered on Samsung mobile devices with P(9.0) software. Secure Folder leaks preview data of recent apps. The Samsung ID is SVE-2018-13764 (March 2019). | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2023-35337 | Win32k Elevation of Privilege Vulnerability | Win32k Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2023-6238 | Kernel: nvme: memory corruption via unprivileged user passthrough | A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel. Only privileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing random kernel crashes and memory corruption. | [
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
CVE-2007-0970 | Multiple SQL injection vulnerabilities in WebTester 5.0.20060927 and earlier allow remote attackers to execute arbitrary SQL commands via the testID parameter to directions.php, and unspecified parameters to other files that accept GET or POST input. | [
"cpe:2.3:a:webtester:webtester:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-xrqg-3g47-qq3r | An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rre.c allows out-of-bounds access via encodings. | [] | null | 5.4 | null | null |
|
CVE-2021-41991 | The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility. | [
"cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinema_remote_connect_server:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cp_1243-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1243-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1242-7_gprs_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc632-2c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc632-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:cp_1543-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:cp_1543-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cp_1543sp-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1543sp-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_net_cp1243-7_lte_eu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_net_cp1243-7_lte_eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cp_1243-7_lte\\/us_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1243-7_lte\\/us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cp_1542sp-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1542sp-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc636-2c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc636-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cp_1542sp-1_irc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1542sp-1_irc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc642-2c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc642-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc646-2c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc646-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc622-2c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc622-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_rail_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1200_cp_1243-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1200_cp_1243-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2024-31144 | Xapi: Metadata injection attack against backup/restore functionality | For a brief summary of Xapi terminology, see:
https://xapi-project.github.io/xen-api/overview.html#object-model-overview
Xapi contains functionality to backup and restore metadata about Virtual
Machines and Storage Repositories (SRs).
The metadata itself is stored in a Virtual Disk Image (VDI) inside an
SR. This is used for two purposes; a general backup of metadata
(e.g. to recover from a host failure if the filer is still good), and
Portable SRs (e.g. using an external hard drive to move VMs to another
host).
Metadata is only restored as an explicit administrator action, but
occurs in cases where the host has no information about the SR, and must
locate the metadata VDI in order to retrieve the metadata.
The metadata VDI is located by searching (in UUID alphanumeric order)
each VDI, mounting it, and seeing if there is a suitable metadata file
present. The first matching VDI is deemed to be the metadata VDI, and
is restored from.
In the general case, the content of VDIs are controlled by the VM owner,
and should not be trusted by the host administrator.
A malicious guest can manipulate its disk to appear to be a metadata
backup.
A guest cannot choose the UUIDs of its VDIs, but a guest with one disk
has a 50% chance of sorting ahead of the legitimate metadata backup. A
guest with two disks has a 75% chance, etc. | [] | null | 3.8 | null | null |
GHSA-g7v3-vhg9-j2fq | Directory traversal vulnerability in Trend Micro Control Manager 6.0 allows remote code execution by attackers able to drop arbitrary files in a web-facing directory. Formerly ZDI-CAN-4684. | [] | null | null | 9.8 | null |
|
CVE-2022-4603 | ppp pppdump pppdump.c dumpppp array index | A vulnerability classified as problematic has been found in ppp. Affected is the function dumpppp of the file pppdump/pppdump.c of the component pppdump. The manipulation of the argument spkt.buf/rpkt.buf leads to improper validation of array index. The real existence of this vulnerability is still doubted at the moment. The name of the patch is a75fb7b198eed50d769c80c36629f38346882cbf. It is recommended to apply a patch to fix this issue. VDB-216198 is the identifier assigned to this vulnerability. NOTE: pppdump is not used in normal process of setting up a PPP connection, is not installed setuid-root, and is not invoked automatically in any scenario. | [
"cpe:2.3:a:samba:ppp:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:samba:ppp:*:*:*:*:*:solaris:*:*"
] | null | 4.3 | null | null |
CVE-2021-3156 | Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. | [
"cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sudo_project:sudo:1.9.5:-:*:*:*:*:*:*",
"cpe:2.3:a:sudo_project:sudo:1.9.5:patch1:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager_core_package:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:web_gateway:8.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:web_gateway:9.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:web_gateway:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:diskstation_manager_unified_controller:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:skynas_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:skynas:-:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*",
"cpe:2.3:a:beyondtrust:privilege_management_for_mac:*:*:*:*:*:*:*:*",
"cpe:2.3:a:beyondtrust:privilege_management_for_unix\\/linux:*:*:*:*:basic:*:*:*",
"cpe:2.3:o:oracle:micros_compact_workstation_3_firmware:310:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:micros_compact_workstation_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:micros_es400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:micros_es400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:micros_kitchen_display_system_firmware:210:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:micros_kitchen_display_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:micros_workstation_5a_firmware:5a:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:micros_workstation_5a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:micros_workstation_6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:micros_workstation_6:-:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
GHSA-qrmw-h7g2-7vjj | The Djelibeybi configuration examples for use of NGINX in SUSE Portus 2.3, when applied to certain configurations involving Docker Compose, have a Missing SSL Certificate Validation issue because no proxy_ssl_* directives are used. | [] | null | null | 8.8 | null |
|
CVE-2022-36037 | Cross-site scripting (XSS) from dynamic options in the multiselect field in Kirby | kirby is a content management system (CMS) that adapts to many different projects and helps you build your own ideal interface. Cross-site scripting (XSS) is a type of vulnerability that allows execution of any kind of JavaScript code inside the Panel session of the same or other users. In the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. If bad actors gain access to your group of authenticated Panel users they can escalate their privileges via the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. The multiselect field allows selection of tags from an autocompleted list. Unfortunately, the Panel in Kirby 3.5 used HTML rendering for the raw option value. This allowed **attackers with influence on the options source** to store HTML code. The browser of the victim who visited a page with manipulated multiselect options in the Panel will then have rendered this malicious HTML code when the victim opened the autocomplete dropdown. Users are *not* affected by this vulnerability if you don't use the multiselect field or don't use it with options that can be manipulated by attackers. The problem has been patched in Kirby 3.5.8.1. | [
"cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
RHSA-2020:0708 | Red Hat Security Advisory: http-parser security update | nodejs: HTTP request smuggling using malformed Transfer-Encoding header | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.1 | null | null |
GHSA-m728-ff6j-xcqp | A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to upload or delete files on an affected device.This vulnerability exists because of missing authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to upload files into a specific container or delete files from a specific folder within that container. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface. | [] | null | 5.4 | null | null |
|
CVE-2021-29362 | A buffer overflow vulnerability in FORMATS!ReadRAS_W+0xa30 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file. | [
"cpe:2.3:a:irfanview:irfanview:4.57:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-crj7-2ffg-jp2v | IBM Intelligent Operations Center V5.1.0 through V5.2.0 could disclose detailed error messages, revealing sensitive information that could aid in further attacks against the system. IBM X-Force ID: 162738. | [] | null | 6.2 | null | null |
|
GHSA-m5qm-mh2p-v9h5 | Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819. | [] | null | 6.5 | null | null |
|
GHSA-g8h3-hp92-c5qx | GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker's OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check.c error. NOTE: GnuPG 2.3.x is unaffected. GnuPG 2.2.23 is a fixed version. | [] | null | null | null | null |
|
GHSA-m4xx-f75v-xfq3 | In the Linux kernel, the following vulnerability has been resolved:sfc: Don't invoke xdp_do_flush() from netpoll.Yury reported a crash in the sfc driver originated from
netpoll_send_udp(). The netconsole sends a message and then netpoll
invokes the driver's NAPI function with a budget of zero. It is
dedicated to allow driver to free TX resources, that it may have used
while sending the packet.In the netpoll case the driver invokes xdp_do_flush() unconditionally,
leading to crash because bpf_net_context was never assigned.Invoke xdp_do_flush() only if budget is not zero. | [] | null | 5.5 | null | null |
|
ICSMA-18-310-01 | Roche Diagnostics Point of Care Handheld Medical Devices (Update A) | Weak access credentials may enable attackers in the adjacent network to gain unauthorized service access via a service interface. CVE-2018-18561 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).. Affected products:CVE-2018-18561 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). Insecure permissions in a service interface may allow authenticated attackers in the adjacent network to execute arbitrary commands on the operating systems. CVE-2018-18562 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H).. Affected products:CVE-2018-18562 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H). A vulnerability in the software update mechanism allows an attacker in adjacent network to overwrite arbitrary files on the system through a crafted update package. CVE-2018-18563 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H).. Affected products: Affected products:. Accu-Chek Inform II Instrument - all versions before 03.06.00 (serial number below 14000) / 04.03.00 (serial Number above 14000)CVE-2018-18563 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H). Improper access control to a service command allows attackers in the adjacent network to execute arbitrary code on the system through a crafted message. CVE-2018-18564 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).. Affected Products:CVE-2018-18564 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). Improper access control allows attackers in the adjacent network to change the instrument configuration. CVE-2018-18565 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H).. Affected products:CVE-2018-18565 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H). | [] | null | null | 8.2 | null |
GHSA-289v-jmv7-6xmx | In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set. | [] | null | null | null | null |
|
GHSA-f3pg-xh2r-fcrw | In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code. | [] | null | null | null | null |
|
CVE-2011-2925 | Cumin in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0 records broker authentication credentials in a log file, which allows local users to bypass authentication and perform unauthorized actions on jobs and message queues via a direct connection to the broker. | [
"cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
RHSA-2021:0024 | Red Hat Security Advisory: ImageMagick security update | ImageMagick: Shell injection via PDF password could result in arbitrary code execution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.3 | null | null |
CVE-2011-4682 | The JavaScript engine in Opera before 11.60 does not properly implement the in operator, which allows remote attackers to bypass the Same Origin Policy via vectors related to variables on different web sites. | [
"cpe:2.3:a:opera:opera_browser:*:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.00:alpha:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.10:alpha:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.50:alpha:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.50:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.52:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-6623-75vm-qff3 | WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1. | [] | null | null | null | null |
|
CVE-2021-46447 | A cross-site scripting (XSS) vulnerability in H.H.G Multistore v5.1.0 and below allows attackers to execute arbitrary web scripts or HTML via a crafted payload inserted into the State parameter under the Address Book module. | [
"cpe:2.3:a:hhg-multistore:multistore:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:hhg-multistore:multistore:4.10.3:*:*:*:community:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2023-37953 | A missing permission check in Jenkins mabl Plugin 0.0.46 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [
"cpe:2.3:a:jenkins:mabl:*:*:*:*:*:jenkins:*:*"
] | null | 6.5 | null | null |
|
GHSA-x2x7-q72v-2q6q | An exploitable access control vulnerability exists in the data, program, and function file permissions functionality of Allen Bradley Micrologix 1400 Series B FRN 21.2 and before. A specially crafted packet can cause a read or write operation resulting in disclosure of sensitive information, modification of settings, or modification of ladder logic. An attacker can send unauthenticated packets to trigger this vulnerability. Required Keyswitch State: REMOTE Description: Live rung edits are able to be made by an unauthenticated user allowing for addition, deletion, or modification of existing ladder logic. Additionally, faults and cpu state modification can be triggered if specific ladder logic is used. | [] | null | null | 9.8 | null |
|
CVE-2017-8356 | In ImageMagick 7.0.5-5, the ReadSUNImage function in sun.c allows attackers to cause a denial of service (memory leak) via a crafted file. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.5-5:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-c3w7-xm4j-hrp8 | OS command injection vulnerability in WAB-S600-PS all versions, and WAB-S300 all versions allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. | [] | null | 8.8 | null | null |
|
GHSA-gf86-j8mh-wpxq | SQL injection vulnerability in Domain Technologie Control (DTC) before 0.34.1 allows remote authenticated users to execute arbitrary SQL commands via the addrlink parameter to shared/inc/forms/domain_info.php. NOTE: CVE-2011-3197 has been SPLIT due to findings by different researchers. CVE-2011-5272 has been assigned for the vps_note parameter to dtcadmin/logPushlet.php vector. | [] | null | null | null | null |
|
GHSA-p7wf-2w5g-7chw | The Live updates from Excel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ipushpull_page' shortcode in versions up to, and including, 2.3.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2013-2407 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "XML security and the class loader." | [
"cpe:2.3:a:oracle:jre:*:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:*:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:*:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update41:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update43:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:*:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update41:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update43:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2023-26286 | IBM AIX privilege escalation | IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX runtime services library to execute arbitrary commands. IBM X-Force ID: 248421. | [
"cpe:2.3:a:ibm:vios:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.3:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
CVE-2005-0425 | Unknown vulnerability in IBM Websphere Application Server 5.0, 5.1, and 6.0 when running on Windows, allows remote attackers to obtain the source code for Java Server Pages (.jsp) via a crafted URL that causes the page to be processed by the file serving servlet instead of the JSP engine. | [
"cpe:2.3:a:ibm:websphere_application_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2012:1459 | Red Hat Security Advisory: nspluginwrapper security and bug fix update | nspluginwrapper: NPNVprivateModeBool variable not forwarded | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-xgxp-9x8p-gcw4 | SQL Injection | A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | [] | null | 8.8 | null | null |
GHSA-wg4m-r562-77pw | A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V17 (All versions >= V17 Update 2), SIMATIC WinCC V7.4 and earlier (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system. | [] | null | 7.8 | null | null |
|
CVE-2022-49417 | iwlwifi: mei: fix potential NULL-ptr deref | In the Linux kernel, the following vulnerability has been resolved:
iwlwifi: mei: fix potential NULL-ptr deref
If SKB allocation fails, continue rather than using the NULL
pointer.
Coverity CID: 1497650 | [] | null | null | null | null |
GHSA-2c2q-v642-37w6 | The Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archive. This affects Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Server, and Secure Web Gateway. | [] | null | 7.8 | null | null |
|
CVE-2008-7004 | Buffer overflow in Electronic Logbook (ELOG) before 2.7.1 has unknown impact and attack vectors, possibly related to elog.c. | [
"cpe:2.3:a:elog:elog:*:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.1.:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:elog:elog:2.6.5:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2023-36033 | Windows DWM Core Library Elevation of Privilege Vulnerability | Windows DWM Core Library Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-qq39-f366-wjqw | In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: fix use-after-free in chanctx codeIn ieee80211_vif_use_reserved_context(), when we have an
old context and the new context's replace_state is set to
IEEE80211_CHANCTX_REPLACE_NONE, we free the old context
in ieee80211_vif_use_reserved_reassign(). Therefore, we
cannot check the old_ctx anymore, so we should set it to
NULL after this point.However, since the new_ctx replace state is clearly not
IEEE80211_CHANCTX_REPLACES_OTHER, we're not going to do
anything else in this function and can just return to
avoid accessing the freed old_ctx. | [] | null | 7.8 | null | null |
|
CVE-2020-5302 | unprivileged user can access priviledged action in MH-WikiBot | MH-WikiBot (an IRC Bot for interacting with the Miraheze API), had a bug that allowed any unprivileged user to access the steward commands on the IRC interface by impersonating the Nickname used by a privileged user as no check was made to see if they were logged in. The issue has been fixed in commit 23d9d5b0a59667a5d6816fdabb960b537a5f9ed1. | [
"cpe:2.3:a:mh-wikibot_project:mh-wikibot:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
CVE-2024-38618 | ALSA: timer: Set lower bound of start tick time | In the Linux kernel, the following vulnerability has been resolved:
ALSA: timer: Set lower bound of start tick time
Currently ALSA timer doesn't have the lower limit of the start tick
time, and it allows a very small size, e.g. 1 tick with 1ns resolution
for hrtimer. Such a situation may lead to an unexpected RCU stall,
where the callback repeatedly queuing the expire update, as reported
by fuzzer.
This patch introduces a sanity check of the timer start tick time, so
that the system returns an error when a too small start size is set.
As of this patch, the lower limit is hard-coded to 100us, which is
small enough but can still work somehow. | [] | null | 5.3 | null | null |
CVE-2023-26429 | Control characters were not removed when exporting user feedback content. This allowed attackers to include unexpected content via user feedback and potentially break the exported data structure. We now drop all control characters that are not whitespace character during the export. No publicly available exploits are known.
| [
"cpe:2.3:a:open-xchange:open-xchange_appsuite_backend:*:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite_backend:7.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite_backend:7.10.6:revision_39:*:*:*:*:*:*"
] | null | 3.5 | null | null |
|
CVE-2025-1080 | Macro URL arbitrary script execution | LibreOffice supports Office URI Schemes to enable browser integration of LibreOffice with MS SharePoint server. An additional scheme 'vnd.libreoffice.command' specific to LibreOffice was added. In the affected versions of LibreOffice a link in a browser using that scheme could be constructed with an embedded inner URL that when passed to LibreOffice could call internal macros with arbitrary arguments.
This issue affects LibreOffice: from 24.8 before < 24.8.5, from 25.2 before < 25.2.1. | [] | 7.2 | null | null | null |
CVE-2024-38759 | WordPress Search & Replace plugin <= 3.2.2 - Deserialization of untrusted data vulnerability | Deserialization of Untrusted Data vulnerability in WP MEDIA SAS Search & Replace search-and-replace.This issue affects Search & Replace: from n/a through 3.2.2. | [
"cpe:2.3:a:wp-media:search_\\&_replace:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
CVE-2023-3383 | SourceCodester Game Result Matrix System GET Parameter athlete-profile.php sql injection | A vulnerability, which was classified as critical, was found in SourceCodester Game Result Matrix System 1.0. This affects an unknown part of the file /dipam/athlete-profile.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232239. | [
"cpe:2.3:a:game_result_matrix_system_project:game_result_matrix_system:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
GHSA-wjrm-3qfx-g6wg | In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 820, SD 820A, SD 835, SD 845, while parsing a private frame in an ID3 tag, a buffer over-read can occur when comparing frame data with predefined owner identifier strings. | [] | null | null | 9.8 | null |
|
CVE-1999-0459 | Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot. | [] | null | null | null | 4.6 |
|
GHSA-497m-47mf-w8gv | Cross-Site Request Forgery (CSRF) vulnerability in Viadat Creations Store Locator for WordPress with Google Maps – LotsOfLocales plugin <= 3.98.7 versions. | [] | null | 5.4 | null | null |
|
GHSA-62mp-vmwr-c2jw | Unspecified vulnerability in the management interface in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.x before 10.1-129.11 and 10.5 before 10.5-50.10 allows remote attackers to execute arbitrary code via unknown vectors. | [] | null | null | null | null |
|
RHSA-2013:0122 | Red Hat Security Advisory: tcl security and bug fix update | postgresql DoS via infinite loop in regex NFA optimization code postgresql: tempory DoS caused by slow regex NFA cleanup | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
Subsets and Splits