id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-jqpq-72xc-xqvj | Cross-site scripting (XSS) vulnerability in zTree 3.5.19.1 and possibly earlier allows remote attackers to inject arbitrary web script or HTML via the id parameter to demo/en/asyncData/getNodesForBigData.php. | [] | null | null | null | null |
|
GHSA-px6v-x65q-3mw6 | PHP remote file inclusion vulnerability in article mode for modules.php in SocialMPN allows remote attackers to execute arbitrary PHP code by modifying the name parameter to reference a URL on a remote web server that contains the code. | [] | null | null | null | null |
|
GHSA-xcf7-vc8w-v2qg | Data Leakage Attacks vulnerability in the web portal component when in an MDR pair in McAfee Network Security Management (NSM) 9.1 < 9.1.7.75 (Update 4) and 9.2 < 9.2.7.31 Update2 allows administrators to view configuration information in plain text format via the GUI or GUI terminal commands. | [] | null | null | 4.1 | null |
|
CVE-2024-29127 | WordPress Advanced Access Manager plugin <= 6.9.20 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AAM Advanced Access Manager allows Reflected XSS.This issue affects Advanced Access Manager: from n/a through 6.9.20.
| [] | null | 7.1 | null | null |
GHSA-mjwx-4m98-f8cv | Cisco UCS Invicta 4.3, 4.5, and 5.0.1 on Invicta appliances and Invicta Scaling System uses the same hardcoded GnuPG encryption key across different customers' installations, which allows remote attackers to defeat cryptographic protection mechanisms by sniffing network traffic to an Autosupport server and leveraging knowledge of this key from another installation, aka Bug ID CSCur85504. | [] | null | null | 7.5 | null |
|
CVE-2024-50121 | nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net | In the Linux kernel, the following vulnerability has been resolved:
nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
In the normal case, when we excute `echo 0 > /proc/fs/nfsd/threads`, the
function `nfs4_state_destroy_net` in `nfs4_state_shutdown_net` will
release all resources related to the hashed `nfs4_client`. If the
`nfsd_client_shrinker` is running concurrently, the `expire_client`
function will first unhash this client and then destroy it. This can
lead to the following warning. Additionally, numerous use-after-free
errors may occur as well.
nfsd_client_shrinker echo 0 > /proc/fs/nfsd/threads
expire_client nfsd_shutdown_net
unhash_client ...
nfs4_state_shutdown_net
/* won't wait shrinker exit */
/* cancel_work(&nn->nfsd_shrinker_work)
* nfsd_file for this /* won't destroy unhashed client1 */
* client1 still alive nfs4_state_destroy_net
*/
nfsd_file_cache_shutdown
/* trigger warning */
kmem_cache_destroy(nfsd_file_slab)
kmem_cache_destroy(nfsd_file_mark_slab)
/* release nfsd_file and mark */
__destroy_client
====================================================================
BUG nfsd_file (Not tainted): Objects remaining in nfsd_file on
__kmem_cache_shutdown()
--------------------------------------------------------------------
CPU: 4 UID: 0 PID: 764 Comm: sh Not tainted 6.12.0-rc3+ #1
dump_stack_lvl+0x53/0x70
slab_err+0xb0/0xf0
__kmem_cache_shutdown+0x15c/0x310
kmem_cache_destroy+0x66/0x160
nfsd_file_cache_shutdown+0xac/0x210 [nfsd]
nfsd_destroy_serv+0x251/0x2a0 [nfsd]
nfsd_svc+0x125/0x1e0 [nfsd]
write_threads+0x16a/0x2a0 [nfsd]
nfsctl_transaction_write+0x74/0xa0 [nfsd]
vfs_write+0x1a5/0x6d0
ksys_write+0xc1/0x160
do_syscall_64+0x5f/0x170
entry_SYSCALL_64_after_hwframe+0x76/0x7e
====================================================================
BUG nfsd_file_mark (Tainted: G B W ): Objects remaining
nfsd_file_mark on __kmem_cache_shutdown()
--------------------------------------------------------------------
dump_stack_lvl+0x53/0x70
slab_err+0xb0/0xf0
__kmem_cache_shutdown+0x15c/0x310
kmem_cache_destroy+0x66/0x160
nfsd_file_cache_shutdown+0xc8/0x210 [nfsd]
nfsd_destroy_serv+0x251/0x2a0 [nfsd]
nfsd_svc+0x125/0x1e0 [nfsd]
write_threads+0x16a/0x2a0 [nfsd]
nfsctl_transaction_write+0x74/0xa0 [nfsd]
vfs_write+0x1a5/0x6d0
ksys_write+0xc1/0x160
do_syscall_64+0x5f/0x170
entry_SYSCALL_64_after_hwframe+0x76/0x7e
To resolve this issue, cancel `nfsd_shrinker_work` using synchronous
mode in nfs4_state_shutdown_net. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-7724-hcxw-879r | Aruba has identified certain configurations of ArubaOS that can lead to sensitive information disclosure from the configured ESSIDs. The scenarios in which disclosure of potentially sensitive information can occur are complex, and depend on factors beyond the control of attackers. | [] | null | 5.3 | null | null |
|
CVE-2022-1420 | Use of Out-of-range Pointer Offset in vim/vim | Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774. | [
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | null | 6.8 | null |
CVE-2023-26512 | Apache EventMesh RabbitMQ-Connector plugin allows RCE through deserialization of untrusted data | CWE-502 Deserialization of Untrusted Data at the rabbitmq-connector plugin module in Apache EventMesh (incubating) V1.7.0\V1.8.0 on windows\linux\mac os e.g. platforms allows attackers to send controlled message and
remote code execute via rabbitmq messages. Users can use the code under the master branch in project repo to fix this issue, we will release the new version as soon as possible. | [
"cpe:2.3:a:apache:eventmesh:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-gfjj-qhgp-2fr4 | The video_usercopy function in drivers/media/video/v4l2-ioctl.c in the Linux kernel before 2.6.39 relies on the count value of a v4l2_ext_controls data structure to determine a kmalloc size, which might allow local users to cause a denial of service (memory consumption) via a large value. | [] | null | null | 5.5 | null |
|
GHSA-8vhf-hgr9-gmr5 | Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via crafted two-dimensional graphics data that is mishandled during clipping-region calculations. | [] | null | null | 8.8 | null |
|
CVE-2019-11248 | Kubernetes kubelet exposes /debug/pprof info on healthz port | The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration. | [
"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.0:-:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.1:-:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.1:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.2:-:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.2:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.3:-:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.3:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.4:-:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.4:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.5:-:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.5:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.6:-:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.6:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.7:-:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.7:beta.0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.13.8:beta.0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.0:-:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.1:-:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.1:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.2:-:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.2:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.3:-:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.3:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.14.4:beta.0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.15.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.15.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.15.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:kubernetes:kubernetes:1.15.0:rc1:*:*:*:*:*:*"
] | null | null | 6.5 | null |
CVE-2022-45065 | WordPress SEO Plugin by Squirrly SEO Plugin <= 12.1.20 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Squirrly SEO Plugin by Squirrly SEO plugin <= 12.1.20 versions. | [
"cpe:2.3:a:squirrly:seo_plugin_by_squirrly_seo:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
GHSA-mxrx-fg8p-5p5j | Bifrost vulnerable to authentication check flaw that leads to authentication bypass | ImpactThe admin and monitor user groups need to be authenticated by username and password. If we delete the X-Requested-With: XMLHttpRequest field in the request header,the authentication will be bypassed.Patcheshttps://github.com/brockercap/Bifrost/pull/201WorkaroundsUpgrade to the latest version | [] | null | 8.8 | null | null |
CVE-2017-18729 | Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6200 before 1.1.00.24, R6020 before 1.0.0.30, R6080 before 1.0.0.30, R6120 before 1.0.0.36, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42. | [
"cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6080_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6080:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
ICSA-22-298-07 | Delta Electronics InfraSuite Device Master | Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize user-supplied data provided through the Device-DataCollect service port without proper verification. An attacker could provide malicious serialized objects to execute arbitrary code upon deserialization. CVE-2022-41778 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize user-supplied data provided through the Device-Gateway service port without proper verification. An attacker could provide malicious serialized objects to execute arbitrary code upon deserialization. CVE-2022-38142 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize network packets without proper verification. If the device connects to an attacker-controlled server, the attacker could send maliciously crafted packets that would be deserialized and executed, leading to remote code execution. CVE-2022-41779 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior allow attacker provided data already serialized into memory to be used in file operation application programmable interfaces (APIs). This could create arbitrary files, which could be used in API operations and could ultimately result in remote code execution. CVE-2022-41657 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior mishandle .ZIP archives containing characters used in path traversal. This path traversal could result in remote code execution. CVE-2022-41772 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The database backup function in Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior lacks proper authentication. An attacker could provide malicious serialized objects which, when deserialized, could activate an opcode for a backup scheduling function without authentication. This function allows the user to designate all function arguments and the file to be executed. This could allow the attacker to start any new process and achieve remote code execution. CVE-2022-40202 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Delta Electronics InfraSuite Device Master versions 00.00.01a and prior lack proper authentication for functions that create and modify user groups. An attacker could provide malicious serialized objects that could run these functions without authentication to create a new user and add them to the administrator group. CVE-2022-41688 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Delta Electronics InfraSuite Device Master versions 00.00.01a and prior lacks authentication for a function that changes group privileges. An attacker could use this to create a denial-of-service state or escalate their own privileges. CVE-2022-41644 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Delta Electronics InfraSuite Device Master versions 00.00.01a and prior allow unauthenticated users to trigger the WriteConfiguration method, which could allow an attacker to provide new values for user configuration files such as UserListInfo.xml. This could lead to the changing of administrative passwords. CVE-2022-41776 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). Delta Electronics InfraSuite Device Master versions 00.00.01a and prior allow unauthenticated users to access the aprunning endpoint, which could allow an attacker to retrieve any file from the RunningConfigs directory. The attacker could then view and modify configuration files such as UserListInfo.xml, which would allow them to see existing administrative passwords. CVE-2022-41629 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | [] | null | null | 7.5 | null |
CVE-2017-3398 | Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). | [
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.6:*:*:*:*:*:*:*"
] | null | null | 8.2 | 5.8 |
|
GHSA-7893-9j9h-935c | The path autocompletion feature in Bash 4.4 allows local users to gain privileges via a crafted filename starting with a " (double quote) character and a command substitution metacharacter. | [] | null | null | 7.8 | null |
|
CVE-2001-0375 | Cisco PIX Firewall 515 and 520 with 5.1.4 OS running aaa authentication to a TACACS+ server allows remote attackers to cause a denial of service via a large number of authentication requests. | [
"cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-662c-cj8q-qc4g | An issue was discovered in GitLab EE starting from version 16.7 before 17.0.6, version 17.1 before 17.1.4 and 17.2 before 17.2.2 that allowed bypassing the password re-entry requirement to approve a policy. | [] | null | 4.2 | null | null |
|
GHSA-5x2p-gch7-phhj | Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow. | [] | null | null | null | null |
|
CVE-2018-17558 | Hardcoded manufacturer credentials and an OS command injection vulnerability in the /cgi-bin/mft/ directory on ABUS TVIP TVIP20050 LM.1.6.18, TVIP10051 LM.1.6.18, TVIP11050 MG.1.6.03.05, TVIP20550 LM.1.6.18, TVIP10050 LM.1.6.18, TVIP11550 MG.1.6.03, TVIP21050 MG.1.6.03, and TVIP51550 MG.1.6.03 cameras allow remote attackers to execute code as root. | [
"cpe:2.3:o:abus:tvip_10000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_10001_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_10005a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_10005b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_10005_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_10050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_10051_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_10055a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_10055b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_10500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_10550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_11000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_11050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_11500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_11501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_11502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_11550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_11551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_11552_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_20000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_20050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_20500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_20550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_21000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_21050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_21500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_21501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_21502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_21550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_21551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_21552_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_22500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_31000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_31001_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_31050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_31500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_31501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_31550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_31551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_32500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_51500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_51550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_71500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_71501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_71550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_71551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abus:tvip_72500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_10000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_10001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_10005:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_10005a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_10005b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_10050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_10051:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_10055a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_10055b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_10500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_10550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_11000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_11050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_11500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_11501:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_11502:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_11550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_11551:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_11552:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_20000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_20050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_20500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_20550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_21000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_21050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_21500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_21501:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_21502:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_21550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_21551:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_21552:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_22500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_31000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_31001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_31050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_31500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_31501:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_31550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_31551:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_32500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_51500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_51550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_71500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_71501:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_71550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_71551:-:*:*:*:*:*:*:*",
"cpe:2.3:h:abus:tvip_72500:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-jfrh-cwq3-hcj6 | An issue was discovered in EJBCA before 6.15.2.6 and 7.x before 7.3.1.2. It is intended to support restriction of available remote protocols (CMP, ACME, REST, etc.) through the system configuration. These restrictions can be bypassed by modifying the URI string from a client. (EJBCA's internal access control restrictions are still in place, and each respective protocol must be configured to allow for enrollment.) | [] | null | null | null | null |
|
CVE-2014-0944 | Cross-site request forgery (CSRF) vulnerability in the RES Console in Rule Execution Server in IBM Operational Decision Manager 7.5 before FP3 IF37, 8.0 before MP1 FP2, and 8.5 before MP1 IF26 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences. | [
"cpe:2.3:a:ibm:operational_decision_manager:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:operational_decision_manager:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:operational_decision_manager:8.5:*:*:*:*:*:*:*"
] | null | null | null | 6 |
|
GHSA-8v72-7j9q-whx9 | The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack. | [] | null | null | null | null |
|
ICSA-20-224-02 | Schneider Electric APC Easy UPS On-Line | A vulnerability exists when accessing a vulnerable method of `FileUploadServlet` that may lead to uploading executable files to non-specified directories.CVE-2020-7521 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A vulnerability exists when accessing a vulnerable method of `SoundUploadServlet` that may lead to uploading executable files to non-specified directories.CVE-2020-7522 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 9.8 | null |
CVE-2006-7149 | Multiple cross-site scripting (XSS) vulnerabilities in Mambo 4.6.x allow remote attackers to inject arbitrary web script or HTML via (1) the query string to (a) index.php, which reflects the string in an error message from mod_login.php; and the (2) mcname parameter to (b) moscomment.php and (c) com_comment.php. | [
"cpe:2.3:a:mambo:mambo:4.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.6:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.6.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-8wg3-xccm-r99v | **DISPUTED** SQL injection vulnerability in SQLiteDatabase.java in the SQLi Api in Android allows remote attackers to execute arbitrary SQL commands via the delete method. | [] | null | null | 9.8 | null |
|
GHSA-g8wx-wwr2-j96m | The uploadFile function in upload/index.php in CosCMS before 1.822 allows remote administrators to execute arbitrary commands via shell metacharacters in the name of an uploaded file. | [] | null | null | null | null |
|
GHSA-vv9c-r5jj-58f9 | Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the "RDMA protocol over infiniband" (aka Soft RoCE) technology. | [] | null | null | 7.8 | null |
|
RHSA-2022:0969 | Red Hat Security Advisory: java-1.7.1-ibm security update | OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | 5.3 | null | null |
GHSA-5m3c-wqgq-pc56 | SQL injection vulnerability in MXChange before 0.2.0-pre10 PL492 allows remote attackers to execute arbitrary SQL commands via unknown vectors. | [] | null | null | null | null |
|
GHSA-58pf-7w8g-r37r | Inappropriate implementation in WebApp Installer in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially overlay and spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | [] | null | null | null | null |
|
GHSA-6w87-24cp-rprc | Unspecified vulnerability in the Address and Routing Parameter Area (ARPA) transport software in HP-UX B.11.11 and B.11.23 before 20060912 allows local users to cause a denial of service via unspecified vectors. | [] | null | null | null | null |
|
CVE-2021-45803 | MartDevelopers iResturant 1.0 is vulnerable to SQL Injection. SQL Injection occurs because this view parameter value is added to the SQL query without additional verification when viewing reservation. | [
"cpe:2.3:a:iresturant_project:iresturant:1.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
CVE-2024-54266 | WordPress ImageRecycle pdf & image compression plugin <= 3.1.16 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ImageRecycle ImageRecycle pdf & image compression allows Reflected XSS.This issue affects ImageRecycle pdf & image compression: from n/a through 3.1.16. | [
"cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
GHSA-5f5m-7p6h-2wm4 | The protocol-inspection feature on Cisco Adaptive Security Appliances (ASA) devices does not properly implement the idle timeout, which allows remote attackers to cause a denial of service (connection-table exhaustion) via crafted requests that use an inspected protocol, aka Bug ID CSCuh13899. | [] | null | null | null | null |
|
RHSA-2025:3801 | Red Hat Security Advisory: RHEL AI 1.5 hdf5 security update | hdf5: heap buffer overread hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs | [
"cpe:/a:redhat:enterprise_linux_ai:1.5::el9"
] | null | 4.8 | null | null |
CVE-2023-40043 | MOVEit Transfer System Administrator SQL Injection |
In Progress MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), 2023.0.6 (15.0.6), a SQL injection vulnerability has been identified in the MOVEit Transfer web interface that could allow a MOVEit system administrator account to gain unauthorized access to the MOVEit Transfer database. A MOVEit system administrator
could submit a crafted payload to the MOVEit Transfer web interface which could result in modification and disclosure of MOVEit database content.
| [
"cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
GHSA-c6rr-f65f-365x | chaskiq is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [] | null | null | null | null |
|
CVE-2022-24342 | In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible. | [
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-xfgf-763r-q2wj | classifieds.cgi allows remote attackers to execute arbitrary commands by specifying them in a hidden variable in a CGI form. | [] | null | null | null | null |
|
GHSA-w9qp-xc8f-8xcq | This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to missing HTTPOnly flag for the session cookies associated with the router's web management interface. An attacker with remote access could exploit this by intercepting transmission within an HTTP session on the vulnerable system.Successful exploitation of this vulnerability could allow the attacker to capture cookies and obtain sensitive information on the targeted system. | [] | 6.9 | 7.5 | null | null |
|
CVE-2025-27323 | WordPress WP About Author plugin <= 1.5 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jon Bishop WP About Author allows DOM-Based XSS. This issue affects WP About Author: from n/a through 1.5. | [] | null | 6.5 | null | null |
GHSA-xw4m-phc2-7jvc | SQL injection vulnerability in the JOOFORGE Gamesbox (com_gamesbox) component 1.0.2, and possibly earlier, for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a consoles action to index.php. | [] | null | null | null | null |
|
GHSA-c2hj-4gfw-x63q | Internet Explorer 5.5 does not display the Class ID (CLSID) when it is at the end of the file name, which could allow attackers to trick the user into executing dangerous programs by making it appear that the document is of a safe file type. | [] | null | null | null | null |
|
CVE-2022-33127 | The function that calls the diff tool in Diffy 3.4.1 does not properly handle double quotes in a filename when run in a windows environment. This allows attackers to execute arbitrary commands via a crafted string. | [
"cpe:2.3:a:diffy_project:diffy:3.4.1:*:*:*:*:ruby:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
RHSA-2020:5055 | Red Hat Security Advisory: buildah security update | golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 7.5 | null | null |
RHSA-2024:5393 | Red Hat Security Advisory: thunderbird security update | mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 6.1 | null | null |
CVE-2020-6235 | SAP Solution Manager (Diagnostics Agent), version 7.2, does not perform the authentication check for the functionalities of the Collector Simulator, leading to Missing Authentication. | [
"cpe:2.3:a:sap:solution_manager:7.2:*:*:*:*:*:*:*"
] | null | null | 8.6 | null |
|
CVE-2024-21633 | Arbitrary file write on Decoding | Apktool is a tool for reverse engineering Android APK files. In versions 2.9.1 and prior, Apktool infers resource files' output path according to their resource names which can be manipulated by attacker to place files at desired location on the system Apktool runs on. Affected environments are those in which an attacker may write/overwrite any file that user has write access, and either user name is known or cwd is under user folder. Commit d348c43b24a9de350ff6e5bd610545a10c1fc712 contains a patch for this issue. | [
"cpe:2.3:a:apktool:apktool:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-mpqp-hhxg-m6w5 | To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used. | [] | null | null | null | null |
|
ICSA-21-257-22 | Siemens Teamcenter Active Workspace | A path traversal vulnerability in the application could allow an attacker to bypass certain restrictions such as direct access to other services within the host. | [] | null | 4.5 | null | null |
GHSA-q7wr-mqfr-3mcx | Stack-based buffer overflow in Visual IRC (ViRC) 2.0 allows remote IRC servers to execute arbitrary code via a long response to a JOIN command. | [] | null | null | null | null |
|
GHSA-vgh8-7m36-cmw2 | The fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges and execute arbitrary operating-system commands via crafted parameters to a file-related command, aka Bug ID CSCtq86554. | [] | null | null | null | null |
|
CVE-2011-1028 | The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file. | [
"cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-vc5c-5fxh-338c | Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite and Applications 11.5.10CU1 has unknown impact and attack vectors, aka Vuln# APPS05. | [] | null | null | null | null |
|
CVE-2008-0103 | Unspecified vulnerability in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP2, and Office 2004 for Mac allows remote attackers to execute arbitrary code via an Office document that contains a malformed object, related to a "memory handling error," aka "Microsoft Office Execution Jump Vulnerability." | [
"cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2004:*:mac\\+os:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-mw3j-f4pg-723r | A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.4), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions >= V4.5.0 < V4.5.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.9.2 < V2.9.4), SIMATIC S7-1500 Software Controller (All versions), SIMATIC S7-PLCSIM Advanced (All versions), TIM 1531 IRC (incl. SIPLUS NET variants) (All versions >= V2.2). An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packet over port 102/tcp. A restart of the affected device is needed to restore normal operations. | [] | null | 7.5 | null | null |
|
CVE-2024-41812 | txtdot SSRF vulnerability in /get | txtdot is an HTTP proxy that parses only text, links, and pictures from pages, removing ads and heavy scripts. Prior to version 1.7.0, a Server-Side Request Forgery (SSRF) vulnerability in the `/get` route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network. Version 1.7.0 prevents displaying the response of forged requests, but the requests can still be sent. For complete mitigation, a firewall between txtdot and other internal network resources should be set. | [
"cpe:2.3:a:txtdot:txtdot:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2023-29505 | An issue was discovered in Zoho ManageEngine Network Configuration Manager 12.6.165. The WebSocket endpoint allows Cross-site WebSocket hijacking. | [
"cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126165:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
CVE-2018-2862 | Vulnerability in the Oracle Retail Point-of-Service component of Oracle Retail Applications (subcomponent: User Interface). Supported versions that are affected are 13.3.8, 13.4.9, 14.0.4 and 14.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Point-of-Service. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Retail Point-of-Service accessible data as well as unauthorized update, insert or delete access to some of Oracle Retail Point-of-Service accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:retail_point-of-service:13.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_point-of-service:13.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_point-of-service:14.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_point-of-service:14.1.3:*:*:*:*:*:*:*"
] | null | null | 7.1 | 5.5 |
|
CVE-2017-13795 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-gqvj-vmm6-rx6c | In the Linux kernel, the following vulnerability has been resolved:ALSA: hda/cs_dsp_ctl: Use private_free for control cleanupUse the control private_free callback to free the associated data
block. This ensures that the memory won't leak, whatever way the
control gets destroyed.The original implementation didn't actually remove the ALSA
controls in hda_cs_dsp_control_remove(). It only freed the internal
tracking structure. This meant it was possible to remove/unload the
amp driver while leaving its ALSA controls still present in the
soundcard. Obviously attempting to access them could cause segfaults
or at least dereferencing stale pointers. | [] | null | 3.3 | null | null |
|
CVE-2007-0152 | OhhASP stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing passwords via a direct request for db/OhhASP.mdb. | [
"cpe:2.3:a:ohhasp:ohhasp:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-0334 | A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. Insufficient capability checks could lead to users accessing their grade report for courses where they did not have the required gradereport/user:view capability. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
CVE-2016-8587 | dlp_policy_upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via an archive file containing a symlink to /eng_ptn_stores/prod/sensorSDK/data/ or /eng_ptn_stores/prod/sensorSDK/backup_pol/. | [
"cpe:2.3:a:trendmicro:threat_discovery_appliance:*:r1:*:*:*:*:*:*"
] | null | null | 7.3 | 6 |
|
GHSA-xg84-73vx-pq6f | Microsoft Power Platform Connector Spoofing Vulnerability | [] | null | 9.6 | null | null |
|
CVE-2020-15140 | Remote Code Execution in Red Discord Bot | In Red Discord Bot before version 3.3.11, a RCE exploit has been discovered in the Trivia module: this exploit allows Discord users with specifically crafted usernames to inject code into the Trivia module's leaderboard command. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. This critical exploit has been fixed on version 3.3.11. | [
"cpe:2.3:a:cogboard:red_discord_bot:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
GHSA-jmqq-vjpq-9xcm | IBM Security Verify Bridge contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 196618. | [] | null | null | null | null |
|
GHSA-w573-j2v8-vx6p | The Category Posts Widget WordPress plugin before 4.9.18 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] | null | 4.8 | null | null |
|
CVE-2012-5616 | Apache CloudStack 4.0.0-incubating and Citrix CloudPlatform (formerly Citrix CloudStack) before 3.0.6 stores sensitive information in the log4j.conf log file, which allows local users to obtain (1) the SSH private key as recorded by the createSSHKeyPair API, (2) the password of an added host as recorded by the AddHost API, or the password of an added VM as recorded by the (3) DeployVM or (4) ResetPasswordForVM API. | [
"cpe:2.3:a:apache:cloudstack:4.0.0:incubating:*:*:*:*:*:*",
"cpe:2.3:a:citrix:cloudplatform:*:*:*:*:*:*:*:*"
] | null | null | null | 1.5 |
|
CVE-1999-1126 | Cisco Resource Manager (CRM) 1.1 and earlier creates certain files with insecure permissions that allow local users to obtain sensitive configuration information including usernames, passwords, and SNMP community strings, from (1) swim_swd.log, (2) swim_debug.log, (3) dbi_debug.log, and (4) temporary files whose names begin with "DPR_". | [
"cpe:2.3:a:cisco:resource_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2001-0582 | Ben Spink CrushFTP FTP Server 2.1.6 and earlier allows a local attacker to access arbitrary files via a '..' (dot dot) attack, or variations, in (1) GET, (2) CD, (3) NLST, (4) SIZE, (5) RETR. | [
"cpe:2.3:a:ben_spink:crushftp_ftp_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ben_spink:crushftp_ftp_server:2.1.4:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-673q-v95c-q7mf | common.inc.php in phpWebLog 0.4.2 does not properly initialize the $CONF array, which inadvertently sets the password to a single character, allowing remote attackers to easily guess the SiteKey and gain administrative privileges to phpWebLog. | [] | null | null | null | null |
|
CVE-2013-1464 | Cross-site scripting (XSS) vulnerability in assets/player.swf in the Audio Player plugin before 2.0.4.6 for Wordpress allows remote attackers to inject arbitrary web script or HTML via the playerID parameter. | [
"cpe:2.3:a:doryphores:audio_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:doryphores:audio_player:2.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:doryphores:audio_player:2.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:doryphores:audio_player:2.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:doryphores:audio_player:2.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:doryphores:audio_player:2.0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:doryphores:audio_player:2.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:doryphores:audio_player:2.0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:doryphores:audio_player:2.0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-37cp-q8r5-mf55 | Cross-site scripting (XSS) vulnerability in the server in IBM Cognos Business Intelligence (BI) 8.4.1, 10.1, 10.1.1, 10.2, and 10.2.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
GHSA-r2hw-65x7-986p | Proietti Tech srl Planet Time Enterprise 4.2.0.1,4.2.0.0,4.1.0.0,4.0.0.0,3.3.1.0,3.3.0.0 is vulnerable to Remote code execution via the Viewstate parameter. | [] | null | 9.8 | null | null |
|
CVE-2010-2743 | The kernel-mode drivers in Microsoft Windows XP SP3 do not properly perform indexing of a function-pointer table during the loading of keyboard layouts from disk, which allows local users to gain privileges via a crafted application, as demonstrated in the wild in July 2010 by the Stuxnet worm, aka "Win32k Keyboard Layout Vulnerability." NOTE: this might be a duplicate of CVE-2010-3888 or CVE-2010-3889. | [
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-mphf-cc86-chgh | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiManager versions 7.6.0 through 7.6.1, versions 7.4.5 through 7.4.0, and versions 7.2.1 through 7.2.8, FortiManager Cloud versions 7.6.0 through 7.6.1, versions 7.4.0 through 7.4.4, and versions 7.2.2 through 7.2.7 may allow an authenticated remote attacker to execute unauthorized code via FGFM crafted requests. | [] | null | 7.2 | null | null |
|
GHSA-7rvj-6cpm-cm89 | In the Linux kernel, the following vulnerability has been resolved:PCI: mediatek: Fix refcount leak in mtk_pcie_subsys_powerup()The of_find_compatible_node() function returns a node pointer with
refcount incremented, We should use of_node_put() on it when done
Add the missing of_node_put() to release the refcount. | [] | null | 5.5 | null | null |
|
CVE-2019-13675 | Insufficient data validation in extensions in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to disable extensions via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 |
|
GHSA-7q48-m9w3-vrpc | The OSM – OpenStreetMap plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's osm_map and osm_map_v3 shortcodes in all versions up to, and including, 6.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-253g-4jm3-6p9v | Huawei Honor Magic2 mobile phones with versions earlier than 10.0.0.175(C00E59R2P11) have an information leak vulnerability. Due to a module using weak encryption tool, an attacker with the root permission may exploit the vulnerability to obtain some information. | [] | null | null | null | null |
|
CVE-2024-11293 | Registration Forms – User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction Social Sites Login <= 1.7.9 - Authentication Bypass via WordPress.com OAuth provider | The Registration Forms – User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction Social Sites Login plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.9. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token. | [
"cpe:2.3:a:genetechsolutions:pie_register:-:*:*:*:*:wordpress:*:*"
] | null | 8.1 | null | null |
CVE-2013-4969 | Puppet before 3.3.3 and 3.4 before 3.4.1 and Puppet Enterprise (PE) before 2.8.4 and 3.1 before 3.1.1 allows local users to overwrite arbitrary files via a symlink attack on unspecified files. | [
"cpe:2.3:a:puppetlabs:puppet:*:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2015-5583 | Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to bypass intended sandbox restrictions and obtain sensitive PDF information by launching a print job on a remote printer, a different vulnerability than CVE-2015-6705, CVE-2015-6706, and CVE-2015-7624. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-8v22-4px4-6c2p | In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Fix memory leak[why]
Resource release is needed on the error handling path
to prevent memory leak.[how]
Fix this by adding kfree on the error handling path. | [] | null | 5.5 | null | null |
|
GHSA-5xwp-7xf8-2r9c | The DRDA Services component in IBM DB2 UDB 9.5 before FP6a allows remote authenticated users to cause a denial of service (database server ABEND) by using the client CLI on Linux, UNIX, or Windows for executing a prepared statement with a large number of parameter markers. | [] | null | null | null | null |
|
CVE-2019-12154 | XXE in the XML parser library in RealObjects PDFreactor before 10.1.10722 allows attackers to supply malicious XML content in externally referenced resources, leading to disclosure of local file contents and/or denial of service conditions. | [
"cpe:2.3:a:realobjects:pdfreactor:*:*:*:*:*:*:*:*"
] | null | null | 9.1 | 6.4 |
|
CVE-2007-6035 | SQL injection vulnerability in graph.php in Cacti before 0.8.7a allows remote attackers to execute arbitrary SQL commands via the local_graph_id parameter. | [
"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-36705 | Windows Installer Elevation of Privilege Vulnerability | Windows Installer Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-gj47-jf8p-7hxm | Under specific circumstances, insecure permissions in Ivanti Velocity License Server before version 5.2 allows a local authenticated attacker to achieve local privilege escalation. | [] | null | 7 | null | null |
|
GHSA-cmmj-wqg9-f37x | The expat XML parser code, as used in the open source Jabber (jabberd) 1.4.3 and earlier, jadc2s 0.9.0 and earlier, and possibly other packages, allows remote attackers to cause a denial of service (application crash) via a malformed packet to a socket that accepts XML connections. | [] | null | null | null | null |
|
GHSA-v85g-hrr5-4jw4 | The Simple Matted Thumbnails WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/simple-matted-thumbnail.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.01. | [] | null | null | null | null |
|
CVE-2007-3946 | mod_auth (http_auth.c) in lighttpd before 1.4.16 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors involving (1) a memory leak, (2) use of md5-sess without a cnonce, (3) base64 encoded strings, and (4) trailing whitespace in the Auth-Digest header. | [
"cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-jjf9-2cqq-64fg | Google Chrome before 11.0.696.57 on Linux does not properly isolate renderer processes, which has unspecified impact and remote attack vectors. | [] | null | null | null | null |
|
CVE-2008-4364 | SQL injection vulnerability in default.aspx in ParsaGostar ParsaWeb CMS allows remote attackers to execute arbitrary SQL commands via the (1) id parameter in the "page" page and (2) txtSearch parameter in the "Search" page. | [
"cpe:2.3:a:parsagostar:parsaweb_cms:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-68x7-7r4x-g878 | Unspecified vulnerability in mosMedia (com_mosmedia) 1.0.8 and earlier for Joomla! has unspecified impact and attack vectors. | [] | null | null | null | null |
|
GHSA-2j5w-cwc3-8hxw | Improper Certificate Validation in Jenkins Spira Importer Plugin | Jenkins Spira Importer Plugin 3.2.3 and earlier disables SSL/TLS certificate validation for the Jenkins master JVM. | [] | null | 8.2 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.