id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2023-32183 | Incorrect Default Permissions vulnerability in the openSUSE Tumbleweed hawk2 package allows users with access to the hacluster to escalate to root
This issue affects openSUSE Tumbleweed.
| [
"cpe:2.3:o:opensuse:tumbleweed:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2022-30723 | Broadcasting Intent including the BluetoothDevice object without proper restriction of receivers in activateVoiceRecognitionWithDevice function of Bluetooth prior to SMR Jun-2022 Release 1 leaks MAC address of the connected Bluetooth device. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 4 | null | null |
|
GHSA-7hp3-hv9v-w85q | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in GE Vernova WorkstationST on Windows (EGD Configuration Server modules) allows Path Traversal.This issue affects WorkstationST: WorkstationST V07.10.10C and earlier. | [] | null | 5.9 | null | null |
|
GHSA-gg25-g94v-xx53 | Symonics libmysofa 0.7 has an invalid read in readOHDRHeaderMessageDataLayout in hdf/dataobject.c. | [] | null | 7.5 | null | null |
|
GHSA-p25g-64wc-h88x | Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capabilities can limit access to some custom and potentially risky commands (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands) for more information. Note that the attack is browser-based and an attacker cannot exploit it at will. | [] | null | 8.1 | null | null |
|
CVE-2011-1429 | Mutt does not verify that the smtps server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL SMTP server via an arbitrary certificate, a different vulnerability than CVE-2009-3766. | [
"cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
RHSA-2021:3988 | Red Hat Security Advisory: samba security update | samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token | [
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 6.8 | null | null |
CVE-2020-27224 | In Eclipse Theia versions up to and including 1.2.0, the Markdown Preview (@theia/preview), can be exploited to execute arbitrary code. | [
"cpe:2.3:a:eclipse:theia:*:*:*:*:*:*:*:*"
] | null | 9.6 | null | 9.3 |
|
CVE-2018-7033 | SchedMD Slurm before 17.02.10 and 17.11.x before 17.11.5 allows SQL Injection attacks against SlurmDBD. | [
"cpe:2.3:a:schedmd:slurm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.0.0:pre1:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.0.0:pre2:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:17.11.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-m462-97rg-rhrv | Cross-site scripting (XSS) vulnerability in the NTT Broadband Platform Japan Connected-free Wi-Fi application 1.6.0 and earlier for Android and 1.0.2 and earlier for iOS allows remote attackers to inject arbitrary web script or HTML via a crafted SSID. | [] | null | null | null | null |
|
CVE-2024-4324 | The WP Video Lightbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘width’ parameter in all versions up to, and including, 1.9.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:wordpress:video_lightbox:-:*:*:*:*:*:*:*"
] | null | 6.4 | null | null |
|
GHSA-vc77-rwwc-jf2g | The users-ultra plugin before 1.5.63 for WordPress has XSS via the p_name parameter. | [] | null | null | null | null |
|
CVE-2016-3747 | Use-after-free vulnerability in the mm-video-v4l2 venc component in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 27903498. | [
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
] | null | null | 7.8 | 10 |
|
CVE-2018-14899 | On the EPSON WF-2750 printer with firmware JP02I2, the Web interface AirPrint Setup page is vulnerable to HTML Injection that can redirect users to malicious sites. | [
"cpe:2.3:o:epson:wf-2750_firmware:jp02l2:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:wf-2750:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-5x67-jmxr-v9g6 | Cross-site scripting in the Login page in ASUSTOR ADM version 3.1.1 allows attackers to execute JavaScript via the System Announcement feature. | [] | null | null | 5.4 | null |
|
GHSA-g394-4frv-jxj3 | Static code injection vulnerability in process.php in AimStats 3.2 and earlier allows remote attackers to inject PHP code into config.php via the databasehost parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
GHSA-9wqj-2cgj-cmq7 | MapUrlToZone Security Feature Bypass Vulnerability | [] | null | 4.3 | null | null |
|
GHSA-v8p7-9pcq-2jvw | HP System Management Homepage (SMH) before 7.2.1 allows remote attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2012-5217. | [] | null | null | null | null |
|
GHSA-rx9g-4vxh-vcv6 | An issue in Ocuco Innovation - REPORTS.EXE v2.10.24.13 allows attackers to bypass authentication and escalate privileges to Administrator via a crafted TCP packet. | [] | null | 9.8 | null | null |
|
GHSA-2rh9-h56r-vv84 | Directory traversal vulnerability in the session mechanism of the web interface for Network Administration Visualized (NAV) before 3.1.1 allows attackers with filesystem write access to have an unknown impact via unknown attack vectors. | [] | null | null | null | null |
|
CVE-2011-1686 | Multiple SQL injection vulnerabilities in Best Practical Solutions RT 2.0.0 through 3.6.10, 3.8.0 through 3.8.9, and 4.0.0rc through 4.0.0rc7 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors, as demonstrated by reading data. | [
"cpe:2.3:a:bestpractical:rt:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc7:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2022-23677 | A remote execution of arbitrary code vulnerability was discovered in ArubaOS-Switch Devices version(s): ArubaOS-Switch 15.xx.xxxx: All versions; ArubaOS-Switch 16.01.xxxx: All versions; ArubaOS-Switch 16.02.xxxx: K.16.02.0033 and below; ArubaOS-Switch 16.03.xxxx: All versions; ArubaOS-Switch 16.04.xxxx: All versions; ArubaOS-Switch 16.05.xxxx: All versions; ArubaOS-Switch 16.06.xxxx: All versions; ArubaOS-Switch 16.07.xxxx: All versions; ArubaOS-Switch 16.08.xxxx: KB/WB/WC/YA/YB/YC.16.08.0024 and below; ArubaOS-Switch 16.09.xxxx: KB/WB/WC/YA/YB/YC.16.09.0019 and below; ArubaOS-Switch 16.10.xxxx: KB/WB/WC/YA/YB/YC.16.10.0019 and below; ArubaOS-Switch 16.11.xxxx: KB/WB/WC/YA/YB/YC.16.11.0003 and below. Aruba has released upgrades for ArubaOS-Switch Devices that address these security vulnerabilities. | [
"cpe:2.3:o:arubanetworks:5406r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:5406r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:2920_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:2920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:2930f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:2930f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:2930m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:2930m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:2530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:2530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:2540_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:2540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:5412r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:5412r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:2615_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:2615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:2620_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:2620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:2915_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:2915:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:3810m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:3810m:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | 9.3 |
|
CVE-2020-7983 | A CSRF issue in login.asp on Ruckus R500 3.4.2.0.384 devices allows remote attackers to access the panel or conduct SSRF attacks. | [
"cpe:2.3:o:commscope:ruckus_zoneflex_r500_firmware:3.4.2.0.384:*:*:*:*:*:*:*",
"cpe:2.3:h:commscope:ruckus_zoneflex_r500:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | 5.8 |
|
GHSA-244c-5h4m-vvfc | Vulnerability in the MICROS Relate CRM Software component of Oracle Retail Applications (subcomponent: Internal Operations). Supported versions that are affected are 10.8.x and 11.4.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise MICROS Relate CRM Software. While the vulnerability is in MICROS Relate CRM Software, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MICROS Relate CRM Software accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MICROS Relate CRM Software. CVSS 3.0 Base Score 6.4 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L). | [] | null | null | 6.4 | null |
|
CVE-2024-25468 | An issue in TOTOLINK X5000R V.9.1.0u.6369_B20230113 allows a remote attacker to cause a denial of service via the host_time parameter of the NTPSyncWithHost component. | [
"cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6369_b20230113:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-jmw2-5mfm-25x7 | An issue was discovered in tools/conversations/view_ajax.php in Concrete5 before 8.3.0. An unauthenticated user can enumerate comments from all blog posts by POSTing requests to /index.php/tools/required/conversations/view_ajax with incremental 'cnvID' integers. | [] | null | 5.3 | null | null |
|
CVE-2011-3794 | Pligg CMS 1.1.3 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by widgets/statistics/init.php and certain other files. | [
"cpe:2.3:a:pligg:pligg_cms:1.1.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-25m9-5gvj-3cx8 | IBM Cognos Analytics 11.1.7 and 11.2.0 contains locally cached browser data, that could allow a local attacker to obtain sensitive information. | [] | null | null | null | null |
|
GHSA-fjgc-8pc6-5qr3 | Unspecified vulnerability in the Virtual Desktop Infrastructure (VDI) component in Oracle Virtualization 3.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Session. NOTE: this CVE identifier was accidentally used for a Concurrency issue in Java Runtime Environment, but that issue has been reassigned to CVE-2012-0507. | [] | null | null | null | null |
|
CVE-2016-4340 | The impersonate feature in Gitlab 8.7.0, 8.6.0 through 8.6.7, 8.5.0 through 8.5.11, 8.4.0 through 8.4.9, 8.3.0 through 8.3.8, and 8.2.0 through 8.2.4 allows remote authenticated users to "log in" as any other user via unspecified vectors. | [
"cpe:2.3:a:gitlab:gitlab:8.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-q4c3-9jg3-v382 | SAP Marketing (Contacts App) - version 160, allows an attacker with low privileges to trick a user to open malicious page which could lead to a very convincing phishing attack with low impact on confidentiality and integrity of the application. | [] | null | 3.7 | null | null |
|
CVE-2020-8660 | CNCF Envoy through 1.13.0 TLS inspector bypass. TLS inspector could have been bypassed (not recognized as a TLS client) by a client using only TLS 1.3. Because TLS extensions (SNI, ALPN) were not inspected, those connections might have been matched to a wrong filter chain, possibly bypassing some security restrictions in the process. | [
"cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
GHSA-q2xf-jvwq-327h | A vulnerability in the REST API of Cisco Managed Services Accelerator (MSX) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the way that the affected software logs certain API requests. An attacker could exploit this vulnerability by sending a flood of crafted API requests to an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device. | [] | null | null | null | null |
|
GHSA-j4gm-mr6g-474q | Improper access control in the auth_oauth module of Odoo Community 15.0 and Odoo Enterprise 15.0 allows an internal user to export the OAuth tokens of other users. | [] | null | 8.1 | null | null |
|
CVE-2023-1744 | IBOS htaccess unrestricted upload | A vulnerability classified as critical was found in IBOS 4.5.5. This vulnerability affects unknown code of the component htaccess Handler. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224632. | [
"cpe:2.3:a:ibos:ibos:*:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
GHSA-9xhp-r5x3-pvv6 | IBM WebSphere Commerce Enterprise, Professional, Express, and Developer 7.0 and 8.0 is vulnerable to information disclosure vulnerability. A local user could view a plain text password in a Unix console. IBM Reference #: 1997408. | [] | null | null | 5.1 | null |
|
GHSA-jvcw-7829-ggcr | Microsoft MSN Messenger allows remote attackers to use Javascript that references an ActiveX object to obtain sensitive information such as display names and web site navigation, and possibly more when the user is connected to certain Microsoft sites (or DNS-spoofed sites). | [] | null | null | null | null |
|
CVE-2024-5607 | GDPR CCPA Compliance & Cookie Consent Banner <= 2.7.0 - Missing Authorization to Settings Update and Stored Cross-Site Scripting | The GDPR CCPA Compliance & Cookie Consent Banner plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions named ajaxUpdateSettings() in all versions up to, and including, 2.7.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the plugin's settings, update page content, send arbitrary emails and inject malicious web scripts. | [
"cpe:2.3:a:ninjateam:gdpr_ccpa_compliance_\\&_cookie_consent_banner:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
CVE-2023-50898 | WordPress Image Optimizer, Resizer and CDN – Sirv plugin <= 7.1.2 - Broken Access Control vulnerability | Missing Authorization vulnerability in sirv.Com Sirv.This issue affects Sirv: from n/a through 7.1.2.
| [
"cpe:2.3:a:sirv:sirv:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-5fc7-h7w8-354m | Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JAXP. | [] | null | null | null | null |
|
CVE-2010-2479 | Cross-site scripting (XSS) vulnerability in HTML Purifier before 4.1.1, as used in Mahara and other products, when the browser is Internet Explorer, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:htmlpurifier:htmlpurifier:*:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:*:*:lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:*:*:standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.4.0:*:strict:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.4.1:*:strict:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.5.0:*:strict:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.6.0:*:strict:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:1.6.1:*:strict:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.0.0:*:strict:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.0.1:*:strict:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.0:*:lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.0:*:standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.0:*:strict:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.0:*:strict-lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.0:*:strict-standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.1:*:lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.1:*:standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.1:*:strict:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.1:*:strict-lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.1:*:strict-standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.2:*:lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.2:*:standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.2:*:strict:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.2:*:strict-lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.2:*:strict-standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.3:*:lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.3:*:standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.3:*:strict:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.3:*:strict-lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.3:*:strict-standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.4:*:lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.4:*:standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.5:*:lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:2.1.5:*:standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.0.0:*:lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.0.0:*:standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.1.0:*:lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.1.0:*:standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.1.0:rc1:lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.1.0:rc1:standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.1.1:*:lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.1.1:*:standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.2.0:*:lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.2.0:*:standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.3.0:*:lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:3.3.0:*:standalone:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:4.0.0:*:lite:*:*:*:*:*",
"cpe:2.3:a:htmlpurifier:htmlpurifier:4.0.0:*:standalone:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-xwmc-cj49-wgpx | An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2018-8431. | [] | null | null | 5.4 | null |
|
CVE-2009-1806 | Unspecified vulnerability in IBM Hardware Management Console (HMC) 7 release 3.4.0 SP2, when Active Memory Sharing is used, has unknown impact and attack vectors, related to a shared memory partition and a shared memory pool with redundant paging Virtual I/O Server (VIOS) partitions. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:ibm:hardware_management_console:7.3.4.0:sp2:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-jf28-v5f6-cvpr | NASA AIT-Core vulnerable to remote code execution | An issue in NASA AIT-Core v2.5.2 allows attackers to execute arbitrary code via a crafted packet. | [] | 9.3 | 7.5 | null | null |
cisco-sa-20180516-dnac | Cisco Digital Network Architecture Center Static Credentials Vulnerability | A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to log in to an affected system by using an administrative account that has default, static user credentials.
The vulnerability is due to the presence of undocumented, static user credentials for the default administrative account for the affected software. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands with root privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dnac ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dnac"] | [] | null | null | 10 | null |
CVE-2020-13266 | Insecure authorization in Project Deploy Keys in GitLab CE/EE 12.8 and later through 13.0.1 allows users to update permissions of other users' deploy keys under certain conditions | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 4.3 | null | null |
|
GHSA-6x2v-hvx7-m5x7 | Inappropriate implementation in Extensions in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to leak potentially sensitive information via a crafted HTML page. | [] | null | 6.5 | null | null |
|
CVE-2022-39039 | aEnrich a+HRD - Server-Side Request Forgery (SSRF) | aEnrich’s a+HRD has inadequate filtering for specific URL parameter. An unauthenticated remote attacker can exploit this vulnerability to send arbitrary HTTP(s) request to launch Server-Side Request Forgery (SSRF) attack, to perform arbitrary system command or disrupt service. | [
"cpe:2.3:a:aenrich:a\\+hrd:6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:aenrich:a\\+hrd:7.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-8c2w-ph9m-jcmf | Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attacker to change the settings of the devices by sending specifically constructed requests without authentication This issue affects: WAGO 750-362 version FW03 and prior versions. WAGO 750-363 version FW03 and prior versions. WAGO 750-823 version FW03 and prior versions. WAGO 750-832/xxx-xxx version FW03 and prior versions. WAGO 750-862 version FW03 and prior versions. WAGO 750-891 version FW03 and prior versions. WAGO 750-890/xxx-xxx version FW03 and prior versions. | [] | null | null | null | null |
|
GHSA-fggg-72p3-wj6v | A vulnerability, which was classified as critical, has been found in Mini-Tmall up to 20250211. This issue affects the function select of the file com/xq/tmall/dao/ProductMapper.java. The manipulation of the argument orderBy leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 6.3 | null | null |
|
GHSA-9rhh-9h7r-f9gf | D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the PSK parameter in the SetQuickVPNSettings module. | [] | null | 5.5 | null | null |
|
CVE-2024-31402 | Incorrect authorization vulnerability in Cybozu Garoon 5.0.0 to 5.15.2 allows a remote authenticated attacker to delete the data of Shared To-Dos. | [
"cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
CVE-2018-21024 | licenseUpload.php in Centreon Web before 2.8.27 allows attackers to upload arbitrary files via a POST request. | [
"cpe:2.3:a:centreon:centreon:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-vv2f-3v8c-53c4 | Improper Input Validation vulnerability in Eskom Bilgisayar e-Belediye allows Information Elicitation.This issue affects e-Belediye: from 1.0.0.95 before 1.0.0.100. | [] | null | 9.8 | null | null |
|
GHSA-2767-g28h-69jv | In the Linux kernel, the following vulnerability has been resolved:fgraph: Add READ_ONCE() when accessing fgraph_array[]In __ftrace_return_to_handler(), a loop iterates over the fgraph_array[]
elements, which are fgraph_ops. The loop checks if an element is a
fgraph_stub to prevent using a fgraph_stub afterward.However, if the compiler reloads fgraph_array[] after this check, it might
race with an update to fgraph_array[] that introduces a fgraph_stub. This
could result in the stub being processed, but the stub contains a null
"func_hash" field, leading to a NULL pointer dereference.To ensure that the gops compared against the fgraph_stub matches the gops
processed later, add a READ_ONCE(). A similar patch appears in commit
63a8dfb ("function_graph: Add READ_ONCE() when accessing fgraph_array[]"). | [] | null | 4.7 | null | null |
|
GHSA-jgpj-vfxg-97h5 | An issue has been discovered in GitLab EE affecting all versions starting from 16.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for an attacker to abuse the policy bot to gain access to internal projects. | [] | null | 4.4 | null | null |
|
GHSA-f723-86qq-j5cv | A vulnerability in the H.264 decoder function of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a Cisco Meeting Server media process to restart unexpectedly when it receives an illegal H.264 frame. The vulnerability is triggered by an H.264 frame that has an invalid picture parameter set (PPS) value. An attacker could exploit this vulnerability by sending a malformed H.264 frame to the targeted device. An exploit could allow the attacker to cause a denial of service (DoS) condition because the media process could restart. The media session should be re-established within a few seconds, during which there could be a brief interruption in service. Cisco Bug IDs: CSCvg12559. | [] | null | null | 5.8 | null |
|
GHSA-f235-r39g-2m8r | Firefox 1.0 does not prevent the user from dragging an executable file to the desktop when it has an image/gif content type but has a dangerous extension such as .bat or .exe, which allows remote attackers to bypass the intended restriction and execute arbitrary commands via malformed GIF files that can still be parsed by the Windows batch file parser, aka "firedragging." | [] | null | null | null | null |
|
CVE-2010-3624 | Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Mac OS X allows attackers to execute arbitrary code via a crafted image. | [
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-2qp5-wv2r-fqw5 | SAP NetWeaver 7.0 allows Remote Code Execution and Denial of Service caused by an error in the DiagTraceHex() function. By sending a specially-crafted packet, an attacker could exploit this vulnerability to cause the application to crash. | [] | null | null | null | null |
|
CVE-2019-18307 | A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18294, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, and CVE-2019-18306. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. | [
"cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2024-3686 | DedeCMS update_guide.php path traversal | A vulnerability has been found in DedeCMS 5.7.112-UTF8 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file update_guide.php. The manipulation of the argument files leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260473 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*"
] | null | 4.3 | 4.3 | 4 |
CVE-2018-1631 | IBM Informix Dynamic Server Enterprise Edition 12.1 could allow a local user logged in with database administrator user to gain root privileges through a symbolic link vulnerability in oninit mongohash. IBM X-Force ID: 144431. | [
"cpe:2.3:a:ibm:informix_dynamic_server:12.1:*:*:*:enterprise:*:*:*"
] | null | null | 8.2 | null |
|
CVE-2003-1554 | Cross-site scripting (XSS) vulnerability in scozbook/add.php in ScozNet ScozBook 1.1 BETA allows remote attackers to inject arbitrary web script or HTML via the (1) username, (2) useremail, (3) aim, (4) msn, (5) sitename and (6) siteaddy variables. | [
"cpe:2.3:a:scoznet:scozbook:1.1_beta:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-w32j-frr3-h6w4 | Vulnerability in the Oracle Universal Work Queue product of Oracle E-Business Suite (component: Work Provider Administration). The supported version that is affected is 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Universal Work Queue. Successful attacks of this vulnerability can result in takeover of Oracle Universal Work Queue. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | null | null |
|
GHSA-w845-647q-rr58 | The (1) ncsarmt and (2) ncsawrap scripts in xmcd 2.6 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/Mosaic.*pid temporary file. | [] | null | null | null | null |
|
CVE-2022-49631 | raw: Fix a data-race around sysctl_raw_l3mdev_accept. | In the Linux kernel, the following vulnerability has been resolved:
raw: Fix a data-race around sysctl_raw_l3mdev_accept.
While reading sysctl_raw_l3mdev_accept, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its reader. | [] | null | 4.7 | null | null |
CVE-2022-46313 | The sensor privacy module has an authentication vulnerability. Successful exploitation of this vulnerability may cause unavailability of the smartphone's camera and microphone. | [
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
CVE-2022-21769 | In CCCI, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641673; Issue ID: ALPS06641687. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | 2.1 |
|
GHSA-v9w2-g4p4-9xg6 | Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference. | [] | null | null | null | null |
|
GHSA-w3jq-67c5-3rfj | On sites that also had the Elementor plugin for WordPress installed, it was possible for users with the edit_posts capability, which includes Contributor-level users, to import blocks onto any page using the astra-page-elementor-batch-process AJAX action. An attacker could craft and host a block containing malicious JavaScript on a server they controlled, and then use it to overwrite any post or page by sending an AJAX request with the action set to astra-page-elementor-batch-process and the url parameter pointed to their remotely-hosted malicious block, as well as an id parameter containing the post or page to overwrite. Any post or page that had been built with Elementor, including published pages, could be overwritten by the imported block, and the malicious JavaScript in the imported block would then be executed in the browser of any visitors to that page. | [] | null | null | null | null |
|
RHSA-2023:6372 | Red Hat Security Advisory: gdb security update | libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
GHSA-v573-78hv-qjj4 | CafeLog b2 Weblog Tool 2.06pre4, with allow_fopen_url enabled, allows remote attackers to execute arbitrary PHP code via the b2inc variable. | [] | null | null | null | null |
|
CVE-2013-3089 | Cross-site request forgery (CSRF) vulnerability in apply.cgi in Belkin N300 (F7D7301v1) router allows remote attackers to hijack the authentication of administrators for requests that modify configuration. | [
"cpe:2.3:o:belkin:n300_firmware:1.00.06:*:*:*:*:*:*:*",
"cpe:2.3:h:belkin:n300:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2008-0083 | The (1) VBScript (VBScript.dll) and (2) JScript (JScript.dll) scripting engines 5.1 and 5.6, as used in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 and SP2, do not properly decode script, which allows remote attackers to execute arbitrary code via unknown vectors. | [
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp1:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2019-13389 | RainLoop Webmail before 1.13.0 lacks XSS protection mechanisms such as xlink:href validation, the X-XSS-Protection header, and the Content-Security-Policy header. | [
"cpe:2.3:a:rainloop:webmail:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2003-1402 | PHP remote file inclusion vulnerability in hit.php for Kietu 2.0 and 2.3 allows remote attackers to execute arbitrary PHP code via the url_hit parameter, a different vulnerability than CVE-2006-5015. | [
"cpe:2.3:a:kietu:kietu:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kietu:kietu:2.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2005-3775 | PHP remote file inclusion vulnerability in pollvote.php in PollVote allows remote attackers to include arbitrary files via a URL in the pollname parameter. | [
"cpe:2.3:a:pollvote:pollvote:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-4cvf-ff56-8rr3 | A vulnerability classified as critical has been found in Simple Art Gallery 1.0. Affected is an unknown function of the file adminHome.php. The manipulation of the argument social_facebook leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223128. | [] | null | 9.8 | null | null |
|
ICSA-21-147-03 | MesaLabs AmegaView | The affected product is vulnerable to a command injection, which may allow an attacker to remotely execute arbitrary code.CVE-2021-27447 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). The affected product 's passcode is generated by an easily reversible algorithm, which may allow an attacker to gain access to the device.CVE-2021-27451 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). The affected product uses default cookies that could be set to bypass authentication to the web application, which may allow an attacker to gain access.CVE-2021-27453 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). The affected product has a command injection vulnerability that can be exploited to execute commands in the web server.CVE-2021-27449 has been assigned to this vulnerability. A CVSS v3 base score of 9.9 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). The affected product has insecure file permissions that could be exploited to escalate privileges on the device.CVE-2021-27445 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 7.8 | null |
GHSA-xpmm-rfmr-767g | Improper access control vulnerability in GalaxyWatch4Plugin prior to versions 2.2.11.22101351 and 2.2.12.22101351 allows attackers to access wearable device information. | [] | null | 3.3 | null | null |
|
GHSA-wpfm-jh3c-j3r6 | The Premium Addons for Elementor plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the get_template_content() function in all versions up to, and including, 4.10.31. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve Elementor template data. | [] | null | 4.3 | null | null |
|
GHSA-wx72-xp52-v927 | A Local Code Injection Vulnerability exists in the product and version listed above. The vulnerability is due to incorrect default permissions and allows for DLLs to be executed with higher level permissions. | [] | 7 | null | null | null |
|
CVE-2003-0816 | Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions by (1) using the NavigateAndFind method to load a file: URL containing Javascript, as demonstrated by NAFfileJPU, (2) using the window.open method to load a file: URL containing Javascript, as demonstrated using WsOpenFileJPU, (3) setting the href property in the base tag for the _search window, as demonstrated using WsBASEjpu, (4) loading the search window into an Iframe, as demonstrated using WsFakeSrc, (5) caching a javascript: URL in the browser history, then accessing that URL in the same frame as the target domain, as demonstrated using WsOpenJpuInHistory, NAFjpuInHistory, BackMyParent, BackMyParent2, and RefBack, aka the "Script URLs Cross Domain" vulnerability. | [
"cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-48523 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
RHSA-2008:0389 | Red Hat Security Advisory: nss_ldap security and bug fix update | nss_ldap randomly replying with wrong user's data | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
GHSA-xpmg-vx7g-292w | A vulnerability in the packet filtering features of Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters. The vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by crafting a malicious TCP packet with specific characteristics and sending it to a target device. A successful exploit could allow the attacker to bypass the L3 and L4 traffic filters and inject an arbitrary packet in the network. | [] | null | null | null | null |
|
CVE-2018-7588 | An issue was discovered in CImg v.220. A heap-based buffer over-read in load_bmp in CImg.h occurs when loading a crafted bmp image. | [
"cpe:2.3:a:cimg:cimg:.220:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2023-43204 | D-LINK DWL-6610 FW_v_4.3.0.8B003C was discovered to contain a command injection vulnerability in the function sub_2EF50. This vulnerability allows attackers to execute arbitrary commands via the manual-time-string parameter. | [
"cpe:2.3:o:dlink:dwl-6610ap_firmware:4.3.0.8b003c:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dwl-6610ap:-:*:*:*:*:*:*:*"
] | null | 8 | null | null |
|
CVE-2019-3905 | Zoho ManageEngine ADSelfService Plus 5.x before build 5703 has SSRF. | [
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5001:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5010:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5011:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5020:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5021:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5022:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5030:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5032:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5040:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5041:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5101:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5102:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5103:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5104:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5105:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5106:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5107:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5108:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5109:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5110:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5111:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5112:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5113:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5114:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5115:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5200:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5201:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5202:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5203:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5204:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5205:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5206:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5207:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5300:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5301:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5302:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5303:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5304:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5305:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5306:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5307:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5308:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5309:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5310:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5311:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5312:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5313:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5314:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5315:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5316:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5317:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5318:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5319:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5320:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5321:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5322:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5323:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5324:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5325:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5326:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5327:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5328:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5329:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5330:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.4:5400:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5500:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5501:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5502:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5503:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5504:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5505:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5506:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5507:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5508:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5509:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5510:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5511:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5512:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5513:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5514:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5515:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5516:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5517:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5518:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5519:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5520:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5521:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5600:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5601:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5602:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5603:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5604:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5605:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5606:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5607:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5700:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5701:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5702:*:*:*:*:*:*"
] | null | null | 10 | 7.5 |
|
CVE-1999-0559 | A system-critical Unix file or directory has inappropriate permissions. | [] | null | null | null | 10 |
|
GHSA-9422-v7w3-rvrq | Buffer overflow in efingerd 1.5 and earlier, and possibly up to 1.61, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a finger request from an IP address with a long hostname that is obtained via a reverse DNS lookup. | [] | null | null | null | null |
|
RHSA-2010:0861 | Red Hat Security Advisory: firefox security update | Mozilla miscellaneous memory safety hazards Mozilla miscellaneous memory safety hazards Mozilla XSS in gopher parser when parsing hrefs Mozilla cross-site information disclosure via modal calls Mozilla buffer overflow and memory corruption using document.write Mozilla use-after-free error in nsBarProp Mozilla unsafe library loading flaw Mozilla dangling pointer vulnerability in LookupGetterOrSetter Firefox race condition flaw (MFSA 2010-73) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
cisco-sa-webex-xss-FmbPu2pe | Cisco Webex Meetings Cross-Site Scripting Vulnerability | A vulnerability in the web-based interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface.
This vulnerability is due to insufficient validation of user-supplied input by the web-based interface of Cisco Webex Meetings. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 6.1 | null | null |
CVE-2015-2607 | Unspecified vulnerability in the Oracle Commerce Guided Search / Oracle Commerce Experience Manager component in Oracle Commerce Platform 3.0.2, 3.1.1, 3.1.2, 11.0, and 11.1 allows remote attackers to affect confidentiality via unknown vectors related to Content Acquisition System. | [
"cpe:2.3:a:oracle:commerce_platform:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:commerce_platform:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:commerce_platform:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:commerce_platform:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:commerce_platform:11.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-j3xx-q598-gx3w | Cross-site request forgery (CSRF) vulnerability in CA Cloud Service Management (CSM) before Summer 2014 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. | [] | null | null | null | null |
|
CVE-2024-5725 | Centreon initCurveList SQL Injection Remote Code Execution Vulnerability | Centreon initCurveList SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability.
The specific flaw exists within the initCurveList function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the apache user. Was ZDI-CAN-22683. | [
"cpe:2.3:a:centreon:centreon:*:*:*:*:*:*:*:*",
"cpe:2.3:a:centreon:centreon_web:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
cisco-sa-20180117-nxos1 | Cisco NX-OS System Software Unauthorized User Account Deletion Vulnerability | A vulnerability in the network-operator user role implementation for Cisco NX-OS System Software could allow an authenticated, local attacker to improperly delete valid user accounts. The network-operator role should not be able to delete other configured users on the device.
The vulnerability is due to a lack of proper role-based access control (RBAC) checks for the actions that a user with the network-operator role is allowed to perform. An attacker could exploit this vulnerability by authenticating to the device with user credentials that give that user the network-operator role. Successful exploitation could allow the attacker to impact the integrity of the device by deleting configured user credentials. The attacker would need valid user credentials for the device.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-nxos1 ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-nxos1"] | [] | null | null | 6.1 | null |
CVE-2021-36948 | Windows Update Medic Service Elevation of Privilege Vulnerability | Windows Update Medic Service Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2114:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1734:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1165:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1165:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1165:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1165:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1165:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2015-4933 | Stack-based buffer overflow in the server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12.1 allows remote attackers to execute arbitrary code via a crafted packet, a different vulnerability than CVE-2015-4931, CVE-2015-4932, CVE-2015-4934, and CVE-2015-4935. | [
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.11.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.