id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2020-15589 | A design issue was discovered in GetInternetRequestHandle, InternetSendRequestEx and InternetSendRequestByBitrate in the client side of Zoho ManageEngine Desktop Central 10.0.552.W and Remote Access Plus before 10.1.2119.1. By exploiting this issue, an attacker-controlled server can force the client to skip TLS certificate validation, leading to a man-in-the-middle attack against HTTPS and unauthenticated remote code execution. | [
"cpe:2.3:a:zohocorp:manageengine_desktop_central:10.0.552.w:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_remote_access_plus:*:*:*:*:*:*:*:*"
]
| null | 8.1 | null | 6.8 |
|
GHSA-2366-wcjw-43wx | In the Linux kernel, the following vulnerability has been resolved:netrom: Fix a data-race around sysctl_netrom_transport_no_activity_timeoutWe need to protect the reader reading the sysctl value because the
value can be changed concurrently. | []
| null | null | null | null |
|
GHSA-x288-4cjf-cw6q | IBM Security Identity Manager 6.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 163493. | []
| null | null | null | null |
|
CVE-2015-5111 | Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-4448, CVE-2015-5095, CVE-2015-5099, CVE-2015-5101, CVE-2015-5113, and CVE-2015-5114. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-f3mv-cjr3-hr9j | The Jobs for WordPress plugin before 2.7.8 does not sanitise and escape some of its Job settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks | []
| null | 5.9 | null | null |
|
GHSA-j9c5-6p9g-hwf3 | Zoho ManageEngine Password Manager Pro before 12101 and PAM360 before 5510 are vulnerable to unauthenticated remote code execution. (This also affects ManageEngine Access Manager Plus before 4303 with authentication.) | []
| null | 9.8 | null | null |
|
GHSA-p634-mhpc-5857 | SQL Injection Vulnerability in ECTouch v2 via the shop page in index.php.. | []
| null | null | null | null |
|
GHSA-cc7p-25jw-497j | A vulnerability in the endpoint software of Cisco Secure Endpoint for Windows could allow an authenticated, local attacker to evade endpoint protection within a limited time window. This vulnerability is due to a timing issue that occurs between various software components. An attacker could exploit this vulnerability by persuading a user to put a malicious file into a specific folder and then persuading the user to execute the file within a limited time window. A successful exploit could allow the attacker to cause the endpoint software to fail to quarantine the malicious file or kill its process. Note: This vulnerability only applies to deployments that have the Windows Folder Redirection feature enabled. | []
| null | 5 | null | null |
|
CVE-2015-3107 | Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3103 and CVE-2015-3106. | [
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2015-2711 | Mozilla Firefox before 38.0 does not recognize a referrer policy delivered by a referrer META element in cases of context-menu navigation and middle-click navigation, which allows remote attackers to obtain sensitive information by reading web-server Referer logs that contain private data in a URL, as demonstrated by a private path component. | [
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
RHSA-2021:4039 | Red Hat Security Advisory: devtoolset-10-gcc security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | 8.5 | null | null |
GHSA-7f3p-8cp9-3xf6 | Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142. | []
| null | null | null | null |
|
CVE-2007-1899 | Multiple SQL injection vulnerabilities in myWebland myBloggie 2.1.6 allow remote attackers to execute arbitrary SQL commands via (1) the user_id parameter in a viewuser action to index.php, and allow remote authenticated administrators to execute arbitrary SQL commands via (2) the post_id parameter in an edit action to admin.php. | [
"cpe:2.3:a:mywebland:mybloggie:2.1.6:*:*:*:*:*:*:*"
]
| null | null | null | 5.1 |
|
GHSA-ffg3-vmf8-h87g | Authentication Bypass
vulnerability in Hitachi Ops Center Analyzer on Linux, 64 bit (Hitachi Ops Center Analyzer detail view component), Hitachi Infrastructure Analytics Advisor on Linux, 64 bit (Hitachi Data Center Analyticscomponent).This issue affects Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.3-00; Hitachi Infrastructure Analytics Advisor: from 2.1.0-00 through 4.4.0-00. | []
| null | 9.4 | null | null |
|
CVE-2018-10606 | WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple heap-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files. | [
"cpe:2.3:a:we-con:levistudiou:1.8.29:*:*:*:*:*:*:*",
"cpe:2.3:a:we-con:levistudiou:1.8.44:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 9.3 |
|
CVE-2020-1123 | A denial of service vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations, aka 'Connected User Experiences and Telemetry Service Denial of Service Vulnerability'. This CVE ID is unique from CVE-2020-1084. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 2.1 |
|
GHSA-rhp4-4ff3-m4c6 | Memory leak in the gf_isom_oinf_read_entry function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. | []
| null | 5.5 | null | null |
|
GHSA-jmx8-355m-8vwh | Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11 | Missing check in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message.https://vaadin.com/security/cve-2018-25007 | []
| null | 2.6 | null | null |
GHSA-678w-6p5f-47x3 | An issue was discovered in phpMyAdmin. In the user interface preference feature, a user can execute an SQL injection attack against the account of the control user. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected. | []
| null | null | 8.8 | null |
|
CVE-2012-0918 | Unspecified vulnerability in Hitachi COBOL2002 Net Developer, Net Server Suite, and Net Client Suite 01-00, 01-01 through 01-01-/D, 01-02 through 01-02-/F, 01-03 through 01-03-/F, 02-00 through 02-00-/D, 02-01 through 02-01-/C, and possibly other versions before 02-01-/D allows remote attackers to execute arbitrary code via unknown attack vectors. | [
"cpe:2.3:a:hitachi:cobol2002_net_developer:01-00:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_developer:01-01:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_developer:01-01-\\/d:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_developer:01-02:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_developer:01-02-\\/f:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_developer:01-03:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_developer:01-03-\\/f:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_developer:02-00:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_developer:02-00-\\/d:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_developer:02-01:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_developer:02-01-\\/c:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_server_suite:01-00:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_server_suite:01-01:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_server_suite:01-01-\\/d:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_server_suite:01-02:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_server_suite:01-02-\\/f:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_server_suite:01-03:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_server_suite:01-03-\\/f:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_server_suite:02-00:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_server_suite:02-00-\\/d:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_server_suite:02-01:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_client_suite:01-00:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_client_suite:01-01:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_client_suite:01-01-\\/d:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_client_suite:01-02:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_client_suite:01-02-\\/f:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_client_suite:01-03:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_client_suite:01-03-\\/f:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_client_suite:02-00:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_client_suite:02-00-\\/d:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cobol2002_net_client_suite:02-01:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2018-19566 | A heap buffer over-read in parse_tiff_ifd in dcraw through 9.28 could be used by attackers able to supply malicious files to crash an application that bundles the dcraw code or leak private information. | [
"cpe:2.3:a:dcraw_project:dcraw:*:*:*:*:*:*:*:*"
]
| null | null | 7.1 | 5.8 |
|
CVE-2022-24301 | In Minetest before 5.4.0, players can add or subtract items from a different player's inventory. | [
"cpe:2.3:a:minetest:minetest:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 6.4 |
|
GHSA-4f4x-g56g-xrm8 | A vulnerability in the web-based management interface of Cisco Smart Software Manager Satellite could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
The vulnerability exists because the web-based management interface improperly validates values within SQL queries. An attacker could exploit this vulnerability by authenticating to the application and sending malicious SQL queries to an affected system. A successful exploit could allow the attacker to modify values on or return values from the underlying database or the operating system. | []
| null | null | null | null |
|
GHSA-x4r7-xqx2-rrpj | Fuji Electric V-Server 4.0.3.0 and prior, A use after free vulnerability has been identified, which may allow remote code execution. | []
| null | null | 9.8 | null |
|
GHSA-7qqp-g74r-7vjv | The unofficial SwiftLint extension before 1.4.5 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted swiftlint.path configuration value that triggers execution upon opening the workspace. | []
| null | null | null | null |
|
CVE-2006-5826 | Buffer overflow in Texas Imperial Software WFTPD Pro Server 3.23.1.1 allows remote authenticated users to execute arbitrary code or cause a denial of service (application crash) via crafted APPE commands that contain "/" (slash) or "\" (backslash) characters. | [
"cpe:2.3:a:texas_imperial_software:wftpd:3.23.1.1:*:pro:*:*:*:*:*"
]
| null | null | null | 5.8 |
|
GHSA-j5xp-cqqg-c5jq | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MDM9650, SD 210/SD 212/SD 205, SD 410/12, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, and SD 835, while printing debug message of a pointer in wlan_qmi_err_cb, the real kernel address will be printed regardless of the kptr_restrict system settings. | []
| null | null | 7.5 | null |
|
CVE-2017-10989 | The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact. | [
"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
CVE-2021-24162 | Responsive Menu < 4.0.4 - CSRF to Settings Update | In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, attackers could craft a request and trick an administrator into importing all new settings. These settings could be modified to include malicious JavaScript, therefore allowing an attacker to inject payloads that could aid in further infection of the site. | [
"cpe:2.3:a:expresstech:responsive_menu:*:*:*:*:free:wordpress:*:*",
"cpe:2.3:a:expresstech:responsive_menu:*:*:*:*:pro:wordpress:*:*"
]
| null | 8.8 | null | 6.8 |
CVE-2023-25915 | Authenticated Remote Command Execution in Danfoss AK-SM800A | Due to improper input validation, an authenticated remote attacker could execute arbitrary commands on the target system. | [
"cpe:2.3:o:danfoss:ak-sm_800a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:danfoss:ak-sm_800a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:danfoss:ak-sm_800a:-:*:*:*:*:*:*:*"
]
| null | 9.9 | null | null |
GHSA-xr6p-m6mj-h42c | Just like in the previous report, an attacker could steal the account of different users. But in this case, it's a little bit more specific, because it is needed to be an editor in the same app as the victim. | []
| null | 4.9 | null | null |
|
GHSA-jrv7-j2hm-r7h8 | A write protection and execution bypass vulnerability in McAfee (now Intel Security) Application Control (MAC) 6.1.0 for Linux and earlier allows authenticated users to change binaries that are part of the Application Control whitelist and allows execution of binaries via specific conditions. | []
| null | null | 5.5 | null |
|
GHSA-p3mm-64pw-w23h | The Guest Support – Complete customer support ticket system for WordPress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteMassTickets' function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to delete arbitrary support tickets. | []
| null | 5.3 | null | null |
|
GHSA-w8g3-3xjr-4mq8 | IBM QRadar Data Synchronization App 1.0 through 3.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 217370. | []
| null | 4.4 | null | null |
|
CVE-2009-1127 | win32k.sys in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not correctly validate an argument to an unspecified system call, which allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, aka "Win32k NULL Pointer Dereferencing Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:gold:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
CVE-2018-8736 | A privilege escalation vulnerability in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an attacker to leverage an RCE vulnerability escalating to root. | [
"cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 9 |
|
GHSA-55xr-gqp7-q7ff | An issue was discovered in Moxa SoftCMS versions prior to Version 1.6. Moxa SoftCMS Webserver does not properly validate input. An attacker could provide unexpected values and cause the program to crash or excessive consumption of resources could result in a denial-of-service condition. | []
| null | null | 7.5 | null |
|
GHSA-qj4p-48x3-w6gm | Cross-site scripting (XSS) vulnerability in the administrator panel in phpForm.net LinkBase 2.0 allows remote attackers to inject arbitrary web script or HTML via the username in a registration, which is not properly handled when the administrator accesses the Users menu. | []
| null | null | null | null |
|
GHSA-w67j-pm6m-f39v | Multiple cross-site scripting (XSS) vulnerabilities in index.php in TomatoCMS before 2.0.5 allow remote authenticated users, with "Add new article" privileges, to inject arbitrary web script or HTML via the (1) title, (2) subTitle, and (3) author parameters in conjunction with a /admin/news/article/add PATH_INFO. | []
| null | null | null | null |
|
GHSA-56q8-wv5h-r272 | Cross-site scripting (XSS) vulnerability in McAfee Email and Web Security (EWS) 5.5 through Patch 6 and 5.6 through Patch 3, and McAfee Email Gateway (MEG) 7.0.0 and 7.0.1, allows remote attackers to inject arbitrary web script or HTML via vectors related to the McAfee Security Appliance Management Console/Dashboard. | []
| null | null | null | null |
|
GHSA-xhxm-p3qv-qprc | By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12. | []
| null | 4.7 | null | null |
|
GHSA-9p6f-v932-mfxm | GNOME Evolution through 3.28.2 is prone to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted email that contains a valid signature from the entity to be impersonated as an attachment. | []
| null | null | 6.5 | null |
|
CVE-2015-9417 | The testimonial-slider plugin through 1.2.1 for WordPress has CSRF with resultant XSS. | [
"cpe:2.3:a:slidervilla:testimonial_slider:*:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | 4.3 |
|
GHSA-3qmr-hmpr-mv37 | An issue was discovered in Docker Desktop through 2.2.0.5 on Windows. If a local attacker sets up their own named pipe prior to starting Docker with the same name, this attacker can intercept a connection attempt from Docker Service (which runs as SYSTEM), and then impersonate their privileges. | []
| null | 7.8 | null | null |
|
CVE-2011-2887 | IBM Lotus Symphony 3 before FP3 on Linux allows remote attackers to cause a denial of service (application crash) via a certain sample document. | [
"cpe:2.3:a:ibm:lotus_symphony:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_symphony:3.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_symphony:3.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-jmf8-63p5-c49j | An Unrestricted Upload of File with Dangerous Type vulnerability in the Ajaxmanager File and Database explorer (ajaxmanager) module for PrestaShop through 2.3.0, allows remote attackers to upload dangerous files without restrictions. | []
| null | 9.8 | null | null |
|
GHSA-f3vr-r77c-3q85 | Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary OS commands via FactoryPassword parameter or bootmode parameter of a certain URL. | []
| null | null | 7.2 | null |
|
GHSA-hwwj-8rjh-78m2 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LambertGroup SHOUT allows SQL Injection. This issue affects SHOUT: from n/a through 3.5.3. | []
| null | 8.5 | null | null |
|
GHSA-x36v-pwx4-c656 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | []
| null | null | null | null |
|
CVE-2017-1086 | In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p4, 11.0-RELEASE-p15, 10.4-STABLE, 10.4-RELEASE-p3, and 10.3-RELEASE-p24, not all information in the struct ptrace_lwpinfo is relevant for the state of any thread, and the kernel does not fill the irrelevant bytes or short strings. Since the structure filled by the kernel is allocated on the kernel stack and copied to userspace, a leak of information of the kernel stack of the thread is possible from the debugger. As a result, some bytes from the kernel stack of the thread using ptrace (PT_LWPINFO) call can be observed in userspace. | [
"cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*"
]
| null | null | 3.3 | 2.1 |
|
CVE-2024-29064 | Windows Hyper-V Denial of Service Vulnerability | Windows Hyper-V Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
]
| null | 6.2 | null | null |
GHSA-xqp9-w6xm-qf2v | Microsoft Message Queuing Remote Code Execution Vulnerability | []
| null | 9.8 | null | null |
|
GHSA-p598-2cg3-8qjf | The showHelp() function in Microsoft Internet Explorer 5.01, 5.5, and 6.0 supports certain types of pluggable protocols that allow remote attackers to bypass the cross-domain security model and execute arbitrary code, aka "Improper Cross Domain Security Validation with ShowHelp functionality." | []
| null | null | null | null |
|
GHSA-4j38-wjhf-884r | Arbitrary code execution in Richfaces | JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310. | []
| null | null | 9.8 | null |
CVE-2016-9398 | The jpc_floorlog2 function in jpc_math.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors. | [
"cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-qvfg-7rq7-85cm | The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | []
| null | null | null | null |
|
GHSA-jmf4-pq78-f8vj | Moderate severity vulnerability that affects org.apache.hive:hive-jdbc | In Apache Hive 2.3.3, 3.1.0 and earlier, Hive "EXPLAIN" operation does not check for necessary authorization of involved entities in a query. An unauthorized user can do "EXPLAIN" on arbitrary table or view and expose table metadata and statistics. | []
| null | null | 4.3 | null |
RHBA-2019:0885 | Red Hat Bug Fix Advisory: Red Hat Ansible Tower 3.4.3-4 - Container | Tower: credentials leaked through environment variables | [
"cpe:/a:redhat:ansible_tower:3.4::el7"
]
| null | null | 7.2 | null |
CVE-2021-47259 | NFS: Fix use-after-free in nfs4_init_client() | In the Linux kernel, the following vulnerability has been resolved:
NFS: Fix use-after-free in nfs4_init_client()
KASAN reports a use-after-free when attempting to mount two different
exports through two different NICs that belong to the same server.
Olga was able to hit this with kernels starting somewhere between 5.7
and 5.10, but I traced the patch that introduced the clear_bit() call to
4.13. So something must have changed in the refcounting of the clp
pointer to make this call to nfs_put_client() the very last one. | [
"cpe:2.3:o:linux:linux_kernel:4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
GHSA-2qc8-39fh-f2v4 | Multiple PHP remote file inclusion vulnerabilities in FreeSchool 1.1.0 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the CLASSPATH parameter to (1) bib_form.php, (2) bib_pldetails.php, (3) bib_plform.php, (4) bib_plsearchc.php, (5) bib_plsearchs.php, (6) bib_save.php, (7) bib_searchc.php, (8) bib_searchs.php, (9) edi_form.php, (10) edi_save.php, (11) gen_form.php, (12) gen_save.php, (13) lin_form.php, (14) lin_save.php, (15) luo_form.php, (16) luo_save.php, (17) sog_form.php, or (18) sog_save.php in biblioteca/; (19) cal_insert.php, (20) cal_save.php, or (21) cal_saveactivity.php in calendario/; (22) circolari/cir_save.php; or (23) modulistica/mdl_save.php. | []
| null | null | null | null |
|
GHSA-cp62-q2rf-23j7 | Unrestricted file upload vulnerability in upload.php in SeeBlick 1.0 Beta allows remote attackers to upload arbitrary files via unspecified vectors. NOTE: these files are stored with .html extensions, so the scope of the attack might be limited to resource consumption and possibly XSS. | []
| null | null | null | null |
|
CVE-2022-38236 | XPDF commit ffaf11c was discovered to contain a global-buffer overflow via Lexer::getObj(Object*) at /xpdf/Lexer.cc. | [
"cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
CVE-2020-35918 | An issue was discovered in the branca crate before 0.10.0 for Rust. Decoding tokens (with invalid base62 data) can panic. | [
"cpe:2.3:a:hakobaito:branca:*:*:*:*:*:rust:*:*"
]
| null | 5.5 | null | 4.9 |
|
GHSA-qm34-9r78-66cq | ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x. | []
| 9.3 | 9.8 | null | null |
|
GHSA-g3x6-r9w9-mcxx | A Remote Code Execution (RCE) vulnerability was identified in GitHub Enterprise Server that allowed attackers to execute arbitrary code by exploiting the pre-receive hook functionality, potentially leading to privilege escalation and system compromise. The vulnerability involves using dynamically allocated ports that become temporarily available, such as during a hot patch upgrade. This means the vulnerability is only exploitable during specific operational conditions, which limits the attack window. Exploitation required either site administrator permissions to enable and configure pre-receive hooks or a user with permissions to modify repositories containing pre-receive hooks where this functionality was already enabled. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.17 and was fixed in versions 3.16.2, 3.15.6, 3.14.11, 3.13.14. This vulnerability was reported via the GitHub Bug Bounty program. | []
| 7.1 | null | null | null |
|
CVE-2019-10621 | Use after free issue when MAP and UNMAP calls at same time as data structure used my MAP may be freed by UNMAP function in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in Nicobar, QCS405, Rennell, Saipan, SC8180X, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130 | [
"cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 4.6 |
|
CVE-2024-37948 | WordPress Caxton – Create Pro page layouts in Gutenberg plugin <= 1.30.1 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PootlePress Caxton – Create Pro page layouts in Gutenberg allows Stored XSS.This issue affects Caxton – Create Pro page layouts in Gutenberg: from n/a through 1.30.1. | []
| null | 6.5 | null | null |
CVE-2004-0437 | Titan FTP Server version 3.01 build 163, and possibly other versions before build 169, allows remote authenticated users to cause a denial of service (crash) by disconnecting from the system during a "LIST -L" command, which causes Titan to access an invalid socket. | [
"cpe:2.3:a:south_river_technologies:titan_ftp_server:3.01_build_163:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-62rq-cf48-633w | In telecom service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges needed | []
| null | 5.5 | null | null |
|
CVE-2014-5504 | SolarWinds Log and Event Manager before 6.0 uses "static" credentials, which makes it easier for remote attackers to obtain access to the database and execute arbitrary code via unspecified vectors, related to HyperSQL. | [
"cpe:2.3:a:solarwinds:log_and_event_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:log_and_event_manager:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:log_and_event_manager:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:log_and_event_manager:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:log_and_event_manager:5.6.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-pq29-2m6m-938v | global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution | []
| null | 7.8 | null | null |
|
RHSA-2025:1285 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto | [
"cpe:/a:redhat:trusted_artifact_signer:1.1::el9"
]
| null | 8.2 | null | null |
CVE-2008-5658 | Directory traversal vulnerability in the ZipArchive::extractTo function in PHP 5.2.6 and earlier allows context-dependent attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-9vx6-546g-266v | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in N Squared Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin.This issue affects Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin: from n/a before 1.6.6.1. | []
| null | 7.6 | null | null |
|
GHSA-xx33-26x2-m77p | In sourcecodetester Engineers Online Portal as of 10-21-21, an attacker can manipulate the Host header as seen by the web application and cause the application to behave in unexpected ways. Very often multiple websites are hosted on the same IP address. This is where the Host Header comes in. This header specifies which website should process the HTTP request. The web server uses the value of this header to dispatch the request to the specified website. Each website hosted on the same IP address is called a virtual host. And It's possible to send requests with arbitrary Host Headers to the first virtual host. | []
| null | null | null | null |
|
CVE-2010-2761 | The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172. | [
"cpe:2.3:a:andy_armstrong:cgi.pm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.42:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.43:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.44:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.45:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.50:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.51:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.52:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.53:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.54:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.55:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.56:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.57:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.01:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.26:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.28:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.29:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.31:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.32:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.33:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.34:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.35:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.36:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.37:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.38:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.39:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.40:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.41:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.42:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.43:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.44:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.45:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.46:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.47:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.48:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.49:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.51:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.52:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.53:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.54:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.55:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.56:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.57:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.58:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.59:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.60:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.61:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.62:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.63:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.64:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.65:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.66:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.67:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.68:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.69:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.70:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.71:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.72:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.73:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.74:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.75:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.76:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.77:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.78:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.79:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.80:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.81:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.82:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.83:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.84:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.85:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.86:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.87:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.88:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.89:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.90:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.91:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.92:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.93:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.94:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.95:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.96:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.97:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.98:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.99:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.751:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.752:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.03:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.04:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.05:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.06:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.07:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.08:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.09:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.19:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.23:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.24:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.25:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.26:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.27:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.28:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.29:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.31:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.32:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.33:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.34:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.35:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.36:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.37:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.38:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.39:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.40:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.41:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.42:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.43:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.44:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.45:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.46:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.47:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.48:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:*:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:0.078:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:0.079:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:0.080:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:0.081:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:0.082:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.104:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.107:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.108:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.109:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.110:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.111:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2021-30621 | Chromium: CVE-2021-30621 UI Spoofing in Autofill | [
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4.3 |
|
GHSA-8gc6-65mm-xr6r | Malicious Package in bp66 | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | []
| null | 9.1 | null | null |
GHSA-xj4f-h5gm-5gh9 | Unspecified vulnerability in the SNMPv2c implementation in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SNMPv1 packet. | []
| null | null | null | null |
|
CVE-2025-30561 | WordPress CAS Maestro plugin <= 1.1.3 - CSRF to Stored XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Henrique Mouta CAS Maestro allows Stored XSS. This issue affects CAS Maestro: from n/a through 1.1.3. | []
| null | 7.1 | null | null |
GHSA-c9h3-w54v-5g3j | Possible Cross-Site Scripting (XSS) Vulnerabilityin eDirectory has been discovered in
OpenText™ eDirectory 9.2.5.0000. | []
| null | 5.4 | null | null |
|
CVE-2011-3160 | Unspecified vulnerability in HP Data Protector Notebook Extension 6.20 and Data Protector for Personal Computers 7.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1228. | [
"cpe:2.3:a:hp:data_protector_for_personal_computers:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:data_protector_notebook_extension:6.20:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-32mh-jmjq-p49p | KACO New Energy XP100U Up to XP-JAVA 2.0 is affected by incorrect access control. Credentials will always be returned in plain-text from the local server during the KACO XP100U authentication process, regardless of whatever passwords have been provided, which leads to an information disclosure vulnerability. | []
| null | null | null | null |
|
CVE-2012-5154 | Integer overflow in Google Chrome before 24.0.1312.52 on Windows allows attackers to cause a denial of service or possibly have unspecified other impact via vectors related to allocation of shared memory. | [
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1272.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1272.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1273.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1274.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1275.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1276.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1276.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1277.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1278.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1279.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1280.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1282.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1283.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1286.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1286.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1287.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1287.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1288.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1288.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1289.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1289.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1291.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1291.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1292.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1292.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1293.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1294.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1295.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1296.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1296.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1297.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1298.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1298.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1299.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1300.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1302.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1303.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1304.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1304.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1306.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1306.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1307.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1307.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1308.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1309.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1310.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1311.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1311.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.50:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2025-30549 | WordPress Yummly Rich Recipes plugin <= 4.2 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Yummly Yummly Rich Recipes allows Cross Site Request Forgery. This issue affects Yummly Rich Recipes: from n/a through 4.2. | []
| null | 4.3 | null | null |
GHSA-2cwh-9m9v-957f | Dzzoffice Version 2.02.1 is affected by cross-site scripting (XSS) due to a lack of sanitization of input data at all upload functions in webroot/dzz/attach/Uploader.class.php and return a wrong response in content-type of output data in webroot/dzz/attach/controller.php. | []
| null | null | null | null |
|
GHSA-h9f9-5vmf-w2j3 | On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, the Traffic Management Microkernel (TMM) may restart when a virtual server has an HTTP/2 profile with Application Layer Protocol Negotiation (ALPN) enabled and it processes traffic where the ALPN extension size is zero. | []
| null | 7.5 | null | null |
|
GHSA-fqw9-5rf7-p2x8 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | []
| null | 8.8 | null | null |
|
GHSA-c335-497w-rpm6 | GPAC v2.1-DEV-rev232-gfcaa01ebb-master was discovered to contain a stack overflow when processing ISOM_IOD. | []
| null | 7.8 | null | null |
|
CVE-2020-27248 | A specially crafted document can cause the document parser to copy data from a particular record type into a static-sized buffer within an object that is smaller than the size used for the copy, which will cause a heap-based buffer overflow. In version/Instance 0x0003 and 0x0014, an attacker can entice the victim to open a document to trigger this vulnerability. This affects SoftMaker Software GmbH SoftMaker Office PlanMaker 2021 (Revision 1014). | [
"cpe:2.3:a:softmaker:planmaker_2021:1014:*:*:*:*:*:*:*"
]
| null | null | 8.8 | null |
|
GHSA-6q78-6xvr-26fg | Jenkins Groovy Plugin sandbox bypass vulnerability | Jenkins Script Security sandbox protection could be circumvented during the script compilation phase by applying AST transforming annotations such as `@Grab` to source code elements.Both the pipeline validation REST APIs and actual script/pipeline execution are affected.This allowed users with Overall/Read permission, or able to control Jenkinsfile or sandboxed Pipeline shared library contents in SCM, to bypass the sandbox protection and execute arbitrary code on the Jenkins controller.All known unsafe AST transformations in Groovy are now prohibited in sandboxed scripts. | []
| null | 8.8 | null | null |
CVE-2022-4861 | Incorrect Implementation of Authentication Algorithm | Incorrect implementation in authentication protocol in M-Files Client before 22.5.11356.0 allows high privileged user to get other users tokens to another resource. | [
"cpe:2.3:a:m-files:m-files_client:*:*:*:*:*:*:*:*"
]
| null | 4.8 | null | null |
GHSA-f9h7-gj94-825h | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Sensei Sensei Pro (WC Paid Courses) allows Stored XSS.This issue affects Sensei Pro (WC Paid Courses): from n/a through 4.23.1.1.23.1. | []
| null | 6.5 | null | null |
|
CVE-2019-19721 | An off-by-one error in the DecodeBlock function in codec/sdl_image.c in VideoLAN VLC media player before 3.0.9 allows remote attackers to cause a denial of service (memory corruption) via a crafted image file. NOTE: this may be related to the SDL_Image product. | [
"cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 6.8 |
|
GHSA-xcp6-3jg8-q26g | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WooCommerce Order Search allows Reflected XSS. This issue affects WooCommerce Order Search: from n/a through 1.1.0. | []
| null | 7.1 | null | null |
|
CVE-2019-17609 | HongCMS 3.0.0 has XSS via the install/index.php dbusername parameter. | [
"cpe:2.3:a:hongcms_project:hongcms:3.0.0:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
GHSA-fc4p-683j-c929 | Unspecified vulnerability in the kernel in Sun OpenSolaris 2009.06 allows remote attackers to cause a denial of service (panic) via unknown vectors, as demonstrated by the vd_solaris2 module in VulnDisco Pack Professional 8.12. NOTE: as of 20091203, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. | []
| null | null | null | null |
|
CVE-2022-36776 | IBM Cloud Pak for Security (CP4S) 1.10.0.0 79and 1.10.2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 233663. | [
"cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
|
CVE-2024-3831 | Enter Addons – Ultimate Template Builder for Elementor <= 2.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Heading widget | The Enter Addons – Ultimate Template Builder for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Heading widget in all versions up to, and including, 2.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
CVE-2017-7931 | In ABB IP GATEWAY 3.39 and prior, by accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access the configuration files and application pages without authentication. | [
"cpe:2.3:o:abb:ip_gateway_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:ip_gateway:-:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.