id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-45526 | An issue was discovered in OPC Foundation OPCFoundation/UA-.NETStandard through 1.5.374.78. A remote attacker can send requests with invalid credentials and cause the server performance to degrade gradually. | [
"cpe:2.3:a:opcfoundation:ua-.netstandard:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
CVE-2021-32518 | QSAN Storage Manager - UNIX Symbolic Link (Symlink) Following | A vulnerability in share_link in QSAN Storage Manager allows remote attackers to create a symbolic link then access arbitrary files. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | [
"cpe:2.3:a:qsan:storage_manager:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-j77p-6wx9-cjqq | vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. | [] | null | 9.8 | null | null |
|
CVE-2012-4994 | SQL injection vulnerability in admin/admin.php in LimeSurvey before 1.91+ Build 120224 allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a browse action. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.50:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.52:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.53\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.70\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.71\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.72:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.80\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.81\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.82\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.85:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.86:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.87\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.90\\+:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
PYSEC-2016-19 | null | Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file. | [] | null | null | null | null |
CVE-2023-0817 | Buffer Over-read in gpac/gpac | Buffer Over-read in GitHub repository gpac/gpac prior to v2.3.0-DEV. | [
"cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*"
] | null | null | 7.3 | null |
CVE-2024-36814 | An arbitrary file read vulnerability in Adguard Home before v0.107.52 allows authenticated attackers to access arbitrary files as root on the underlying Operating System via placing a crafted file into a readable directory. | [
"cpe:2.3:a:adguard:adguard_home:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
GHSA-29jf-w9mr-r2xp | In Philips' IntelliSpace Cardiovascular (ISCV) products (ISCV Version 2.x or prior and Xcelera Version 4.1 or prior), an attacker with escalated privileges could access folders which contain executables where authenticated users have write permissions, and could then execute arbitrary code with local administrative permissions. | [] | null | 7.8 | null | null |
|
GHSA-gwgr-rxcg-c2cg | Out of bounds reads while parsing NAN beacons attributes and OUIs due to improper length of field check in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking | [] | null | null | null | null |
|
CVE-2023-52687 | crypto: safexcel - Add error handling for dma_map_sg() calls | In the Linux kernel, the following vulnerability has been resolved:
crypto: safexcel - Add error handling for dma_map_sg() calls
Macro dma_map_sg() may return 0 on error. This patch enables
checks in case of the macro failure and ensures unmapping of
previously mapped buffers with dma_unmap_sg().
Found by Linux Verification Center (linuxtesting.org) with static
analysis tool SVACE. | [] | null | 5.5 | null | null |
GHSA-64rv-h943-wm6q | The Access Control issues include allowing a regular user to view a restricted incident, user role escalation to admin, users adding themselves as a participant in a restricted incident, and users able to view restricted incidents via the search feature. If your install has followed the secure deployment guidelines the risk of this is lowered, as this may only be exploited by an authenticated user. | [] | null | null | null | null |
|
RHSA-2017:1256 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.15 update on RHEL 5 | Resteasy: Yaml unmarshalling vulnerable to RCE | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | 8.1 | null |
GHSA-534q-9f5r-pv5m | Cross-site scripting (XSS) vulnerability in the preview form in Stephen Ostermiller Contact Form before 2.00.02 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that contain an apostrophe. | [] | null | null | null | null |
|
GHSA-h558-fg72-4xph | CORE/HDD/src/wlan_hdd_hostapd.c in the Qualcomm Wi-Fi driver in Android before 2016-07-05 on Nexus 7 (2013) devices mishandles userspace data copying, which allows attackers to gain privileges via a crafted application, aka Android internal bug 27725204 and Qualcomm internal bug CR561022. | [] | null | null | 7.8 | null |
|
CVE-2008-5847 | Constructr CMS 3.02.5 and earlier stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information by reading the hash column. | [
"cpe:2.3:a:constructr:constructr-cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.00.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.00.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.00.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.01.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.01.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.01.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.01.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.01.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.01.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.01.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.01.7:beta:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.01.8:beta:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.01.9:beta:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.02.0:*:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.02.1:*:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.02.2:*:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.02.3:*:*:*:*:*:*:*",
"cpe:2.3:a:constructr:constructr-cms:3.02.4:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-724g-4hc2-8gf6 | Finjan Vital Security Appliance 5100/8100 NG 8.3.5 stores passwords in plaintext in a backup file, which allows local users to gain privileges. NOTE: the vendor has notified CVE that this issue was fixed in 8.3.6. | [] | null | null | null | null |
|
GHSA-p3r9-vhxm-75g7 | Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. | [] | null | 7.2 | null | null |
|
RHSA-2021:3926 | Red Hat Security Advisory: OpenShift Container Platform 4.8.17 security and bug fix update | coreos-installer: incorrect signature verification on gzip-compressed install images | [
"cpe:/a:redhat:openshift:4.8::el7",
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 7.5 | null | null |
CVE-2013-4013 | IBM Maximo Asset Management 6.2 through 6.2.8, 7.1 through 7.1.1.12, and 7.5 before 7.5.0.2 allows remote attackers to obtain sensitive information via unspecified vectors. | [
"cpe:2.3:a:ibm:maximo_asset_management:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2021-39025 | IBM Guardium Data Encryption (GDE) 4.0.0.0 and 5.0.0.0 could disclose internal IP address information when the web backend is down. IBM X-Force 213863. | [
"cpe:2.3:a:ibm:guardium_data_encryption:4.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:guardium_data_encryption:5.0.0.0:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
|
GHSA-r857-4vmh-q8gw | Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_sonos, at 0x9d01ddd4, the value for the `s_sonos_cmd` key is copied using `strcpy` to the buffer at `$sp+0x290`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. | [] | null | 9.9 | null | null |
|
GHSA-9jmq-68m9-2x2j | In the module "Account Manager | Sales Representative & Dealers | CRM" (prestasalesmanager) up to 9.0 from Presta World for PrestaShop, a guest can download personal information without restriction by performing a path traversal attack. | [] | null | 7.5 | null | null |
|
RHSA-2015:1636 | Red Hat Security Advisory: net-snmp security update | net-snmp: snmp_pdu_parse() incompletely parsed varBinds left in list of variables net-snmp: Heap corruption in snmp_pdu_parse function in snmplib/snmp_api.c | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
CVE-2021-30521 | Heap buffer overflow in Autofill in Google Chrome on Android prior to 91.0.4472.77 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-26r7-84w5-c8mf | irfanView 4.56 contains an error processing parsing files of type .pcx. Which leads to out-of-bounds writing at i_view32+0xdb60. | [] | null | null | null | null |
|
RHSA-2020:3841 | Red Hat Security Advisory: OpenShift Container Platform 4.5.13 jenkins security update | jetty: double release of resource can lead to information disclosure jenkins: user-specified tooltip values leads to stored cross-site scripting jenkins: stored XSS vulnerability in project naming strategy jenkins: stored XSS vulnerability in 'trigger builds remotely' | [
"cpe:/a:redhat:openshift:4.5::el7"
] | null | 5.4 | null | null |
GHSA-p8rx-xh76-m952 | In OpenEMR, versions 4.2.0 to 6.0.0 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly. An attacker could trick a user to click on a malicious url and execute malicious code. | [] | null | 6.1 | null | null |
|
GHSA-4hgh-2v7g-hc3q | SolarWinds Serv-U is submitting an HTTP request when changing or updating the attributes for File Share or File request.? Part of the URL of the request discloses sensitive data. | [] | null | 7.5 | null | null |
|
CVE-2023-26768 | Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the compileTranslationTable.c and lou_setDataPath functions. | [
"cpe:2.3:a:liblouis:liblouis:3.24.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2019-1123 | A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory, aka 'DirectWrite Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1117, CVE-2019-1118, CVE-2019-1119, CVE-2019-1120, CVE-2019-1121, CVE-2019-1122, CVE-2019-1124, CVE-2019-1127, CVE-2019-1128. | [
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 |
|
CVE-2014-0900 | The Device Administrator code in Android before 4.4.1_r1 might allow attackers to spoof device administrators and consequently bypass MDM restrictions by leveraging failure to update the mAdminMap data structure. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-frqg-qr33-mvr2 | SourceCodester (rems) Employee Management System 1.0 is vulnerable to Cross Site Scripting (XSS) in add_employee.php via the First Name and Address text fields. | [] | null | 6.1 | null | null |
|
CVE-2021-44920 | An invalid memory address dereference vulnerability exists in gpac 1.1.0 in the dump_od_to_saf.isra function, which causes a segmentation fault and application crash. | [
"cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2015-0140 | An unspecified ActiveX control in IBM SPSS Statistics 22.0 through FP1 on 32-bit platforms allows remote attackers to execute arbitrary code via a crafted HTML document. | [
"cpe:2.3:a:ibm:spss_statistics:22.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2023-35720 | ASUS RT-AX92U lighttpd mod_webdav.so SQL Injection Information Disclosure Vulnerability | ASUS RT-AX92U lighttpd mod_webdav.so SQL Injection Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected ASUS RT-AX92U routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the mod_webdav.so module. When parsing a request, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-16078. | [
"cpe:2.3:o:asus:rt-ax92u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*"
] | null | null | 6.5 | null |
GHSA-33fr-rpxm-q4fp | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Gopi Ramasamy Email download link.This issue affects Email download link: from n/a through 3.7. | [] | null | 5.3 | null | null |
|
CVE-2014-2684 | The GenericConsumer class in the Consumer component in ZendOpenId before 2.0.2 and the Zend_OpenId_Consumer class in Zend Framework 1 before 1.12.4 does not verify that the openid_op_endpoint value identifies the same Identity Provider as the provider used in the association handle, which allows remote attackers to bypass authentication and spoof arbitrary OpenID identities by using a malicious OpenID Provider that generates OpenID tokens with arbitrary identifier and claimed_id values. | [
"cpe:2.3:a:zend:zendopenid:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2013-0916 | Use-after-free vulnerability in the Web Audio implementation in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.41:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2019-5217 | There is an information disclosure vulnerability on Mate 9 Pro Huawei smartphones versions earlier than LON-AL00B9.0.1.150 (C00E61R1P8T8). An attacker could view the photos after a series of operations without unlocking the screen lock. Successful exploit could cause an information disclosure condition. | [
"cpe:2.3:o:huawei:mate_9_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_9_pro:-:*:*:*:*:*:*:*"
] | null | null | 4.6 | 2.1 |
|
GHSA-v24x-73f9-v4j3 | Memory corruption while parsing the memory map info in IOCTL calls. | [] | null | 7.8 | null | null |
|
GHSA-5w8c-34c5-7jq9 | An Improper Neutralization of Special Elements vulnerability in the download manager of Juniper Networks Junos OS on SRX Series and EX Series allows a locally authenticated attacker with low privileges to take full control over the device. One aspect of this vulnerability is that the attacker needs to be able to execute any of the "request ..." or "show system download ..." commands. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: All versions prior to 19.2R1-S9, 19.2R3-S5; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R3-S8; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S3; 20.4 versions prior to 20.4R3-S2, 20.4R3-S3; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R2-S2, 21.2R3; 21.3 versions prior to 21.3R2, 21.3R3; 21.4 versions prior to 21.4R1-S1, 21.4R2. | [] | null | 7.8 | null | null |
|
CVE-2017-17599 | Advance Online Learning Management Script 3.1 has SQL Injection via the courselist.php subcatid or popcourseid parameter. | [
"cpe:2.3:a:advance_online_learning_management_script_project:advance_online_learning_management_script:3.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2021-41785 | Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, allow attackers to trigger a use-after-free and execute arbitrary code because JavaScript is mishandled. | [
"cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2023-28746 | Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | [] | null | 6.5 | null | null |
|
GHSA-w2xm-9v29-725f | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPHocus My auctions allegro allows Reflected XSS. This issue affects My auctions allegro: from n/a through 3.6.18. | [] | null | 7.1 | null | null |
|
GHSA-j234-73mf-fxmv | The User.offer_account_by_email WebService method in Bugzilla 2.x and 3.x before 3.4.13, 3.5.x and 3.6.x before 3.6.7, 3.7.x and 4.0.x before 4.0.3, and 4.1.x through 4.1.3, when createemailregexp is not empty, does not properly handle user_can_create_account settings, which allows remote attackers to create user accounts by leveraging a token contained in an e-mail message. | [] | null | null | null | null |
|
GHSA-47fc-vmwq-366v | PyTorch vulnerable to arbitrary code execution | In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely. The fix for this issue is available in version 1.13.1. There is a release checker in [issue #89855](https://github.com/pytorch/pytorch/issues/89855). | [] | 9.3 | 9.8 | null | null |
GHSA-m2fw-cvrc-qphg | Missing Authorization vulnerability in WPWebinarSystem WebinarPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WebinarPress: from n/a through 1.33.27. | [] | null | 4.3 | null | null |
|
CVE-2018-7935 |
There is a vulnerability in 21.328.01.00.00 version of the E5573Cs-322. Remote attackers could exploit this vulnerability to make the network where the E5573Cs-322 is running temporarily unavailable.
| [
"cpe:2.3:o:huawei:e5573cs-322_firmware:21.328.01.00.00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:e5573cs-322:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
CVE-2002-0867 | Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to cause a denial of service (crash) in Internet Explorer via invalid handle data in a Java applet, aka "Handle Validation Flaw." | [
"cpe:2.3:a:microsoft:virtual_machine:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:virtual_machine:3000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:virtual_machine:3100:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:virtual_machine:3188:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:virtual_machine:3200:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:virtual_machine:3300:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:virtual_machine:3802:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:virtual_machine:3805:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2007-5944 | Cross-site scripting (XSS) vulnerability in Servlet Engine / Web Container in IBM WebSphere Application Server (WAS) 5.1.1.4 through 5.1.1.16 allows remote attackers to inject arbitrary web script or HTML via the Expect HTTP header. NOTE: this might be the same issue as CVE-2006-3918, but there are insufficient details to be sure. | [
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.1.16:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2005-2746 | Mail.app in Mail for Apple Mac OS X 10.3.9 and 10.4.2 includes message contents when using auto-reply rules, which could cause Mail.app to include decrypted message contents for encrypted messages. | [
"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2014-5164 | The rlc_decode_li function in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.10.x before 1.10.9 initializes a certain structure member only after this member is used, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | [
"cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.8:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-94hw-5cx8-g994 | An issue in Clementine v.1.3.1 allows a local attacker to execute arbitrary code via a crafted DLL file. | [] | null | 7.3 | null | null |
|
GHSA-7xr5-w5mj-r2jm | A vulnerability has been identified in SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.4.8), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.4.8). Casting an internal value could lead to floating point exception under certain circumstances. This could allow an attacker to cause a denial of service condition on affected devices. | [] | null | 6.5 | null | null |
|
CVE-2020-20675 | Nuishop v2.3 contains a SQL injection vulnerability in /goods/getGoodsListByConditions/. | [
"cpe:2.3:a:nuishop:nuishop:2.3:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-wpgr-xfg9-fg2p | An elevation of privilege vulnerability in the MediaTek camera driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-28470975. References: M-ALPS02696367. | [] | null | null | 7 | null |
|
CVE-2006-0677 | telnetd in Heimdal 0.6.x before 0.6.6 and 0.7.x before 0.7.2 allows remote unauthenticated attackers to cause a denial of service (server crash) via unknown vectors that trigger a null dereference. | [
"cpe:2.3:a:kth:heimdal:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kth:heimdal:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kth:heimdal:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kth:heimdal:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:kth:heimdal:0.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:kth:heimdal:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kth:heimdal:0.7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kth:heimdal:0.7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kth:heimdal:0.7.1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-8pmh-46hf-c4rr | Buffer Overflow vulnerability in FFmpeg 4.2 in the build_diff_map function in libavfilter/vf_fieldmatch.c, which could let a remote malicious user cause a Denial of Service. | [] | null | null | null | null |
|
GHSA-r255-vm29-9xg5 | A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service. | [] | null | 7.1 | null | null |
|
CVE-2023-23723 | WordPress WordPress Email Marketing Plugin – WP Email Capture Plugin <= 3.9.3 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Winwar Media WP Email Capture plugin <= 3.9.3 versions. | [
"cpe:2.3:a:winwar:wp_email_capture:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
CVE-2018-8890 | An information disclosure vulnerability in the Management Console of BlackBerry UEM 12.8.0 and 12.8.1 could allow an attacker to take over a UEM user's session and perform administrative actions in the context of the user. | [
"cpe:2.3:a:blackberry:unified_endpoint_manager:12.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:blackberry:unified_endpoint_manager:12.8.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-q3rp-jgjj-hj8w | Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1. | [] | null | null | 6.3 | null |
|
CVE-2019-19823 | A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) stores cleartext administrative passwords in flash memory and in a file. This affects TOTOLINK A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0; Rutek RTK 11N AP through 2019-12-12; Sapido GR297n through 2019-12-12; CIK TELECOM MESH ROUTER through 2019-12-12; KCTVJEJU Wireless AP through 2019-12-12; Fibergate FGN-R2 through 2019-12-12; Hi-Wifi MAX-C300N through 2019-12-12; HCN MAX-C300N through 2019-12-12; T-broad GN-866ac through 2019-12-12; Coship EMTA AP through 2019-12-12; and IO-Data WN-AC1167R through 2019-12-12. | [
"cpe:2.3:o:totolink:a3002ru_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:a702r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a702r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n302r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n302r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n300rt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n300rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n200re_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n150rt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n150rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n100re_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n100re:-:*:*:*:*:*:*:*",
"cpe:2.3:o:realtek:rtk_11n_ap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:realtek:rtk_11n_ap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sapido:gr297n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sapido:gr297n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ciktel:mesh_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ciktel:mesh_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:kctvjeju:wireless_ap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:kctvjeju:wireless_ap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fg-products:fgn-r2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fg-products:fgn-r2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hiwifi:max-c300n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hiwifi:max-c300n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tbroad:gn-866ac_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tbroad:gn-866ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:coship:emta_ap_firmwre:*:*:*:*:*:*:*:*",
"cpe:2.3:h:coship:emta_ap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:wn-ac1167r_firmwre:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:wn-ac1167r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hcn_max-c300n_project:hcn_max-c300n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hcn_max-c300n_project:hcn_max-c300n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n301rt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n301rt:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2008-6725 | Multiple SQL injection vulnerabilities in CMScout 2.06 allow remote authenticated users to execute arbitrary SQL commands via the id parameter to (1) index.php in a mythings page (mythings.php) and (2) the users page in admin.php. | [
"cpe:2.3:a:cmscout:cmscout:2.06:*:*:*:*:*:*:*"
] | null | null | null | 6 |
|
CVE-2019-20396 | A segmentation fault is present in yyparse in libyang before v1.0-r1 due to a malformed pattern statement value during lys_parse_path parsing. | [
"cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.11:r2:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.12:r1:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.12:r2:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.13:r1:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.13:r2:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.14:r1:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.15:r1:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.16:r1:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.16:r2:*:*:*:*:*:*",
"cpe:2.3:a:cesnet:libyang:0.16:r3:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-g2vh-rcx2-8pp8 | Unspecified vulnerability in Record Management Services (RMS) before VMS83A_RMS-V1100 for HP OpenVMS on the Alpha platform allows local users to gain privileges via unknown vectors. | [] | null | null | null | null |
|
CVE-2018-12841 | Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have a double free vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2004-0181 | The JFS file system code in Linux 2.4.x has an information leak in which in-memory data is written to the device for the JFS file system, which allows local users to obtain sensitive information by reading the raw device. | [
"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-5xqg-qxfr-gqgc | This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the IDE virtual device. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13189. | [] | null | null | null | null |
|
GHSA-jr5j-7wx2-g59m | Uncontrolled search path element in the Intel(R) oneAPI Deep Neural Network (oneDNN) before version 2022.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | null | 7.3 | null | null |
|
CVE-2024-43449 | Windows USB Video Class System Driver Elevation of Privilege Vulnerability | Windows USB Video Class System Driver Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
GHSA-7cr2-q6gp-v63x | EMC Avamar Server and Avamar Virtual Edition before 7.0 on Data Store Gen3, Gen4, and Gen4s platforms do not properly determine authorization for calls to Java RMI methods, which allows remote authenticated users to execute arbitrary code via unspecified vectors. | [] | null | null | null | null |
|
CVE-2021-32069 | The AWV component of Mitel MiCollab before 9.3 could allow an attacker to perform a Man-In-the-Middle attack due to improper TLS negotiation. A successful exploit could allow an attacker to view and modify data. | [
"cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:*"
] | null | 4.8 | null | 5.8 |
|
CVE-2016-1000138 | Reflected XSS in wordpress plugin indexisto v1.0.5 | [
"cpe:2.3:a:indexisto_project:indexisto:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2008-2312 | Network Preferences in Apple Mac OS X 10.4.11 stores PPP passwords in cleartext in a world-readable file, which allows local users to obtain sensitive information by reading this file. | [
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-vpmp-m797-5jx8 | An issue was discovered in eClinicalWorks Patient Portal 7.0 build 13. This is a blind SQL injection within the messageJson.jsp, which can only be exploited by authenticated users via an HTTP POST request and which can be used to dump database data out to a malicious server, using an out-of-band technique such as select_loadfile(). | [] | null | null | 8.8 | null |
|
RHSA-2020:2212 | Red Hat Security Advisory: ruby security update | ruby: HTTP response splitting in WEBrick ruby: Buffer under-read in String#unpack | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | null | 4.8 | null |
CVE-2019-1640 | Cisco Webex Network Recording Player Arbitrary Code Execution Vulnerabilities | A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or email attachment and persuading the user to open the file with the affected software. Successful exploitation could allow the attacker to execute arbitrary code on the affected system. | [
"cpe:2.3:a:cisco:webex_meetings_online:1.3.33:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_online:1.3.39:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_online:t32.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_online:t33.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_online:t33.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:3.0mr2:p1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:t31:sp3:*:*:*:*:*:*"
] | null | null | 7.8 | null |
GHSA-93ww-rwv5-gjg4 | Windows DWM Core Library Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
GHSA-v9xr-r3xx-x9gc | In Mosquitto before 2.0.16, excessive memory is allocated based on malicious initial packets that are not CONNECT packets. | [] | null | 5.8 | null | null |
|
CVE-2019-12564 | In DouCo DouPHP v1.5 Release 20190516, remote attackers can view the database backup file via a brute-force guessing approach for data/backup/DyyyymmddThhmmss.sql filenames. | [
"cpe:2.3:a:douco:douphp:1.5:20190516:*:*:*:*:*:*"
] | null | null | 9.8 | 5 |
|
GHSA-942p-539x-69rq | IBM CloudPak for Multicloud Monitoring 2.0 and 2.3 has a few containers running in privileged mode which is vulnerable to host information leakage or destruction if unauthorized access to these containers could execute arbitrary commands. IBM X-Force ID: 211048. | [] | null | 8.1 | null | null |
|
CVE-2020-20908 | Akaunting v1.3.17 was discovered to contain a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Company Name input field. | [
"cpe:2.3:a:akaunting:akaunting:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-p3gg-w5rj-m5rv | Missing Authorization vulnerability in Drupal Open Social allows Forceful Browsing.This issue affects Open Social: from 11.8.0 before 12.3.10, from 12.4.0 before 12.4.9. | [] | null | 5.3 | null | null |
|
GHSA-8x5g-gv52-3m86 | There is a Cross Site Scripting (XSS) vulnerability in "cid" parameter of preview.php in PHPJabbers Time Slots Booking Calendar v3.3. | [] | null | 6.1 | null | null |
|
GHSA-h6g3-qwxm-h5gj | A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. GetRec param is not object. An attacker can send an HTTP request to trigger this vulnerability. | [] | null | 6.5 | null | null |
|
CVE-2024-31634 | Cross Site Scripting (XSS) vulnerability in Xunruicms versions 4.6.3 and before, allows remote attacker to execute arbitrary code via the Security.php file in the catalog \XunRuiCMS\dayrui\Fcms\Library. | [] | null | 6.1 | null | null |
|
GHSA-w993-vwc7-h8jx | Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Web General). Supported versions that are affected are 6.4.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). | [] | null | 6.5 | null | null |
|
CVE-2005-4026 | search.php in Geeklog 1.4.x before 1.4.0rc1, and 1.3.x before 1.3.11sr3, allows remote attackers to obtain sensitive information via invalid (1) datestart and (2) dateend parameters, which leaks the web server path in an error message. | [
"cpe:2.3:a:geeklog:geeklog:*:*:*:*:*:*:*:*",
"cpe:2.3:a:geeklog:geeklog:1.3.11:rc1:*:*:*:*:*:*",
"cpe:2.3:a:geeklog:geeklog:1.3.11:sr1:*:*:*:*:*:*",
"cpe:2.3:a:geeklog:geeklog:1.3.11:sr2:*:*:*:*:*:*",
"cpe:2.3:a:geeklog:geeklog:1.4.0:beta1:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-0600 | WP Visitor Statistics (Real Time Traffic) < 6.9 - Unauthenticated SQLi | The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 6.9 does not escape user input which is concatenated to an SQL query, allowing unauthenticated visitors to conduct SQL Injection attacks. | [
"cpe:2.3:a:plugins-market:wp_visitor_statistics:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null |
GHSA-5cqp-j54f-r2jc | Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1769, CVE-2014-1785, CVE-2014-2753, CVE-2014-2755, CVE-2014-2760, CVE-2014-2761, CVE-2014-2772, and CVE-2014-2776. | [] | null | null | null | null |
|
CVE-2021-35607 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-r7q2-qf8r-5h57 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, Apple Safari before 4.1 on Mac OS X 10.4, and Google Chrome before 5.0.375.70 does not properly handle a transformation of a text node that has the IBM1147 character set, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document containing a BR element, related to a "type checking issue." | [] | null | null | null | null |
|
CVE-2025-0278 | An internal path disclosure vulnerability affects HCL Traveler | HCL Traveler is affected by an internal path disclosure in a Windows application when the application inadvertently reveals internal file paths, in error messages, debug logs, or responses to user requests. | [] | null | 4.3 | null | null |
CVE-1999-0657 | WinGate is being used. | [] | null | null | null | 0 |
|
GHSA-hw9h-77p4-296j | TCExam before 14.1.2 has XSS via an ff_ or xl_ field. | [] | null | null | 6.1 | null |
|
RHSA-2021:4151 | Red Hat Security Advisory: python27:2.7 security update | python: Unsafe use of eval() on data retrieved via HTTP in the test suite python-jinja2: ReDoS vulnerability in the urlize filter python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python-pygments: Infinite loop in SML lexer may lead to DoS python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters python-pygments: ReDoS in multiple lexers python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2018:2707 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Information Disclosure vulnerability (APSB18-31) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2019:0188 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use-after-free due to race condition in AF_PACKET implementation | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 7 | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.