id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-m6h2-jx9v-58w6 | Missing Authorization in Apache Airflow | If remote logging is not used, the worker (in the case of CeleryExecutor) or the scheduler (in the case of LocalExecutor) runs a Flask logging server and is listening on a specific port and also binds on 0.0.0.0 by default. This logging server had no authentication and allows reading log files of DAG jobs. This issue affects Apache Airflow < 2.1.2. | [] | 5.3 | 5.3 | null | null |
CVE-2012-4429 | Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900. | [
"cpe:2.3:a:david_king:vino:*:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.7.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.7.91:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.11.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.11.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.11.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.11.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.28.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.31.4:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.31.91:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.32.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.99.0:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.99.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.99.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.99.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.99.4:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.99.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.91:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.3.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.4.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-5v8m-5pfx-jrmx | Windows Bluetooth Driver Information Disclosure Vulnerability. | [] | null | 5.5 | null | null |
|
CVE-2020-9807 | A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution. | [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-v3gq-vrpv-476w | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Micah Blu RSVP ME allows SQL Injection.This issue affects RSVP ME: from n/a through 1.9.9. | [] | null | 9.3 | null | null |
|
CVE-2025-23901 | WordPress GravatarLocalCache plugin <= 1.1.2 - CSRF to Stored XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Oliver Schaal GravatarLocalCache allows Cross Site Request Forgery.This issue affects GravatarLocalCache: from n/a through 1.1.2. | [] | null | 7.1 | null | null |
GHSA-f7pg-xgpm-7pv6 | SQL injection vulnerability in Welcart e-Commerce prior to 2.11.2 allows an attacker who can login to the product to obtain or alter the information stored in the database. | [] | null | 8.8 | null | null |
|
CVE-2019-18463 | An issue was discovered in GitLab Community and Enterprise Edition through 12.4. It has Insecure Permissions (issue 4 of 4). | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 4.3 | null | 4 |
|
CVE-2022-41240 | Jenkins Walti Plugin 1.0.1 and earlier does not escape the information provided by the Walti API, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide malicious API responses from Walti. | [
"cpe:2.3:a:jenkins:walti:*:*:*:*:*:jenkins:*:*"
] | null | 5.4 | null | null |
|
GHSA-4c6m-4p4p-3j5f | Insufficient input validation in the SMU may
enable a privileged attacker to write beyond the intended bounds of a shared
memory buffer potentially leading to a loss of integrity. | [] | null | 7.5 | null | null |
|
RHSA-2015:1647 | Red Hat Security Advisory: mariadb55-mariadb security update | mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU April 2015) mysql: unspecified vulnerability related to Server:Federated (CPU April 2015) mysql: unspecified vulnerability related to Server:Compiling (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU April 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:GIS (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: use of SSL/TLS can not be enforced in mysql client library (oCERT-2015-003, BACKRONYM) mysql: unspecified vulnerability related to Server:Pluggable Auth (CPU July 2015) mysql: unspecified vulnerability related to Server:I_S (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
CVE-2024-47150 | Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak. | [] | null | 3.3 | null | null |
|
GHSA-mjh4-pvvj-rg94 | A vulnerability was discovered in the Arctera InfoScale 7.0 through 8.0.2 where a .NET remoting endpoint can be exploited due to the insecure deserialization of potentially untrusted messages. The vulnerability is present in the Windows Plugin_Host service, which runs on all the servers where InfoScale is installed. The service is used only when applications are configured for Disaster Recovery (DR) using the DR wizard. Disabling the Plugin_Host service manually will eliminate the vulnerability. | [] | null | 9.8 | null | null |
|
GHSA-x8r2-m2x5-4qcf | Unspecified vulnerability in the Hyperion Enterprise Performance Management Architect component in Oracle Hyperion 11.1.2.2 and 11.1.2.3 allows remote authenticated users to affect integrity via unknown vectors related to Security, a different vulnerability than CVE-2015-2592. | [] | null | null | null | null |
|
GHSA-7w4r-5rhr-622x | Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs. | [] | null | null | null | null |
|
GHSA-224v-6x99-6pp7 | In Progress MOVEit Transfer 10.2 before 10.2.6 (2018.3), 11.0 before 11.0.4 (2019.0.4), and 11.1 before 11.1.3 (2019.1.3), multiple SQL Injection vulnerabilities have been found in the REST API that could allow an unauthenticated attacker to gain unauthorized access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database or may be able to alter the database. | [] | null | 9.8 | null | null |
|
GHSA-pvm2-jp69-rx5f | An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1252. | [] | null | null | null | null |
|
GHSA-f9pv-7pxf-272g | This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12711. | [] | null | 7.8 | null | null |
|
CVE-2023-31941 | File Upload vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via a crafted PHP file to the employee_insert.php. | [
"cpe:2.3:a:online_travel_agency_system_project:online_travel_agency_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2020-25272 | In SourceCodester Online Bus Booking System 1.0, there is XSS through the name parameter in book_now.php. | [
"cpe:2.3:a:online_bus_booking_system_project:online_bus_booking_system:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2020-15391 | The UI in DevSpace 4.13.0 allows web sites to execute actions on pods (on behalf of a victim) because of a lack of authentication for the WebSocket protocol. This leads to remote code execution. | [
"cpe:2.3:a:devspace:devspace:4.13.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2024-45527 | REDCap 14.7.0 allows HTML injection via the project title of a New Project action. This can lead to resultant logout CSRF via index.php?logout=1, and can also be used to insert a link to an external phishing website. | [
"cpe:2.3:a:redcap:redcap:14.7.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-w67g-6gjv-c599 | Powerline Gitstatus vulnerable to arbitrary code execution | powerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbitrary code execution. git repositories can contain per-repository configuration that changes the behavior of git, including running arbitrary commands. When using powerline-gitstatus, changing to a directory automatically runs git commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory to one controlled by the attacker, such as in a shared filesystem or extracted archive, powerline-gitstatus will run arbitrary commands under the attacker's control. NOTE: this is similar to CVE-2022-20001. | [] | null | 7.8 | null | null |
CVE-2023-5533 | The AI ChatBot plugin for WordPress is vulnerable to unauthorized use of AJAX actions due to missing capability checks on the corresponding functions in versions up to, and including, 4.8.9 as well as 4.9.2. This makes it possible for unauthenticated attackers to perform some of those actions that were intended for higher privileged users. | [
"cpe:2.3:a:quantumcloud:ai_chatbot:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:quantumcloud:ai_chatbot:4.9.2:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null |
|
CVE-2009-4677 | Cross-site scripting (XSS) vulnerability in search.php in phpFK PHP Forum ohne 7.0.4 allows remote attackers to inject arbitrary web script or HTML via the search parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:frank-karau:phpfk_php_forum:7.0.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-gcfc-j66c-qv36 | In asn1_p256_int of crypto/asn1.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223492713References: N/A | [] | null | 4.4 | null | null |
|
ICSA-18-296-02 | GAIN Electronic Co. Ltd SAGA1-L Series | This product is vulnerable to a replay attack and command forgery.CVE-2018-17903 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H). This vulnerability may allow an attacker to force-pair the device without human interaction.CVE-2018-17921 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). An attacker with physical access to the product may able to reprogram it.CVE-2018-17923 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 6.1 | null |
GHSA-2vgg-c8q8-87vg | An arbitrary file upload vulnerability in the Upload Photos module of Wedding Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file. | [] | null | 7.2 | null | null |
|
GHSA-w39x-q2hf-mc75 | There is a Permission verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect the device performance. | [] | null | null | null | null |
|
CVE-2025-21788 | net: ethernet: ti: am65-cpsw: fix memleak in certain XDP cases | In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: ti: am65-cpsw: fix memleak in certain XDP cases
If the XDP program doesn't result in XDP_PASS then we leak the
memory allocated by am65_cpsw_build_skb().
It is pointless to allocate SKB memory before running the XDP
program as we would be wasting CPU cycles for cases other than XDP_PASS.
Move the SKB allocation after evaluating the XDP program result.
This fixes the memleak. A performance boost is seen for XDP_DROP test.
XDP_DROP test:
Before: 460256 rx/s 0 err/s
After: 784130 rx/s 0 err/s | [] | null | null | null | null |
CVE-2009-0656 | Asus SmartLogon 1.0.0005 allows physically proximate attackers to bypass "security functions" by presenting an image with a modified viewpoint that matches the posture of a stored image of the authorized notebook user. | [
"cpe:2.3:a:asus:smartlogon:1.0.0005:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
CVE-2007-3800 | Unspecified vulnerability in the Real-time scanner (RTVScan) component in Symantec AntiVirus Corporate Edition 9.0 through 10.1 and Client Security 2.0 through 3.1, when the Notification Message window is enabled, allows local users to gain privileges via crafted code. | [
"cpe:2.3:a:symantec:client_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:*:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate:*:*:*:*:*"
] | null | null | null | 6 |
|
RHSA-2022:6753 | Red Hat Security Advisory: httpd24-httpd security and bug fix update | httpd: Request splitting via HTTP/2 method injection and mod_proxy httpd: NULL pointer dereference via malformed requests httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path httpd: Out-of-bounds write in ap_escape_quotes() via malicious input httpd: possible NULL dereference or SSRF in forward proxy configurations httpd: mod_lua: Use of uninitialized value of in r:parsebody httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody httpd: mod_sed: Read/write beyond bounds httpd: mod_proxy_ajp: Possible request smuggling httpd: Out-of-bounds read via ap_rwrite() httpd: Out-of-bounds read in ap_strcmp_match() httpd: mod_lua: DoS in r:parsebody httpd: mod_sed: DoS vulnerability httpd: mod_lua: Information disclosure with websockets httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.3 | null | null |
CVE-2024-42994 | VTiger CRM <= 8.1.0 does not properly sanitize user input before using it in a SQL statement, leading to a SQL Injection in the "CompanyDetails" operation of the "MailManager" module. | [
"cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2021-22658 | Advantech iView versions prior to v5.7.03.6112 are vulnerable to a SQL injection, which may allow an attacker to escalate privileges to 'Administrator'. | [
"cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-2j54-2x3p-5g5f | SQL injection vulnerability in Advanced Electron Forum (AEF) 1.x, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the filename in an uploaded attachment. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
GHSA-qmfg-mq72-7q5w | Race condition in some Intel(R) PROSet/Wireless WiFi and Killerâ„¢ WiFi software for Windows before version 23.80 may allow an authenticated user to potentially enable denial of service via local access. | [] | 5.7 | 5.6 | null | null |
|
CVE-2005-3114 | Buffer overflow in the ActiveX control for NateOn Messenger (NateonDownloadManager.ocx) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long third argument to the GotNate.Excute method. | [
"cpe:2.3:a:nateon:nateon_messenger:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-r3fj-qh7q-9m82 | cPanel before 55.9999.141 allows FTP cPHulk bypass via account name munging (SEC-102). | [] | null | null | 6.5 | null |
|
CVE-2022-36249 | Shop Beat Services Vulnerable To Bypass 2FA via APIs | Shop Beat Solutions (Pty) LTD Shop Beat Media Player 2.5.95 up to 3.2.57 is vulnerable to Bypass 2FA via APIs. For Controlpanel Lite. "After login we are directly able to use the bearer token or jsession ID to access the apis instead of entering the 2FA code. Thus, leading to bypass of 2FA on API level. | [
"cpe:2.3:a:shopbeat:shop_beat_media_player:*:*:*:*:*:*:arm:*"
] | null | 5.4 | null | null |
ICSA-18-275-03 | Entes EMG 12 | The application uses a web interface where it is possible for an attacker to bypass authentication with a specially crafted URL. This could allow for remote code execution. CVE-2018-14826 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user and execute arbitrary code.CVE-2018-14822 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). | [] | null | null | 9.1 | null |
CVE-2020-3182 | Cisco Webex Meetings Client for MacOS Information Disclosure Vulnerability | A vulnerability in the multicast DNS (mDNS) protocol configuration of Cisco Webex Meetings Client for MacOS could allow an unauthenticated adjacent attacker to obtain sensitive information about the device on which the Webex client is running. The vulnerability exists because sensitive information is included in the mDNS reply. An attacker could exploit this vulnerability by doing an mDNS query for a particular service against an affected device. A successful exploit could allow the attacker to gain access to sensitive information. | [
"cpe:2.3:a:cisco:webex_meetings:*:*:*:*:*:macos:*:*"
] | null | null | 4.3 | null |
CVE-2020-10626 | In Fazecast jSerialComm, Version 2.2.2 and prior, an uncontrolled search path element vulnerability could allow a malicious DLL file with the same name of any resident DLLs inside the software installation to execute arbitrary code. | [
"cpe:2.3:a:fazecast:jserialcomm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:1.7.0.64:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.9 |
|
GHSA-wvvp-8954-mw4v | Cross-Site Request Forgery (CSRF) vulnerability in Metagauss Download Plugin <= 2.0.4 versions. | [] | null | 4.3 | null | null |
|
CVE-2014-1969 | Directory traversal vulnerability in the apps4u@android SD Card Manager application before 20140224 for Android allows attackers to overwrite or create arbitrary files via a crafted filename. | [
"cpe:2.3:a:apps4u\\@android:sd_card_manager:*:*:*:*:*:android:*:*"
] | null | null | null | 5.8 |
|
GHSA-qg5r-95m4-mjgj | Reflected Cross-site Scripting in yiisoft/yii2 Debug mode | During the internal penetration testing of our product based on Yii2, we discovered an XSS vulnerability within the framework itself. This issue is relevant for the latest version of Yii2 (2.0.49.3).Conditions for vulnerability reproductionThe framework is in debug mode (YII_DEBUG set to true).The php.ini setting zend.exception_ignore_args is set to Off (default value).An attacker induces an exception in the application, leading to a stack trace page being displayed.Vulnerability descriptionThe issue lies in the mechanism for displaying function argument values in the stack trace. The vulnerability manifests when an argument's value exceeds 32 characters. For convenience, argument values exceeding this limit are truncated and displayed with an added "...". The full argument value becomes visible when hovering over it with the mouse, as it is displayed in the title attribute of a span tag. However, the use of a double quote (") allows an attacker to break out of the title attribute's value context and inject their own attributes into the span tag, including malicious JavaScript code through event handlers such as onmousemove.Demonstration example:
http://31.184.254.143/about/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa%22%20onmousemove=alert(1)%20style=%22width:%20100000px;%20height:%20100000px;%20position:%20absolute;%20top:%20-10000px;%20left:%200;%22Impact of the vulnerabilityThis vulnerability allows an attacker to execute arbitrary JavaScript code in the security context of the victim's site via a specially crafted link. This could lead to the theft of cookies (including httpOnly cookies, which are accessible on the page), content substitution, or complete takeover of user accounts.Technical analysis and mitigation suggestionUpon analyzing the framework's source code, it was found that data handling for the title attribute is performed in the file framework/web/ErrorHandler.php. The identified problem is related to changes made in the commit https://github.com/yiisoft/yii2/commit/8cc9aeb2f0b2ffe02fb54a817064e9da75512706 , which led to the disabling of encoding for single and double quotes in the htmlEncode method (https://github.com/yiisoft/yii2/blob/8cc9aeb2f0b2ffe02fb54a817064e9da75512706/framework/web/ErrorHandler.php#L183) due to the addition of the ENT_NOQUOTES flag. To address this issue while preserving the functionality intended by the commit, we suggest modifying the htmlEncode method as follows:This change will effectively prevent the XSS vulnerability while maintaining the targeted functionality of the previous changes.ConclusionBased on the above, we strongly recommend implementing the suggested changes to the project's main code as soon as possible to protect framework users from potential attacks. I am ready to provide further information or assistance, including creating a pull request if necessary. | [] | null | 4.2 | null | null |
GHSA-83jm-4m95-wg4p | Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality via unknown vectors related to Deployment. | [] | null | null | null | null |
|
GHSA-99xv-c4pc-cc88 | A vulnerability, which was classified as problematic, was found in mooSocial mooStore 3.1.6. Affected is an unknown function of the file /search/index. The manipulation of the argument q leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-236208. | [] | null | null | 3.5 | null |
|
GHSA-fw27-96f7-xwpc | SQL injection vulnerability in pics.php in Availscript Photo Album allows remote attackers to execute arbitrary SQL commands via the sid parameter. | [] | null | null | null | null |
|
CVE-2024-38082 | Microsoft Edge (Chromium-based) Spoofing Vulnerability | Microsoft Edge (Chromium-based) Spoofing Vulnerability | [
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
] | null | 4.7 | null | null |
GHSA-2mf7-5579-gcwx | A User Mode Write AV in Editor+0x76af of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tiff file. | [] | null | null | null | null |
|
GHSA-g933-c5v6-98jv | Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a type confusion vulnerability. Successful exploitation could lead to information disclosure. | [] | null | null | null | null |
|
CVE-2024-31259 | WordPress SearchIQ plugin <= 4.5 - Sensitive Data Exposure via Log File vulnerability | Insertion of Sensitive Information into Log File vulnerability in Searchiq SearchIQ.This issue affects SearchIQ: from n/a through 4.5.
| [
"cpe:2.3:a:searchiq:searchiq:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-9f9g-fjv5-h5g7 | An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed issue comments to be updated with an improperly scoped token. This vulnerability did not allow unauthorized access to any repository content as it also required contents:write and issues:read permissions. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.17.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1. | [] | null | 4.9 | null | null |
|
GHSA-9c2f-jqqj-vj39 | Cross-site scripting (XSS) vulnerability in the Spotlight module 7.x-1.x before 7.x-1.5 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via a node title. | [] | null | null | null | null |
|
GHSA-h55x-f7m7-p9jh | Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5889, CVE-2013-5902, CVE-2014-0415, CVE-2014-0418, and CVE-2014-0424. | [] | null | null | null | null |
|
CVE-2019-0386 | Order processing in SAP ERP Sales (corrected in SAP_APPL 6.0, 6.02, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18) and S4HANA Sales (corrected in S4CORE 1.0, 1.01, 1.02, 1.03, 1.04) does not execute the required authorization checks for an authenticated user, which can result in an escalation of privileges. | [
"cpe:2.3:a:sap:erp_sales:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4hana_sales:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4hana_sales:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4hana_sales:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4hana_sales:1.03:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4hana_sales:1.04:*:*:*:*:*:*:*"
] | null | 6.3 | null | 6.5 |
|
GHSA-f32v-f53x-625g | Race condition in Passcode Lock in Apple iOS before 4 on the iPhone and iPod touch allows physically proximate attackers to bypass intended passcode requirements, and pair a locked device with a computer and access arbitrary data, via vectors involving the initial boot. | [] | null | null | null | null |
|
CVE-2018-18924 | The image-upload feature in ProjeQtOr 7.2.5 allows remote attackers to execute arbitrary code by uploading a .shtml file with "#exec cmd" because rejected files remain on the server, with predictable filenames, after a "This file is not a valid image" error message. | [
"cpe:2.3:a:projeqtor:projeqtor:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
CVE-2000-0104 | The Shoptron shopping cart application allows remote users to modify sensitive purchase information via hidden form fields. | [
"cpe:2.3:a:web_express:shoptron:1.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2020-29611 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, iCloud for Windows 12.0, watchOS 7.2. Processing a maliciously crafted image may lead to arbitrary code execution. | [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-9qpm-p6ch-fh75 | Illustrator versions 29.1, 28.7.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 7.8 | null | null |
|
CVE-2005-2576 | CaLogic 1.22, and possibly earlier versions, allows remote attackers to obtain sensitive information via a direct request to (1) doclsqlres.php, (2) clmcpreload.php, (3) viewhistlog.php, (4) mcconfig.php, (5) doclsqlbak.php, (6) defcalsel.php, or (7) cl_minical.php, which reveals the path in an error message. | [
"cpe:2.3:a:calogic:calogic:1.22:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-52590 | Missing validation allows spoofed profiles in Misskey | Misskey is an open source, federated social media platform. In affected versions missing validation in `ApRequestService.signedGet` allows an attacker to create fake user profiles that appear to be from a different instance than the one where they actually exist. These profiles can be used to impersonate existing users from the target instance. Vulnerable Misskey instances will accept spoofed users as valid, allowing an attacker to impersonate users on another instance. Attackers have full control of the spoofed user and can post, renote, or otherwise interact like a real account. This issue has been addressed in version 2024.11.0-alpha.3. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [] | 8.8 | null | null | null |
CVE-2011-4263 | Cross-site scripting (XSS) vulnerability in Schneider Electric PowerChute Business Edition before 8.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:apc:powerchute:*:*:business:*:*:*:*:*",
"cpe:2.3:a:apc:powerchute:6.0:*:business:*:*:*:*:*",
"cpe:2.3:a:apc:powerchute:7.0.4:*:business:*:*:*:*:*",
"cpe:2.3:a:apc:powerchute:7.1:*:business:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-8ppm-2m96-gmg5 | An issue was discovered in the Linux kernel through 4.17.10. There is a use-after-free in try_merge_free_space() when mounting a crafted btrfs image, because of a lack of chunk type flag checks in btrfs_check_chunk_valid in fs/btrfs/volumes.c. | [] | null | null | 5.5 | null |
|
CVE-2020-12717 | The COVIDSafe (Australia) app 1.0 and 1.1 for iOS allows a remote attacker to crash the app, and consequently interfere with COVID-19 contact tracing, via a Bluetooth advertisement containing manufacturer data that is too short. This occurs because of an erroneous OpenTrace manuData.subdata call. The ABTraceTogether (Alberta), ProteGO (Poland), and TraceTogether (Singapore) apps were also affected. | [
"cpe:2.3:a:alberta:abtracetogether:-:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:gov:protego_safe:-:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:health:covidsafe:1.0:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:health:covidsafe:1.1:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:tracetogether:tracetogether:-:*:*:*:*:iphone_os:*:*"
] | null | 6.5 | null | 3.3 |
|
GHSA-8m6h-hpr3-hm4g | Constructr CMS 3.02.5 and earlier stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information by reading the hash column. | [] | null | null | null | null |
|
CVE-2020-3179 | Cisco Firepower Threat Defense Software Generic Routing Encapsulation Tunnel IPv6 Denial of Service Vulnerability | A vulnerability in the generic routing encapsulation (GRE) tunnel decapsulation feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory handling error when GRE over IPv6 traffic is processed. An attacker could exploit this vulnerability by sending crafted GRE over IPv6 packets with either IPv4 or IPv6 payload through an affected device. A successful exploit could allow the attacker to cause the device to crash, resulting in a DoS condition. | [
"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5505_firmware:9.9\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5505_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5510_firmware:9.9\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5510_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5512-x_firmware:9.9\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5512-x_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5515-x_firmware:9.9\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5515-x_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5520_firmware:9.9\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5520_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5525-x_firmware:9.9\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5525-x_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5540_firmware:9.9\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5540_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5545-x_firmware:9.9\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5545-x_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5550_firmware:9.9\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5550_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5555-x_firmware:9.9\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5555-x_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5580_firmware:9.9\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5580_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5585-x_firmware:9.9\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5585-x_firmware:101.5\\(1.26\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*"
] | null | null | 8.6 | null |
GHSA-mjmc-34rr-8mwh | An issue in the Feature Navigator of Micro-Star International MSI Feature Nagivator v1.0.1808.0901 allows attackers to cause a Denial of Service (DoS) via a crafted image or video file. | [] | null | 7.1 | null | null |
|
GHSA-4527-385c-q8r6 | IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could
lead attackers to identify and access vulnerable systems. | [] | null | 6.7 | null | null |
|
CVE-2024-33688 | WordPress Teluro theme <= 1.0.31 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Extend Themes Teluro.This issue affects Teluro: from n/a through 1.0.31.
| [
"cpe:2.3:a:wordpress:teluro_theme:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
CVE-2024-45817 | x86: Deadlock in vlapic_error() | In x86's APIC (Advanced Programmable Interrupt Controller) architecture,
error conditions are reported in a status register. Furthermore, the OS
can opt to receive an interrupt when a new error occurs.
It is possible to configure the error interrupt with an illegal vector,
which generates an error when an error interrupt is raised.
This case causes Xen to recurse through vlapic_error(). The recursion
itself is bounded; errors accumulate in the the status register and only
generate an interrupt when a new status bit becomes set.
However, the lock protecting this state in Xen will try to be taken
recursively, and deadlock. | [] | null | 7.3 | null | null |
CVE-2022-46123 | Helmet Store Showroom Site v1.0 is vulnerable to SQL Injection via /hss/admin/categories/manage_category.php?id=. | [
"cpe:2.3:a:helmet_store_showroom_site_project:helmet_store_showroom_site:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-f7rq-r4jq-fq45 | The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the clear_uucss_logs function. This makes it possible for unauthenticated attackers to clear plugin logs via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 4.3 | null | null |
|
CVE-2011-0598 | Integer overflow in ACE.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to execute arbitrary code via crafted ICC data, a different vulnerability than CVE-2011-0596, CVE-2011-0599, and CVE-2011-0602. | [
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2022-48435 | In JetBrains PhpStorm before 2023.1 source code could be logged in the local idea.log file | [
"cpe:2.3:a:jetbrains:phpstorm:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
|
PYSEC-2020-286 | null | In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, changing the TensorFlow's `SavedModel` protocol buffer and altering the name of required keys results in segfaults and data corruption while loading the model. This can cause a denial of service in products using `tensorflow-serving` or other inference-as-a-service installments. Fixed were added in commits f760f88b4267d981e13f4b302c437ae800445968 and fcfef195637c6e365577829c4d67681695956e7d (both going into TensorFlow 2.2.0 and 2.3.0 but not yet backported to earlier versions). However, this was not enough, as #41097 reports a different failure mode. The issue is patched in commit adf095206f25471e864a8e63a0f1caef53a0e3a6, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. | [] | null | null | null | null |
GHSA-6276-fpxw-7hf6 | An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks. | [] | null | null | 6.1 | null |
|
GHSA-455g-hrv6-rm9g | Stack-based buffer overflow in Eureka Email 2.2q allows remote POP3 servers to execute arbitrary code via a long error message. | [] | null | null | null | null |
|
GHSA-c3hc-9pfw-j6jf | Simple Bus Ticket Booking System 1.0 is vulnerable to SQL Injection via /SimpleBusTicket/index.php. | [] | null | 9.8 | null | null |
|
GHSA-h328-hvpc-rxj2 | The LTL Freight Quotes – TForce Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] | null | 7.5 | null | null |
|
CVE-2022-3969 | OpenKM FileUtils.java getFileExtension temp file | A vulnerability was found in OpenKM up to 6.3.11 and classified as problematic. Affected by this issue is the function getFileExtension of the file src/main/java/com/openkm/util/FileUtils.java. The manipulation leads to insecure temporary file. Upgrading to version 6.3.12 is able to address this issue. The name of the patch is c069e4d73ab8864345c25119d8459495f45453e1. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213548. | [
"cpe:2.3:a:openkm:openkm:*:*:*:*:*:*:*:*"
] | null | 2.6 | null | null |
GHSA-gjcw-vmfm-pc8c | An unauthenticated attacker can perform a null pointer dereference in the DHIP Service (UDP port 37810). This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111. | [] | null | 5.3 | null | null |
|
GHSA-x463-hcrq-3f9v | Trusty contains a vulnerability in the HDCP service TA where bounds checking in command 10 is missing. The length of an I/O buffer parameter is not checked, which might lead to memory corruption. | [] | null | 6.7 | null | null |
|
GHSA-jccw-fxvj-rv5h | Object lifecycle issue in Chrome Custom Tab in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | [] | null | null | 4.3 | null |
|
GHSA-g5ff-82hw-j5f8 | Integer overflow in the IMAP (IMAP4) support in Microsoft Exchange Server 2000 SP3 allows remote attackers to cause a denial of service (service hang) via crafted literals in an IMAP command, aka the "IMAP Literal Processing Vulnerability." | [] | null | null | null | null |
|
CVE-2019-8568 | A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1. A local user may be able to modify protected parts of the file system. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2023-42122 | Control Web Panel wloggui Command Injection Local Privilege Escalation Vulnerability | Control Web Panel wloggui Command Injection Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Control Web Panel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the cwpsrv process, which listens on the loopback interface. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-21079. | [
"cpe:2.3:a:control_web_panel:control_web_panel:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
RHSA-2024:1763 | Red Hat Security Advisory: OpenShift Container Platform 4.13.40 packages and security update | golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2025:1242 | Red Hat Security Advisory: OpenShift Container Platform 4.12.73 bug fix and security update | rsync: Info Leak via Uninitialized Stack Contents kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format | [
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.3 | null | null |
CVE-2020-15918 | Multiple Stored Cross Site Scripting (XSS) vulnerabilities were discovered in Mida eFramework through 2.9.0. | [
"cpe:2.3:a:midasolutions:eframework:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-rhx9-3qf7-r3j7 | Drupal Remote code execution | A 3rd party development library including with Drupal 8 development dependencies is vulnerable to remote code execution. This is mitigated by the default .htaccess protection against PHP execution, and the fact that Composer development dependencies aren't normal installed. You might be vulnerable to this if you are running a version of Drupal before 8.2.2. To be sure you aren't vulnerable, you can remove the <siteroot>/vendor/phpunit directory from your production deployments | [] | null | null | 8.1 | null |
GHSA-q7qj-rx6w-8pxw | A race condition was addressed with additional validation. This issue is fixed in iPadOS 17.7.3, watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An attacker may be able to create a read-only memory mapping that can be written to. | [] | null | 5.9 | null | null |
|
CVE-2007-1801 | Directory traversal vulnerability in inc/lang.php in sBLOG 0.7.3 Beta allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the conf_lang_default parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by inc/lang.php. | [
"cpe:2.3:a:sblog:sblog:0.7.3_beta:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2020:1020 | Red Hat Security Advisory: curl security and bug fix update | curl: TFTP receive heap buffer overflow in tftp_receive_packet() function | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7 | null | null |
CVE-2015-5571 | Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API. NOTE: this issue exists because of an incomplete fix for CVE-2014-4671 and CVE-2014-5333. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.190:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.191:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.160:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.194:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.203:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.209:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.232:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2014-8475 | FreeBSD 9.1, 9.2, and 10.0, when compiling OpenSSH with Kerberos support, uses incorrect library ordering when linking sshd, which causes symbols to be resolved incorrectly and allows remote attackers to cause a denial of service (sshd deadlock and prevention of new connections) by ending multiple connections before authentication is completed. | [
"cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-86p5-97jr-r598 | Arbitrary file upload in ShopXO | An issue was discovered in ShopXO CMS 2.2.0. After entering the management page, there is an arbitrary file upload vulnerability in three locations. | [] | null | 7.2 | null | null |
CVE-2024-44195 | A logic issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.1. An app may be able to read arbitrary files. | [] | null | 7.5 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.