id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-23295 | A permissions issue was addressed to help ensure Personas are always protected This issue is fixed in visionOS 1.1. An unauthenticated user may be able to use an unprotected Persona. | [
"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
|
GHSA-286p-cf2h-fc7g | One-byte buffer overflow in replydirname function in BSD-based ftpd allows remote attackers to gain root privileges. | [] | null | null | null | null |
|
GHSA-437w-56m7-gqfx | Synacor Zimbra Collaboration Suite Collaboration before 8.8.11 has XSS in the AJAX and html web clients. | [] | null | null | 6.1 | null |
|
CVE-2018-7934 | Some Huawei mobile phone with the versions before BLA-L29 8.0.0.145(C432) have a denial of service (DoS) vulnerability because they do not adapt to specific screen gestures. An attacker may trick users into installing a malicious app. As a result, apps running on the frontend crash after the users make specific screen gestures. | [
"cpe:2.3:o:huawei:mate_10_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_10_pro:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 7.1 |
|
GHSA-23f8-vj3q-65w6 | In Xymon through 4.3.28, an XSS vulnerability exists in the csvinfo CGI script due to insufficient filtering of the db parameter. | [] | null | null | 6.1 | null |
|
GHSA-x5g3-xc68-hm4x | Cross-site scripting (XSS) vulnerability in installer/build/view.step4.php of the SnapCreek Duplicator plugin 1.2.32 for WordPress allows remote attackers to inject arbitrary JavaScript or HTML via the json parameter. | [] | null | 6.1 | null | null |
|
GHSA-32wq-hfww-rqcm | An issue in the sqlg_parallel_ts_seq component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | [] | null | 7.5 | null | null |
|
GHSA-fcx8-3xwg-jjq7 | Missing input validation in the ORing IAP-420 web-interface allows stored Cross-Site Scripting (XSS).This issue affects IAP-420 version 2.01e and below. | [] | 7.1 | null | null | null |
|
GHSA-65p4-8967-8v6f | The Adaptive Security Appliance (ASA) 5585-X FirePOWER Security Services Processor (SSP) module for Cisco ASA with FirePOWER Services 5.3.1 through 6.0.0 misconfigures kernel logging, which allows remote attackers to cause a denial of service (resource consumption, and inspection outage or module outage) via a flood of crafted IP traffic, aka Bug ID CSCux19922. | [] | null | null | 7.5 | null |
|
CVE-2014-8772 | Cross-site scripting (XSS) vulnerability in the search_controller in X3 CMS 0.5.1 and 0.5.1.1 allows remote authenticated users to inject arbitrary web script or HTML via the search parameter. | [
"cpe:2.3:a:x3cms:x3_cms:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x3cms:x3_cms:0.5.1.1:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-wfhc-fw4h-r7ww | sysreport 1.3.15 and earlier includes contents of the up2date file in a report, which leaks the password for a proxy server in plaintext and allows local users to gain privileges. | [] | null | null | null | null |
|
CVE-2024-37324 | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-x5fr-93xj-6pp3 | In OMA DRM, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05722434; Issue ID: ALPS05722434. | [] | null | null | null | null |
|
CVE-2015-6140 | Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6142, CVE-2015-6143, CVE-2015-6153, CVE-2015-6158, CVE-2015-6159, and CVE-2015-6160. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
RHSA-2023:1110 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: stack overflow in do_proc_dointvec and proc_skip_spaces | [
"cpe:/a:redhat:rhel_tus:8.2::nfv",
"cpe:/a:redhat:rhel_tus:8.2::realtime"
] | null | 7.8 | null | null |
CVE-2017-18035 | The /rest/review-coverage-chart/1.0/data/<repository_name>/.json resource in Atlassian Fisheye and Crucible before version 4.5.1 and 4.6.0 was missing a permissions check, this allows remote attackers who do not have access to a particular repository to determine its existence and access review coverage statistics for it. | [
"cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4 |
|
CVE-2021-36202 | Metasys UI | Server-Side Request Forgery (SSRF) vulnerability in Johnson Controls Metasys could allow an authenticated attacker to inject malicious code into the MUI PDF export feature. This issue affects: Johnson Controls Metasys All 10 versions versions prior to 10.1.5; All 11 versions versions prior to 11.0.2. | [
"cpe:2.3:a:johnsoncontrols:metasys_application_and_data_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:johnsoncontrols:metasys_extended_application_and_data_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:johnsoncontrols:metasys_open_application_server:*:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
GHSA-r9jv-73jq-9qcw | SpagoBI before 4.1 has Privilege Escalation via an error in the AdapterHTTP script | [] | null | null | null | null |
|
CVE-2020-15365 | LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds. | [
"cpe:2.3:a:libraw:libraw:0.20:beta3:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2012-3443 | The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file. | [
"cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2-alpha1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.3:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.3:beta1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2016:0069 | Red Hat Security Advisory: CloudForms 2.0 EOL | This is the notification of the End Of Life plans for Red Hat
CloudForms 2.0. | [
"cpe:/a:redhat:cloudforms:2.0"
] | null | null | null | null |
GHSA-pm8c-jgcw-6vj7 | A formula injection vulnerability exists in Tenable Identity Exposure where an authenticated remote attacker with administrative privileges could manipulate application form fields in order to trick another administrator into executing CSV payloads. - CVE-2024-3232 | [] | null | 7.6 | null | null |
|
GHSA-w3p6-2cc8-h63h | SpamAssassin 3.1.x, 3.2.0, and 3.2.1 before 20070611, when running as root in unusual configurations using vpopmail or virtual users, allows local users to cause a denial of service (corrupt arbitrary files) via a symlink attack on a file that is used by spamd. | [] | null | null | null | null |
|
CVE-2022-22017 | Remote Desktop Client Remote Code Execution Vulnerability | Remote Desktop Client Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:remote_desktop:-:*:*:*:*:windows:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2007-3562 | SQL injection vulnerability in videos.php in PHP Director 0.21 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:php_director:php_director:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2002:101 | Red Hat Security Advisory: : Updated mailman packages available | security flaw | [
"cpe:/a:redhat:secure_web_server:3.2"
] | null | null | null | null |
CVE-2023-26398 | ZDI-CAN-20310: Adobe Substance 3D Designer USDC File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability | Adobe Substance 3D Designer version 12.4.0 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:substance_3d_designer:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2024-36442 | cgi-bin/fdmcgiwebv2.cgi on Swissphone DiCal-RED 4009 devices allows an authenticated attacker to gain access to arbitrary files on the device's file system. | [
"cpe:2.3:a:swissphone:dical-red:4009:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-w827-q88j-8c47 | A CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability exists that could cause remote code execution when an improperly handled TLS packet is reassembled.Affected Product: SmartConnect Family: SMT Series (SMT Series ID=1015: UPS 04.5 and prior), SMC Series (SMC Series ID=1018: UPS 04.2 and prior), SMTL Series (SMTL Series ID=1026: UPS 02.9 and prior), SCL Series (SCL Series ID=1029: UPS 02.5 and prior / SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior / SCL Series ID=1037: UPS 03.1 and prior), SMX Series (SMX Series ID=1031: UPS 03.1 and prior) | [] | null | 9.8 | null | null |
|
GHSA-wpgg-v2pr-g379 | VMware AirWatch Launcher for Android prior to 3.2.2 contains a vulnerability that could allow an escalation of privilege from the launcher UI context menu to native UI functionality and privilege. Successful exploitation of this issue could result in an escalation of privilege. | [] | null | null | 7.8 | null |
|
CVE-2015-2546 | The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2517, and CVE-2015-2518. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | 8.2 | null | 6.9 |
|
GHSA-mxq5-hwfr-q6p8 | A buffer overflow was reported in the BiosExtensionLoader module in some Lenovo Desktop products that may allow a local attacker with elevated privileges to execute arbitrary code. | [] | null | 6.7 | null | null |
|
GHSA-fw5x-x7h2-3j3x | Arbitrary file upload vulnerability in SourceCodester Alumni Management System v 1.0 allows attackers to execute arbitrary code, via the file upload to manage_event.php. | [] | null | null | null | null |
|
GHSA-4fv2-w8h3-69jj | Multiple vulnerabilities in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the Aruba EdgeConnect Enterprise Orchestrator instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the Aruba EdgeConnect Enterprise Orchestrator host in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned. | [] | null | 8.8 | null | null |
|
CVE-2025-32836 | A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetConnectionVariables' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. | [] | 8.7 | 8.8 | null | null |
|
GHSA-f7mf-pr3c-ffjp | Cross-site request forgery (CSRF) vulnerability in CMS Made Simple before 2.1.6 allows remote attackers to hijack the authentication of administrators for requests that create accounts via an admin/adduser.php request. | [] | null | null | 8 | null |
|
GHSA-9rrf-xw5h-f29c | An issue was discovered in OpenEXR before 2.5.2. An invalid tiled input file could cause invalid memory access in TiledInputFile::TiledInputFile() in IlmImf/ImfTiledInputFile.cpp, as demonstrated by a NULL pointer dereference. | [] | null | 5.5 | null | null |
|
GHSA-rwqq-p4p9-5wpq | Wechat-php-sdk is affected by a Cross Site Scripting vulnerability. | Wechat-php-sdk v1.10.2 is affected by a Cross Site Scripting (XSS) vulnerability in Wechat.php. | [] | null | 6.1 | null | null |
CVE-2022-4271 | Cross-site Scripting (XSS) - Reflected in osticket/osticket | Cross-site Scripting (XSS) - Reflected in GitHub repository osticket/osticket prior to 1.16.4. | [
"cpe:2.3:a:enhancesoft:osticket:*:*:*:*:*:*:*:*"
] | null | null | 8 | null |
CVE-2007-4228 | rmpvc on IBM AIX 4.3 allows local users to cause a denial of service (system crash) via long port logical name (-l) argument. | [
"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*"
] | null | null | null | 4.7 |
|
CVE-2020-1220 | A spoofing vulnerability exists when theMicrosoft Edge (Chromium-based) in IE Mode improperly handles specific redirects, aka 'Microsoft Edge (Chromium-based) in IE Mode Spoofing Vulnerability'. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.8 |
|
GHSA-6q3w-77jx-862x | PHP remote file inclusion vulnerability in JOWAMP_ShowPage.php in J-OWAMP Web Interface 2.1 allows remote authenticated users to execute arbitrary PHP code via a URL in the link parameter. | [] | null | null | null | null |
|
GHSA-963v-2vvx-2jxh | Under certain conditions on F5 BIG-IP 13.1.0-13.1.0.5, 13.0.0, 12.1.0-12.1.3.1, 11.6.0-11.6.3.1, or 11.5.0-11.5.6, TMM may core while processing SSL forward proxy traffic. | [] | null | null | 7.5 | null |
|
GHSA-67v3-v6h4-rfpq | In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport[Why]
Potential out of bounds access in dml2_calculate_rq_and_dlg_params()
because the value of out_lowest_state_idx used as an index for FCLKChangeSupport
array can be greater than 1.[How]
Currently dml2 core specifies identical values for all FCLKChangeSupport
elements. Always use index 0 in the condition to avoid out of bounds access. | [] | null | 7.8 | null | null |
|
GHSA-ggp9-3x3m-fh3q | Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have a buffer error vulnerability. Successful exploitation could lead to arbitrary code execution . | [] | null | null | null | null |
|
CVE-2025-31452 | WordPress WP Ultimate Search <= 2.0.3 - Cross Site Scripting (XSS) Vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mindshare Labs, Inc. WP Ultimate Search allows Stored XSS. This issue affects WP Ultimate Search: from n/a through 2.0.3. | [] | null | 6.5 | null | null |
CVE-2022-2448 | reSmush.it Image Optimizer < 0.4.6 - Admin+ Cross-Site Scripting | The reSmush.it WordPress plugin before 0.4.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when unfiltered_html is disallowed. | [
"cpe:2.3:a:resmush.it:resmush.it_image_optimizer:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null |
GHSA-72fh-3prm-m3pv | Authentication Bypass by Capture-replay vulnerability in Elfatek Elektronics ANKA JPD-00028 allows Session Hijacking.This issue affects ANKA JPD-00028: through 19.03.2025.NOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available. | [] | null | 7.6 | null | null |
|
GHSA-jw4v-xfx4-pv7q | RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the idlist parameter at /WorkFlow/wf_work_print.aspx. | [] | null | 9.8 | null | null |
|
CVE-2012-0626 | WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-vgv8-jxqv-mhh6 | A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may cause unexpected changes in memory shared between processes. | [] | null | null | 5.5 | null |
|
GHSA-wm74-mh49-g5x5 | IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 could disclose sensitive information due to improper privilege management for storage provider types. IBM X-Force ID: 229962. | [] | null | 6.5 | null | null |
|
CVE-2007-0107 | WordPress before 2.0.6, when mbstring is enabled for PHP, decodes alternate character sets after escaping the SQL query, which allows remote attackers to bypass SQL injection protection schemes and execute arbitrary SQL commands via multibyte charsets, as demonstrated using UTF-7. | [
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2021-23134 | Linux kernel llcp_sock_bind/connect use-after-free | Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-jgwh-rghq-wr66 | Certain NETGEAR devices are affected by authentication bypass. This affects WAC505 before 5.0.0.17 and WAC510 before 5.0.0.17. | [] | null | null | null | null |
|
CVE-2024-27819 | The issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 17.5 and iPadOS 17.5. An attacker with physical access may be able to access contacts from the lock screen. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 2.4 | null | null |
|
CVE-2010-2366 | Cross-site scripting (XSS) vulnerability in futomi CGI Cafe Access Analyzer CGI Professional, and Standard 4.0.2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:futomi:access_analyzer_cgi:*:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:*:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.0:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.0:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.1:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.1:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.2:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.2:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.3:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.3:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.4:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.4:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.5:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.5:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.6:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.6:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.7:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:1.7:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:2.0:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:2.0:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:2.1:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:2.1:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:2.2:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:2.2:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:2.3:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:2.3:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:2.4:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:2.4:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.0:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.0:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.1:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.1:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.2:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.2:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.3:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.3:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.4:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.4:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.5:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.5:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.6:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.6:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.7:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.7:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.8:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.8:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.8.1:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:3.8.1:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:4.0.0:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:4.0.0:*:std:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:4.0.1:*:pro:*:*:*:*:*",
"cpe:2.3:a:futomi:access_analyzer_cgi:4.0.1:*:std:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2013:0831 | Red Hat Security Advisory: libvirt security and bug fix update | libvirt: DoS (max count of open files exhaustion) due sockets leak in the storage pool | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-7vx3-5mq4-mccg | Improper handling of invalid nested page table entries in the IOMMU may allow a privileged attacker to induce page table entry (PTE) faults to bypass RMP checks in SEV-SNP, potentially leading to a loss of guest memory integrity. | [] | null | 5.3 | null | null |
|
GHSA-rjfc-697q-4r5p | Insufficient boundary checks when processing M_SOFx markers from JPEG headers in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1. | [] | null | null | 9.8 | null |
|
GHSA-5vv8-c9mj-g6jc | Multiple PHP remote file inclusion vulnerabilities in PgmReloaded 0.8.5 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the (1) lang parameter to (a) index.php, the (2) CFG[libdir] and (3) CFG[localedir] parameters to (b) common.inc.php, and the CFG[localelangdir] parameter to (c) form_header.php. | [] | null | null | null | null |
|
CVE-2020-14126 | Information leakage vulnerability exists in the Mi Sound APP. This vulnerability is caused by illegal calls of some sensitive JS interfaces, which can be exploited by attackers to leak sensitive information. | [
"cpe:2.3:a:mi:sound:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2004-2408 | Linux VServer 1.27 and earlier, 1.3.9 and earlier, and 1.9.1 and earlier shares /proc permissions across all virtual and host servers, which allows local users with the ability to set permissions in /proc to obtain system information or cause a denial of service on other virtual servers or the host server. | [
"cpe:2.3:a:vserver:linux-vserver:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:vserver:linux-vserver:1.27:*:*:*:*:*:*:*"
] | null | null | null | 3.6 |
|
RHSA-2018:1192 | Red Hat Security Advisory: rh-perl524-perl security update | perl: heap write overflow in regcomp.c perl: heap read overflow in regexec.c | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.5 | null |
CVE-2008-1043 | PHP remote file inclusion vulnerability in templates/default/header.inc.php in Linux Web Shop (LWS) php User Base 1.3 BETA allows remote attackers to execute arbitrary PHP code via a URL in the menu parameter. | [
"cpe:2.3:a:linux_web_shop:php_user_base:1.3:beta:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-4473-7649-rj9x | In dotCMS, versions mentioned, a flaw in the NormalizationFilter does not strip double slashes (//) from URLs, potentially enabling bypasses for XSS and access controls. An example affected URL is https://demo.dotcms.com//html/portlet/ext/files/edit_text_inc.jsp https://demo.dotcms.com//html/portlet/ext/files/edit_text_inc.jsp , which should return a 404 response but didn't.The oversight in the default invalid URL character list can be viewed at the provided GitHub link https://github.com/dotCMS/core/blob/master/dotCMS/src/main/java/com/dotcms/filters/NormalizationFilter.java#L37 .To mitigate, users can block URLs with double slashes at firewalls or utilize dotCMS config variables.Specifically, they can use the DOT_URI_NORMALIZATION_FORBIDDEN_STRINGS environmental variable to add // to the list of invalid strings.Additionally, the DOT_URI_NORMALIZATION_FORBIDDEN_REGEX variable offers more detailed control, for instance, to block //html.* URLs.Fix Version:23.06+, LTS 22.03.7+, LTS 23.01.4+ | [] | null | 5.3 | null | null |
|
CVE-2017-6417 | Code injection vulnerability in Avira Total Security Suite 15.0 (and earlier), Optimization Suite 15.0 (and earlier), Internet Security Suite 15.0 (and earlier), and Free Security Suite 15.0 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Avira process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Image File Execution Options in the registry; (2) the self-protection mechanism is intended to block all local processes (regardless of privileges) from modifying Image File Execution Options for these products; and (3) this mechanism can be bypassed by an attacker who temporarily renames Image File Execution Options during the attack. | [
"cpe:2.3:a:avira:free_security_suite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:avira:internet_security_suite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:avira:optimization_suite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:avira:total_security_suite:*:*:*:*:*:*:*:*"
] | null | null | 6.7 | 7.2 |
|
CVE-2011-3762 | OpenBlog 1.2.1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by system/scaffolding/views/view.php and certain other files. | [
"cpe:2.3:a:open-blog:openblog:1.2.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2021-30627 | Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-w5w9-4cmf-97jp | The issue was addressed with improved memory handling. This issue is fixed in tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5, watchOS 9.6. An app may be able to execute arbitrary code with kernel privileges. | [] | null | 7.8 | null | null |
|
GHSA-4h45-m97x-h895 | Cross-site request forgery (CSRF) vulnerability in IBM Security QRadar Vulnerability Manager 7.2.x before 7.2.5 Patch 5 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences. | [] | null | null | null | null |
|
GHSA-ccvf-jhvh-4w9p | The Favicon by RealFaviconGenerator WordPress plugin before 1.3.23 does not properly sanitise and escape the json_result_url parameter before outputting it back in the Favicon admin dashboard, leading to a Reflected Cross-Site Scripting issue | [] | null | 6.1 | null | null |
|
CVE-2021-26115 | An OS command injection (CWE-78) vulnerability in FortiWAN version 4.5.7 and below Command Line Interface may allow a local, authenticated and unprivileged attacker to escalate their privileges to root via executing a specially-crafted command.An OS command injection (CWE-78) vulnerability in FortiWAN Command Line Interface may allow a local, authenticated and unprivileged attacker to escalate their privileges to root via executing a specially-crafted command. | [] | null | 7.6 | null | null |
|
GHSA-vfpm-r25x-9hg6 | A vulnerability in the restricted shell of the Cisco Identity Services Engine (ISE) that is accessible via SSH could allow an authenticated, local attacker to run arbitrary CLI commands with elevated privileges. The vulnerability is due to incomplete input validation of the user input for CLI commands issued at the restricted shell. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. An attacker would need valid user credentials to the device to exploit this vulnerability. The vulnerability affects the following Cisco Identity Services Engine (ISE) products running Release 1.4, 2.0, 2.0.1, 2.1.0: ISE, ISE Express, ISE Virtual Appliance. Cisco Bug IDs: CSCve74916. | [] | null | null | 7.8 | null |
|
GHSA-9fqh-jpcp-95fv | Mozilla developers reported memory safety bugs present in Firefox 89. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 90. | [] | null | 8.8 | null | null |
|
GHSA-p9wr-v92w-45q4 | A widget local file inclusion vulnerability in Trend Micro Apex One could allow a remote attacker to execute arbitrary code on affected installations.Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | [] | null | 7.5 | null | null |
|
GHSA-wr4v-3vj7-6wg6 | EasyCom SQL iPlug allows remote attackers to cause a denial of service via the D$EVAL parameter to the default URI. | [] | null | null | 7.5 | null |
|
GHSA-8w37-4wx3-mmg3 | An issue in the component rtkio64.sys of Realtek Semiconductor Corp Realtek lO Driver v1.008.0823.2017 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests. | [] | null | 8.4 | null | null |
|
CVE-2020-14976 | GNS3 ubridge through 0.9.18 on macOS, as used in GNS3 server before 2.1.17, allows a local attacker to read arbitrary files because it handles configuration-file errors by printing the configuration file while executing in a setuid root context. | [
"cpe:2.3:a:gns3:ubridge:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:gns3:gns3:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.9 |
|
CVE-2013-3348 | Adobe Shockwave Player before 12.0.3.133 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | [
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2017-3162 | HDFS clients interact with a servlet on the DataNode to browse the HDFS namespace. The NameNode is provided as a query parameter that is not validated in Apache Hadoop before 2.7.0. | [
"cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:*"
] | null | null | 7.3 | 7.5 |
|
CVE-2024-47452 | Illustrator | Out-of-bounds Write (CWE-787) | Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-645x-3j3m-f2c2 | The WPLegalPages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wplegalpage' shortcode in versions up to, and including, 2.9.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with author-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 5.5 | null | null |
|
CVE-2024-41551 | CampCodes Supplier Management System v1.0 is vulnerable to SQL injection via Supply_Management_System/admin/view_order_items.php?id= . | [
"cpe:2.3:a:campcodes:supplier_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
|
CVE-2022-27472 | SQL injection vulnerability in Topics Counting feature of Roothub 2.6.0 allows unauthorized attackers to execute arbitrary SQL commands via the "s" parameter remotely. | [
"cpe:2.3:a:roothub_project:roothub:2.6.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-cmhq-wv7c-g9x5 | Directory traversal vulnerability in the administrative web server in Swann DVR4-SecuraNet allows remote attackers to read arbitrary files via a .. (dot dot) in the URI, as demonstrated by reading the vy_netman.cfg file that contains passwords. | [] | null | null | null | null |
|
CVE-2014-3520 | OpenStack Identity (Keystone) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated trustees to gain access to an unauthorized project for which the trustor has certain roles via the project ID in a V2 API trust token request. | [
"cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
GHSA-8f6w-3r97-qgc7 | CA Technologies Identity Governance 12.6, 14.0, 14.1, and 14.2 and CA Identity Suite Virtual Appliance 14.0, 14.1, and 14.2 provide telling error messages that may allow remote attackers to enumerate account names. | [] | null | null | 5.3 | null |
|
GHSA-mmj5-w9ph-33wc | The Flaming Forms WordPress plugin through 1.0.1 does not sanitise and escape some parameters, which could allow unauthenticated users to perform Cross-Site Scripting attacks against administrators. | [] | null | 5.4 | null | null |
|
CVE-2024-45541 | Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in WLAN Windows Host | Memory corruption when IOCTL call is invoked from user-space to read board data. | [
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca1062_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca1062:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca1064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca1064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca2062_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca2062:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca2064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca2064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca2065_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca2065:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca2066_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca2066:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:video_collaboration_vc3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_7c_compute_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_7c_compute_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_7c_gen_2_compute_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_7c_gen_2_compute_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x-ad_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x-ad:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180xp-ad_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180xp-ad:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x-aaab_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x-aaab:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180xp-acaf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180xp-acaf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x-acaf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x-acaf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180xp-aaab_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180xp-aaab:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8280xp-abbb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8280xp-abbb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-xrxx-94c8-w7rw | In PVRSRVBridgeRGXTDMSubmitTransfer of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270397970 | [] | null | 7.8 | null | null |
|
CVE-2018-6240 | NVIDIA Tegra contains a vulnerability in BootRom where a user with kernel level privileges can write an arbitrary value to an arbitrary physical address | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2023-35808 | An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. An Unrestricted File Upload vulnerability has been identified in the Notes module. By using crafted requests, custom PHP code can be injected and executed through the Notes module because of missing input validation. Regular user privileges can be used to exploit this vulnerability. Editions other than Enterprise are also affected. | [
"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:professional:*:*:*",
"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:sell:*:*:*",
"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:serve:*:*:*",
"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:ultimate:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-58xj-x78v-xpqf | The Hydrogen Water (aka com.appzone628) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-rrxp-76v8-qm7m | A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly neutralize special characters when interpreting user controlled log paths.
This could allow an authenticated highly-privileged remote attacker to execute a limited set of binaries that are already present on the filesystem. | [] | 2.1 | 2.7 | null | null |
|
GHSA-wjh9-gfgw-24mv | An OS command injection vulnerability exists in Vinci Protocol Analyzer that could allow an attacker to escalate privileges and perform code execution on affected system. | [] | 9.4 | 9.9 | null | null |
|
CVE-2022-27799 | Adobe Acrobat Reader DC AcroForm Use-After-Free Remote Code Execution Vulnerability | Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of the acroform event that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] | null | null | 7.8 | null |
RHSA-2017:0827 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.14 update on RHEL 6 | RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack jboss: jbossas writable config files allow privilege escalation tomcat: Infinite loop in the processing of https requests | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 7.5 | null |
GHSA-r2gm-grjj-fx38 | Rigter Portal System (RPS) 1.0, 2.0, and 3.0 allows remote attackers to bypass authentication and upload arbitrary files via direct requests to (1) adm/photos/images.php and (2) adm/down/files.php. | [] | null | null | null | null |
|
GHSA-cfq4-9mwv-3gpm | Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability in the Acrobat/Reader's JavaScript engine. Successful exploitation could lead to arbitrary code execution. | [] | null | null | 8.8 | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.