id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2009-2206 | Multiple heap-based buffer overflows in the AudioCodecs library in the CoreAudio component in Apple iPhone OS before 3.1, and iPhone OS before 3.1.1 for iPod touch, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted (1) AAC or (2) MP3 file, as demonstrated by a ringtone with malformed entries in the sample size table. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2023-46484 | An issue in TOTOlink X6000R V9.4.0cu.852_B20230719 allows a remote attacker to execute arbitrary code via the setLedCfg function. | [
"cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.852_b20230719:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-4vpq-gvj2-8j36 | LibreOffice has a feature where documents can specify that pre-installed scripts can be executed on various document events such as mouse-over, etc. LibreOffice is typically also bundled with LibreLogo, a programmable turtle vector graphics script, which can be manipulated into executing arbitrary python commands. By using the document event feature to trigger LibreLogo to execute python contained within a document a malicious document could be constructed which would execute arbitrary python commands silently without warning. In the fixed versions, LibreLogo cannot be called from a document event handler. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5. | [] | null | 9.8 | null | null |
|
RHSA-2017:1504 | Red Hat Security Advisory: Red Hat OpenStack Platform director security update | rhosp-director: libvirtd is deployed with no authentication | [
"cpe:/a:redhat:openstack-director:9::el7"
] | null | null | 9.9 | null |
CVE-2014-3185 | Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
CVE-2006-7190 | Cross-site scripting (XSS) vulnerability in cgi-bin/user-lib/topics.pl in web-app.net WebAPP before 20060515 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors in the viewnews function, related to use of doubbctopic instead of doubbc. | [
"cpe:2.3:a:web-app.net:webapp:0.9.9.6:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2012:0039 | Red Hat Security Advisory: mod_cluster-native security update | mod_cluster: malicious worker nodes can register on any vhost | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | null | null |
CVE-2007-0923 | buscador/buscador.htm in Portal Search allows remote attackers to obtain sensitive information (business logic) via a query string composed of a search for certain characters. | [
"cpe:2.3:a:radical_technologies:portal_search:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2002-0054 | SMTP service in (1) Microsoft Windows 2000 and (2) Internet Mail Connector (IMC) in Exchange Server 5.5 does not properly handle responses to NTLM authentication, which allows remote attackers to perform mail relaying via an SMTP AUTH command using null session credentials. | [
"cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:5.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:5.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:5.5:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:5.5:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:-:sp2:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-41007 | tcp: avoid too many retransmit packets | In the Linux kernel, the following vulnerability has been resolved:
tcp: avoid too many retransmit packets
If a TCP socket is using TCP_USER_TIMEOUT, and the other peer
retracted its window to zero, tcp_retransmit_timer() can
retransmit a packet every two jiffies (2 ms for HZ=1000),
for about 4 minutes after TCP_USER_TIMEOUT has 'expired'.
The fix is to make sure tcp_rtx_probe0_timed_out() takes
icsk->icsk_user_timeout into account.
Before blamed commit, the socket would not timeout after
icsk->icsk_user_timeout, but would use standard exponential
backoff for the retransmits.
Also worth noting that before commit e89688e3e978 ("net: tcp:
fix unexcepted socket die when snd_wnd is 0"), the issue
would last 2 minutes instead of 4. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
CVE-2017-3105 | Adobe RoboHelp has an Open Redirect vulnerability. This affects versions before RH12.0.4.460 and RH2017 before RH2017.0.2. | [
"cpe:2.3:a:adobe:robohelp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | 5.8 |
|
GHSA-6w8g-777w-9mcc | A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects, aka "Microsoft COM for Windows Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. | [] | null | null | 7.5 | null |
|
CVE-2009-0337 | SQL injection vulnerability in index.asp in Katy Whitton BlogIt! allows remote attackers to execute arbitrary SQL commands via the (1) month and (2) year parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:katywhitton:blogit\\!:_nil_:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-xmc9-6p56-3c4v | Apache Tomcat XSS In Accept-Language Headers | Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616". | [] | null | null | null | null |
GHSA-9xmx-5fhh-h6g9 | Reflected cross-site scripting vulnerability in VI Web Client prior to 7.9.6 allows a remote unauthenticated attacker to inject an arbitrary script. | [] | null | 6.1 | null | null |
|
GHSA-5c5g-24q7-3qc2 | , aka 'Windows Backup Engine Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964. | [] | null | 7.8 | null | null |
|
GHSA-fhrq-x65x-r754 | An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to access confidential information on the system.On all Junos OS and Junos OS Evolved platforms, when NETCONF traceoptions are configured, and a super-user performs specific actions via NETCONF, then a low-privileged user can access sensitive information compromising the confidentiality of the system.
This issue affects:Junos OS:all versions before 21.2R3-S7,from 21.4 before 21.4R3-S5,from 22.1 before 22.1R3-S5,from 22.2 before 22.2R3-S3,from 22.3 before 22.3R3-S2,from 22.4 before 22.4R3,from 23.2 before 23.2R1-S2.Junos OS Evolved:all versions before 21.2R3-S7-EVO,from 21.3 before 21.3R3-S5-EVO,from 21.4 before 21.4R3-S5-EVO,from 22.1 before 22.1R3-S5-EVO,from 22.2 before 22.2R3-S3-EVO,from 22.3 before 22.3R3-S2-EVO,from 22.4 before 22.4R3-EVO,from 23.2 before 23.2R1-S2. | [] | 5.1 | 5 | null | null |
|
CVE-2010-4494 | Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:insight_control_server_deployment:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:rapid_deployment_pack:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-wx4q-8vh8-7998 | Incorrect Privilege Assignment vulnerability in nssTheme Wp NssUser Register allows Privilege Escalation.This issue affects Wp NssUser Register: from n/a through 1.0.0. | [] | null | 9.8 | null | null |
|
CVE-2001-1102 | Check Point FireWall-1 3.0b through 4.1 for Solaris allows local users to overwrite arbitrary files via a symlink attack on temporary policy files that end in a .cpp extension, which are set world-writable. | [
"cpe:2.3:a:checkpoint:firewall-1:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:4.1:sp1:*:*:*:*:*:*"
] | null | null | null | 6.2 |
|
CVE-2010-3531 | Unspecified vulnerability in the PeopleSoft Enterprise FMS ESA - RM component in Oracle PeopleSoft and JDEdwards Suite 8.9 Bundle #38, 9.0 Bundle #31, and 9.1 Bundle #6 allows remote authenticated users to affect confidentiality and integrity via unknown vectors. | [
"cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:8.9:bundle38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:9.0:bundle31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_and_jdedwards_product_suite:9.1:bundle6:*:*:*:*:*:*"
] | null | null | null | 5.5 |
|
GHSA-hhm4-8g33-mmff | google-checkout-php-sample-code before 1.3.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | [] | null | null | null | null |
|
GHSA-9h56-55p8-xgj2 | Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.20, 4.0.22, 4.1.30, 4.2.20, and 4.3.4 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Core, a different vulnerability than CVE-2014-0405. | [] | null | null | null | null |
|
GHSA-82f4-xfhj-h9pg | Adobe Photoshop versions 24.7.1 (and earlier) and 25.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 5.5 | null | null |
|
GHSA-7xf6-cpxm-5mx9 | Malicious Package in bufner-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.RecommendationRemove the package from your environment. Ensure no Ethereum funds were compromised. | [] | null | 9.8 | null | null |
CVE-2008-5808 | Cross-site scripting (XSS) vulnerability in Six Apart Movable Type Enterprise (MTE) 1.x before 1.56; Movable Type (MT) 3.x before 3.38; and Movable Type, Movable Type Open Source (MTOS), and Movable Type Enterprise 4.x before 4.23 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly related to "application management." | [
"cpe:2.3:a:six_apart:movable_type:4:*:*:*:*:*:*:*",
"cpe:2.3:a:six_apart:movable_type:4:unknown:enterprise:*:*:*:*:*",
"cpe:2.3:a:six_apart:movable_type:4:unknown:open_source:*:*:*:*:*",
"cpe:2.3:a:six_apart:movable_type:4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:six_apart:movable_type:4.20:unknown:enterprise:*:*:*:*:*",
"cpe:2.3:a:six_apart:movable_type:4.20:unknown:open_source:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:1.00:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:1.1:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:1.2:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:1.3:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:1.4:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:1.5:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:1.31:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:3.0d:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:3.01d:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:3.32:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:3.33:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:3.34:*:*:*:*:*:*:*",
"cpe:2.3:a:sixapart:movable_type:3.35:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-c456-vjhw-vjgw | Invensys Wonderware Information Server 4.0 SP1 and 4.5 does not properly implement client controls, which allows remote attackers to bypass intended access restrictions via unspecified vectors. | [] | null | null | null | null |
|
GHSA-v247-w9mw-6x35 | The Rover IDX plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 3.0.0.2903. This makes it possible for authenticated attackers, with subscriber-level access and above, to add, modify, or delete plugin options. | [] | null | 6.3 | null | null |
|
GHSA-8j89-mf7f-m8q3 | An issue was discovered in the Linux kernel before 4.8. Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem. | [] | null | null | 5.5 | null |
|
CVE-2015-1300 | The FrameFetchContext::updateTimingInfoForIFrameNavigation function in core/loader/FrameFetchContext.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not properly restrict the availability of IFRAME Resource Timing API times, which allows remote attackers to obtain sensitive information via crafted JavaScript code that leverages a history.back call. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-2w86-3xc7-pmwq | A Cross Site Request Forgery (CSRF) issue in Server Console in CloverDX through 5.9.0 allows remote attackers to execute any action as the logged-in user (including script execution). The issue is resolved in CloverDX 5.10, CloverDX 5.9.1, CloverDX 5.8.2, and CloverDX 5.7.1. | [] | null | 8.8 | null | null |
|
GHSA-gv3h-vfg2-9v7g | A vulnerability was found in Campcodes Beauty Salon Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/search-appointment.php. The manipulation of the argument searchdata leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235249 was assigned to this vulnerability. | [] | null | null | 3.5 | null |
|
CVE-2023-28335 | Moodle: csrf risk in resetting all templates of a database activity | The link to reset all templates of a database activity did not include the necessary token to prevent a CSRF risk. | [
"cpe:2.3:a:moodle:moodle:4.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:4.1.1:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-hhhq-8f65-6q7x | Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via "an invalid and non-sensical ordering of table-related tags" that results in a negative array index. | [] | null | null | null | null |
|
GHSA-g365-5x48-7j84 | In LuxSoft LuxCal Web Calendar before 5.2.0, an unauthenticated attacker can manipulate a POST request. This allows the attacker's session to be authenticated as any registered LuxCal user, including the site administrator. | [] | null | 9.8 | null | null |
|
CVE-2016-6385 | Memory leak in the Smart Install client implementation in Cisco IOS 12.2 and 15.0 through 15.2 and IOS XE 3.2 through 3.8 allows remote attackers to cause a denial of service (memory consumption) via crafted image-list parameters, aka Bug ID CSCuy82367. | [
"cpe:2.3:o:cisco:ios:12.2\\(35\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(35\\)ex1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(35\\)ex2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(35\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(35\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(35\\)se2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(35\\)se3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(35\\)se4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(35\\)se5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(37\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(37\\)ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(37\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(37\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(40\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(40\\)ex1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(40\\)ex2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(40\\)ex3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(40\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(40\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(40\\)se2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(44\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(44\\)ex1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(44\\)ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(44\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(44\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(44\\)se2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(44\\)se3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(44\\)se4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(44\\)se5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(44\\)se6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(46\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(46\\)ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(46\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(46\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(46\\)se2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(50\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(50\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(50\\)se2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(50\\)se3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(50\\)se4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(50\\)se5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(52\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(52\\)ex1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(52\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(52\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(53\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(53\\)ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(53\\)ez:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(53\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(53\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(53\\)se2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(54\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)ex1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)ex2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)ex3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)ez:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)se2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)se8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(55\\)se10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)ey1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)ey2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)ez:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(60\\)ez8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)se2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(1\\)se3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)eb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ec:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ed:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ed1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)eh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ek:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ek1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ez:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2a\\)se9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3m\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3m\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4m\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.0ja:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.0se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.1se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.2se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.3se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.0se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.1se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.2se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.3se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.4se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.5se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
CVE-2018-10966 | An issue was discovered in GamerPolls 0.4.6, related to config/environments/all.js and config/initializers/02_passport.js. An attacker can edit the Passport.js contents of the session cookie to contain the ID number of the account they wish to take over, and re-sign it using the hard coded secret. | [
"cpe:2.3:a:gamerpolls:gamerpolls:0.4.6:*:*:*:*:*:*:*"
] | null | null | 7.3 | 7.5 |
|
GHSA-cpv6-j272-xmcq | There is a reflected XSS vulnerability in AXON PBX 2.02 via the "AXON->Auto-Dialer->Agents->Name" field. The vulnerability exists due to insufficient filtration of user-supplied data. A remote attacker can execute arbitrary HTML and script code in a browser in the context of the vulnerable application. | [] | null | null | 6.1 | null |
|
GHSA-mqch-c6jh-g9xj | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in I Thirteen Web Solution WP Responsive Tabs horizontal vertical and accordion Tabs.This issue affects WP Responsive Tabs horizontal vertical and accordion Tabs: from n/a through 1.1.17. | [] | null | 8.5 | null | null |
|
GHSA-jxjv-r2pr-m3g6 | BEA WebLogic Server and Express version 7.0 SP3 may follow certain code execution paths that result in an incorrect current user, such as in the frequent use of JNDI initial contexts, which could allow remote authenticated users to gain privileges. | [] | null | null | null | null |
|
CVE-2024-32782 | WordPress HT Mega plugin <= 2.4.7 - Sensitive Data Exposure vulnerability | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in HasThemes HT Mega.This issue affects HT Mega: from n/a through 2.4.7.
| [] | null | 4.3 | null | null |
RHSA-2020:4331 | Red Hat Security Advisory: kpatch-patch security update | kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
CVE-2021-30919 | An out-of-bounds write was addressed with improved input validation. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. Processing a maliciously crafted PDF may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2013-5856 | Unspecified vulnerability in the Oracle Health Sciences InForm component in Oracle Industry Applications 4.5 SP3, 4.5 SP3a-k, 4.6 SP0, 4.6 SP0a-c, 4.6 SP1, 4.6 SP1a-c, 4.6 SP2, 4.6 SP2a-c, 5.0 SP0, 5.0 SP0a, 5.0 SP1, 5.0 SP1a-b, 5.5 SP0, 5.5 SP0b, 5.5.1, and 6.0.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Web. | [
"cpe:2.3:a:oracle:industry_applications:4.5:sp3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3b:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3c:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3d:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3e:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3f:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3g:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3h:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3i:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3j:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.5:sp3k:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp0:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp0a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp0b:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp0c:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp1a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp1b:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp1c:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp2a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp2b:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:4.6:sp2c:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:5.0:sp0:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:5.0:sp0a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:5.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:5.0:sp1a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:5.0:sp1b:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:5.5:sp0:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:5.5:sp0b:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:industry_applications:6.0.0:*:*:*:*:*:*:*"
] | null | null | null | 3.6 |
|
GHSA-hq3m-jwg9-rv8q | A vulnerability in Cisco NX-OS System Software could allow an authenticated, local attacker to bypass signature verification when loading a software image. The vulnerability is due to insufficient NX-OS signature verification for software images. An authenticated, local attacker could exploit this vulnerability to bypass signature verification and load a crafted, unsigned software image on a targeted device. The attacker would need valid administrator credentials to perform this exploit. This vulnerability affects the following products running Cisco NX-OS System Software: Multilayer Director Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Unified Computing System Manager. Cisco Bug IDs: CSCvf25045, CSCvf31495. | [] | null | null | 6.7 | null |
|
CVE-2025-32687 | WordPress Review Stars Count For WooCommerce <= 2.0 - SQL Injection Vulnerability | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Magnigenie Review Stars Count For WooCommerce allows SQL Injection. This issue affects Review Stars Count For WooCommerce: from n/a through 2.0. | [] | null | 8.5 | null | null |
CVE-2008-4372 | Cross-site scripting (XSS) vulnerability in articles.php in AvailScript Article Script allows remote attackers to inject arbitrary web script or HTML via the aIDS parameter. | [
"cpe:2.3:a:availscript:availscript_article_script:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2019-8907 | do_core_note in readelf.c in libmagic.a in file 5.35 allows remote attackers to cause a denial of service (stack corruption and application crash) or possibly have unspecified other impact. | [
"cpe:2.3:a:file_project:file:5.35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2023-40199 | WordPress WP Like Button Plugin <= 1.7.0 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in CRUDLab WP Like Button plugin <= 1.7.0 versions. | [
"cpe:2.3:a:crudlab:wp_like_button:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
GHSA-3hc3-93hv-h8f3 | An issue was discovered in baigo CMS 2.1.1. There is a vulnerability that allows remote attackers to execute arbitrary code. A BG_SITE_NAME parameter with malicious code can be written into the opt_base.inc.php file. | [] | null | null | 9.8 | null |
|
CVE-2022-28705 | On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, and 13.1.x versions prior to 13.1.5, on platforms with an ePVA and the pva.fwdaccel BigDB variable enabled, undisclosed requests to a virtual server with a FastL4 profile that has ePVA acceleration enabled can cause the Traffic Management Microkernel (TMM) process to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated | [
"cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:13.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:13.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:13.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:13.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:14.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:14.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:14.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:15.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:15.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:15.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:15.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:15.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:16.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:13.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:13.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:13.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:13.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:14.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:14.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:14.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:15.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:15.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:15.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:15.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:15.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:16.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:13.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:13.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:13.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:13.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:14.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:14.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:14.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:15.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:15.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:15.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:15.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:15.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:16.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:16.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:16.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:13.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:13.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:13.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:13.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:14.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:14.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:14.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:15.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:15.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:15.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:15.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:15.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:16.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:16.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:17.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-mfhj-c6fm-f4m2 | Windows Hyper-V Remote Code Execution Vulnerability. | [] | null | 7.8 | null | null |
|
CVE-2025-27187 | After Effects | Out-of-bounds Read (CWE-125) | After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 5.5 | null | null |
GHSA-x65x-96xx-c3hv | in OpenHarmony v4.0.0 and prior versions allow a remote attacker cause DOS through improper input. | [] | null | 8.1 | null | null |
|
CVE-2022-27250 | The UNISOC chipset through 2022-03-15 allows attackers to obtain remote control of a mobile phone, e.g., to obtain sensitive information from text messages or the device's screen, record video of the device's physical environment, or modify data. | [
"cpe:2.3:h:unisoc:unisoc_chipset:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2008-3003 | Microsoft Office Excel 2007 Gold and SP1 does not properly delete the PWD (password) string from connections.xml when a .xlsx file is configured not to save the remote data session password, which allows local users to obtain sensitive information and obtain access to a remote data source, aka the "Excel Credential Caching Vulnerability." | [
"cpe:2.3:a:microsoft:office:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007:*:gold:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*"
] | null | null | null | 6.6 |
|
GHSA-3fvg-j3j7-2v24 | Responsive Newspaper Magazine & Blog CMS 1.0 allows SQL Injection via the id parameter to admin/admin_process.php for form editing. | [] | null | 9.8 | null | null |
|
GHSA-9q5x-p26r-832q | Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.5. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS Base Score depend on the software that uses Outside In Technology. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology, but if data is not received over a network the CVSS score may be lower. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N). | [] | null | null | null | null |
|
CVE-2014-2008 | SQL injection vulnerability in confirm.php in the mPAY24 payment module before 1.6 for PrestaShop allows remote attackers to execute arbitrary SQL commands via the TID parameter. | [
"cpe:2.3:a:mpay24_project:mpay24:*:*:*:*:*:prestashop:*:*",
"cpe:2.3:a:mpay24_project:mpay24:1.4.0:*:*:*:*:prestashop:*:*",
"cpe:2.3:a:mpay24_project:mpay24:1.4.1:*:*:*:*:prestashop:*:*",
"cpe:2.3:a:mpay24_project:mpay24:1.4.2:*:*:*:*:prestashop:*:*",
"cpe:2.3:a:mpay24_project:mpay24:1.4.3:*:*:*:*:prestashop:*:*",
"cpe:2.3:a:mpay24_project:mpay24:1.4.4:*:*:*:*:prestashop:*:*",
"cpe:2.3:a:mpay24_project:mpay24:1.4.5:*:*:*:*:prestashop:*:*",
"cpe:2.3:a:mpay24_project:mpay24:1.4.6:*:*:*:*:prestashop:*:*",
"cpe:2.3:a:mpay24_project:mpay24:1.4.7:*:*:*:*:prestashop:*:*",
"cpe:2.3:a:mpay24_project:mpay24:1.4.8:*:*:*:*:prestashop:*:*",
"cpe:2.3:a:mpay24_project:mpay24:1.4.9:*:*:*:*:prestashop:*:*",
"cpe:2.3:a:mpay24_project:mpay24:1.5.0:*:*:*:*:prestashop:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-48285 | loadAsync in JSZip before 3.8.0 allows Directory Traversal via a crafted ZIP archive. | [
"cpe:2.3:a:jszip_project:jszip:*:*:*:*:*:node.js:*:*"
] | null | 7.3 | null | null |
|
GHSA-hcfg-mxgg-w8v8 | An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. | [] | null | null | null | null |
|
CVE-2016-3939 | drivers/video/msm/mdss/mdss_debug.c in the Qualcomm video driver in Android before 2016-10-05 on Nexus 5X, Nexus 6, Nexus 6P, and Android One devices allows attackers to gain privileges via a crafted application, aka Android internal bug 30874196 and Qualcomm internal bug CR 1001224. | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2024-27823 | A race condition was addressed with improved locking. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, macOS Ventura 13.6.7, watchOS 10.5, visionOS 1.3, tvOS 17.5, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5. An attacker in a privileged network position may be able to spoof network packets. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
|
CVE-2018-6202 | In eScan Antivirus 14.0.1400.2029, the driver file (econceal.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x830020F8. | [
"cpe:2.3:a:escanav:anti-virus:14.0.1400.2029:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.1 |
|
CVE-2024-13411 | Zapier for WordPress <= 1.5.1 - Authenticated (Subscriber+) Blind Server-Side Request Forgery via updated_user Function | The Zapier for WordPress plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.5.1 via the updated_user() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services. | [] | null | 6.4 | null | null |
GHSA-h5wh-7h2j-h999 | Exposure of Resource to Wrong Sphere in Simple-Wayland-HotKey-Daemon | SWHKD 1.1.5 consumes the keyboard events of unintended users. This could potentially cause an information leak, but is usually a denial of functionality. | [] | null | 4.4 | null | null |
CVE-2019-20147 | An issue was discovered in GitLab Community Edition (CE) and Enterprise Edition (EE) 9.1 through 12.6.1. It has Incorrect Access Control. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2012-4432 | Use-after-free vulnerability in opngreduc.c in OptiPNG Hg and 0.7.x before 0.7.3 might allow remote attackers to execute arbitrary code via unspecified vectors related to "palette reduction." | [
"cpe:2.3:a:optipng:optipng:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:optipng:optipng:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:optipng:optipng:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:optipng:optipng:hg:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-2vqv-f5h7-hwv8 | RealNetworks RealPlayer before 15.0.0 allows remote attackers to execute arbitrary code via a crafted length of an MLTI chunk in an IVR file. | [] | null | null | null | null |
|
CVE-2022-46139 | TP-Link TL-WR940N V4 3.16.9 and earlier allows authenticated attackers to cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process. | [
"cpe:2.3:o:tp-link:tl-wr940n_v4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr940n_v4:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2017-0218 | Microsoft Windows 10 Gold, Windows 10 1511, Windows 10 1607, and Windows Server 2016 allow an attacker to exploit a security feature bypass vulnerability in Device Guard that could allow the attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This CVE ID is unique from CVE-2017-0173, CVE-2017-0215, CVE-2017-0216, and CVE-2017-0219. | [
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | 4.6 |
|
GHSA-3g64-fqmg-p75w | Cisco IOS 15.5(3)M on Integrated Services Router (ISR) 800, 819, and 829 devices allows remote attackers to cause a denial of service (memory consumption) via crafted TCP packets on the SSH port, aka Bug ID CSCuu13476. | [] | null | null | 7.5 | null |
|
CVE-2017-5683 | Privilege escalation in IntelHAXM.sys driver in the Intel Hardware Accelerated Execution Manager before version 6.0.6 allows a local user to gain system level access. | [
"cpe:2.3:a:intel:hardware_accelerated_execution_manager:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
RHSA-2014:1669 | Red Hat Security Advisory: qemu-kvm security and bug fix update | Qemu: information leakage when guest sets high resolution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
CVE-2025-27201 | Animate | Out-of-bounds Read (CWE-125) | Animate versions 24.0.7, 23.0.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 5.5 | null | null |
GHSA-h7hm-pcj8-gj2r | Vulnerability in the Oracle Retail Store Inventory Management product of Oracle Retail Applications (component: Security). The supported version that is affected is 16.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Store Inventory Management. Successful attacks of this vulnerability can result in takeover of Oracle Retail Store Inventory Management. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | null | null |
|
CVE-2018-9845 | Etherpad Lite before 1.6.4 is exploitable for admin access. | [
"cpe:2.3:a:etherpad:etherpad_lite:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-3q38-2x39-mm6g | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0920, CVE-2019-0988, CVE-2019-1055, CVE-2019-1080. | [] | null | null | null | null |
|
GHSA-wg26-873w-g56c | The affected product transmits unencrypted sensitive information, which may allow an attacker to access this information on the NIO 50 (all versions). | [] | null | null | null | null |
|
GHSA-5h3p-vhgq-p526 | Windows Hyper-V Denial of Service Vulnerability This CVE ID is unique from CVE-2021-33755. | [] | null | 7.7 | null | null |
|
GHSA-xf58-4g5r-cm9h | src/main-win.c in GPicView 0.1.9 in Lightweight X11 Desktop Environment (LXDE) allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename. | [] | null | null | null | null |
|
GHSA-wvf9-rvwq-82v5 | Multiple cross-site scripting (XSS) vulnerabilities in REDCap before 5.1.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving different modules. | [] | null | null | null | null |
|
GHSA-hvgm-99g5-jwq5 | A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 9). The affected applications suffer from a DLL hijacking vulnerability. This could allow an attacker to execute arbitrary code via placing a crafted DLL file on the system. | [] | 7 | 7.3 | null | null |
|
CVE-2024-54422 | WordPress Evernote Sync plugin <= 3.0.0 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gaowei Tang Evernote Sync allows Reflected XSS.This issue affects Evernote Sync: from n/a through 3.0.0. | [] | null | 7.1 | null | null |
RHSA-2018:2255 | Red Hat Security Advisory: java-1.7.0-oracle security update | JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6"
] | null | null | 5.9 | null |
GHSA-xx83-gq5v-8prv | An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory, aka 'DirectX Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1308. | [] | null | 7.8 | null | null |
|
CVE-2025-24706 | WordPress MultiVendorX plugin <= 4.2.13 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MultiVendorX WC Marketplace allows Stored XSS. This issue affects WC Marketplace: from n/a through 4.2.13. | [] | null | 6.5 | null | null |
GHSA-qpxv-j26m-rr62 | A remote denial of service vulnerability in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1. Android ID: A-35472997. | [] | null | null | 5.5 | null |
|
CVE-2023-37029 | Magma versions <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) are susceptible to an assertion-based crash when an oversized NAS packet is received. An attacker may leverage this behavior to repeatedly crash the MME via either a compromised base station or via an unauthenticated cellphone within range of a base station managed by the MME, causing a denial of service. | [] | null | 7.5 | null | null |
|
GHSA-hfvj-w63f-mc9j | The lack of encryption in the DuoxMe (formerly Blue) application binary in versions prior to 3.3.1 for iOS devices allows an attacker to gain unauthorised access to the application code and discover sensitive information. | [] | 6.9 | null | null | null |
|
GHSA-4587-j677-hvhr | Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Actions). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | [] | null | null | null | null |
|
CVE-2016-1881 | The kernel in FreeBSD 9.3, 10.1, and 10.2 allows local users to cause a denial of service (crash) or potentially gain privilege via a crafted Linux compatibility layer setgroups system call. | [
"cpe:2.3:o:freebsd:freebsd:9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.2:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2021-41992 | PingID Windows Login RSA cryptographic weakness with possible offline MFA bypass | A misconfiguration of RSA in PingID Windows Login prior to 2.7 is vulnerable to pre-computed dictionary attacks, leading to an offline MFA bypass. | [
"cpe:2.3:a:pingidentity:pingid_integration_for_windows_login:*:*:*:*:*:*:*:*"
] | null | 7.7 | null | null |
CVE-2023-3199 | The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_status_order_title function. This makes it possible for unauthenticated attackers to update status order title via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
|
CVE-2006-0312 | create.php in aoblogger 2.3 allows remote attackers to bypass authentication and create new blog entries by setting the uza parameter to 1. | [
"cpe:2.3:a:mike_helton:aoblogger:2.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2016:1532 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Permission bypass on overlayfs during copy_up kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 7.8 | null |
GHSA-626c-c4r3-vmjg | Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23928. | [] | null | null | 7.8 | null |
|
CVE-2020-14154 | Mutt before 1.14.3 proceeds with a connection even if, in response to a GnuTLS certificate prompt, the user rejects an expired intermediate certificate. | [
"cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] | null | 4.8 | null | 5.8 |
|
GHSA-q9fg-c965-3f7m | A vulnerability has been identified in JT2Go (All Versions < V13.1.0), Teamcenter Visualization (All Versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of RGB and SGI files. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. | [] | null | null | null | null |
|
GHSA-gfxh-gvwh-3w55 | Unauthenticated Stored XSS in FME Server versions 2019.2 and 2020.0 Beta allows a remote attacker to gain admin privileges by injecting arbitrary web script or HTML via the login page. The XSS is executed when an administrator accesses the logs. | [] | null | null | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.