id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2015-2266 | message/index.php in Moodle through 2.5.9, 2.6.x before 2.6.9, 2.7.x before 2.7.6, and 2.8.x before 2.8.4 does not consider the moodle/site:readallmessages capability before accessing arbitrary conversations, which allows remote authenticated users to obtain sensitive personal-contact and unread-message-count information via a modified URL. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.8.3:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-6p5q-h963-pwwf | Apache AGE: Python and Golang drivers allow data manipulation and exposure due to SQL injection | There are issues with the AGE drivers for Golang and Python that enable SQL injections to occur. This impacts AGE for PostgreSQL 11 & AGE for PostgreSQL 12, all versions up-to-and-including 1.1.0, when using those drivers. The fix is to update to the latest Golang and Python drivers in addition to the latest version of AGE that is used for PostgreSQL 11 or PostgreSQL 12. The update of AGE will add a new function to enable parameterization of the cypher() function, which, in conjunction with the driver updates, will resolve this issue. Background (for those who want more information): After thoroughly researching this issue, we found that due to the nature of the cypher() function, it was not easy to parameterize the values passed into it. This enabled SQL injections, if the developer of the driver wasn't careful. The developer of the Golang and Pyton drivers didn't fully utilize parameterization, likely because of this, thus enabling SQL injections. The obvious fix to this issue is to use parameterization in the drivers for all PG SQL queries. However, parameterizing all PG queries is complicated by the fact that the cypher() function call itself cannot be parameterized directly, as it isn't a real function. At least, not the parameters that would take the graph name and cypher query. The reason the cypher() function cannot have those values parameterized is because the function is a placeholder and never actually runs. The cypher() function node, created by PG in the query tree, is transformed and replaced with a query tree for the actual cypher query during the analyze phase. The problem is that parameters - that would be passed in and that the cypher() function transform needs to be resolved - are only resolved in the execution phase, which is much later. Since the transform of the cypher() function needs to know the graph name and cypher query prior to execution, they can't be passed as parameters. The fix that we are testing right now, and are proposing to use, is to create a function that will be called prior to the execution of the cypher() function transform. This new function will allow values to be passed as parameters for the graph name and cypher query. As this command will be executed prior to the cypher() function transform, its values will be resolved. These values can then be cached for the immediately following cypher() function transform to use. As added features, the cached values will store the calling session's pid, for validation. And, the cypher() function transform will clear this cached information after function invocation, regardless of whether it was used. This method will allow the parameterizing of the cypher() function indirectly and provide a way to lock out SQL injection attacks. | [] | null | 8.1 | null | null |
CVE-2019-20182 | The FooGallery plugin 1.8.12 for WordPress allow XSS via the post_title parameter. | [
"cpe:2.3:a:fooplugins:foogallery:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 |
|
GHSA-4284-x26r-4hhc | Cross Site Request Forgery in Apache JSPWiki | Apache JSPWiki user preferences form is vulnerable to CSRF attacks, which can lead to account takeover. Apache JSPWiki users should upgrade to 2.11.2 or later. | [] | null | 8.8 | null | null |
GHSA-fgvr-vmvg-whg2 | Cross-site scripting (XSS) vulnerability in index.php in Gravity Board X (GBX) 2.0 Beta allows remote attackers to inject arbitrary web script or HTML via the subject parameter in a postnewsubmit (aka create new thread) action. | [] | null | null | null | null |
|
GHSA-jvjc-qf53-pgj7 | fwknop before 2.0.3 does not properly validate IP addresses, which allows remote authenticated users to cause a denial of service (server crash) via a long IP address. | [] | null | null | null | null |
|
CVE-2020-7668 | Arbitrary File Write via Archive Extraction (Zip Slip) | In all versions of the package github.com/unknwon/cae/tz, the ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading "..". This allows an attacker to add or replace files system-wide. | [
"cpe:2.3:a:compression_and_archive_extensions_tz_project:compression_and_archive_extensions_tz_project:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
RHSA-2021:0659 | Red Hat Security Advisory: firefox security update | Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: MediaError message property could have leaked information about cross-origin resources Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
CVE-2009-1272 | The php_zip_make_relative_path function in php_zip.c in PHP 5.2.x before 5.2.9 allows context-dependent attackers to cause a denial of service (crash) via a ZIP file that contains filenames with relative paths, which is not properly handled during extraction. | [
"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.4:*:windows:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-whpq-mfw5-3vxx | The Joomanager component through 2.0.0 for Joomla! has an arbitrary file download issue, resulting in exposing the credentials of the database via an index.php?option=com_joomanager&controller=details&task=download&path=configuration.php request. | [] | null | null | 9.8 | null |
|
CVE-2019-5591 | A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server. | [
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 3.3 |
|
CVE-2021-3898 | Versions of Motorola Ready For and Motorola Device Help Android applications prior to 2021-04-08 do not properly verify the server certificate which could lead to the communication channel being accessible by an attacker. | [
"cpe:2.3:a:motorola:device_help:*:*:*:*:*:android:*:*",
"cpe:2.3:a:motorola:ready_for:*:*:*:*:*:android:*:*"
] | null | 6.8 | null | null |
|
CVE-2017-9989 | util/outputtxt.c in libming 0.4.8 mishandles memory allocation. A crafted input will lead to a remote denial of service (NULL pointer dereference) attack. | [
"cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-8mcc-j8jc-cj5h | The Treck TCP/IP stack before 6.0.1.66 improperly handles a Length Parameter Inconsistency in TCP. | [] | null | null | null | null |
|
GHSA-qvv4-3g8f-rgjx | Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device. | [] | null | 9.8 | null | null |
|
CVE-2023-39441 | Apache Airflow SMTP Provider, Apache Airflow IMAP Provider, Apache Airflow: SMTP/IMAP client components allowed MITM due to missing Certificate Validation | Apache Airflow SMTP Provider before 1.3.0, Apache Airflow IMAP Provider before 3.3.0, and Apache Airflow before 2.7.0 are affected by the Validation of OpenSSL Certificate vulnerability.
The default SSL context with SSL library did not check a server's X.509 certificate. Instead, the code accepted any certificate, which could result in the disclosure of mail server credentials or mail contents when the client connects to an attacker in a MITM position.
Users are strongly advised to upgrade to Apache Airflow version 2.7.0 or newer, Apache Airflow IMAP Provider version 3.3.0 or newer, and Apache Airflow SMTP Provider version 1.3.0 or newer to mitigate the risk associated with this vulnerability | [
"cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:apache-airflow-providers-imap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:apache-airflow-providers-smtp:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
CVE-2016-3324 | Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-g4rj-4g63-8r2h | Windows 2012R2 stemcells, versions prior to 1200.17, contain an information exposure vulnerability on vSphere. A remote user with the ability to push apps can execute crafted commands to read the IaaS metadata from the VM, which may contain BOSH credentials. | [] | null | null | 6.5 | null |
|
GHSA-v6fv-h7mf-cc44 | The MPEG-4 video codec in Apple iPhone OS 1.0 through 2.2.1 and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to cause a denial of service (device reset) via a crafted MPEG-4 video file that triggers an "input validation issue." | [] | null | null | null | null |
|
GHSA-99mr-5r92-ggx5 | A null pointer dereference was addressed with improved validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Big Sur 11.6.5, Security Update 2022-003 Catalina, watchOS 8.5, macOS Monterey 12.3. An attacker in a privileged position may be able to perform a denial of service attack. | [] | null | 6.5 | null | null |
|
GHSA-w7xq-2x44-5m2x | Command injection vulnerability in Combodo iTop 2.4.1 allows remote authenticated administrators to execute arbitrary commands by changing the platform configuration, because web/env-production/itop-config/config.php contains a function called TestConfig() that calls the vulnerable function eval(). | [] | null | null | 7.2 | null |
|
CVE-2009-3598 | Cross-site scripting (XSS) vulnerability in survey_result.php in eCardMAX FormXP 2007 allows remote attackers to inject arbitrary web script or HTML via the sid parameter. | [
"cpe:2.3:a:ecardmax.com:formxp:2007:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-30558 | WordPress Add Shortcodes Actions And Filters plugin <= 2.10 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Michael Simpson Add Shortcodes Actions And Filters allows Reflected XSS.This issue affects Add Shortcodes Actions And Filters: from n/a through 2.10.
| [] | null | 7.1 | null | null |
GHSA-vmxf-f8cr-mhq7 | A directory traversal vulnerability in HPE Intelligent Management Center (IMC) PLAT 7.3 E0504P02 could allow remote code execution. | [] | null | null | 8.8 | null |
|
GHSA-x32x-qjwj-x48p | Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. | [] | null | null | null | null |
|
GHSA-4v5r-2vpm-gvgv | Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] | null | 5.4 | null | null |
|
GHSA-qm72-9j6p-39q3 | Improper Enforcement of Behavioral Workflow vulnerability in DECE Software Geodi allows Functionality Bypass.This issue affects Geodi: before 8.0.0.27396. | [] | null | 7.1 | null | null |
|
PYSEC-2019-224 | null | Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of exploitation is: context-dependent. | [] | null | null | null | null |
CVE-2024-45774 | Grub2: reader/jpeg: heap oob write during jpeg parsing | A flaw was found in grub2. A specially crafted JPEG file can cause the JPEG parser of grub2 to incorrectly check the bounds of its internal buffers, resulting in an out-of-bounds write. The possibility of overwriting sensitive information to bypass secure boot protections is not discarded. | [
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9",
"cpe:/a:redhat:openshift:4"
] | null | 6.7 | null | null |
CVE-2000-0438 | Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter. | [
"cpe:2.3:o:caldera:openlinux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:turbolinux:turbolinux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:turbolinux:turbolinux:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:turbolinux:turbolinux:6.0.2:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2024-4658 | SQLi in TE Informatics' Nova CMS | SQL Injection: Hibernate vulnerability in TE Informatics Nova CMS allows SQL Injection.This issue affects Nova CMS: before 5.0. | [
"cpe:2.3:a:te_informatics:nova_cms:*:*:*:*:*:*:*:*"
] | 6.9 | null | null | null |
GHSA-rrg7-hv9c-7q66 | Altai Technologies Ltd Altai IX500 Indoor 22 802.11ac Wave 2 AP After login, there are file reads in the background, and attackers can obtain sensitive information such as user credentials, system configuration, and database connection strings, which can lead to data breaches and identity theft. | [] | null | 5.7 | null | null |
|
CVE-2019-11857 | ALEOS AceManager Information Disclosure | Lack of input sanitization in AceManager of ALEOS before 4.12.0, 4.9.5 and 4.4.9 allows disclosure of sensitive system information. | [
"cpe:2.3:o:sierrawireless:aleos:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_lx40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_lx60:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_mp70:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_mp70e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_rv50:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_rv50x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_es450:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_gx450:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_es440:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_gx400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_gx440:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_ls300:-:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
GHSA-c2fq-jf74-fghj | Cisco FireSIGHT Management Center allows remote attackers to bypass the HTTP attack detection feature and avoid triggering Snort IDS rules via an SSL session that is mishandled after decryption, aka Bug ID CSCux53437. | [] | null | null | null | null |
|
CVE-2025-21374 | Windows CSC Service Information Disclosure Vulnerability | Windows CSC Service Information Disclosure Vulnerability | [] | null | 5.5 | null | null |
GHSA-rh5p-hcx7-6rc7 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in YesStreaming.com Shoutcast and Icecast Internet Radio Hosting Shoutcast and Icecast HTML5 Web Radio Player by YesStreaming.com allows Stored XSS.This issue affects Shoutcast and Icecast HTML5 Web Radio Player by YesStreaming.com: from n/a through 3.3. | [] | null | 5.9 | null | null |
|
CVE-2016-3530 | Unspecified vulnerability in the Oracle Agile PLM component in Oracle Supply Chain Products Suite 9.3.4 and 9.3.5 allows remote authenticated users to affect integrity and availability via vectors related to PGC / Import. | [
"cpe:2.3:a:oracle:agile_product_lifecycle_management_framework:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_product_lifecycle_management_framework:9.3.5:*:*:*:*:*:*:*"
] | null | null | 7.1 | 7.5 |
|
CVE-2024-34086 | A vulnerability has been identified in JT2Go (All versions < V2312.0001), Teamcenter Visualization V14.1 (All versions < V14.1.0.13), Teamcenter Visualization V14.2 (All versions < V14.2.0.10), Teamcenter Visualization V14.3 (All versions < V14.3.0.7), Teamcenter Visualization V2312 (All versions < V2312.0001). The affected applications contain an out of bounds write vulnerability when parsing a specially crafted CGM file.
This could allow an attacker to execute code in the context of the current process. | [
"cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:2312:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:14.3:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2023-0476 | A LDAP injection vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. An authenticated attacker could generate data in Active Directory using the application account through blind LDAP injection. | [
"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2020-12753 | An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 software. Arbitrary code execution can occur via the bootloader because of an EL1/EL3 coldboot vulnerability involving raw_resources. The LG ID is LVE-SMP-200006 (May 2020). | [
"cpe:2.3:o:google:android:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2017-15951 | The KEYS subsystem in the Linux kernel before 4.13.10 does not correctly synchronize the actions of updating versus finding a key in the "negative" state to avoid a race condition, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
GHSA-vpg6-87c4-44h8 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15463. | [] | null | null | null | null |
|
CVE-2018-0124 | A vulnerability in Cisco Unified Communications Domain Manager could allow an unauthenticated, remote attacker to bypass security protections, gain elevated privileges, and execute arbitrary code. The vulnerability is due to insecure key generation during application configuration. An attacker could exploit this vulnerability by using a known insecure key value to bypass security protections by sending arbitrary requests using the insecure key to a targeted application. An exploit could allow the attacker to execute arbitrary code. This vulnerability affects Cisco Unified Communications Domain Manager releases prior to 11.5(2). Cisco Bug IDs: CSCuv67964. | [
"cpe:2.3:a:cisco:unified_communications_domain_manager:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
PYSEC-2020-337 | null | In affected versions of TensorFlow under certain cases, loading a saved model can result in accessing uninitialized memory while building the computation graph. The MakeEdge function creates an edge between one output tensor of the src node (given by output_index) and the input slot of the dst node (given by input_index). This is only possible if the types of the tensors on both sides coincide, so the function begins by obtaining the corresponding DataType values and comparing these for equality. However, there is no check that the indices point to inside of the arrays they index into. Thus, this can result in accessing data out of bounds of the corresponding heap allocated arrays. In most scenarios, this can manifest as unitialized data access, but if the index points far away from the boundaries of the arrays this can be used to leak addresses from the library. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0. | [] | null | null | null | null |
GHSA-766h-vjvr-5rg4 | An unauthenticated remote attacker may use a reflected XSS vulnerability to obtain information from a user or reboot the affected device once. | [] | null | 7.1 | null | null |
|
GHSA-h5xf-hvr4-x25g | Memory corruption while creating a LPAC client as LPAC engine was allowed to access GPU registers. | [] | null | 8.4 | null | null |
|
CVE-2022-37312 | OX App Suite through 7.10.6 has Uncontrolled Resource Consumption via a large request body containing a redirect URL to the deferrer servlet. | [
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:-:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_5961:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_5973:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_5976:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_5982:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_5989:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_5994:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6000:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6003:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6008:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6010:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6016:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6020:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6026:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6029:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6034:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6035:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6038:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6046:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6051:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6053:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6060:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6061:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6066:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6068:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6072:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6079:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6084:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6092:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6101:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6111:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6120:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6132:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6137:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6140:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.5:patch_release_6149:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:-:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6069:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6073:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6080:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6085:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6093:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6102:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6112:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6121:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6133:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6138:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6141:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6146:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6147:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6148:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6150:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
GHSA-vm8p-8844-p4rj | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | [] | null | null | null | null |
|
CVE-2024-45040 | gnark's commitments to private witnesses in Groth16 as implemented break zero-knowledge property | gnark is a fast zk-SNARK library that offers a high-level API to design circuits. Prior to version 0.11.0, commitments to private witnesses in Groth16 as implemented break the zero-knowledge property. The vulnerability affects only Groth16 proofs with commitments. Notably, PLONK proofs are not affected. The vulnerability affects the zero-knowledge property of the proofs - in case the witness (secret or internal) values are small, then the attacker may be able to enumerate all possible choices to deduce the actual value. If the possible choices for the variables to be committed is large or there are many values committed, then it would be computationally infeasible to enumerate all valid choices. It doesn't affect the completeness/soundness of the proofs. The vulnerability has been fixed in version 0.11.0. The patch to fix the issue is to add additional randomized value to the list of committed value at proving time to mask the rest of the values which were committed. As a workaround, the user can manually commit to a randomized value. | [
"cpe:2.3:a:consensys:gnark:*:*:*:*:*:*:*:*",
"cpe:2.3:a:consensys:gnark-crypto:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
CVE-2024-32883 | MCUboot Injection attack of unprotected TLV values | MCUboot is a secure bootloader for 32-bits microcontrollers. MCUboot uses a TLV (tag-length-value) structure to represent the meta data associated with an image. The TLVs themselves are divided into two sections, a protected and an unprotected section. The protected TLV entries are included as part of the image signature to avoid tampering. However, the code does not distinguish which TLV entries should be protected or not, so it is possible for an attacker to add unprotected TLV entries that should be protected. Currently, the primary protected TLV entries should be the dependency indication, and the boot record. An injected dependency value would primarily result in an otherwise acceptable image being rejected. A boot record injection could allow fields in a later attestation record to include data not intended, which could cause an image to appear to have properties that it should not have. As a workaround, disable the boot record functionality. | [] | null | 7.7 | null | null |
CVE-2007-6158 | Multiple SQL injection vulnerabilities in caladmin.inc.php in Proverbs Web Calendar 1.1 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) loginname (aka Username) and (2) loginpass (aka Password) parameters to caladmin.php. | [
"cpe:2.3:a:proverbs:proverbs_web_calendar:1.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-50262 | bpf: Fix out-of-bounds write in trie_get_next_key() | In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix out-of-bounds write in trie_get_next_key()
trie_get_next_key() allocates a node stack with size trie->max_prefixlen,
while it writes (trie->max_prefixlen + 1) nodes to the stack when it has
full paths from the root to leaves. For example, consider a trie with
max_prefixlen is 8, and the nodes with key 0x00/0, 0x00/1, 0x00/2, ...
0x00/8 inserted. Subsequent calls to trie_get_next_key with _key with
.prefixlen = 8 make 9 nodes be written on the node stack with size 8. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2008-5181 | Microsoft Communicator allows remote attackers to cause a denial of service (application or device outage) via instant messages containing large numbers of emoticons. | [
"cpe:2.3:a:microsoft:office_communicator:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-gfvq-mxw3-mfq3 | asyncua vulnerable to denial of service via infinite loop | Versions of the package asyncua before 0.9.96 are vulnerable to Denial of Service (DoS) such that an attacker can send a malformed packet and as a result, the server will enter into an infinite loop and consume excessive memory. | [] | null | 7.5 | null | null |
CVE-2022-35106 | SWFTools commit 772e55a2 was discovered to contain a segmentation violation via FoFiTrueType::computeTableChecksum(unsigned char*, int) at /xpdf/FoFiTrueType.cc. | [
"cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2018-0316 | A vulnerability in the Session Initiation Protocol (SIP) call-handling functionality of Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability exists because the firmware of an affected phone incorrectly handles errors that could occur when an incoming phone call is not answered. An attacker could exploit this vulnerability by sending a set of maliciously crafted SIP packets to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition. This vulnerability affects Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware if they are running a Multiplatform Firmware release prior to Release 11.1(2). Cisco Bug IDs: CSCvi24718. | [
"cpe:2.3:o:cisco:ip_phone_firmware:11.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
GHSA-5pr3-frh5-5p66 | Missing Authorization vulnerability in WP Swings Wallet System for WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Wallet System for WooCommerce: from n/a through 2.5.13. | [] | null | 7.5 | null | null |
|
GHSA-4rr7-7xpx-xq3f | There was an argument injection vulnerability in Sourcetree for Windows via Mercurial repository tag name that is going to be deleted. An attacker with permission to create a tag on a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. All versions of Sourcetree for Windows before 2.5.5.0 are affected by this vulnerability. | [] | null | null | 8.8 | null |
|
GHSA-vgvg-jgvw-9xgg | Missing Authorization vulnerability in Arshid WooCommerce Quick View allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WooCommerce Quick View: from n/a through 1.1.1. | [] | null | 5.3 | null | null |
|
cisco-sa-ce-roomos-dos-c65x2Qf2 | Cisco TelePresence Collaboration Endpoint and RoomOS Software H.323 Denial of Service Vulnerability | A vulnerability in the packet processing functionality of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted H.323 traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to either reboot normally or reboot into maintenance mode, which could result in a DoS condition on the device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 7.5 | null | null |
GHSA-68r7-3388-cmpg | In aee, there is a possible use after free due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07202891; Issue ID: ALPS07202891. | [] | null | 6.7 | null | null |
|
GHSA-33g6-495w-v8j2 | Snowflake JDBC uses insecure temporary credential cache file permissions | IssueSnowflake discovered and remediated a vulnerability in the Snowflake JDBC Driver. On Linux systems, when temporary credential caching is enabled, the Snowflake JDBC Driver will cache temporary credentials locally in a world-readable file.This vulnerability affects versions 3.6.8 through 3.21.0. Snowflake fixed the issue in version 3.22.0.Vulnerability DetailsOn Linux, when either EXTERNALBROWSER or USERNAME_PASSWORD_MFA authentication methods are used with temporary credential caching enabled, the Snowflake JDBC Driver will cache temporary credentials in a local file. In the vulnerable versions of the Driver, this file is created with world-readable permissions.SolutionSnowflake released version 3.22.0 of the Snowflake JDBC Driver, which fixes this issue. We recommend users upgrade to version 3.22.0.Additional InformationIf you discover a security vulnerability in one of our products or websites, please report the issue to HackerOne. For more information, please see our [Vulnerability Disclosure Policy](https://hackerone.com/snowflake?type=team). | [] | null | 4.4 | null | null |
CVE-2023-28374 | Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | [
"cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2021-34341 | Ming 0.4.8 has an out-of-bounds read vulnerability in the function decompileIF() in the decompile.c file that causes a direct segmentation fault and leads to denial of service. | [
"cpe:2.3:a:libming:ming:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2024-4770 | When saving a page to PDF, certain font styles could have led to a potential use-after-free crash. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11. | [
"cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-3j65-5g3g-m8f2 | Multiple cross-site scripting (XSS) vulnerabilities in index.php in phpMyFAQ before 2.5.5 allow remote attackers to inject arbitrary web script or HTML via (1) the lang parameter in a sitemap action, (2) the search parameter in a search action, (3) the tagging_id parameter in a search action, (4) the highlight parameter in an artikel action, (5) the artlang parameter in an artikel action, (6) the letter parameter in a sitemap action, (7) the lang parameter in a show action, (8) the cat parameter in a show action, (9) the newslang parameter in a news action, (10) the artlang parameter in a send2friend action, (11) the cat parameter in a send2friend action, (12) the id parameter in a send2friend action, (13) the srclang parameter in a translate action, (14) the id parameter in a translate action, (15) the cat parameter in a translate action, (16) the cat parameter in an add action, or (17) the question parameter in an add action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
CVE-2022-35807 | Azure Site Recovery Elevation of Privilege Vulnerability | Azure Site Recovery Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:azure_site_recovery:*:*:*:*:vmware_to_azure:*:*:*"
] | null | 6.5 | null | null |
GHSA-82hr-8jw5-cf8x | In the Linux kernel, the following vulnerability has been resolved:media: cx24116: prevent overflows on SNR calculusas reported by Coverity, if reading SNR registers fail, a negative
number will be returned, causing an underflow when reading SNR
registers.Prevent that. | [] | null | null | null | null |
|
GHSA-5xf2-6qpg-8569 | IBM Rational Business Developer 8.x before 8.0.1.4 allows remote attackers to obtain potentially sensitive information via a connection to a web service created with the Rational Business Developer product. | [] | null | null | null | null |
|
CVE-2012-5547 | Multiple cross-site request forgery (CSRF) vulnerabilities in the Search API module 7.x-1.x before 7.x-1.3 for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) enable a server via a server action or (2) enable a search index via an enable index action. | [
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2023-38736 | IBM QRadar WinCollect Agent privilege escalation | IBM QRadar WinCollect Agent 10.0 through 10.1.6, when installed to run as ADMIN or SYSTEM, is vulnerable to a local escalation of privilege attack that a normal user could utilize to gain SYSTEM permissions. IBM X-Force ID: 262542. | [
"cpe:2.3:a:ibm:qradar_wincollect:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2004-0165 | Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and earlier allows remote attackers to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges. | [
"cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-cwqm-g264-pf82 | ktsuss versions 1.4 and prior spawns the GTK interface to run as root. This can allow a local attacker to escalate privileges to root and use the "GTK_MODULES" environment variable to possibly execute arbitrary code. | [] | null | 7.8 | null | null |
|
GHSA-gxj6-9wjm-8228 | NVIDIA nvTIFF Library for Windows and Linux contains a vulnerability where improper input validation might enable an attacker to use a specially crafted input file. A successful exploit of this vulnerability might lead to a partial denial of service. | [] | null | 2.8 | null | null |
|
GHSA-m74p-p5fp-95cw | The Triton Lite theme for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' attribute within the theme's Button shortcode in all versions up to, and including, 1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2021-33549 | UDP Technology/Geutebrück camera devices: Buffer overflow in action parameter leading to RCE | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in the action parameter, which may allow an attacker to remotely execute arbitrary code. | [
"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ebc-2110:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ebc-2111:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_efd-2241:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_efd-2250:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2230:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2239:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2240:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2249:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ewpc-2270:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-code_eec-2400:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-code_een-2010:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-code_een-2040:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ebc-2112:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_efd-2251:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ewpc-2275:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ewpc-2271:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
CVE-2019-16283 | A potential security vulnerability has been identified with a version of the HP Softpaq installer that can lead to arbitrary code execution. | [
"cpe:2.3:a:hp:softpaq_installer:4.0.100.1189:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
RHSA-2023:4892 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.12 security and bug fix update | golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results | [
"cpe:/a:redhat:rhmt:1.7::el8"
] | null | 5.3 | null | null |
GHSA-wwvv-x5mq-h3jj | Use of Cryptographically Weak Pseudo-Random Number Generator in yiisoft/yii2-dev | yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator | [] | null | 5.3 | null | null |
GHSA-4cgm-977g-fmc6 | services/audioflinger/Effects.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 does not validate the reply size for an AudioFlinger effect command, which allows attackers to gain privileges via a crafted application, aka internal bug 29251553. | [] | null | null | 7.8 | null |
|
CVE-2018-1695 | IBM WebSphere Application Server 7.0, 8.0, and 8.5.5 installations using Form Login could allow a remote attacker to conduct spoofing attacks. IBM X-Force ID: 145769. | [
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.0:*:*:*:*:*:*:*"
] | null | null | 7.3 | null |
|
CVE-2008-0564 | Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.10b1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to (1) editing templates and (2) the list's "info attribute" in the web administrator interface, a different vulnerability than CVE-2006-3636. | [
"cpe:2.3:a:mailman:mailman:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-20470 | In bindRemoteViewsService of AppWidgetServiceImpl.java, there is a possible way to bypass background activity launch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-234013191 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2018-19894 | ThinkCMF X2.2.2 has SQL Injection via the functions check() and delete() in CommentadminController.class.php and is exploitable with the manager privilege via the ids[] parameter in a commentadmin action. | [
"cpe:2.3:a:thinkcmf:thinkcmf:x2.2.2:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 |
|
CVE-2015-7341 | JNews Joomla Component before 8.5.0 allows arbitrary File Upload via Subscribers or Templates, as demonstrated by the .php5 extension. | [
"cpe:2.3:a:joobi:jnews:*:*:*:*:*:joomla\\!:*:*"
] | null | 8.8 | null | 6.5 |
|
CVE-2009-3224 | SQL injection vulnerability in index.php in Super Mod System, when using the 68 Classifieds 3.1 Core System, allows remote attackers to execute arbitrary SQL commands via the s parameter. | [
"cpe:2.3:a:68classifieds:68_classifieds:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:classified-software:super_mod_system:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2020:3274 | Red Hat Security Advisory: grub2 security and bug fix update | grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow grub2: Fail kernel validation without shim protocol grub2: Use-after-free redefining a function whilst the same function is already executing grub2: Integer overflow in initrd size handling | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 5.7 | null | null |
GHSA-gwgr-xqcv-px29 | Multiple functions in NetApp OnCommand System Manager before 8.3.2 do not properly escape special characters, which allows remote authenticated users to execute arbitrary API calls via unspecified vectors. | [] | null | null | 7.5 | null |
|
CVE-2007-5971 | Double free vulnerability in the gss_krb5int_make_seal_token_v3 function in lib/gssapi/krb5/k5sealv3.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors. | [
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-w4h8-48x8-2gv2 | Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2044, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047. | [] | null | null | null | null |
|
GHSA-m5q6-hm4m-4vv5 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-55956. Reason: This candidate is a duplicate of CVE-2024-55956. Notes: All CVE users should reference CVE-2024-55956 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. | [] | null | null | null | null |
|
ICSA-20-219-02 | Advantech WebAccess HMI Designer | Multiple heap-based buffer overflow vulnerabilities may be exploited by opening specially crafted project files that may overflow the heap, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.CVE-2020-16207 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). An out-of-bounds read vulnerability may be exploited by processing specially crafted project files, which may allow an attacker to read information.CVE-2020-16211 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N). Processing specially crafted project files lacking proper validation of user supplied data may cause the system to write outside the intended buffer area, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.CVE-2020-16213 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Processing specially crafted project files lacking proper validation of user supplied data may cause a type confusion condition, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.CVE-2020-16229 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Processing specially crafted project files lacking proper validation of user supplied data may cause a stack-based buffer overflow, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.CVE-2020-16215 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A double free vulnerability caused by processing specially crafted project files may allow remote code execution, disclosure/modification of information, or cause the application to crash.CVE-2020-16217 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). | [] | null | null | 7.8 | null |
GHSA-f5f5-fvm4-p475 | Previous versions of HP Device Manager (prior to HPDM 5.0.10) could potentially allow command injection and/or elevation of privileges. | [] | null | 9.8 | null | null |
|
CVE-2004-1586 | Flash Messaging clients can ignore disconnecting commands such as "shutdown" from the Flash Messaging Server 5.2.0g (rev 1.1.2), which could allow remote attackers to stay connected. | [
"cpe:2.3:a:jera_technology:flash_messaging_server:5.2.0g:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2023-30502 | Authenticated Remote Code Execution in Aruba EdgeConnect Enterprise Command Line Interface | Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise. | [
"cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
CVE-2006-6624 | The FTP Server in Sambar Server 6.4 allows remote authenticated users to cause a denial of service (application crash) via a long series of "./" sequences in the SIZE command. | [
"cpe:2.3:a:sambar:sambar_server:6.4:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2020-11887 | svg2png 4.1.1 allows XSS with resultant SSRF via JavaScript inside an SVG document. | [
"cpe:2.3:a:svg2png_project:svg2png:4.1.1:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-w57r-v6fm-gv5w | The kernel in Microsoft Windows 2000 SP4, XP SP2, and Server 2003, when ICMP Router Discovery Protocol (RDP) is enabled, allows remote attackers to cause a denial of service via fragmented router advertisement ICMP packets that trigger an out-of-bounds read, aka "Windows Kernel TCP/IP/ICMP Vulnerability." | [] | null | null | null | null |
|
GHSA-74p5-wh3g-f9rh | IBM Scale Out Network Attached Storage (SONAS) 1.3.x and 1.4.x before 1.4.3.3 places an administrative password in the shell history upon use of the -p option to chuser, which allows local users to obtain sensitive information by leveraging root access. | [] | null | null | null | null |
|
CVE-2021-21327 | Unsafe Reflection in getItemForItemtype() | GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 non-authenticated user can remotely instantiate object of any class existing in the GLPI environment that can be used to carry out malicious attacks, or to start a “POP chain”. As an example of direct impact, this vulnerability affects integrity of the GLPI core platform and third-party plugins runtime misusing classes which implement some sensitive operations in their constructors or destructors. This is fixed in version 9.5.4. | [
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.