id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2007-1598 | Stack-based buffer overflow in InterVations FileCOPA FTP Server 1.01 allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by filecopa.tar by Immunity. NOTE: some of these details are obtained from third party information. NOTE: As of 20070322, this disclosure has no actionable information. However, since it is from a reliable researcher, it is being assigned a CVE identifier for tracking purposes. | [
"cpe:2.3:a:intervations:filecopa:1.01:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2023-1397 | SourceCodester Online Student Management System profile.php cross site scripting | A vulnerability classified as problematic has been found in SourceCodester Online Student Management System 1.0. Affected is an unknown function of the file profile.php. The manipulation of the argument adminname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222984. | [
"cpe:2.3:a:online_student_management_system_project:online_student_management_system:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 |
GHSA-pq6r-5hmw-hp3w | The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_edit_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. | [] | null | 4.3 | null | null |
|
GHSA-mc7m-6p9r-236f | An issue was discovered on Motorola C1 and M2 devices with firmware 1.01 and 1.07 respectively. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetSmartQoSSettings API function, as demonstrated by shell metacharacters in the smartqos_priority_devices field. | [] | null | null | 9.8 | null |
|
RHSA-2024:1662 | Red Hat Security Advisory: Red Hat build of Quarkus 3.2.11 release and security update | io.vertx/vertx-core: memory leak due to the use of Netty FastThreadLocal data structures in Vertx io.vertx:vertx-core: memory leak when a TCP server is configured with TLS and SNI support pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE quarkus: security checks for some inherited endpoints performed after serialization in RESTEasy Reactive may trigger a denial of service quarkus: information leak in annotation commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file commons-compress: OutOfMemoryError unpacking broken Pack200 file | [
"cpe:/a:redhat:quarkus:3.2::el8"
] | null | 5.5 | null | null |
CVE-2022-22987 | Advantech ADAM-3600 | The affected product has a hardcoded private key available inside the project folder, which may allow an attacker to achieve Web Server login and perform further actions. | [
"cpe:2.3:o:advantech:adam-3600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:advantech:adam-3600:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2023-5121 | The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings (the backup path parameter) in versions up to, and including, 0.9.89 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [
"cpe:2.3:a:wpvivid:migration\\,_backup\\,_staging:*:*:*:*:*:wordpress:*:*"
] | null | 4.4 | null | null |
|
GHSA-xhg6-xj8v-hx9v | Vulnerability in the Oracle iStore component of Oracle E-Business Suite (subcomponent: Merchant UI). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [] | null | null | 8.2 | null |
|
CVE-2018-5969 | Cross Site Request Forgery (CSRF) exists in Photography CMS 1.0 via clients/resources/ajax/ajax_new_admin.php, as demonstrated by adding an admin account. | [
"cpe:2.3:a:photography_cms_project:photography_cms:1.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2017-14315 | In Apple iOS 7 through 9, due to a BlueBorne flaw in the implementation of LEAP (Low Energy Audio Protocol), a large audio command can be sent to a targeted device and lead to a heap overflow with attacker-controlled data. Since the audio commands sent via LEAP are not properly validated, an attacker can use this overflow to gain full control of the device through the relatively high privileges of the Bluetooth stack in iOS. The attack bypasses Bluetooth access control; however, the default "Bluetooth On" value must be present in Settings. | [
"cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:9.3.5:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.9 |
|
GHSA-wjx4-3mmx-85jf | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | [] | null | null | null | null |
|
CVE-2010-0547 | client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string. | [
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.17:p1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.17:p2:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.17:p3:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.17:p4:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.17:p5:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p10:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p2:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p3:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p4:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p5:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p6:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p7:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:1.9.18:p8:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:2.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.27a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-x5gf-69xm-cjxm | Windows Standards-Based Storage Management Service Denial of Service Vulnerability | [] | null | 7.5 | null | null |
|
CVE-2007-0253 | Unspecified vulnerability in the grsecurity patch has unspecified impact and remote attack vectors, a different vulnerability than the expand_stack vulnerability from the Digital Armaments 20070110 pre-advisory. NOTE: the grsecurity developer has disputed this issue, stating that "the function they claim the vulnerability to be in is a trivial function, which can, and has been, easily checked for any supposed vulnerabilities." The developer also cites a past disclosure that was not proven | [
"cpe:2.3:a:grsecurity:grsecurity_kernel_patch:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2024-33950 | WordPress Archives Calendar Widget plugin <= 1.0.15 - Cross Site Scripting (XSS) vulnerability | Administrator Cross Site Scripting (XSS) in Archives Calendar Widget <= 1.0.15 versions. | [] | null | 5.9 | null | null |
GHSA-cc9w-f4c6-7c7r | An issue in almaodo GmbH appinventor.ai_google.almando_control 2.3.1 allows a remote attacker to obtain sensitive information via the firmware update process | [] | null | 7.5 | null | null |
|
CVE-2022-29797 | There is a buffer overflow vulnerability in CV81-WDM FW 01.70.49.29.46. Successful exploitation of this vulnerability may lead to privilege escalation. | [
"cpe:2.3:o:huawei:cv81-wdm_firmware:01.70.49.29.46:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cv81-wdm:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
GHSA-r62h-65cq-7gqr | Tenda AX12 V22.03.01.16_cn is vulnerable to command injection via goform/fast_setting_internet_set. | [] | null | 8.8 | null | null |
|
RHSA-2016:2819 | Red Hat Security Advisory: memcached security update | memcached: Server append/prepend remote code execution memcached: Server update remote code execution memcached: SASL authentication remote code execution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
GHSA-pmpr-vc5q-h3jw | Exposure of Resource to Wrong Sphere in valib | valib through 2.0.0 allows Internal Property Tampering. A maliciously crafted JavaScript object can bypass several inspection functions provided by valib. Valib uses a built-in function (hasOwnProperty) from the unsafe user-input to examine an object. It is possible for a crafted payload to overwrite this function to manipulate the inspection results to bypass security checks. | [] | null | 7.5 | null | null |
CVE-2023-44265 | WordPress Popup contact form Plugin <= 7.1 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Popup contact form plugin <= 7.1 versions. | [
"cpe:2.3:a:gopiplus:popup_contact_form:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
GHSA-q3j3-w37x-hq2q | Webcache Poisoning in symfony/http-kernel | DescriptionWhen a Symfony application is running behind a proxy or a load-balancer, you can tell Symfony to look for the `X-Forwarded-*` HTTP headers. HTTP headers that are not part of the "trusted_headers" allowed list are ignored and protect you from "Cache poisoning" attacks.In Symfony 5.2, we've added support for the `X-Forwarded-Prefix` header, but this header was accessible in sub-requests, even if it was not part of the "trusted_headers" allowed list. An attacker could leverage this opportunity to forge requests containing a `X-Forwarded-Prefix` HTTP header, leading to a web cache poisoning issue.ResolutionSymfony now ensures that the `X-Forwarded-Prefix` HTTP header is not forwarded to sub-requests when it is not trusted.The patch for this issue is available [here](https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487) for branch 5.3.CreditsWe would like to thank Soner Sayakci for reporting the issue and Jérémy Derussé for fixing the issue. | [] | null | 6.5 | null | null |
GHSA-h38r-5m65-j9vp | A BOLA vulnerability in POST /customers allows a low privileged user to create a low privileged user (customer) in the system. This results in unauthorized data manipulation. | [] | null | 5 | null | null |
|
CVE-2020-0699 | An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-0962. | [
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2018-17645 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the vAlign property of a TimeField. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6482. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
RHSA-2023:6842 | Red Hat Security Advisory: OpenShift Container Platform 4.12.43 bug fix and security update | OpenShift: modification of node role labels golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.5 | null | null |
CVE-2023-49817 | WordPress Flexible Woocommerce Checkout Field Editor plugin <= 2.0.1 - Broken Access Control vulnerability | Missing Authorization vulnerability in heoLixfy Flexible Woocommerce Checkout Field Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Flexible Woocommerce Checkout Field Editor: from n/a through 2.0.1. | [
"cpe:2.3:a:woocommerce:checkout_field_editor:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
CVE-2024-3564 | Content Blocks (Custom Post Widget) <= 3.3.0 - Authenticated (Contributor+) Local File Inclusion via Shortcode | The Content Blocks (Custom Post Widget) plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.3.0 via the plugin's 'content_block' shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. | [
"cpe:2.3:a:vanderwijk:content_blocks:0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2010-4702 | SQL injection vulnerability in JRadio (com_jradio) component before 1.5.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:fxwebdesign:com_jradio:*:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-48743 | net: amd-xgbe: Fix skb data length underflow | In the Linux kernel, the following vulnerability has been resolved:
net: amd-xgbe: Fix skb data length underflow
There will be BUG_ON() triggered in include/linux/skbuff.h leading to
intermittent kernel panic, when the skb length underflow is detected.
Fix this by dropping the packet if such length underflows are seen
because of inconsistencies in the hardware descriptors. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-j39f-xq2j-78rc | Green Packet DX-350 Firmware version v2.8.9.5-g1.4.8-atheeb has a default password of admin for the admin account. | [] | null | null | 9.8 | null |
|
CVE-2017-1000411 | OpenFlow Plugin and OpenDayLight Controller versions Nitrogen, Carbon, Boron, Robert Varga, Anil Vishnoi contain a flaw when multiple 'expired' flows take up the memory resource of CONFIG DATASTORE which leads to CONTROLLER shutdown. If multiple different flows with 'idle-timeout' and 'hard-timeout' are sent to the Openflow Plugin REST API, the expired flows will eventually crash the controller once its resource allocations set with the JVM size are exceeded. Although the installed flows (with timeout set) are removed from network (and thus also from controller's operations DS), the expired entries are still present in CONFIG DS. The attack can originate both from NORTH or SOUTH. The above description is for a north bound attack. A south bound attack can originate when an attacker attempts a flow flooding attack and since flows come with timeouts, the attack is not successful. However, the attacker will now be successful in CONTROLLER overflow attack (resource consumption). Although, the network (actual flow tables) and operational DS are only (~)1% occupied, the controller requests for resource consumption. This happens because the installed flows get removed from the network upon timeout. | [
"cpe:2.3:a:opendaylight:opendaylight:boron:*:*:*:*:*:*:*",
"cpe:2.3:a:opendaylight:opendaylight:carbon:*:*:*:*:*:*:*",
"cpe:2.3:a:opendaylight:opendaylight:nitrogen:*:*:*:*:*:*:*",
"cpe:2.3:a:opendaylight:openflow:boron:*:*:*:*:opendaylight:*:*",
"cpe:2.3:a:opendaylight:openflow:carbon:*:*:*:*:opendaylight:*:*",
"cpe:2.3:a:opendaylight:openflow:nitrogen:*:*:*:*:opendaylight:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2002-2212 | The DNS resolver in unspecified versions of Fujitsu UXP/V, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed responses, which increases the possibility of successfully spoofing a response in a way that is more efficient than brute force methods. | [
"cpe:2.3:a:isc:bind:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:4.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:4.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:4.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:4.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:4.9.5:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:4.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:4.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:4.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:4.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:p3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:p4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:p5:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:p6:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:p7:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.3.4:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:uxp_v:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-vphw-2w3h-qj8c | Windows BitLocker Information Disclosure Vulnerability | [] | null | 4.2 | null | null |
|
CVE-2015-7882 | Authentication bypass when using LDAP authentication in MongoDB Enterprise Server | Improper handling of LDAP authentication in MongoDB Server versions 3.0.0 to 3.0.6 allows an unauthenticated client to gain unauthorized access. | [
"cpe:2.3:a:mongodb:mongodb:*:*:*:*:enterprise:*:*:*"
] | null | null | 8.1 | null |
CVE-2020-7707 | Prototype Pollution | The package property-expr before 2.0.3 are vulnerable to Prototype Pollution via the setter function. | [
"cpe:2.3:a:property-expr_project:property-expr:*:*:*:*:*:node.js:*:*"
] | null | 9.8 | null | null |
GHSA-7qcx-jmrc-h2rr | Cross-Site Scripting in keystone | Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize user input on the `Contact Us` page, allowing attackers to submit contact forms with malicious JavaScript in the message field. The output is not properly encoded leading an admin that opens new inquiry to execute the arbitrary JavaScript supplied in their browser.RecommendationUpdate to version 4.0.0 or later. | [] | null | null | 6.1 | null |
CVE-2010-1644 | Multiple cross-site scripting (XSS) vulnerabilities in Cacti before 0.8.7f, as used in Red Hat High Performance Computing (HPC) Solution and other products, allow remote attackers to inject arbitrary web script or HTML via the (1) hostname or (2) description parameter to host.php, or (3) the host_id parameter to data_sources.php. | [
"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.5:-:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.6.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6a:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6b:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6c:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6d:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6f:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6g:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6h:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6i:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6k:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-479c-fx42-r8p8 | Vulnerability in screen before 3.9.10, related to a multi-attach error, allows local users to gain root privileges when there is a subdirectory under /tmp/screens/. | [] | null | null | null | null |
|
CVE-2024-26146 | Possible Denial of Service Vulnerability in Rack Header Parsing | Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1. | [
"cpe:2.3:a:rack_project:rack:2.2.0:*:*:*:*:ruby:*:*",
"cpe:2.3:a:rack_project:rack:2.1.0:*:*:*:*:ruby:*:*",
"cpe:2.3:a:rack_project:rack:3.0.0:-:*:*:*:ruby:*:*",
"cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*"
] | null | 5.3 | null | null |
CVE-2023-4802 | ITM Server Cross-site Scripting in UpdateInstalledSoftware Endpoint | A reflected cross-site scripting vulnerability in the UpdateInstalledSoftware endpoint of the Insider Threat Management (ITM) Server's web console could be used by an authenticated administrator to run arbitrary javascript within another web console administrator's browser. All versions prior to 7.14.3.69 are affected. | [
"cpe:2.3:a:proofpoint:insider_threat_management:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
GHSA-p5qx-gv99-2q5m | The FL3R FeelBox WordPress plugin through 8.1 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack | [] | null | 6.1 | null | null |
|
CVE-2013-6484 | The STUN protocol implementation in libpurple in Pidgin before 2.10.8 allows remote STUN servers to cause a denial of service (out-of-bounds write operation and application crash) by triggering a socket read error. | [
"cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-0958 | Several plugins for WordPress by Inisev are vulnerable to unauthorized installation of plugins due to a missing capability check on the handle_installation function that is called via the inisev_installation AJAX aciton in various versions. This makes it possible for authenticated attackers with minimal permissions, such as subscribers, to install select plugins from Inisev on vulnerable sites. CVE-2023-38514 appears to be a duplicate of this vulnerability. | [
"cpe:2.3:a:backupbliss:backup_migration:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:backupbliss:clone:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:copy-delete-posts:duplicate_post:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:inisev:redirection:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:inisev:rss_redirect_\\&_feedburner_alternative:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:inisev:ssl_mixed_content_fix:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:mypopups:pop-up:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:socialshare:social_share_icons_\\&_social_share_buttons:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:themecheck:enhanced_text_widget:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:themecheck:ultimate_posts_widget:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:ultimatelysocial:social_media_share_buttons_\\&_social_sharing_icons:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
|
CVE-2008-6734 | Directory traversal vulnerability in Public/index.php in Keller Web Admin CMS 0.94 Pro allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter. | [
"cpe:2.3:a:keller_web_admin:kwa:0.94:*:pro:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2017-5876 | XSS was discovered in dotCMS 3.7.0, with an unauthenticated attack against the /news-events/events date parameter. | [
"cpe:2.3:a:dotcms:dotcms:3.7.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-q96m-53g6-x5c4 | SAP Customer Data Cloud (Gigya mobile app for Android) - version 7.4, uses insecure random number generator program which makes it easy for the attacker to predict future random numbers. This can lead to information disclosure and modification of certain user settings. | [] | null | 5.2 | null | null |
|
RHSA-2023:3557 | Red Hat Security Advisory: openshift-gitops-kam security update | go-restful: Authorization Bypass Through User-Controlled Key | [
"cpe:/a:redhat:openshift_gitops:1.9::el9"
] | null | 9.1 | null | null |
GHSA-2qvf-62mv-jxmq | The Thumbnail carousel slider plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
|
RHSA-2023:6190 | Red Hat Security Advisory: firefox security update | libvpx: crash related to VP9 encoding in libvpx | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
GHSA-j72h-72jr-j8pr | Dell PowerProtect Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contain an weak cryptographic algorithm vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to man-in-the-middle attack that exposes sensitive session information. | [] | null | 5.9 | null | null |
|
CVE-2024-43661 | Buffer overflow in <redacted>.so leads to DoS of OCPP service | The <redacted>.so library, which is used by <redacted>, is
vulnerable to a buffer overflow in the code that handles the deletion
of certificates. This buffer overflow can be triggered by providing a
long file path to the <redacted> action of the <redacted>.exe CGI binary or
to the <redacted>.sh CGI script. This binary or script will write this
file path to <redacted>, which is then
read by <redacted>.so
This issue affects Iocharger firmware for AC models before version 24120701.
Likelihood: Moderate – An attacker will have to find this exploit by
either obtaining the binaries involved in this vulnerability, or by trial
and error. Furthermore, the attacker will need a (low privilege)
account to gain access to the <redacted>.exe CGI binary or <redacted>.sh
script to trigger the vulnerability, or convince a user with such access
send an HTTP request that triggers it.
Impact: High – The <redacted> process, which we assume is
responsible for OCPP communication, will keep crashing after
performing the exploit. This happens because the buffer overflow
causes the process to segfault before
<redacted> is removed. This means that,
even though <redacted> is automatically restarted, it will crash
again as soon as it tries to parse the text file.
CVSS clarification. The attack can be executed over any network connection the station is listening to and serves the web interface (AV:N), and there are no additional security measure sin place that need to be circumvented (AC:L), the attack does not rely on preconditions (AT:N). The attack does require authentication, but the level of authentication is irrelevant (PR:L), it does not require user interaction (UI:N). The attack leads to reducred availability of the device (VC:N/VI:N/VA:H). THere is not impact on subsequent systems. (SC:N/SI:N/SA:N). Alltough this device is an EV charger handing significant amounts of power, we do not forsee a safety impact. The attack can be automated (AU:Y). Because the DoS condition is written to disk persistantly, it cannot be recovered by the user (R:I). | [] | 7.1 | null | null | null |
GHSA-6cr9-7cfm-4prq | PHP remote file inclusion vulnerability in footer.inc.php in B1G b1gBB 2.24 allows remote attackers to execute arbitrary PHP code via a URL in the tfooter parameter. | [] | null | null | null | null |
|
CVE-2020-4483 | IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 181857. | [
"cpe:2.3:a:ibm:urbancode_deploy:6.2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:7.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:7.0.4.0:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
GHSA-7w39-2c97-4p7p | Unspecified vulnerability in the Oracle FLEXCUBE Universal Banking component in Oracle Financial Services Software 10.0.0 through 10.5.0 and 11.0.0 through 11.4.0 allows remote authenticated users to affect integrity via unknown vectors related to Core, a different vulnerability than CVE-2012-0544. | [] | null | null | null | null |
|
GHSA-wxcf-phrh-824f | liguidsoap.py in liguidsoap 0.3.8.1+2 allows local users to overwrite arbitrary files via a symlink attack on (1) /tmp/liguidsoap.liq, (2) /tmp/lig.#####.log, and (3) /tmp/emission.ogg temporary files. | [] | null | null | null | null |
|
RHSA-2024:2577 | Red Hat Security Advisory: shadow-utils security update | shadow-utils: possible password leak during passwd(1) change | [
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 4.7 | null | null |
CVE-2018-19532 | A NULL pointer dereference vulnerability exists in the function PdfTranslator::setTarget() in pdftranslator.cpp of PoDoFo 0.9.6, while creating the PdfXObject, as demonstrated by podofoimpose. It allows an attacker to cause Denial of Service. | [
"cpe:2.3:a:podofo_project:podofo:0.9.6:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2024-35286 | A vulnerability in NuPoint Messenger (NPM) of Mitel MiCollab through 9.8.0.33 allows an unauthenticated attacker to conduct a SQL injection attack due to insufficient sanitization of user input. A successful exploit could allow an attacker to access sensitive information and execute arbitrary database and management operations. | [
"cpe:2.3:a:mitel:micollab:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2024-25091 | Protection mechanism failure issue exists in RevoWorks SCVX prior to scvimage4.10.21_1013 (when using 'VirusChecker' or 'ThreatChecker' feature) and RevoWorks Browser prior to 2.2.95 (when using 'VirusChecker' or 'ThreatChecker' feature). If data containing malware is saved in a specific file format (eml, dmg, vhd, iso, msi), malware may be taken outside the sandboxed environment. | [
"cpe:2.3:a:jscom:revoworks_scvx:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jscom:revoworks_browser:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
|
CVE-2016-9643 | The regex code in Webkit 2.4.11 allows remote attackers to cause a denial of service (memory consumption) as demonstrated in a large number of ($ (open parenthesis and dollar) followed by {-2,16} and a large number of +) (plus close parenthesis). | [
"cpe:2.3:a:webkit:webkit:2.4.11:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-8gpj-8888-5722 | script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command. | [] | null | 5.5 | null | null |
|
CVE-2019-15492 | openITCOCKPIT before 3.7.1 has reflected XSS, aka RVID 3-445b21. | [
"cpe:2.3:a:it-novum:openitcockpit:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
RHSA-2022:0513 | Red Hat Security Advisory: firefox security update | Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
CVE-2024-22817 | FlyCms v1.0 contains a Cross-Site Request Forgery (CSRF) vulnerability via /system/email/email_conf_updagte | [
"cpe:2.3:a:flycms_project:flycms:1.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2020-0756 | An information disclosure vulnerability exists in the Cryptography Next Generation (CNG) service when it fails to properly handle objects in memory.To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.The security update addresses the vulnerability by correcting how the service handles objects in memory., aka 'Windows Key Isolation Service Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-0675, CVE-2020-0676, CVE-2020-0677, CVE-2020-0748, CVE-2020-0755. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2014-3791 | Stack-based buffer overflow in Easy File Sharing (EFS) Web Server 6.8 allows remote attackers to execute arbitrary code via a long string in a cookie UserID parameter to vfolder.ghp. | [
"cpe:2.3:a:efssoft:easy_file_sharing_web_server:6.8:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2020-26267 | Lack of validation in data format attributes in TensorFlow | In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not validate the src_format and dst_format attributes. The code assumes that these two arguments define a permutation of NHWC. This can result in uninitialized memory accesses, read outside of bounds and even crashes. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
CVE-2022-28264 | Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability | Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] | null | 5.5 | null | null |
CVE-2024-24820 | Icinga Director configuration is susceptible to Cross-Site Request Forgery | Icinga Director is a tool designed to make Icinga 2 configuration handling easy. Not any of Icinga Director's configuration forms used to manipulate the monitoring environment are protected against cross site request forgery (CSRF). It enables attackers to perform changes in the monitoring environment managed by Icinga Director without the awareness of the victim. Users of the map module in version 1.x, should immediately upgrade to v2.0. The mentioned XSS vulnerabilities in Icinga Web are already fixed as well and upgrades to the most recent release of the 2.9, 2.10 or 2.11 branch must be performed if not done yet. Any later major release is also suitable. Icinga Director will receive minor updates to the 1.8, 1.9, 1.10 and 1.11 branches to remedy this issue. Upgrade immediately to a patched release. If that is not feasible, disable the director module for the time being. | [
"cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*"
] | null | 8.3 | null | null |
CVE-2024-24911 | Out of Bounds read in the CPCA process on Check Point Management Server | In rare scenarios, the cpca process on the Security Management Server / Domain Management Server may exit unexpectedly, creating a core dump file. When the cpca process is down, VPN and SIC connectivity issues may occur if the CRL is not present in the Security Gateway's CRL cache. | [] | null | 5.3 | null | null |
CVE-2012-5807 | The Authorize.Net eCheck module in Zen Cart does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | [
"cpe:2.3:a:lincolnloop:authorize.net_echeck_module:-:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:-:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
CVE-2014-8890 | IBM WebSphere Application Server Liberty Profile 8.5.x before 8.5.5.4 allows remote attackers to gain privileges by leveraging the combination of a servlet's deployment descriptor security constraints and ServletSecurity annotations. | [
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.3:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
GHSA-xpmg-6c76-v9cq | Path traversal vulnerability exists in CAMS for HIS Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00. | [] | null | 8.8 | null | null |
|
CVE-2025-31778 | WordPress Donate Me Plugin <= 1.2.5 - Stored Cross-Site Scripting vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in raphaelheide Donate Me allows Reflected XSS. This issue affects Donate Me: from n/a through 1.2.5. | [] | null | 6.5 | null | null |
GHSA-qj4w-733c-vfv3 | Array index error in Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Mac OS X allows attackers to execute arbitrary code via unspecified vectors. | [] | null | null | null | null |
|
GHSA-8jqq-8mp9-6r8w | GoPro gpmf-parser 1.5 has a division-by-zero vulnerability in GPMF_ScaledData(). Parsing malicious input can result in a crash. | [] | null | null | null | null |
|
CVE-2016-2422 | Wi-Fi in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 does not prevent use of a Wi-Fi CA certificate in an unrelated CA role, which allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 26324357. | [
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-cx55-6qpj-fmjq | Unspecified vulnerability in the Hyperion Enterprise Performance Management Architect component in Oracle Hyperion 11.1.2.2 and 11.1.2.3 allows local users to affect integrity and availability via unknown vectors related to Data Synchronizer. | [] | null | null | null | null |
|
CVE-2008-6581 | login.php in PhpAddEdit 1.3 allows remote attackers to bypass authentication and gain administrative access by setting the addedit cookie parameter. | [
"cpe:2.3:a:phpaddedit:phpaddedit:1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-p9rf-jg9f-2chc | An issue was discovered in NRadio N8-180 NROS-1.9.2.n3.c5 devices. The /cgi-bin/luci/nradio/basic/radio endpoint is vulnerable to XSS via the 2.4 GHz and 5 GHz name parameters, allowing an attacker to execute JavaScript within the context of the current user by injecting JavaScript into the SSID field. If an administrator logs into the device, the injected script runs in their browser, executing the malicious payload. | [] | null | 6.1 | null | null |
|
CVE-2009-0437 | The Installation Factory installation process for IBM WebSphere Application Server (WAS) 6.0.2 on Windows, when WAS is registered as a Windows service, allows local users to obtain sensitive information by reading the logs/instconfigifwas6.log log file. | [
"cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 1.9 |
|
CVE-1999-0954 | WWWBoard has a default username and default password. | [
"cpe:2.3:a:matt_wright:wwwboard:2.0_alpha_2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2010:0162 | Red Hat Security Advisory: openssl security update | openssl: missing bn_wexpand return value checks TLS: MITM attacks via session renegotiation openssl: crash caused by a missing krb5_sname_to_principal() return value check | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2024-7082 | easy-table-of-contents < 2.0.68 - Editor+ Stored XSS | The Easy Table of Contents WordPress plugin before 2.0.68 does not sanitise and escape some parameters, which could allow users with a role as low as Editor to perform Cross-Site Scripting attacks. | [] | null | 6.1 | null | null |
GHSA-4xrm-6vq2-f7mq | Missing Authorization vulnerability in Saul Morales Pacheco Banner System allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Banner System: from n/a through 1.0.0. | [] | null | 8.2 | null | null |
|
CVE-2023-1452 | GPAC load_text.c buffer overflow | A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability. | [
"cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*"
] | null | 5.3 | 5.3 | 4.3 |
CVE-2023-21961 | Vulnerability in the Oracle Hyperion Essbase Administration Services product of Oracle Essbase (component: EAS Administration and EAS Console). The supported version that is affected is 21.4.3.0.0. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Hyperion Essbase Administration Services executes to compromise Oracle Hyperion Essbase Administration Services. While the vulnerability is in Oracle Hyperion Essbase Administration Services, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hyperion Essbase Administration Services accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:hyperion_essbase_administration_services:21.4.3.0.0:*:*:*:*:*:*:*"
] | null | 6 | null | null |
|
CVE-2022-29682 | CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/vod/admin/topic/del. | [
"cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 |
|
CVE-2020-28395 | A vulnerability has been identified in SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.0). Devices do not create a new unique private key after factory reset. An attacker could leverage this situation to a man-in-the-middle situation and decrypt previously captured traffic. | [
"cpe:2.3:o:siemens:scalance_xr324-12m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-12m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-12m_ts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-12m_ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-4m_eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-4m_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-4m_poe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-4m_poe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-4m_poe_ts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-4m_poe_ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324wg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324wg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr326-2c_poe_wg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr326-2c_poe_wg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr328-4c_wg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr328-4c_wg:-:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 |
|
CVE-2023-24904 | Windows Installer Elevation of Privilege Vulnerability | Windows Installer Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"
] | null | 7.1 | null | null |
CVE-2013-2582 | CRLF injection vulnerability in the redirect servlet in Open-Xchange AppSuite and Server before 6.22.0 rev15, 6.22.1 before rev17, 7.0.1 before rev6, and 7.0.2 before rev7 allows remote attackers to inject arbitrary HTTP headers and conduct open redirect attacks by leveraging improper sanitization of whitespace characters. | [
"cpe:2.3:a:open-xchange:open-xchange_appsuite:6.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:6.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_server:6.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_server:6.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_server:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_server:7.0.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2025-27584 | A stored cross-site scripting (XSS) vulnerability in Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the First Name parameter at /rest/staffResource/update. | [] | null | 5.4 | null | null |
|
CVE-2024-22862 | Integer overflow vulnerability in FFmpeg before n6.1, allows remote attackers to execute arbitrary code via the JJPEG XL Parser. | [
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
RHSA-2018:2884 | Red Hat Security Advisory: firefox security update | Mozilla: type confusion in JavaScript Mozilla: stack out-of-bounds read in Array.prototype.push | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2024:0278 | Red Hat Security Advisory: Red Hat AMQ Broker 7.11.5 release and security update | bouncycastle: potential blind LDAP injection attack using a self-signed certificate | [
"cpe:/a:redhat:amq_broker:7.11"
] | null | 5.3 | null | null |
CVE-2007-1511 | Buffer overflow in FrontBase Relational Database Server 4.2.7 and earlier allows remote authenticated users, with privileges for creating a stored procedure, to execute arbitrary code via a CREATE PROCEDURE request with a long procedure name. | [
"cpe:2.3:a:frontbase:relational_database_server:*:*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
GHSA-p489-7cmg-j3gv | In checkDebuggingDisallowed of DeviceVersionFragment.java, there is a possible way to access adb before SUW completion due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 7.8 | null | null |
|
CVE-2024-27047 | net: phy: fix phy_get_internal_delay accessing an empty array | In the Linux kernel, the following vulnerability has been resolved:
net: phy: fix phy_get_internal_delay accessing an empty array
The phy_get_internal_delay function could try to access to an empty
array in the case that the driver is calling phy_get_internal_delay
without defining delay_values and rx-internal-delay-ps or
tx-internal-delay-ps is defined to 0 in the device-tree.
This will lead to "unable to handle kernel NULL pointer dereference at
virtual address 0". To avoid this kernel oops, the test should be delay
>= 0. As there is already delay < 0 test just before, the test could
only be size == 0. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2015-8688 | Gajim before 0.16.5 allows remote attackers to modify the roster and intercept messages via a crafted roster-push IQ stanza. | [
"cpe:2.3:a:gajim:gajim:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 5.8 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.