id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2012-0191 | The web container in IBM Lotus Expeditor 6.1.x and 6.2.x before 6.2 FP5+Security Pack does not properly perform access control for requests, which allows remote attackers to spoof a localhost request origin via crafted headers. | [
"cpe:2.3:a:ibm:lotus_expeditor:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_expeditor:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_expeditor:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_expeditor:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_expeditor:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_expeditor:6.2.3:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-3g4h-66cq-c8vg | The application Faronics WINSelect (Standard + Enterprise) saves its configuration in an encrypted file on the file system which "Everyone" has read and write access to, path to file:C:\ProgramData\WINSelect\WINSelect.wsdThe path for the affected WINSelect Enterprise configuration file is:C:\ProgramData\Faronics\StorageSpace\WS\WINSelect.wsd | []
| null | 7.7 | null | null |
|
CVE-2005-2966 | The Python SVG import plugin (diasvg_import.py) for DIA 0.94 and earlier allows user-assisted attackers to execute arbitrary commands via a crafted SVG file. | [
"cpe:2.3:a:dia:dia:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dia:dia:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:dia:dia:0.92.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dia:dia:0.93:*:*:*:*:*:*:*"
]
| null | null | null | 5.1 |
|
GHSA-rw8v-g4fm-gw3v | In the Linux kernel, the following vulnerability has been resolved:NFSD: Prevent a potential integer overflowIf the tag length is >= U32_MAX - 3 then the "length + 4" addition
can result in an integer overflow. Address this by splitting the
decoding into several steps so that decode_cb_compound4res() does
not have to perform arithmetic on the unsafe length value. | []
| null | 5.5 | null | null |
|
GHSA-93gh-j29f-4h3w | The Service configuration-2 function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. | []
| null | null | null | null |
|
cisco-sa-20190327-evss | Cisco IOS XE Software Catalyst 4500 Cisco Discovery Protocol Denial of Service Vulnerability | A vulnerability in the Easy Virtual Switching System (VSS) of Cisco IOS XE Software on Catalyst 4500 Series Switches could allow an unauthenticated, adjacent attacker to cause the switches to reload.
The vulnerability is due to incomplete error handling when processing Cisco Discovery Protocol (CDP) packets used with the Easy Virtual Switching System. An attacker could exploit this vulnerability by sending a specially crafted CDP packet. An exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-evss ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-evss"]
This advisory is part of the March 27, 2019, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 17 Cisco Security Advisories that describe 19 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-71135"]. | []
| null | null | 7.4 | null |
CVE-2022-46914 | An issue in the firmware update process of TP-LINK TL-WA801N / TL-WA801ND V1 v3.12.16 and earlier allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image. | [
"cpe:2.3:o:tp-link:tl-wa801n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wa801n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-wa801nd_v1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wa801nd_v1:-:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-cg44-83gm-9c7j | IBM Security Guardium 10.0 is vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning, cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 124737. | []
| null | null | 6.1 | null |
|
CVE-2022-1594 | HC Custom WP-Admin URL <= 1.4 - Arbitrary Settings Update via CSRF | The HC Custom WP-Admin URL WordPress plugin through 1.4 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack, allowing them to change the login URL | [
"cpe:2.3:a:hc_custom_wp-admin_url_project:hc_custom_wp-admin_url:*:*:*:*:*:wordpress:*:*"
]
| null | 4.3 | null | 4.3 |
CVE-2017-17412 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of GET method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute arbitrary code in the context of the underlying database. Was ZDI-CAN-4223. | [
"cpe:2.3:a:quest:netvault_backup:11.3.0.12:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
CVE-2008-5655 | Multiple SQL injection vulnerabilities in MyioSoft EasyBookMarker 4.0 allow remote attackers to execute arbitrary SQL commands via the (1) delete_folder and (2) delete_link parameters to unspecified vectors, possibly to (a) plugins/bookmarker/bookmarker_backend.php or (b) ajaxp.php, different vectors than CVE-2008-5654. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:myiosoft:easybookmarker:4.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-jqcf-frh4-x2vj | In adreno_set_param of adreno_gpu.c, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-265016072References: Upstream kernel | []
| null | 7.8 | null | null |
|
GHSA-2cf3-8v44-39fh | An Improper Access Control could allow a malicious actor authenticated in the API to enable Android Debug Bridge (ADB) and make unsupported changes to the system.Affected Products:UniFi Connect EV Station (Version 1.1.18 and earlier)UniFi Connect EV Station Pro (Version 1.1.18 and earlier)UniFi Access G2 Reader Pro (Version 1.2.172 and earlier)UniFi Access Reader Pro (Version 2.7.238 and earlier)UniFi Access Intercom (Version 1.0.66 and earlier)UniFi Access Intercom Viewer (Version 1.0.5 and earlier)UniFi Connect Display (Version 1.9.324 and earlier)UniFi Connect Display Cast (Version 1.6.225 and earlier)Mitigation:Update UniFi Connect Application to Version 3.10.7 or later.Update UniFi Connect EV Station to Version 1.2.15 or later.Update UniFi Connect EV Station Pro to Version 1.2.15 or later.Update UniFi Access G2 Reader Pro Version 1.3.37 or later.Update UniFi Access Reader Pro Version 2.8.19 or later.Update UniFi Access Intercom Version 1.1.32 or later.Update UniFi Access Intercom Viewer Version 1.1.6 or later.Update UniFi Connect Display to Version 1.11.348 or later.Update UniFi Connect Display Cast to Version 1.8.255 or later. | []
| null | null | 2.2 | null |
|
CVE-2022-43406 | A sandbox bypass vulnerability in Jenkins Pipeline: Deprecated Groovy Libraries Plugin 583.vf3b_454e43966 and earlier allows attackers with permission to define untrusted Pipeline libraries and to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. | [
"cpe:2.3:a:jenkins:groovy_libraries:*:*:*:*:*:jenkins:*:*"
]
| null | 9.9 | null | null |
|
CVE-2014-2968 | Cross-site scripting (XSS) vulnerability in the web interface on the Huawei E355 CH1E355SM modem with software 21.157.37.01.910 and Web UI 11.001.08.00.03 allows remote attackers to inject arbitrary web script or HTML via an SMS message. | [
"cpe:2.3:a:huawei:e355_web_ui:11.001.08.00.03:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:e355_firmware:21.157.37.01.910:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:e355:ch1e355sm:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2017-3652 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
]
| null | null | 4.2 | 4.9 |
|
CVE-2021-4107 | Cross-site Scripting (XSS) - Reflected in yetiforcecompany/yetiforcecrm | yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [
"cpe:2.3:a:yetiforce:yetiforce_customer_relationship_management:*:*:*:*:*:*:*:*"
]
| null | null | 5.3 | null |
GHSA-j6cm-xq5x-cjv3 | Unspecified vulnerability in in.named in Solaris 9 allows attackers to cause a denial of service via unknown manipulations that cause in.named to "make unnecessary queries." | []
| null | null | null | null |
|
CVE-2025-3228 | Unauthorized Guest user access to Playbook | Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to properly retrieve requestorInfo from playbooks handler for guest users which allows an attacker access to the playbook run. | []
| null | 4.3 | null | null |
CVE-2023-38492 | Kirby vulnerable to denial of service from unlimited password lengths | Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). The real-world impact of this vulnerability is limited, however we still recommend to update to one of the patch releases because they also fix more severe vulnerabilities.
Kirby's authentication endpoint did not limit the password length. This allowed attackers to provide a password with a length up to the server's maximum request body length. Validating that password against the user's actual password requires hashing the provided password, which requires more CPU and memory resources (and therefore processing time) the longer the provided password gets. This could be abused by an attacker to cause the website to become unresponsive or unavailable. Because Kirby comes with a built-in brute force protection, the impact of this vulnerability is limited to 10 failed logins from each IP address and 10 failed logins for each existing user per hour.
The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have added password length limits in the affected code so that passwords longer than 1000 bytes are immediately blocked, both when setting a password and when logging in. | [
"cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
GHSA-97j4-jf77-v37p | Heap-based buffer overflow in the wordwrap function in PHP after 4.1.2 and before 4.3.0 may allow attackers to cause a denial of service or execute arbitrary code. | []
| null | null | null | null |
|
CVE-2022-35963 | `CHECK` failures in `FractionalAvgPoolGrad` in TensorFlow | TensorFlow is an open source platform for machine learning. The implementation of `FractionalAvgPoolGrad` does not fully validate the input `orig_input_tensor_shape`. This results in an overflow that results in a `CHECK` failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 03a659d7be9a1154fdf5eeac221e5950fec07dad. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*"
]
| null | 5.9 | null | null |
GHSA-cpw3-947f-46cc | Microsoft SharePoint Server 2010 SP1 and SP2 and 2013, and Office Web Apps 2013, allows remote attackers to execute arbitrary code via crafted page content, aka "SharePoint Page Content Vulnerabilities." | []
| null | null | null | null |
|
CVE-2007-3502 | Unspecified vulnerability in the web-based product configuration system in Kaspersky Anti-Spam before 3.0 MP1 allows remote attackers to obtain access to certain directories. | [
"cpe:2.3:a:kaspersky_lab:kaspersky_anti-spam:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-6cpp-547f-8pvw | Multiple cross-site scripting (XSS) vulnerabilities in SoftCart.exe in SoftCart 5.1.2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) License_Plate, (2) License_State, (3) Ticket_Date, and (4) Ticket_Number parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
| null | null | null | null |
|
GHSA-3px9-vgqj-48v9 | Missing Authorization vulnerability in WPDeveloper BetterLinks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects BetterLinks: from n/a through 1.6.0. | []
| null | 7.3 | null | null |
|
RHSA-2020:3911 | Red Hat Security Advisory: python security update | python: XSS vulnerability in the documentation XML-RPC server in server_title field | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 6.1 | null | null |
CVE-2023-21937 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N). | [
"cpe:2.3:a:oracle:graalvm:20.3.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:21.3.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:22.3.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update361:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:17.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:20:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update361:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:17.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:20:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:brocade_san_navigator:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update322:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update332:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update342:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update352:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update362:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:20:*:*:*:*:*:*:*"
]
| null | 3.7 | null | null |
|
CVE-2000-0613 | Cisco Secure PIX Firewall does not properly identify forged TCP Reset (RST) packets, which allows remote attackers to force the firewall to close legitimate connections. | [
"cpe:2.3:a:cisco:pix_firewall:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2006-7159 | Directory traversal vulnerability in include/prune_torrents.php in BTI-Tracker 1.3.2 (aka btitracker) allows remote attackers to delete arbitrary files via ".." sequences in the TORRENTSDIR parameter in a prune action. | [
"cpe:2.3:a:bti-tracker:bti-tracker:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:btitracker:btitracker:1.3.2:*:*:*:*:*:*:*"
]
| null | null | null | 6.4 |
|
RHSA-2024:1468 | Red Hat Security Advisory: go-toolset-1.19-golang security update | golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads | [
"cpe:/a:redhat:devtools:2023::el7"
]
| null | 7.5 | null | null |
GHSA-gh6q-hg4q-mm5j | The WP Mail Log WordPress plugin before 1.1.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Contributor. | []
| null | 8.8 | null | null |
|
GHSA-5c48-7h6p-5x58 | Dell Enterprise SONiC OS, 3.5.3, 4.0.0, 4.0.1, 4.0.2, contains an "Uncontrolled Resource Consumption vulnerability" in authentication component. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to uncontrolled resource consumption by creating permanent home directories for unauthenticated users. | []
| null | 7.5 | null | null |
|
GHSA-vm94-m3xr-gvj8 | The Awesome Contact Form7 for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'AEP Contact Form 7' widget in all versions up to, and including, 2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
|
GHSA-wv2h-fph6-hx6j | The contact-form-plugin plugin before 3.96 for WordPress has XSS. | []
| null | null | 6.1 | null |
|
CVE-2010-3926 | Multiple cross-site scripting (XSS) vulnerabilities in Shop.cgi in SGX-SP Final before 11.00 and SGX-SP Final NE before 11.00 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:wb-i:sgx-sp_final:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wb-i:sgx-sp_final_ne:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-q3cc-722m-mfc6 | Dell vApp Manager, versions prior to 9.2.4.x contain an information disclosure vulnerability. A remote attacker could potentially exploit this vulnerability leading to obtain sensitive information that may aid in further attacks. | []
| null | 7.5 | null | null |
|
GHSA-75cj-f663-h7fv | Cross-site request forgery (CSRF) vulnerability in core/ajax/appconfig.php in ownCloud before 4.0.7 allows remote attackers to hijack the authentication of administrators for requests that edit the app configurations. | []
| null | null | null | null |
|
CVE-2013-4451 | gitolite commit fa06a34 through 3.5.3 might allow attackers to have unspecified impact via vectors involving world-writable permissions when creating (1) ~/.gitolite.rc, (2) ~/.gitolite, or (3) ~/repositories/gitolite-admin.git on fresh installs. | [
"cpe:2.3:a:gitolite:gitolite:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
RHSA-2015:1206 | Red Hat Security Advisory: openstack-cinder security and bug fix update | openstack-cinder: Host file disclosure through qcow2 backing file | [
"cpe:/a:redhat:openstack:5::el6",
"cpe:/a:redhat:openstack:5::el7",
"cpe:/a:redhat:openstack:6::el7"
]
| null | null | null | null |
CVE-2022-1310 | Use after free in regular expressions in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
CVE-2025-5895 | Metabase dom.js parseDataUri redos | A vulnerability was found in Metabase 54.10. It has been classified as problematic. This affects the function parseDataUri of the file frontend/src/metabase/lib/dom.js. The manipulation leads to inefficient regular expression complexity. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The patch is named 4454ebbdc7719016bf80ca0f34859ce5cee9f6b0. It is recommended to apply a patch to fix this issue. | []
| 5.3 | 4.3 | 4.3 | 4 |
CVE-2021-3243 | Wfilter ICF 5.0.117 contains a cross-site scripting (XSS) vulnerability. An attacker in the same LAN can craft a packet with a malicious User-Agent header to inject a payload in its logs, where an attacker can take over the system by through its plugin-running function. | [
"cpe:2.3:a:wfiltericf:wfilter_internet_content_filter:5.0.117:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2024-4894 | ITPison OMICARD EDM - Server-Side Request Forgery | ITPison OMICARD EDM fails to properly filter specific URL parameter, allowing unauthenticated remote attackers to modify the parameters and conduct Server-Side Request Forgery (SSRF) attacks. This vulnerability enables attackers to probe internal network information. | [
"cpe:2.3:a:itpison:omicard_edm:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
GHSA-vgfh-ppxh-3g5c | BSD pppd allows local users to change the permissions of arbitrary files via a symlink attack on a file that is specified as a tty device. | []
| null | null | null | null |
|
CVE-2022-36866 | Improper access control vulnerability in Broadcaster in Group Sharing prior to versions 13.0.6.15 in Android S(12), 13.0.6.14 in Android R(11) and below allows attackers to identify the device. | [
"cpe:2.3:a:samsung:group_sharing:*:*:*:*:*:android:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
]
| null | 4 | null | null |
|
CVE-2023-27376 | Missing Authentication In IDAttend’s IDWeb Application | Missing authentication in the StudentPopupDetails_StudentDetails method in IDAttend’s IDWeb application 3.1.052 and earlier allows extraction of sensitive student data by unauthenticated attackers. | [
"cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
CVE-2017-5112 | Heap buffer overflow in WebGL in Google Chrome prior to 61.0.3163.79 for Windows allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
CVE-2007-5815 | Absolute path traversal vulnerability in the WebCacheCleaner ActiveX control 1.3.0.3 in SonicWall SSL-VPN 200 before 2.1, and SSL-VPN 2000/4000 before 2.5, allows remote attackers to delete arbitrary files via a full pathname in the argument to the FileDelete method. | [
"cpe:2.3:a:sonicwall:ssl_vpn_200:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sonicwall:ssl_vpn2000\\/4000:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-g73p-9p76-7wm8 | An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability [CWE-22] in FortiVoiceEntreprise version 7.0.0 and before 6.4.7 allows an authenticated attacker to read arbitrary files from the system via sending crafted HTTP or HTTPS requests | []
| null | 6.5 | null | null |
|
ICSA-19-134-05 | ICSA-19-134-05 Siemens SINAMICS PERFECT HARMONY GH180 Drives NXG I and NXG II | A denial of service vulnerability exists in the affected products. The vulnerability could be exploited by an attacker with network access to the device. Successful exploitation requires no privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known. | []
| null | null | 7.5 | null |
RHSA-2024:8315 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.9.8 | net/http: Denial of service due to improper 100-continue handling in net/http go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:logging:5.9::el9"
]
| null | 5.9 | null | null |
GHSA-v6qf-ph27-h56h | PHP remote file inclusion vulnerability in include/class_yapbbcooker.php in YapBB 1.2.Beta 2 allows remote attackers to execute arbitrary PHP code via a URL in the cfgIncludeDirectory parameter. | []
| null | null | null | null |
|
CVE-2017-8401 | In SWFTools 0.9.2, an out-of-bounds read of heap data can occur in the function png_load() in lib/png.c:724. This issue can be triggered by a malformed PNG file that is mishandled by png2swf. Attackers could exploit this issue for DoS. | [
"cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4.3 |
|
RHSA-2004:073 | Red Hat Security Advisory: metamail security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
]
| null | null | null | null |
CVE-2022-45478 | Telepad allows an attacker (in a man-in-the-middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N | [
"cpe:2.3:a:telepad-app:telepad:*:*:*:*:*:*:*:*"
]
| null | 5.1 | null | null |
|
GHSA-796c-4hrx-2rq6 | A vulnerability was found in SourceCodester Human Resource Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file detailview.php. The manipulation of the argument employeeid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-232288. | []
| null | null | 6.3 | null |
|
CVE-2020-6446 | Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4.3 |
|
CVE-2019-1615 | Cisco NX-OS Software Image Signature Verification Vulnerability | A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software image on an affected device. The vulnerability is due to improper verification of digital signatures for software images. An attacker could exploit this vulnerability by loading an unsigned software image on an affected device. A successful exploit could allow the attacker to boot a malicious software image. Note: The fix for this vulnerability requires a BIOS upgrade as part of the software upgrade. For additional information, see the Details section of this advisory. Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I7(5). Nexus 9000 Series Fabric Switches in ACI Mode are affected running software versions prior to 13.2(1l). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I7(5). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5). | [
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:12.3\\(0.97\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:9432pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:9536pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:9636pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:9736pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9432c-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9464px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9464tx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9564px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9564tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9636c-rx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x97160yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9732c-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9732c-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9736c-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9736c-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n9k-x9788tc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:x9636q-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n3k-c31128pq-10ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n3k-c3132c-z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n3k-c3164q-40ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n3k-c3264q:-:*:*:*:*:*:*:*"
]
| null | null | 6.7 | null |
CVE-2016-1464 | Cisco WebEx Meetings Player T29.10, when WRF file support is enabled, allows remote attackers to execute arbitrary code via a crafted file, aka Bug ID CSCva09375. | [
"cpe:2.3:a:cisco:webex_wrf_player_t29:sp10_base:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 9.3 |
|
CVE-2022-3083 | All versions of Landis+Gyr E850 (ZMQ200) are vulnerable to CWE-784: Reliance on Cookies Without Validation and Integrity. The device's web application navigation depends on the value of the session cookie. The web application could become inaccessible for the user if an attacker changes the cookie values.
| [
"cpe:2.3:o:landisgyr:e850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:landisgyr:e850:-:*:*:*:*:*:*:*"
]
| null | 3.9 | null | null |
|
CVE-2021-34945 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15054. | [
"cpe:2.3:a:bentley:bentley_view:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | null |
|
CVE-2020-21990 | Emmanuel MyDomoAtHome (MDAH) REST API REST API Domoticz ISS Gateway 0.2.40 is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this, via a specially crafted request to gain access to sensitive information. | [
"cpe:2.3:a:domoticz:mydomoathome:0.240:*:*:*:*:node.js:*:*"
]
| null | 7.5 | null | 5 |
|
CVE-2023-21912 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 5.7.41 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
GHSA-pr7j-566r-q2rq | ** DISPUTED ** SQL injection vulnerability in index.php for Quick.cart 0.3.0 allows remote attackers to execute arbitrary SQL commands via the iCategory parameter. NOTE: the vendor has privately disputed this issue, saying that Quick.cart does not even use SQL and therefore can not be vulnerable to SQL injection. | []
| null | null | null | null |
|
RHSA-2024:1129 | Red Hat Security Advisory: curl security update | curl: information disclosure by exploiting a mixed case flaw | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
]
| null | 5.3 | null | null |
CVE-2020-12272 | OpenDMARC through 1.3.2 and 1.4.x allows attacks that inject authentication results to provide false information about the domain that originated an e-mail message. This is caused by incorrect parsing and interpretation of SPF/DKIM authentication results, as demonstrated by the example.net(.example.com substring. | [
"cpe:2.3:a:trusteddomain:opendmarc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trusteddomain:opendmarc:1.4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:trusteddomain:opendmarc:1.4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
]
| null | 5.3 | null | 5 |
|
RHSA-2025:0211 | Red Hat Security Advisory: dpdk security update | dpdk: Denial Of Service from malicious guest on hypervisors using DPDK Vhost library | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
]
| null | null | 7.4 | null |
CVE-2018-8004 | There are multiple HTTP smuggling and cache poisoning issues when clients making malicious requests interact with Apache Traffic Server (ATS). This affects versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions. | [
"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | null | 6.5 | 4 |
|
CVE-2021-31780 | In app/Model/MispObject.php in MISP 2.4.141, an incorrect sharing group association could lead to information disclosure on an event edit. When an object has a sharing group associated with an event edit, the sharing group object is ignored and instead the passed local ID is reused. | [
"cpe:2.3:a:misp:misp:2.4.141:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-v4cq-4w34-cj9c | A vulnerability has been found in SourceCodester Billing Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file ajax_service.php of the component POST Parameter Handler. The manipulation of the argument drop_services leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228397 was assigned to this vulnerability. | []
| null | null | 6.3 | null |
|
CVE-2019-19553 | In Wireshark 3.0.0 to 3.0.6 and 2.6.0 to 2.6.12, the CMS dissector could crash. This was addressed in epan/dissectors/asn1/cms/packet-cms-template.c by ensuring that an object identifier is set to NULL after a ContentInfo dissection. | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-cr48-c784-cmxh | authpam.c in courier-authdaemon for Courier Mail Server 0.37.3 through 0.52.1, when using pam_tally, does not call the pam_acct_mgmt function to verify that access should be granted, which allows attackers to authenticate to the server using accounts that have been disabled. | []
| null | null | null | null |
|
CVE-2021-28956 | The unofficial vscode-sass-lint (aka Sass Lint) extension through 1.0.7 for Visual Studio Code allows attackers to execute arbitrary binaries if the user opens a crafted workspace. NOTE: This vulnerability only affects products that are no longer supported by the maintainer | [
"cpe:2.3:a:sass_lint_project:sass_lint:*:*:*:*:*:visual_studio_code:*:*"
]
| null | 8.8 | null | 6.8 |
|
GHSA-v53w-m46c-w4w4 | Multiple cross-site request forgery (CSRF) vulnerabilities in the Sharebar plugin 1.2.5 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) add or (2) modify buttons, or (3) insert cross-site scripting (XSS) sequences. | []
| null | null | null | null |
|
GHSA-v665-8rf9-gphr | Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to inject arbitrary web script or HTML via vectors involving submission of a form to the about:blank URL, leading to security-context replacement. | []
| null | null | null | null |
|
GHSA-q3r4-2437-ppv4 | Windows Update Stack Elevation of Privilege Vulnerability | []
| null | 7.8 | null | null |
|
GHSA-g3c7-95hc-gv66 | An arbitrary file upload vulnerability in the component /server/executeExec of JEHC-BPM v2.0.1 allows attackers to execute arbitrary code via uploading a crafted file. | []
| null | 9.8 | null | null |
|
CVE-2024-56288 | WordPress WP Docs plugin <= 2.2.1 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fahad Mahmood WP Docs allows Stored XSS.This issue affects WP Docs: from n/a through 2.2.1. | []
| null | 5.9 | null | null |
CVE-2021-38561 | golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic with an out-of-bounds read during BCP 47 language tag parsing. Index calculation is mishandled. If parsing untrusted user input, this can be used as a vector for a denial-of-service attack. | [
"cpe:2.3:a:golang:text:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
RHSA-2022:5823 | Red Hat Security Advisory: 389-ds:1.4 security update | 389-ds-base: sending crafted message could result in DoS 389-ds-base: expired password was still allowed to access the database | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 5.7 | null | null |
CVE-2014-7860 | The web/web_file/fb_publish.php script in D-Link DNS-320L before 1.04b12 and DNS-327L before 1.03b04 Build0119 does not authenticate requests, which allows remote attackers to obtain arbitrary photos and publish them to an arbitrary Facebook profile via a target album_id and access_token. | [
"cpe:2.3:o:d-link:dns-327l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-327l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dns-320l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-320l:-:*:*:*:*:*:*:*"
]
| null | null | 5.3 | 5 |
|
GHSA-vmh9-w834-6xjq | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1343, CVE-2013-1344, CVE-2013-3864, and CVE-2013-3865. | []
| null | 7.8 | null | null |
|
RHSA-2015:0103 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.4 Extended Update Support One-Month Notice | This is the One-Month notification for the retirement of Red Hat Enterprise
Linux 6.4 Extended Update Support (EUS). This notification applies only to
those customers subscribed to the Extended Update Support (EUS) channel for
Red Hat Enterprise Linux 6.4. | [
"cpe:/o:redhat:rhel_eus:6.4::server"
]
| null | null | null | null |
GHSA-wp73-c4gh-8ccr | Incorrect access control in the firmware update and download processes of Ruochan Smart v4.4.7 allows attackers to access sensitive information by analyzing the code and data within the APK file. | []
| null | 8.4 | null | null |
|
GHSA-87f4-45wv-qprf | In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation. | []
| null | null | 7.5 | null |
|
GHSA-3cv4-xxv7-934q | Improper Verification of Cryptographic Signature in Apache Pulsar in TensorFlow | If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instances as any user (incl. admins). | []
| null | 9.8 | null | null |
ICSA-25-135-14 | Siemens APOGEE PXC and TALON TC Series | Affected devices start sending unsolicited BACnet broadcast messages after processing a specific BACnet createObject request. This could allow an attacker residing in the same BACnet network to send a specially crafted message that results in a partial denial of service condition of the targeted device, and potentially reduce the availability of BACnet network. A power cycle is required to restore the device's normal operation. | []
| null | 4.7 | null | null |
CVE-2024-12278 | Booster for WooCommerce <= 7.2.5 - Unauthenticated Stored Cross-Site Scripting | The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via any location that typically sanitizes data using wp_kses, like comments, in all versions up to, and including, 7.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 7.2 | null | null |
RHSA-2022:7811 | Red Hat Security Advisory: mingw-expat security update | expat: integer overflow in the doProlog function expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Stack exhaustion in doctype parsing expat: Integer overflow in copyString() expat: Integer overflow in storeRawNames() | [
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | 9.8 | null | null |
PYSEC-2019-145 | null | ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them. | []
| null | null | null | null |
GHSA-jh49-frp2-9886 | Dell PowerScale InsightIQ, version 5.0, contain a Use of hard coded Credentials vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure. | []
| null | 2.3 | null | null |
|
CVE-2021-2079 | Vulnerability in the Oracle Configurator product of Oracle Supply Chain (component: UI Servlet). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Configurator, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data as well as unauthorized update, insert or delete access to some of Oracle Configurator accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:configurator:12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:configurator:12.2:*:*:*:*:*:*:*"
]
| null | 8.2 | null | null |
|
CVE-2009-5000 | Multiple cross-site scripting (XSS) vulnerabilities in the Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 4.0.2.x before 4.0.2.3-P8AE-FP003 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to .jsp pages. | [
"cpe:2.3:a:ibm:filenet_p8_application_engine:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:4.0.2:001:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:4.0.2:002:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-m79g-h2ww-gqhg | SQL injection vulnerability in save.php in PHPSurveyor 0.995 and earlier allows remote attackers to execute arbitrary SQL commands via the surveyid cookie. NOTE: this issue could be leveraged to execute arbitrary PHP code, as demonstrated by inserting directory traversal sequences into the database, which are then processed by the thissurvey['language'] variable. | []
| null | null | null | null |
|
CVE-2009-1079 | Multiple cross-site scripting (XSS) vulnerabilities in Sun Java System Identity Manager (IdM) 7.0 through 8.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug IDs 19659, 19660, and 19683. | [
"cpe:2.3:a:sun:java_system_identity_manager:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_identity_manager:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_identity_manager:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_identity_manager:8.0:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-c84w-pfmp-9cxg | An externally controlled reference to a resource vulnerability has been reported to affect QNAP NAS running Photo Station. If exploited, This could allow an attacker to modify system files. We have already fixed the vulnerability in the following versions: QTS 5.0.1: Photo Station 6.1.2 and later QTS 5.0.0/4.5.x: Photo Station 6.0.22 and later QTS 4.3.6: Photo Station 5.7.18 and later QTS 4.3.3: Photo Station 5.4.15 and later QTS 4.2.6: Photo Station 5.2.14 and later | []
| null | 9.1 | null | null |
|
GHSA-wr42-7mgr-v6qx | In the version 12.1.0.1004 and below of 360 Total Security, when the main process of 360 Total Security calls GameChrome.exe, there exists a local privilege escalation vulnerability. An attacker who could exploit DLL hijacking to bypass the hips could execute arbitrary code on the Local system. | []
| null | null | null | null |
|
CVE-2020-13433 | Jason2605 AdminPanel 4.0 allows SQL Injection via the editPlayer.php hidden parameter. | [
"cpe:2.3:a:adminpanel_project:adminpanel:4.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
CVE-2017-5195 | Irssi 0.8.17 before 0.8.21 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted ANSI x8 color code. | [
"cpe:2.3:a:irssi:irssi:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.