id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-qvgr-wc77-vj3m | IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.3 could allow an authenticated user to cause a denial of service due to uncontrolled resource consumption. IBM X-Force ID: 255827. | []
| null | 6.5 | null | null |
|
RHSA-2023:7548 | Red Hat Security Advisory: kernel-rt security update | kernel: use-after-free due to race condition occurring in dvb_register_device() kernel: use-after-free due to race condition occurring in dvb_net.c kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c kernel: use-after-free in smb2_is_status_io_timeout() kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: use after free in nvmet_tcp_free_crypto in NVMe | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
]
| null | 8.8 | null | null |
CVE-2024-12770 | WP ULike < 4.7.6 - Admin+ Stored XSS | The WP ULike WordPress plugin before 4.7.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | []
| null | 4.8 | null | null |
GHSA-2gfq-wxq2-rxqj | Format string vulnerability in util.c in nbsmtp 0.99 and earlier, while running in debug mode, allows remote attackers to execute arbitrary code via format string specifiers that are not properly handled in a syslog call. | []
| null | null | null | null |
|
GHSA-qwqp-mmm6-33xj | Cross-site scripting (XSS) vulnerability in Bajie Java HTTP Server 0.95 through 0.95zxv4 allows remote attackers to inject arbitrary web script or HTML via (1) the query string to test.txt, (2) the guestName parameter to the custMsg servlet, or (3) the cookiename parameter to the CookieExample servlet. | []
| null | null | null | null |
|
CVE-2010-3855 | Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font. | [
"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2012-1466 | The Traffic Grapher Server for NetMechanica NetDecision before 4.6.1 allows remote attackers to obtain the source code of NtDecision script files with a .nd extension via an invalid version number in an HTTP request, as demonstrated using default.nd. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:netmechanica:netdecision:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2023-24960 | IBM InfoSphere Information Server information disclosure | IBM InfoSphere Information Server 11.7 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 246333 | [
"cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
CVE-2023-37489 | Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Version Management System) | Due to the lack of validation, SAP BusinessObjects Business Intelligence Platform (Version Management System) - version 403, permits an unauthenticated user to read the code snippet through the UI, which leads to low impact on confidentiality and no impact on the application's availability or integrity.
| [
"cpe:2.3:a:sap:businessobjects_business_intelligence:430:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
RHSA-2017:2800 | Red Hat Security Advisory: kernel security update | kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary | [
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
]
| null | null | 7.8 | null |
CVE-2014-6426 | The dissect_hip_tlv function in epan/dissectors/packet-hip.c in the HIP dissector in Wireshark 1.12.x before 1.12.1 does not properly handle a NULL tree, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet. | [
"cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-vv8p-v9q5-4pvf | An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. A command channel includes the next hop. which can be intercepted and used to break frequency hopping. | []
| null | 7.1 | null | null |
|
CVE-2014-3093 | IBM PowerVC 1.2.0 before FP3 and 1.2.1 before FP2 uses cleartext passwords in (1) api-paste.ini, (2) debug logs, (3) the installation process, (4) environment checks, (5) powervc-ldap-config, (6) powervc-restore, and (7) powervc-diag, which allows local users to obtain sensitive information by entering a ps command or reading a file. | [
"cpe:2.3:a:ibm:powervc:1.2.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.0.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.1.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.1.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.1.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:powervc:1.2.1.1:*:*:*:standard:*:*:*"
]
| null | null | null | 2.1 |
|
CVE-2023-40957 | A SQL injection vulnerability in Didotech srl Engineering & Lifecycle Management (aka pdm) v.14.0, v.15.0 and v.16.0 fixed in pdm-14.0.1.0.0, pdm-15.0.1.0.0, and pdm-16.0.1.0.0 allows a remote authenticated attacker to execute arbitrary code via the request parameter in models/base_client.py component. | [
"cpe:2.3:a:didotech:engineering_\\&_lifecycle_management:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-36c4-6cpg-q42g | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HashThemes Easy Elementor Addons allows DOM-Based XSS. This issue affects Easy Elementor Addons: from n/a through 2.1.5. | []
| null | 6.5 | null | null |
|
CVE-2020-2132 | Jenkins Parasoft Environment Manager Plugin 2.14 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system. | [
"cpe:2.3:a:jenkins:parasoft_environment_manager:*:*:*:*:*:jenkins:*:*"
]
| null | 6.5 | null | 4 |
|
CVE-2023-2037 | Campcodes Video Sharing Website watch.php sql injection | A vulnerability was found in Campcodes Video Sharing Website 1.0. It has been classified as critical. This affects an unknown part of the file watch.php. The manipulation of the argument code leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225915. | [
"cpe:2.3:a:campcodes_video_sharing_website_project:campcodes_video_sharing_website:1.0:*:*:*:*:*:*:*"
]
| null | 6.3 | 6.3 | 6.5 |
GHSA-32pj-3qhw-8xrh | A vulnerability was found in SourceCodester Student Result Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /script/academic/division-system of the component Division System Page. The manipulation of the argument Division leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | []
| 1.9 | 2.4 | null | null |
|
GHSA-4fq8-mjrf-79qc | SQL injection vulnerability in store.php in AJ Auction Pro OOPD 2.x allows remote attackers to execute arbitrary SQL commands via the id parameter. | []
| null | null | null | null |
|
CVE-2024-36620 | moby v25.0.0 - v26.0.2 is vulnerable to NULL Pointer Dereference via daemon/images/image_history.go. | []
| null | 6.5 | null | null |
|
CVE-2019-13657 | CA Performance Management 3.5.x, 3.6.x before 3.6.9, and 3.7.x before 3.7.4 have a default credential vulnerability that can allow a remote attacker to execute arbitrary commands and compromise system security. | [
"cpe:2.3:a:broadcom:ca_performance_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:ca_performance_management:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:network_operations:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-prwv-85r5-j7rp | dig.php in GScripts.net DNS Tools allows remote attackers to execute arbitrary commands via shell metacharacters in the host parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
| null | null | null | null |
|
CVE-2022-47892 | Information disclosure in NetMan 204 | All versions of NetMan 204 could allow an unauthenticated remote attacker to read a file (config.cgi) containing sensitive information, like credentials. | [
"cpe:2.3:o:riello-ups:netman_204_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:riello-ups:netman_204:-:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
GHSA-vhhq-fxg5-hvp8 | In dotCMS dashboard, the Tools and Log Files tabs under System → Maintenance Portlet, which is and always has been an Admin portlet, is accessible to anyone with that portlet and not just to CMS Admins. Users that get site admin but not a system admin, should not have access to the System Maintenance → Tools portlet. This would share database username and password under Log Files and download DB Dump and other dotCMS Content under Tools. Nothing in the System → Maintenance should be displayed for users with site admin role. Only system admins must have access to System Maintenance.OWASP Top 10 - A01) Broken Access ControlOWASP Top 10 - A04) Insecure Design | []
| null | 4.5 | null | null |
|
GHSA-4hjr-mh66-rpm7 | HP Ignite-UX does not save /etc/passwd when it creates an image of a trusted system, which can set the password field to a blank and allow an attacker to gain privileges. | []
| null | null | null | null |
|
CVE-2012-4220 | diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call. | [
"cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-3cj6-45x3-vrjj | Zohocorp ManageEngine OpManager and Remote Monitoring and Management versions 128329 and below are vulnerable to the authenticated remote code execution in the deploy agent option. | []
| null | 8.8 | null | null |
|
RHSA-2022:7182 | Red Hat Security Advisory: thunderbird security update | Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
]
| null | 8.8 | 6.1 | null |
CVE-2015-4989 | The portal in IBM Tealeaf Customer Experience before 8.7.1.8814, 8.8 before 8.8.0.9026, 9.0.0, 9.0.0A, 9.0.1 before 9.0.1.1083, 9.0.1A before 9.0.1.5073, 9.0.2 before 9.0.2.1095, and 9.0.2A before 9.0.2.5144 allows remote attackers to read arbitrary charts by specifying an internal chart name. | [
"cpe:2.3:a:ibm:tealeaf_customer_experience:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tealeaf_customer_experience:8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tealeaf_customer_experience:8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.2a:*:*:*:*:*:*:*"
]
| null | null | 3.7 | 5 |
|
GHSA-48p9-g68q-jgp2 | A vulnerability classified as problematic has been found in zerochplus. This affects the function PrintResList of the file test/mordor/thread.res.pl. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 9ddf9ecca8565341d8d26a3b2f64540bde4fa273. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218007. | []
| null | 6.1 | null | null |
|
CVE-2023-42560 | Heap out-of-bounds write vulnerability in dec_mono_audb of libsavsac.so prior to SMR Dec-2023 Release 1 allows an attacker to execute arbitrary code. | [
"cpe:2.3:o:samsung:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*"
]
| null | 7.4 | null | null |
|
CVE-2014-2473 | Unspecified vulnerability in the Oracle Secure Global Desktop component in Oracle Virtualization 5.0 and 5.1 allows remote attackers to affect availability via vectors related to SGD Proxy Server (ttaauxserv) and SGD SSL Daemon (ttassl). | [
"cpe:2.3:a:oracle:virtualization:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:virtualization:5.1:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-2g8f-98pm-wh7m | Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.10, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | []
| null | null | null | null |
|
RHSA-2024:8788 | Red Hat Security Advisory: krb5 security update | freeradius: forgery attack | [
"cpe:/o:redhat:rhel_els:7"
]
| null | 9 | null | null |
GHSA-f9p6-8h3f-wpvp | Omnicron OmniHTTPd 2.09 allows remote attackers to cause a denial of service (crash) via an HTTP request with a long, malformed HTTP 1version number. | []
| null | null | null | null |
|
CVE-2022-25762 | Response mix-up with WebSocket concurrent send and close | If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors. | [
"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*"
]
| null | 8.6 | null | 7.5 |
CVE-2025-21182 | Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability | Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability | []
| null | 7.4 | null | null |
GHSA-rgvc-vx7v-ffgw | Cross-site scripting (XSS) vulnerability in EveryBlog 5.x and 6.x, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | []
| null | null | null | null |
|
CVE-2023-34051 | VMware Aria Operations for Logs contains an authentication bypass vulnerability. An unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.
| [
"cpe:2.3:a:vmware:aria_operations_for_logs:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:aria_operations_for_logs:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:aria_operations_for_logs:8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:aria_operations_for_logs:8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:aria_operations_for_logs:8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:aria_operations_for_logs:8.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:aria_operations_for_logs:8.12:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-g6f4-mcx6-c9wf | Adobe Acrobat and Reader versions 2020.006.20034 and earlier, 2017.011.30158 and earlier, 2017.011.30158 and earlier, 2015.006.30510 and earlier, and 2015.006.30510 and earlier have a stack-based buffer overflow vulnerability. Successful exploitation could lead to arbitrary code execution . | []
| null | null | null | null |
|
GHSA-5f35-pq34-c87q | Apache Airflow missing Certificate Validation | Apache Airflow SMTP Provider before 1.3.0, Apache Airflow IMAP Provider before 3.3.0, and Apache Airflow before 2.7.0 are affected by the Validation of OpenSSL Certificate vulnerability.The default SSL context with SSL library did not check a server's X.509 certificate. Instead, the code accepted any certificate, which could result in the disclosure of mail server credentials or mail contents when the client connects to an attacker in a MITM position.Users are strongly advised to upgrade to Apache Airflow version 2.7.0 or newer, Apache Airflow IMAP Provider version 3.3.0 or newer, and Apache Airflow SMTP Provider version 1.3.0 or newer to mitigate the risk associated with this vulnerability | []
| null | 5.9 | null | null |
CVE-2019-15386 | The Lava Z60s Android device with a build fingerprint of LAVA/Z60s/Z60s:8.1.0/O11019/1530331229:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. | [
"cpe:2.3:o:lavamobiles:z60s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lavamobiles:z60s:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 2.1 |
|
CVE-2017-12758 | https://www.joomlaextensions.co.in/ Joomla! Component Appointment 1.1 is affected by: SQL Injection. The impact is: Code execution (remote). The component is: com_appointment component. | [
"cpe:2.3:a:joomlaextensions:component_appointment:1.1:*:*:*:*:joomla\\!:*:*"
]
| null | null | 9.8 | 7.5 |
|
GHSA-56gp-rxr2-fq55 | SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session. | []
| null | null | null | null |
|
CVE-2022-2187 | Contact Form 7 Captcha < 0.1.2 - Reflected Cross-Site Scripting | The Contact Form 7 Captcha WordPress plugin before 0.1.2 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers | [
"cpe:2.3:a:contact_form_7_captcha_project:contact_form_7_captcha:*:*:*:*:*:wordpress:*:*"
]
| null | 6.1 | null | 4.3 |
GHSA-8559-f4g5-6pjj | A vulnerability in the gateway GPRS support node (GGSN) of Cisco ASR 5000 Series Aggregation Services Routers 17.3.9.62033 through 21.1.2 could allow an unauthenticated, remote attacker to redirect HTTP traffic sent to an affected device. More Information: CSCvc67927. | []
| null | null | 8.6 | null |
|
GHSA-ghqc-6vv2-rpqh | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2466 and CVE-2013-2468. | []
| null | null | null | null |
|
CVE-2019-13389 | RainLoop Webmail before 1.13.0 lacks XSS protection mechanisms such as xlink:href validation, the X-XSS-Protection header, and the Content-Security-Policy header. | [
"cpe:2.3:a:rainloop:webmail:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
GHSA-7cp5-rpjh-6q5v | There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. | []
| null | null | null | null |
|
CVE-2025-3364 | HGiga PowerStation - Chroot Escape | The SSH service of PowerStation from HGiga has a Chroot Escape vulnerability, allowing attackers with root privileges to bypass chroot restrictions and access the entire file system. | []
| null | 6.7 | null | null |
CVE-2022-43146 | An arbitrary file upload vulnerability in the image upload function of Canteen Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file. | [
"cpe:2.3:a:canteen_management_system_project:canteen_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
|
GHSA-xjwp-6c2p-p5mx | Highly predictable session tokens in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt allow gaining administrative router access. | []
| null | null | 8.3 | null |
|
GHSA-9wgq-fhm2-pjf3 | Command injection and multiple stack-based buffer overflows vulnerabilities in the modifyUserb_func function of spx_restservice allow an attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0. | []
| null | 9.8 | null | null |
|
GHSA-2249-5x8x-97jc | A vulnerability in the user group configuration of the Cisco SD-WAN Solution could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the group configuration. An attacker could exploit this vulnerability by writing a crafted file to the directory where the user group configuration is located in the underlying operating system. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device. | []
| null | 7.8 | null | null |
|
CVE-2012-5215 | Unspecified vulnerability on the HP LaserJet Pro M1212nf, M1213nf, M1214nfh, M1216nfh, M1217nfw, and M1219nf, and HotSpot LaserJet Pro M1218nfs, with firmware before 20130211; LaserJet Pro CP1025nw with firmware before 20130212; and LaserJet Pro P1102w and P1606dn with firmware before 20130213 allows remote attackers to modify data or cause a denial of service via unknown vectors. | [
"cpe:2.3:h:hp:hotspot_laserjet_pro_m1218nfs_mfp:b4k88a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m1212nf_mfp:ce841a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m1213nf_mfp:ce845a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m1214nfh_mfp:ce842a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m1216nfh_multifunction_printer:ce843a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m1217nfw_multifunction_printer:ce844a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m1219nf_mfp:ce846a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hotspot_laserjet_pro_m1218nfs_mfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m1212nf_mfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m1213nf_mfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m1214nfh_mfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m1216nfh_multifunction_printer_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m1217nfw_multifunction_printer_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m1219nf_mfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_cp1025nw:ce914a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_cp1025nw:ce918a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_cp1025nw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_p1102w:ce657a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_p1102w:ce658a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_p1606dn:ce749a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_p1102w_firmware:20130212:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_p1606dn_firmware:20130212:*:*:*:*:*:*:*"
]
| null | null | null | 8.8 |
|
GHSA-66g2-4363-r37f | SolarWinds Web Help Desk 12.7.0 allows XSS via a CSV template file with a crafted Location Name field. | []
| null | null | null | null |
|
CVE-2023-41227 | D-Link DIR-3040 prog.cgi SetTriggerPPPoEValidate Stack-Based Buffer Overflow Remote Code Execution Vulnerability | D-Link DIR-3040 prog.cgi SetTriggerPPPoEValidate Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-3040 routers. Authentication is required to exploit this vulnerability.
The specific flaw exists within the prog.cgi binary, which handles HNAP requests made to the lighttpd webserver listening on TCP ports 80 and 443. The issue results from the lack of proper validation of a user-supplied string before copying it to a fixed-size stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21653. | [
"cpe:2.3:h:d-link:dir-3040:-:*:*:*:*:*:*:*"
]
| null | null | 6.8 | null |
CVE-2024-39603 | A stack-based buffer overflow vulnerability exists in the wireless.cgi set_wifi_basic_mesh() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | []
| null | 9.1 | null | null |
|
GHSA-24vw-fq64-647q | In the Linux kernel, the following vulnerability has been resolved:net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error pathPrior to this patch in case mlx5_core_destroy_cq() failed it returns
without completing all destroy operations and that leads to memory leak.
Instead, complete the destroy flow before return error.Also move mlx5_debug_cq_remove() to the beginning of mlx5_core_destroy_cq()
to be symmetrical with mlx5_core_create_cq().kmemleak complains on:unreferenced object 0xc000000038625100 (size 64):
comm "ethtool", pid 28301, jiffies 4298062946 (age 785.380s)
hex dump (first 32 bytes):
60 01 48 94 00 00 00 c0 b8 05 34 c3 00 00 00 c0 `.H.......4.....
02 00 00 00 00 00 00 00 00 db 7d c1 00 00 00 c0 ..........}.....
backtrace:
[<000000009e8643cb>] add_res_tree+0xd0/0x270 [mlx5_core]
[<00000000e7cb8e6c>] mlx5_debug_cq_add+0x5c/0xc0 [mlx5_core]
[<000000002a12918f>] mlx5_core_create_cq+0x1d0/0x2d0 [mlx5_core]
[<00000000cef0a696>] mlx5e_create_cq+0x210/0x3f0 [mlx5_core]
[<000000009c642c26>] mlx5e_open_cq+0xb4/0x130 [mlx5_core]
[<0000000058dfa578>] mlx5e_ptp_open+0x7f4/0xe10 [mlx5_core]
[<0000000081839561>] mlx5e_open_channels+0x9cc/0x13e0 [mlx5_core]
[<0000000009cf05d4>] mlx5e_switch_priv_channels+0xa4/0x230
[mlx5_core]
[<0000000042bbedd8>] mlx5e_safe_switch_params+0x14c/0x300
[mlx5_core]
[<0000000004bc9db8>] set_pflag_tx_port_ts+0x9c/0x160 [mlx5_core]
[<00000000a0553443>] mlx5e_set_priv_flags+0xd0/0x1b0 [mlx5_core]
[<00000000a8f3d84b>] ethnl_set_privflags+0x234/0x2d0
[<00000000fd27f27c>] genl_family_rcv_msg_doit+0x108/0x1d0
[<00000000f495e2bb>] genl_family_rcv_msg+0xe4/0x1f0
[<00000000646c5c2c>] genl_rcv_msg+0x78/0x120
[<00000000d53e384e>] netlink_rcv_skb+0x74/0x1a0 | []
| null | 5.5 | null | null |
|
GHSA-3hcq-hgf3-x479 | Cross-site scripting (XSS) vulnerability in index.php in myPHP Guestbook 2.0.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the lang parameter. | []
| null | null | null | null |
|
GHSA-479v-8jg2-8fgj | xpdf 4.03 has heap buffer overflow in the function readXRefTable located in XRef.cc. An attacker can exploit this bug to cause a Denial of Service (Segmentation fault) or other unspecified effects by sending a crafted PDF file to the pdftoppm binary. | []
| null | 5.5 | null | null |
|
GHSA-hvmw-63v6-mpv5 | Unspecified vulnerability in Oracle E-Business Suite 11.5.10CU2 has unknown impact and remote attack vectors in the (1) Common Applications (APPS01) and (2) iProcurement (APPS02). | []
| null | null | null | null |
|
RHSA-2023:1297 | Red Hat Security Advisory: OpenShift Container Platform 4.11.32 security and extras update | goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be | [
"cpe:/a:redhat:openshift:4.11::el8"
]
| null | 7 | null | null |
CVE-2016-0833 | Android allows users to cause a denial of service. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 7.8 |
|
GHSA-chcc-xph2-3gc9 | An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. XSS could occur via the title_link field of a Slack attachment. | []
| null | null | null | null |
|
GHSA-j52r-pmqv-wm38 | Missing permission check in Jenkins Support Core Plugin | A missing permission check in Jenkins Support Core Plugin 2.63 and earlier allows attackers with Overall/Read permission to delete support bundles. | []
| null | 6.5 | null | null |
GHSA-6xj9-hjxf-g7xj | OhhASP stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing passwords via a direct request for db/OhhASP.mdb. | []
| null | null | null | null |
|
CVE-2025-2752 | Open Asset Import Library Assimp CSM File fast_atof.h fast_atoreal_move out-of-bounds | A vulnerability was found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This issue affects the function fast_atoreal_move in the library include/assimp/fast_atof.h of the component CSM File Handler. The manipulation leads to out-of-bounds read. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | []
| 5.3 | 4.3 | 4.3 | 5 |
CVE-2021-45917 | SUN & MOON RISE CO., LTD. Shockwall - Improper Authentication | The server-request receiver function of Shockwall system has an improper authentication vulnerability. An authenticated attacker of an agent computer within the local area network can use the local registry information to launch server-side request forgery (SSRF) attack on another agent computer, resulting in arbitrary code execution for controlling the system or disrupting service. | [
"cpe:2.3:o:sun_moon_jingyao:network_computer_terminal_protection_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun_moon_jingyao:network_computer_terminal_protection_system:*:*:*:*:*:*:*:*"
]
| null | 8 | null | null |
CVE-2019-13411 | A remote command execution vulnerability was discovered in HiNet GPON firmware < I040GWR190731 port 3097 | An “invalid command” handler issue was discovered in HiNet GPON firmware < I040GWR190731. It allows an attacker to execute arbitrary command through port 3097. CVSS 3.0 Base score 10.0. CVSS vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). | [
"cpe:2.3:o:hinet:gpon_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hinet:gpon:-:*:*:*:*:*:*:*"
]
| null | 10 | null | null |
CVE-2022-37146 | The PlexTrac platform prior to version 1.28.0 allows for username enumeration via HTTP response times on invalid login attempts for users configured to use the PlexTrac authentication provider. Login attempts for valid, unlocked users configured to use PlexTrac as their authentication provider take significantly longer than those for invalid users, allowing for valid users to be enumerated by an unauthenticated remote attacker. Note that the lockout policy implemented in Plextrac version 1.17.0 makes it impossible to distinguish between valid, locked user accounts and user accounts that do not exist, but does not prevent valid, unlocked users from being enumerated. | [
"cpe:2.3:a:plextrac:plextrac:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
|
CVE-2023-30588 | When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20. | [
"cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
|
CVE-2009-1613 | Multiple SQL injection vulnerabilities in leap.php in Leap CMS 0.1.4, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) searchterm or (2) email parameter. | [
"cpe:2.3:a:gowondesigns:leap:0.1.4:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2025-32925 | WordPress SUMO Reward Points plugin <= 30.7.0 - Local File Inclusion vulnerability | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in FantasticPlugins SUMO Reward Points allows PHP Local File Inclusion.This issue affects SUMO Reward Points: from n/a through 30.7.0. | []
| null | 8.3 | null | null |
CVE-2006-2955 | Multiple cross-site scripting (XSS) vulnerabilities in KAPhotoservice 7.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) New Category (newcategory) or (2) apage parameter to (a) edtalbum.asp, or the (3) cat or (4) albumid parameter to (b) album.asp. | [
"cpe:2.3:a:kaphotoservice:kaphotoservice:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2023-34326 | x86/AMD: missing IOMMU TLB flushing | The caching invalidation guidelines from the AMD-Vi specification (48882—Rev
3.07-PUB—Oct 2022) is incorrect on some hardware, as devices will malfunction
(see stale DMA mappings) if some fields of the DTE are updated but the IOMMU
TLB is not flushed.
Such stale DMA mappings can point to memory ranges not owned by the guest, thus
allowing access to unindented memory regions.
| [
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
RHSA-2014:0330 | Red Hat Security Advisory: samba and samba3x security update | samba: pam_winbind fails open when non-existent group specified to require_membership_of samba: Password lockout not enforced for SAMR password changes | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
CVE-2025-27403 | Ratify Azure authentication providers can leak authentication tokens to non-Azure container registries | Ratify is a verification engine as a binary executable and on Kubernetes which enables verification of artifact security metadata and admits for deployment only those that comply with policies the user creates. In a Kubernetes environment, Ratify can be configured to authenticate to a private Azure Container Registry (ACR). The Azure workload identity and Azure managed identity authentication providers are configured in this setup. Users that configure a private ACR to be used with the Azure authentication providers may be impacted by a vulnerability that exists in versions prior to 1.2.3 and 1.3.2. Both Azure authentication providers attempt to exchange an Entra ID (EID) token for an ACR refresh token. However, Ratify’s Azure authentication providers did not verify that the target registry is an ACR. This could have led to the EID token being presented to a non-ACR registry during token exchange. EID tokens with ACR access can potentially be extracted and abused if a user workload contains an image reference to a malicious registry. As of versions 1.2.3 and 1.3.2, the Azure workload identity and Azure managed identity authentication providers are updated to add new validation prior to EID token exchange. Validation relies upon registry domain validation against a pre-configured list of well-known ACR endpoints. EID token exchange will be executed only if at least one of the configured well-known domain suffixes (wildcard support included) matches the registry domain of the image reference. | []
| 7.2 | null | null | null |
CVE-2022-41272 | An unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the User Defined Search (UDS) of SAP NetWeaver Process Integration (PI) - version 7.50 and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data across the entire system. This allows the attacker to have full read access to user data, make limited modifications to user data, and degrade the performance of the system, leading to a high impact on confidentiality and a limited impact on the availability and integrity of the application.
| [
"cpe:2.3:a:sap:netweaver_process_integration:7.50:*:*:*:*:*:*:*"
]
| null | 9.9 | null | null |
|
GHSA-7rpm-c7cg-9pp8 | The Admin panel in PwsPHP 1.2.2 does not properly verify uploaded picture files, which allows remote attackers to upload and possibly execute arbitrary files. | []
| null | null | null | null |
|
GHSA-xq7r-x85c-27jm | In the Linux kernel, the following vulnerability has been resolved:netfilter: ctnetlink: use helper function to calculate expect IDDelete expectation path is missing a call to the nf_expect_get_id()
helper function to calculate the expectation ID, otherwise LSB of the
expectation object address is leaked to userspace. | []
| null | 5.5 | null | null |
|
GHSA-7v87-4jgh-cmq4 | Race condition in Microsoft Windows Media server allows remote attackers to cause a denial of service in the Windows Media Unicast Service via a malformed request, aka the "Unicast Service Race Condition" vulnerability. | []
| null | null | null | null |
|
GHSA-m65m-xrgm-j736 | The file extension check in GNUBoard 3.40 and earlier only verifies extensions that contain all lowercase letters, which allows remote attackers to upload arbitrary files via file extensions that include uppercase letters. | []
| null | 9.8 | null | null |
|
CVE-2024-31448 | Cross-site Scripting vulnerability in link CSV import in Combodo iTop | Combodo iTop is a simple, web based IT Service Management tool. By filling malicious code in a CSV content, an Cross-site Scripting (XSS) attack can be performed when importing this content. This issue has been fixed in versions 3.1.2 and 3.2.0. All users are advised to upgrade. Users unable to upgrade should validate CSV content before importing it. | [
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
CVE-2022-33217 | Memory corruption in Qualcomm IPC due to buffer copy without checking the size of input while starting communication with a compromised kernel. in Snapdragon Mobile | [
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
CVE-1999-1421 | NBase switches NH208 and NH215 run a TFTP server which allows remote attackers to send software updates to modify the switch or cause a denial of service (crash) by guessing the target filenames, which have default names. | [
"cpe:2.3:h:n-base:nh208:*:*:*:*:*:*:*:*",
"cpe:2.3:h:n-base:nh215:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.4 |
|
CVE-2025-53018 | Lychee has Server-Side Request Forgery (SSRF) in Photo::fromUrl API via unvalidated remote image URLs | Lychee is a free, open-source photo-management tool. Prior to version 6.6.13, a critical Server-Side Request Forgery (SSRF) vulnerability exists in the `/api/v2/Photo::fromUrl` endpoint. This flaw lets an attacker instruct the application’s backend to make HTTP requests to any URL they choose. Consequently, internal network resources—such as localhost services or cloud-provider metadata endpoints—become reachable. The endpoint takes a URL from the user and calls it server-side via fopen() without any safeguards. There is no IP address validation, nor are there any allow-list, timeout, or size restrictions. Because of this, attackers can point the application at internal targets. Using this flaw, an attacker can perform internal port scans or retrieve sensitive cloud metadata. Version 6.6.13 contains a patch for the issue. | []
| null | 3 | null | null |
CVE-2011-4514 | The TELNET daemon in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not perform authentication, which makes it easier for remote attackers to obtain access via a TCP session. | [
"cpe:2.3:a:siemens:wincc_flexible:2004:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc_flexible:2005:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc_flexible:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc_flexible:2008:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc:v11:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_hmi_panels:comfort_panels:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_hmi_panels:mobile_panels:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_hmi_panels:mp:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_hmi_panels:op:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_hmi_panels:tp:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc_runtime_advanced:v11:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:wincc_flexible_runtime:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-m53r-v9v7-fx9r | Integer overflow in X.org libXcursor 1.1.13 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the _XcursorFileHeaderCreate function. | []
| null | null | null | null |
|
GHSA-fw96-99q5-pmjp | Improper permissions in the installer for Intel(R) Turbo Boost Max Technology 3.0 driver version 1.0.0.1035 and before may allow an authenticated user to potentially enable escalation of privilege via local access. | []
| null | 7.3 | null | null |
|
CVE-2006-0143 | Microsoft Windows Graphics Rendering Engine (GRE) allows remote attackers to corrupt memory and cause a denial of service (crash) via a WMF file containing (1) ExtCreateRegion or (2) ExtEscape function calls with arguments with inconsistent lengths. | [
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:datacenter_64-bit:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-xw65-87w9-v79c | There is a local privilege escalation vulnerability in some versions of ManageOne. A local authenticated attacker could perform specific operations to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege and compromise the service. | []
| null | 7.8 | null | null |
|
RHSA-2024:4408 | Red Hat Security Advisory: tpm2-tss security update | tpm2-tss: Buffer Overlow in TSS2_RC_Decode | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
]
| null | 6.4 | null | null |
CVE-2009-1454 | Cross-site scripting (XSS) vulnerability in tasks.php in WebCollab before 2.50 (aka Billy Goat) allows remote attackers to inject arbitrary web script or HTML via the selection parameter in a todo action. | [
"cpe:2.3:a:andrew_simpson:webcollab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:andrew_simpson:webcollab:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:andrew_simpson:webcollab:2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:andrew_simpson:webcollab:2.31:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-mhxg-pcmj-chvj | IBM Business Process Manager 7.5, 8.0, and 8.5 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 130156. | []
| null | null | 8.1 | null |
|
CVE-2006-6158 | Multiple cross-site scripting (XSS) vulnerabilities in (a) PMOS Help Desk 2.4, formerly (b) InverseFlow Help Desk 2.31 and also sold as (c) Ace Helpdesk 2.31, allow remote attackers to inject arbitrary web script or HTML via the (1) id or email parameter to ticketview.php, or (2) the email parameter to ticket.php. | [
"cpe:2.3:a:ace_helpdesk:ace_helpdesk:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:inverseflow:help_desk:2.31:*:*:*:*:*:*:*",
"cpe:2.3:a:pmos_helpdesk:pmos_helpdesk:2.4:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-rjqp-cxwg-rwxv | IBM WebSphere Application Server (WAS) 6.1 through 6.1.0.24 and 7.0 through 7.0.0.4, IBM WebSphere Portal Server 5.1 through 6.0, and IBM Integrated Solutions Console (ISC) 6.0.1 do not properly set the IsSecurityEnabled security flag during migration of WebSphere Member Manager (WMM) to Virtual Member Manager (VMM) and a Federated Repository, which allows attackers to obtain sensitive information from repositories via unspecified vectors. | []
| null | null | null | null |
|
CVE-2019-5312 | An issue was discovered in weixin-java-tools v3.3.0. There is an XXE vulnerability in the getXmlDoc method of the BaseWxPayResult.java file. NOTE: this issue exists because of an incomplete fix for CVE-2018-20318. | [
"cpe:2.3:a:wxjava_project:wxjava:3.3.0:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
GHSA-9h9j-x34v-v365 | Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module). Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Corporate Lending. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Banking Corporate Lending, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Banking Corporate Lending accessible data as well as unauthorized read access to a subset of Oracle Banking Corporate Lending accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | []
| null | null | 6.1 | null |
|
CVE-2008-6054 | PreProjects Pre Courier and Cargo Business stores dbcourior.mdb under the web root with insufficient access control, which allows remote attackers to obtain passwords via a direct request. | [
"cpe:2.3:a:preprojects.com:pre_courier_and_cargo_business:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.