id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2012-2155
|
Cross-site request forgery (CSRF) vulnerability in the CDN2 Video module 6.x for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
|
[
"cpe:2.3:a:kyle_browning:cdn2_video:6.x-1.x:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-69v3-hqq8-2m59
|
IBM Security Guardium Insights 2.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 174405.
|
[] | null | null | null | null |
|
RHSA-2007:1076
|
Red Hat Security Advisory: python security update
|
pcre integer overflow python off-by-one locale.strxfrm() (possible memory disclosure) python imageop module heap corruption
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
GHSA-f2xr-9459-fvjc
|
The Everest Forms (Pro) plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_entry_files() function in all versions up to, and including, 1.9.4. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The vulnerability requires an admin to trigger the deletion via deletion of a form entry and cannot be carried out by the attacker alone.
|
[] | null | 7.5 | null | null |
|
CVE-2007-6599
|
Race condition in fileserver in OpenAFS 1.3.50 through 1.4.5 and 1.5.0 through 1.5.27 allows remote attackers to cause a denial of service (daemon crash) by simultaneously acquiring and giving back file callbacks, which causes the handler for the GiveUpAllCallBacks RPC to perform linked-list operations without the host_glock lock.
|
[
"cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2023-29132
|
Irssi 1.3.x and 1.4.x before 1.4.4 has a use-after-free because of use of a stale special collector reference. This occurs when printing of a non-formatted line is concurrent with printing of a formatted line.
|
[
"cpe:2.3:a:irssi:irssi:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
GHSA-gv8q-v6jh-m723
|
SQL injection vulnerability in Knovos Discovery v.22.67.0 allows a remote attacker to execute arbitrary code via the /DiscoveryProcess/Service/Admin.svc/getGridColumnStructure component.
|
[] | null | 8.8 | null | null |
|
CVE-2023-42234
|
Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Cross Site Request Forgery (CSRF) via the WSCView function.
|
[] | null | 5.4 | null | null |
|
CVE-2021-0113
|
Out of bounds write in the BMC firmware for Intel(R) Server Board M10JNP2SB before version EFI BIOS 7215, BMC 8100.01.08 may allow an unauthenticated user to potentially enable a denial of service via adjacent access.
|
[
"cpe:2.3:o:intel:efi_bios_7215:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_m10jnp2sb:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 3.3 |
|
CVE-2022-2598
|
Out-of-bounds Write to API in vim/vim
|
Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.
|
[
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2018-18445
|
In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2011-2913
|
Off-by-one error in the CSoundFile::ReadAMS function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (stack memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of samples.
|
[
"cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2022-43494
|
An unauthorized user could be able to read any file on the system, potentially exposing sensitive information.
|
[
"cpe:2.3:a:ge:proficy_historian:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-h98j-7pf9-cv9p
|
SQL injection vulnerability in (1) Joomla! 1.0.11 and 1.5 Beta, and (2) Mambo 4.6.1, allows remote attackers to execute arbitrary SQL commands via the id parameter when cancelling content editing.
|
[] | null | null | null | null |
|
GHSA-68gc-2m5p-7376
|
An elevation of privilege vulnerability exists when the Windows Diagnostics Execution Service fails to properly sanitize input, leading to an unsecure library-loading behavior, aka 'Windows Diagnostics Hub Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1393.
|
[] | null | null | null | null |
|
GHSA-wfgv-4xh4-mff6
|
Expired sessions were not securely terminated in the RestAPI for Tribe29's Checkmk <= 2.1.0p10 and Checkmk <= 2.0.0p28 allowing an attacker to use expired session tokens when communicating with the RestAPI.
|
[] | null | 9.8 | null | null |
|
RHSA-2016:1385
|
Red Hat Security Advisory: ceph security update
|
crash: mon_command crashes ceph monitors on receiving empty prefix
|
[
"cpe:/a:redhat:ceph_storage:1.3::ubuntu:14.04"
] | null | null | 4.9 | null |
GHSA-rf57-872p-6vwh
|
FrontPage Server Extensions (FPSE) in IIS 4.0 and 5.0 allows remote attackers to cause a denial of service via a malformed form, aka the "Malformed Web Form Submission" vulnerability.
|
[] | null | null | null | null |
|
GHSA-66hv-84j4-2xf5
|
An issue was discovered in Frappe Framework 10, 11 before 11.1.46, and 12. There exists an XSS vulnerability.
|
[] | null | null | 6.1 | null |
|
CVE-2022-20168
|
Product: AndroidVersions: Android kernelAndroid ID: A-210594998References: N/A
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
GHSA-hwp3-c628-9f7v
|
The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.
|
[] | null | null | null | null |
|
GHSA-6wm4-qv34-7x5f
|
Cross-site scripting (XSS) vulnerability in A51 D.O.O. activeCollab 0.7.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2009-1772.
|
[] | null | null | null | null |
|
GHSA-rwxj-58wx-7h6x
|
A vulnerability classified as critical was found in SourceCodester Food Ordering Management System 1.0. Affected by this vulnerability is an unknown functionality of the file user-router.php. The manipulation of the argument 1_verified leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269281 was assigned to this vulnerability.
|
[] | 5.3 | 6.3 | null | null |
|
GHSA-vf8v-f8rq-63gf
|
Unspecified vulnerability in Joomla! before 2.5.4 before 2.5.26, 3.x before 3.2.6, and 3.3.x before 3.3.5 allows attackers to cause a denial of service via unspecified vectors.
|
[] | null | null | null | null |
|
CVE-2020-25463
|
Invalid Memory Access in fxUTF8Decode at moddable/xs/sources/xsCommon.c:916 in Moddable SDK before OS200908 causes a denial of service (SEGV).
|
[
"cpe:2.3:a:moddable:moddable:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2018-16232
|
An authenticated command injection vulnerability exists in IPFire Firewall before 2.21 Core Update 124 in backup.cgi. This allows an authenticated user with privileges for the affected page to execute arbitrary commands.
|
[
"cpe:2.3:a:ipfire:ipfire:1.49:*:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.1:core_update16:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.11:core_update53:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.11:core_update54:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.11:core_update59:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.11:core_update60:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.11:core_update62:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.11:core_update64:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.13:core_update66:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.13:core_update67:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.13:core_update71:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.13:core_update72:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.13:core_update73:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.13:core_update74:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.13:core_update75:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.13:core_update76:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.13:rc_1:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.13:rc_2:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.15:76_rc1:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.15:77_rc1:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.15:77_rc2:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.15:core_update79:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.15:core_update81:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.15:core_update82:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.15:core_update83:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.15:core_update84:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.15:core_update85:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.17:86_beta1:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.17:87_rc1:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.17:core_update88:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.17:core_update89:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.17:core_update91:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.17:core_update93:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.17:core_update95:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.17:core_update97:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.17:core_update98:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.17:core_update99:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update100:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update101:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update102:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update105:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update106:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update107:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update108:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update111:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update112:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update113:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update114:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update116:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update117:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update118:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update119:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.19:core_update120:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.21:core_update122:*:*:*:*:*:*",
"cpe:2.3:a:ipfire:ipfire:2.21:core_update123:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
GHSA-h958-q9ch-hq7c
|
The permissions for system-critical data in an anonymous FTP account are inappropriate. For example, the root directory is writeable by world, a real password file is obtainable, or executable commands such as "ls" can be overwritten.
|
[] | null | null | null | null |
|
CVE-2024-38185
|
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
|
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-cg45-vc5v-xqq7
|
Rocket.Chat.Audit through 5ad78e8 depends on filecachetools, which does not exist in PyPI.
|
[] | null | 9.1 | null | null |
|
RHSA-2020:4453
|
Red Hat Security Advisory: vim security update
|
vim: users can execute arbitrary OS commands via scripting interfaces in the rvim restricted mode
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | null | null |
CVE-2020-10671
|
The Canon Oce Colorwave 500 4.0.0.0 printer's web application is missing any form of CSRF protections. This is a system-wide issue. An attacker could perform administrative actions by targeting a logged-in administrative user. NOTE: this is fixed in the latest version.
|
[
"cpe:2.3:o:canon:oce_colorwave_500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:oce_colorwave_500:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-rxwq-x6h5-x525
|
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.
|
[] | null | 10 | null | null |
|
GHSA-96gw-9mrw-fgrw
|
A vulnerability, which was classified as problematic, was found in SourceCodester Simple Parking Management System 1.0. This affects an unknown part of the file /ci_spms/admin/category. The manipulation of the argument vehicle_type with the input "><script>alert("XSS")</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | null | 5.4 | null | null |
|
GHSA-82mh-4377-p289
|
Directory traversal vulnerability in the Tom M8te (tom-m8te) plugin 1.5.3 for WordPress allows remote attackers to read arbitrary files via the file parameter to tom-download-file.php.
|
[] | null | null | null | null |
|
CVE-2019-12671
|
Cisco IOS XE Software Consent Token Bypass Vulnerability
|
A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS). The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the CLI and requesting shell access on an affected device. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS.
|
[
"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1:a:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1001-hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1001-hx-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1001-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1001-x-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1001-x-ws:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-hx-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-hx-ws:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-x-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-x-ws:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c1117-4p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c1117-4plteea:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c1117-4pltela:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:encs5412\\/k9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:encs5412\\/k9-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sasr1k1xucmk9-1610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sasr1k2xucmk9-1610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sasr1khxucmk9-1610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sisr1100ucmk9-1610:-:*:*:*:*:*:*:*"
] | null | null | 6.7 | null |
GHSA-6fc2-jr2c-4p94
|
A firmware update vulnerability exists in the boa formUpload functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted network packets can lead to arbitrary firmware update. An attacker can provide a malicious file to trigger this vulnerability.
|
[] | null | 7.2 | null | null |
|
GHSA-fgx3-3w99-wc79
|
WabCMS 1.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for db/wabcmsn.mdb. NOTE: this issue was originally reported for "webCMS," but this was an error by an unreliable researcher.
|
[] | null | null | null | null |
|
CVE-2017-1000365
|
The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2025-20146
|
Cisco IOS XR Software for ASR 9000 Series Routers Layer 3 Multicast Routing Denial of Service Vulnerability
|
A vulnerability in the Layer 3 multicast feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers, ASR 9902 Compact High-Performance Routers, and ASR 9903 Compact High-Performance Routers could allow an unauthenticated, remote attacker to cause a line card to reset, resulting in a denial of service (DoS) condition.
This vulnerability is due to the incorrect handling of malformed IPv4 multicast packets that are received on line cards where the interface has either an IPv4 access control list (ACL) or a QoS policy applied. An attacker could exploit this vulnerability by sending crafted IPv4 multicast packets through an affected device. A successful exploit could allow the attacker to cause line card exceptions or a hard reset. Traffic over that line card would be lost while the line card reloads.
|
[] | null | 8.6 | null | null |
CVE-2018-16985
|
In Lizard (formerly LZ5) 2.0, use of an invalid memory address was discovered in LZ5_compress_continue in lz5_compress.c, related to LZ5_compress_fastSmall and MEM_read32. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
|
[
"cpe:2.3:a:lizard_project:lizard:2.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2018-1000858
|
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.
|
[
"cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-frq6-rwpv-5f3j
|
SAP Disclosure Management, version 10.1, does not perform necessary authorization checks for an authenticated user, allowing access to administration accounts by a user with no roles, leading to Missing Authorization Check.
|
[] | null | 7.5 | null | null |
|
CVE-2024-30005
|
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
|
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
CVE-2021-25517
|
An improper input validation vulnerability in LDFW prior to SMR Dec-2021 Release 1 allows attackers to perform arbitrary code execution.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 7.7 | null | null |
|
CVE-2023-34412
|
Stored XXS vulnerability in mbnet, mbnet.rokey, REX 200 and REX 250
|
A vulnerability in Red Lion Europe mbNET/mbNET.rokey and Helmholz REX 200 and REX 250 devices with firmware lower 7.3.2 allows an
authenticated remote attacker with high privileges to inject malicious HTML or JavaScript code (XSS).
|
[
"cpe:2.3:o:helmholz:rex_250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:helmholz:rex_250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:helmholz:rex_200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:helmholz:rex_200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlion:mbnet.rokey_rkh_210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:redlion:mbnet.rokey_rkh_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlion:mbnet.rokey_rkh_216_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:redlion:mbnet.rokey_rkh_216:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlion:mbnet.rokey_rkh_235_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:redlion:mbnet.rokey_rkh_235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlion:mbnet.rokey_rkh_259_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:redlion:mbnet.rokey_rkh_259:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlion:mbnet_mdh_811_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:redlion:mbnet_mdh_811:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlion:mbnet_mdh_850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:redlion:mbnet_mdh_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlion:mbnet_mdh_871_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:redlion:mbnet_mdh_871:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlion:mbnet_mdh_831_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:redlion:mbnet_mdh_831:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlion:mbnet_mdh_855_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:redlion:mbnet_mdh_855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlion:mbnet_mdh_876_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:redlion:mbnet_mdh_876:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlion:mbnet_mdh_858_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:redlion:mbnet_mdh_858:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlion:mbnet_mdh_816_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:redlion:mbnet_mdh_816:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlion:mbnet_mdh_841_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:redlion:mbnet_mdh_841:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlion:mbnet_mdh_859_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:redlion:mbnet_mdh_859:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlion:mbnet_mdh_835_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:redlion:mbnet_mdh_835:-:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
RHSA-2022:0555
|
Red Hat Security Advisory: OpenShift Container Platform 3.11.634 security update
|
jenkins: no POST request is required for the endpoint handling manual build requests which could result in CSRF jenkins-2-plugins/docker-commons: does not sanitize the name of an image or a tag which could result in an OS command execution
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 8.8 | null | null |
GHSA-6rx2-vgf2-fwv2
|
A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue.
|
[] | null | 7.8 | null | null |
|
CVE-2018-10618
|
Davolink DVW-3200N all version prior to Version 1.00.06. The device generates a weak password hash that is easily cracked, allowing a remote attacker to obtain the password for the device.
|
[
"cpe:2.3:o:davolink:dvw-3200n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:davolink:dvw-3200n:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 |
|
GHSA-p7q7-3phc-xxq2
|
In ContactsProvider, there is a possible crash loop due to resource exhaustion. This could lead to local persistent denial of service in the Phone app with User execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 5.5 | null | null |
|
CVE-2020-21654
|
emlog v6.0 contains a vulnerability in the component admin\template.php, which allows attackers to getshell via a crafted Zip file.
|
[
"cpe:2.3:a:emlog:emlog:6.0.0:-:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 |
|
GHSA-5x99-3m4j-vwwh
|
Microsoft Outlook 2002 allows remote attackers to embed bypass the file download restrictions for attachments via an HTML email message that uses an IFRAME to reference malicious content.
|
[] | null | null | null | null |
|
CVE-2016-1656
|
The download implementation in Google Chrome before 50.0.2661.75 on Android allows remote attackers to bypass intended pathname restrictions via unspecified vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-h922-mv7w-mhm4
|
When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn't specify a revocation reason, were unaffected. This vulnerability affects Thunderbird < 91.8.
|
[] | null | 5.4 | null | null |
|
CVE-2022-29656
|
Wedding Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /Wedding-Management/package_detail.php.
|
[
"cpe:2.3:a:wedding_management_system_project:wedding_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2023-26302
|
markdown-it-py CLI crash on invalid UTF-8 characters
|
Denial of service could be caused to the command line interface of markdown-it-py, before v2.2.0, if an attacker was allowed to use invalid UTF-8 characters as input.
|
[
"cpe:2.3:a:executablebooks:markdown-it-py:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
CVE-2013-4287
|
Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.
|
[
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.13:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.15:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.16:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.17:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.18:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.19:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.20:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.21:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.22:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.24:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.25:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p385:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p392:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p426:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p429:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:preview1:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:preview2:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-4pc4-xv7x-hh9q
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP images. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5472.
|
[] | null | null | 8.8 | null |
|
CVE-2021-37995
|
Inappropriate implementation in WebApp Installer in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially overlay and spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-92wp-jghr-hh87
|
Weak encryption in Ninja Core
|
The encrypt() function of Ninja Core v7.0.0 was discovered to use a weak cryptographic algorithm, leading to a possible leakage of sensitive information.
|
[] | null | null | null | null |
CVE-2017-16776
|
Security researchers discovered an authentication bypass vulnerability in version 2.0.2 of the Conserus Workflow Intelligence application by McKesson Medical Imaging Company, which is now a Change Healthcare company. The attacker must send a malicious HTTP GET request to exploit the vulnerability. The vulnerability allows an attacker to bypass authentication and escalate privileges of valid users. An unauthenticated attacker can exploit the vulnerability and be granted limited access to other accounts. An authenticated attacker can exploit the vulnerability and be granted access reserved for higher privilege users.
|
[
"cpe:2.3:a:mckesson:conserus_workflow_intelligence:2.0.2:*:*:*:*:*:*:*"
] | null | null | 8.1 | 6.8 |
|
CVE-2002-0160
|
The administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to read HTML, Java class, and image files outside the web root via a ..\.. (modified ..) in the URL to port 2002.
|
[
"cpe:2.3:a:cisco:secure_access_control_server:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_access_control_server:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_access_control_server:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_access_control_server:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_access_control_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_access_control_server:3.0.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-vcf6-rqgx-fhj7
|
Memory leak in the Certificate Trust List (CTL) Provider service in Cisco Unified Communications Manager (CUCM) 5.x before 5.1(3) and 6.x before 6.1(1) allows remote attackers to cause a denial of service (memory consumption and service interruption) via a series of malformed TCP packets, aka Bug ID CSCsi98433.
|
[] | null | null | null | null |
|
CVE-2013-2671
|
Multiple cross-site scripting (XSS) vulnerabilities in the Brother MFC-9970CDW printer with firmware L (1.10) allow remote attackers to inject arbitrary web script or HTML via the (1) id or (2) val parameter to admin/admin_main.html; (3) id, (4) val, or (5) arbitrary parameter name (QUERY_STRING) to admin/profile_settings_net.html; or (6) kind or (7) arbitrary parameter name (QUERY_STRING) to fax/general_setup.html, a different vulnerability than CVE-2013-2507 and CVE-2013-2670.
|
[
"cpe:2.3:o:brother:mfc-9970cdw_firmware:l\\(1.10\\):*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-9970cdw:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-j85v-4mxr-8hx7
|
A stack overflow in the Edit_BasicSSID function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
|
[] | null | 7.5 | null | null |
|
CVE-2022-28640
|
A potential local adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability was discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses this security vulnerability.
|
[
"cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:apollo_4500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_6500_gen10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:integrated_lights-out_5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-cm3v-7fgr-4cc4
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate user-mode input, which allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via a crafted application, aka "Win32k Null Pointer De-reference Vulnerability."
|
[] | null | 7.1 | null | null |
|
GHSA-r97g-5x4p-h964
|
Wireless IP Camera (P2P) WIFICAM devices have a backdoor root account that can be accessed with TELNET.
|
[] | null | null | 9.8 | null |
|
GHSA-g8jp-jv8p-3qr4
|
An issue was discovered in Schism Tracker through 20190722. There is an integer underflow via a large plen in fmt_okt_load_song in the Amiga Oktalyzer parser in fmt/okt.c.
|
[] | null | 7.8 | null | null |
|
CVE-2024-52373
|
WordPress Devexhub Gallery plugin <= 2.0.1 - Arbitrary File Upload vulnerability
|
Unrestricted Upload of File with Dangerous Type vulnerability in Team Devexhub Devexhub Gallery allows Upload a Web Shell to a Web Server.This issue affects Devexhub Gallery: from n/a through 2.0.1.
|
[
"cpe:2.3:a:team_devexhub:devexhub_gallery:*:*:*:*:*:*:*:*"
] | null | 10 | null | null |
CVE-2024-54148
|
Gogs has a Path Traversal in file editing UI
|
Gogs is an open source self-hosted Git service. A malicious user is able to commit and edit a crafted symlink file to a repository to gain SSH access to the server. The vulnerability is fixed in 0.13.1.
|
[] | 8.7 | null | null | null |
CVE-2020-1201
|
An elevation of privilege vulnerability exists in the way the Windows Now Playing Session Manager handles objects in memory, aka 'Windows Now Playing Session Manager Elevation of Privilege Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2016-2848
|
ISC BIND 9.1.0 through 9.8.4-P2 and 9.9.0 through 9.9.2-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via malformed options data in an OPT resource record.
|
[
"cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:rc5:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:rc6:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.1:rc7:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.1.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc10:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc8:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.0:rc9:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.3:rc4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:rc4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:rc5:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:rc6:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:rc7:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.4:rc8:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.5:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.7:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.2.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.1:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.5:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.3.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:a4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:a5:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:a6:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.3:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.3:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.3:b3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.3:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:a4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:a5:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:a6:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:a7:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:p2_w1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:p2_w2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.1:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.1:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.1:b3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.2:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.2:p3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.2:p4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.3:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6:*:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r1:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r2:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r3:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r4:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r4_p1:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r5:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r5_b1:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r6:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r7:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r9:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r9_p1:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.1:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.1:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.1:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.1:p3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.2:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.2:p3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.3:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.1:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.6:p3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.6:p4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.3:p3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.3:p4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.1:p3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.1:p4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.2:p2:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2016-1000135
|
Reflected XSS in wordpress plugin hdw-tube v1.2
|
[
"cpe:2.3:a:hdw-tube_project:hdw-tube:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-6c2c-pm22-chpr
|
ILIAS 5.1.x, 5.2.x, and 5.3.x before 5.3.5 redirects a logged-in user to a third-party site via the return_to_url parameter.
|
[] | null | null | 6.1 | null |
|
CVE-2019-5463
|
An authorization issue was discovered in the GitLab CE/EE CI badge images endpoint which could result in disclosure of the build status. This vulnerability was addressed in 12.1.2, 12.0.4, and 11.11.6.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 5.3 | null | 5 |
|
GHSA-q729-84hg-j6wm
|
SQL Injection vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary SQL commands via 'classids' Parameter in ajax/query.slide.next.inc
|
[] | null | 8.1 | null | null |
|
CVE-2020-2972
|
Vulnerability in the Oracle Application Express component of Oracle Database Server. Supported versions that are affected are 5.1-19.2. Easily exploitable vulnerability allows low privileged attacker having SQL Workshop privilege with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express accessible data as well as unauthorized read access to a subset of Oracle Application Express accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
CVE-2025-27103
|
Dataease Mysql JDBC Connection Parameters Not Being Verified Leads to Arbitrary File Read Vulnerability
|
DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.6, a bypass for the patch for CVE-2024-55953 allows authenticated users to read and deserialize arbitrary files through the background JDBC connection. The vulnerability has been fixed in v2.10.6. No known workarounds are available.
|
[] | 7.3 | null | null | null |
CVE-2008-4128
|
Multiple cross-site request forgery (CSRF) vulnerabilities in the HTTP Administration component in Cisco IOS 12.4 on the 871 Integrated Services Router allow remote attackers to execute arbitrary commands via (1) a certain "show privilege" command to the /level/15/exec/- URI, and (2) a certain "alias exec" command to the /level/15/exec/-/configure/http URI. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:871_integrated_services_router:-:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2024-49376
|
Autolab Has Misconfigured Reset Password Permissions
|
Autolab, a course management service that enables auto-graded programming assignments, has misconfigured reset password permissions in version 3.0.0. For email-based accounts, users with insufficient privileges could reset and theoretically access privileged users' accounts by resetting their passwords. This issue is fixed in version 3.0.1. No known workarounds exist.
|
[
"cpe:2.3:a:autolabproject:autolab:3.0.0:*:*:*:*:*:*:*"
] | 7.1 | null | null | null |
CVE-2020-1865
|
There is an out-of-bounds read vulnerability in Huawei CloudEngine products. The software reads data past the end of the intended buffer when parsing certain PIM message, an adjacent attacker could send crafted PIM messages to the device, successful exploit could cause out of bounds read when the system does the certain operation.
|
[
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c50spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r003c00spc810:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r005c00spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r005c10spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r019c00spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r019c10spc800:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r002c50spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r003c00spc810:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r005c00spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r005c10spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r019c00spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r019c10spc800:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cloudengine_5800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r002c50spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r003c00spc810:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r005c00spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r005c10spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r005c20spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r019c00spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r019c10spc800:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cloudengine_6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r002c50spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r003c00spc810:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r005c00spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r005c10spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r019c00spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r019c10spc800:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cloudengine_7800:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 3.3 |
|
CVE-2019-18952
|
SibSoft Xfilesharing through 2.5.1 allows cgi-bin/up.cgi arbitrary file upload. This can be combined with CVE-2019-18951 to achieve remote code execution via a .html file, containing short codes, that is served over HTTP.
|
[
"cpe:2.3:a:sibsoft:xfilesharing:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2018-20951
|
cPanel before 68.0.27 allows self XSS in WHM Spamd Startup Config (SEC-387).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
RHSA-2022:7628
|
Red Hat Security Advisory: php:7.4 security, bug fix, and enhancement update
|
php: Special character breaks path in xml parsing php: Use after free due to php_filter_float() failing for ints php-pear: Directory traversal vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.4 | null | null |
CVE-2016-7955
|
The logcheck function in session.inc in AlienVault OSSIM before 5.3.1, when an action has been created, and USM before 5.3.1 allows remote attackers to bypass authentication and consequently obtain sensitive information, modify the application, or execute arbitrary code as root via an "AV Report Scheduler" HTTP User-Agent header.
|
[
"cpe:2.3:a:alienvault:ossim:*:*:*:*:*:*:*:*",
"cpe:2.3:a:alienvault:unified_security_management:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-cr36-9r2x-97q5
|
Unspecified vulnerability in Novell Forum (formerly SiteScape Forum) 7.0, 7.1, 7.2, 7.3, and 8.0 allows remote attackers to execute arbitrary TCL code via a modified URL. NOTE: this might overlap CVE-2007-6515.
|
[] | null | null | null | null |
|
GHSA-f9h4-953h-vx5r
|
Stack-based buffer overflow in Sergey Lyubka Simple HTTPD (shttpd) 1.34 allows remote attackers to execute arbitrary code via a long URI.
|
[] | null | null | null | null |
|
GHSA-48mm-3p2m-g475
|
Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
|
[] | null | null | 9.8 | null |
|
CVE-2021-31661
|
RIOT-OS 2021.01 before commit 609c9ada34da5546cffb632a98b7ba157c112658 contains a buffer overflow that could allow attackers to obtain sensitive information.
|
[
"cpe:2.3:o:riot-os:riot:2021.01:-:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2017-1000386
|
Jenkins Active Choices plugin version 1.5.3 and earlier allowed users with Job/Configure permission to provide arbitrary HTML to be shown on the 'Build With Parameters' page through the 'Active Choices Reactive Reference Parameter' type. This could include, for example, arbitrary JavaScript. Active Choices now sanitizes the HTML inserted on the 'Build With Parameters' page if and only if the script is executed in a sandbox. As unsandboxed scripts are subject to administrator approval, it is up to the administrator to allow or disallow problematic script output.
|
[
"cpe:2.3:a:jenkins:active_choices:*:*:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:active_choices:1.5.3:-:*:*:*:*:*:*",
"cpe:2.3:a:jenkins:active_choices:1.5.3:alpha:*:*:*:jenkins:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-c7v6-mhfv-qgg2
|
A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, remote attacker to send a malicious packet to the management interface on an affected system and execute a command-injection exploit. The vulnerability is due to incorrect input validation of user-supplied data to the NX-API subsystem. An attacker could exploit this vulnerability by sending a malicious HTTP or HTTPS packet to the management interface of an affected system that has the NX-API feature enabled. A successful exploit could allow the attacker to execute arbitrary commands with root privileges. Note: NX-API is disabled by default. This vulnerability affects MDS 9000 Series Multilayer Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCvd47415, CSCve03216, CSCve03224, CSCve03234.
|
[] | null | 8.8 | null | null |
|
CVE-2021-24567
|
Simple Post <= 1.1 - Authenticated Stored Cross-Site Scripting (XSS)
|
The Simple Post WordPress plugin through 1.1 does not sanitize user input when an authenticated user Text value, then it does not escape these values when outputting to the browser leading to an Authenticated Stored XSS Cross-Site Scripting issue.
|
[
"cpe:2.3:a:nickmomrik:simple_post:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
CVE-2023-1211
|
SQL Injection in phpipam/phpipam
|
SQL Injection in GitHub repository phpipam/phpipam prior to v1.5.2.
|
[
"cpe:2.3:a:phpipam:phpipam:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | null |
RHSA-2022:4957
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | 5.3 | null | null |
GHSA-9272-j67v-qf39
|
Unspecified vulnerability in the AClient agent in Symantec Altiris Deployment Solution 6.9.x before 6.9 SP3 Build 430, when key-based authentication is being used between a deployment server and a client, allows remote attackers to bypass authentication and execute arbitrary commands as SYSTEM by spoofing the deployment server and sending "alternate commands" before the handshake is completed.
|
[] | null | null | null | null |
|
RHSA-2012:0034
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: IIOP deserialization code execution (Deserialization, 7055902) OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823) JDK: unspecified vulnerability fixed in 6u29 (Sound) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) JDK: unspecified vulnerability fixed in 6u29 (Swing) JDK: unspecified vulnerability fixed in 6u29 (AWT) OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640) OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794) OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857) OpenJDK: RMI DGC server remote code execution (RMI, 7077466) OpenJDK: RMI registry privileged code execution (RMI, 7083012) OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936) JDK: unspecified vulnerability fixed in 6u29 (Deployment)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
GHSA-ccqp-gv79-xc45
|
Information exposure vulnerability in Shenzhen Reachfar v28, the exploitation of which could allow a remote attacker to retrieve all the week's logs stored in the 'log2' directory. An attacker could retrieve sensitive information such as remembered wifi networks, sent messages, SOS device locations and device configurations.
|
[] | null | 7.5 | null | null |
|
CVE-2018-9091
|
A critical vulnerability in the KEMP LoadMaster Operating System (LMOS) 6.0.44 through 7.2.41.2 and Long Term Support (LTS) LMOS before 7.1.35.5 related to Session Management could allow an unauthenticated, remote attacker to bypass security protections, gain system privileges, and execute elevated commands such as ls, ps, cat, etc., thereby compromising the system. Through this remote execution, in certain cases, exposure of sensitive system data such as certificates, private keys, and other information may be possible.
|
[
"cpe:2.3:o:kemptechnologies:loadmaster_operating_system:*:*:*:*:*:*:*:*",
"cpe:2.3:o:kemptechnologies:loadmaster_operating_system:*:*:*:*:lts:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2023-52672
|
pipe: wakeup wr_wait after setting max_usage
|
In the Linux kernel, the following vulnerability has been resolved:
pipe: wakeup wr_wait after setting max_usage
Commit c73be61cede5 ("pipe: Add general notification queue support") a
regression was introduced that would lock up resized pipes under certain
conditions. See the reproducer in [1].
The commit resizing the pipe ring size was moved to a different
function, doing that moved the wakeup for pipe->wr_wait before actually
raising pipe->max_usage. If a pipe was full before the resize occured it
would result in the wakeup never actually triggering pipe_write.
Set @max_usage and @nr_accounted before waking writers if this isn't a
watch queue.
[Christian Brauner <[email protected]>: rewrite to account for watch queues]
|
[
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 7 | null | null |
RHSA-2022:6370
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes
|
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode moment: inefficient parsing algorithm resulting in DoS golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
|
[
"cpe:/a:redhat:acm:2.6::el8"
] | null | 6.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.