id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2013-5563 | Cross-site scripting (XSS) vulnerability in Query/NewQueryResult.jsp in Cisco Security Monitoring, Analysis and Response System (CS-MARS) allows remote attackers to inject arbitrary web script or HTML via the isnowLatency parameter, aka Bug ID CSCul16173. | [
"cpe:2.3:h:cisco:security_monitoring_analysis_and_response_system:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2024:3418 | Red Hat Security Advisory: rust security update | rust-cargo: cargo does not respect the umask when extracting dependencies | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 6.7 | null | null |
GHSA-27qm-xvmj-53q7 | Multiple directory traversal vulnerabilities in cpCommerce 1.1.0 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in (1) the language parameter in a language action to the default URI, which is not properly handled in actions/language.act.php, or (2) the action parameter to category.php. | [] | null | null | null | null |
|
CVE-2020-12723 | regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls. | [
"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_eagle_application_processor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_lsms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:configuration_manager:12.1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:sd-wan_edge:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:sd-wan_edge:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:sd-wan_edge:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2019-1003061 | Jenkins jenkins-cloudformation-plugin Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | [
"cpe:2.3:a:jenkins:jenkins-cloudformation-plugin:*:*:*:*:*:jenkins:*:*"
] | null | 8.8 | null | 4 |
|
CVE-2023-23885 | WordPress Quick Contact Form Plugin <= 8.0.3.1 is vulnerable to Cross Site Scripting (XSS) | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Fullworks Quick Contact Form plugin <= 8.0.3.1 versions. | [
"cpe:2.3:a:fullworksplugins:quick_contact_form:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
GHSA-7m6p-hc66-rg3q | The dissect_sdp_media_attribute function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly process crypto-suite parameters, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet. | [] | null | null | null | null |
|
GHSA-gpfc-2jpc-6v6c | Stack-based buffer overflow in st-wizard.exe in Subtitle Translation Wizard 3.0 allows user-assisted remote attackers to execute arbitrary code via a crafted SRT file with a long line after a time range. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
RHSA-2023:3243 | Red Hat Security Advisory: git security update | git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents git: malicious placement of crafted messages when git was compiled with runtime prefix git: arbitrary configuration injection when renaming or deleting a section from a configuration file | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.8 | null | null |
CVE-2024-38188 | Azure Network Watcher VM Agent Elevation of Privilege Vulnerability | Azure Network Watcher VM Agent Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:azure_network_watcher_agent:*:*:*:*:*:windows:*:*"
] | null | 7.1 | null | null |
CVE-2025-46355 | Incorrect default permissions issue in PC Time Tracer prior to 5.2. If exploited, arbitrary code may be executed with SYSTEM privilege on Windows system where the product is running by a local authenticated attacker. | [] | 7 | null | 7.3 | null |
|
CVE-2022-20040 | In power_hal_manager_service, there is a possible permission bypass due to a stack-based buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219150; Issue ID: ALPS06219150. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2021-28691 | Guest triggered use-after-free in Linux xen-netback A malicious or buggy network PV frontend can force Linux netback to disable the interface and terminate the receive kernel thread associated with queue 0 in response to the frontend sending a malformed packet. Such kernel thread termination will lead to a use-after-free in Linux netback when the backend is destroyed, as the kernel thread associated with queue 0 will have already exited and thus the call to kthread_stop will be performed against a stale pointer. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
GHSA-4hpj-g79q-h8h5 | The tcp_read_sock function in net/ipv4/tcp.c in the Linux kernel before 2.6.34 does not properly manage skb consumption, which allows local users to cause a denial of service (system crash) via a crafted splice system call for a TCP socket. | [] | null | 5.5 | null | null |
|
GHSA-36w4-5gpx-jw2f | Transient DOS while parsing the BSS parameter change count or MLD capabilities fields of the ML IE. | [] | null | 7.5 | null | null |
|
RHSA-2018:2331 | Red Hat Security Advisory: Red Hat OpenStack Platform 12.0 director security and bug fix update | memcached: UDP server support allows spoofed traffic amplification DoS | [
"cpe:/a:redhat:openstack:12::el7"
] | null | null | 5.3 | null |
CVE-2008-7010 | Skalfa Software SkaLinks Exchange Script 1.5 allows remote attackers to add new administrators and gain privileges via a direct request to admin/register.php. | [
"cpe:2.3:a:skalinks:exchange_script:1.5:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2001-1072 | Apache with mod_rewrite enabled on most UNIX systems allows remote attackers to bypass RewriteRules by inserting extra / (slash) characters into the requested path, which causes the regular expression in the RewriteRule to fail. | [
"cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2003-0338 | Directory traversal vulnerability in WsMp3 daemon (WsMp3d) 0.0.10 and earlier allows remote attackers to read and execute arbitrary files via .. (dot dot) sequences in HTTP GET or POST requests. | [
"cpe:2.3:a:wsmp3:wsmp3_daemon:0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_daemon:0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_daemon:0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wsmp3:wsmp3_web_server:0.0.7:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-7px4-864r-qv7w | Use-after-free vulnerability in the GetLoadTimes function in renderer/loadtimes_extension_bindings.cc in the Extensions implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that modifies a pointer used for reporting loadTimes data. | [] | null | null | null | null |
|
GHSA-vjh6-m6p3-x58p | A cross-site request forgery (CSRF) in /admin/maintenance/ of Domainmod 4.13 allows attackers to arbitrarily delete logs. | [] | null | null | null | null |
|
GHSA-q97g-c29h-x2p7 | Whoogle Search Path Traversal vulnerability | Whoogle Search is a self-hosted metasearch engine. In versions prior to 0.8.4, the `element` method in `app/routes.py` does not validate the user-controlled `src_type` and `element_url` variables and passes them to the `send` method which sends a GET request on lines 339-343 in `request.py`, which leads to a server-side request forgery. This issue allows for crafting GET requests to internal and external resources on behalf of the server. For example, this issue would allow for accessing resources on the internal network that the server has access to, even though these resources may not be accessible on the internet. This issue is fixed in version 0.8.4. | [] | null | 9.1 | null | null |
GHSA-pj28-mx3m-9668 | Buffer overflow in Ruby 1.9.x before 1.9.1-p429 on Windows might allow local users to gain privileges via a crafted ARGF.inplace_mode value that is not properly handled when constructing the filenames of the backup files. | [] | null | null | null | null |
|
CVE-2014-6278 | GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277. | [
"cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-65w8-mf96-wpcm | Inappropriate implementation in ChromeOS Networking in Google Chrome on ChromeOS prior to 94.0.4606.54 allowed an attacker with a rogue wireless access point to to potentially carryout a wifi impersonation attack via a crafted ONC file. | [] | null | null | null | null |
|
CVE-2024-42336 | Servision - CWE-287: Improper Authentication | Servision - CWE-287: Improper Authentication | [
"cpe:2.3:a:servision:ivg_webmax:*:*:*:*:*:*:*:*",
"cpe:2.3:a:servision:ivg_webmax:1.0.57:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
GHSA-3qvj-q9mh-gv5x | The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) .
This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset. | [] | null | 7.7 | null | null |
|
GHSA-xf2v-vm6q-p68c | Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of V8 files in the V-Simulator 5 component. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24769. | [] | null | null | 7.8 | null |
|
CVE-2019-10297 | Jenkins Sametime Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | [
"cpe:2.3:a:jenkins:sametime:*:*:*:*:*:jenkins:*:*"
] | null | 8.8 | null | 4 |
|
GHSA-74vp-qhxg-m3qw | PHP remote file inclusion vulnerability in modules/guestbook/index.php in ALiCE-CMS 0.1 allows remote attackers to execute arbitrary PHP code via a URL in the CONFIG[local_root] parameter. | [] | null | null | null | null |
|
GHSA-694f-8w7q-gg37 | An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka "Windows Common Log File System Driver Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. | [] | null | null | 7 | null |
|
CVE-2018-6587 | CA API Developer Portal 3.5 up to and including 3.5 CR6 has a reflected cross-site scripting vulnerability related to the widgetID variable. | [
"cpe:2.3:a:ca:api_developer_portal:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:api_developer_portal:3.5:cr1:*:*:*:*:*:*",
"cpe:2.3:a:ca:api_developer_portal:3.5:cr2:*:*:*:*:*:*",
"cpe:2.3:a:ca:api_developer_portal:3.5:cr3:*:*:*:*:*:*",
"cpe:2.3:a:ca:api_developer_portal:3.5:cr4:*:*:*:*:*:*",
"cpe:2.3:a:ca:api_developer_portal:3.5:cr5:*:*:*:*:*:*",
"cpe:2.3:a:ca:api_developer_portal:3.5:cr6:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-28w6-v9pv-jfvr | Multiple cross-site scripting (XSS) vulnerabilities in BLOG:CMS 4.2.1b allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) admin.php or (2) index.php in photo/. | [] | null | null | null | null |
|
GHSA-wwqh-qmmx-4gw7 | Cross-site request forgery (CSRF) vulnerability in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allows remote attackers to perform unauthorized actions as authenticated MediaWiki users. | [] | null | null | null | null |
|
GHSA-8fq4-fp76-vppr | Cross-site scripting (XSS) vulnerability in blogs/blog1.php in b2evolution 4.1.3 allows remote attackers to inject arbitrary web script or HTML via the message body. | [] | null | null | null | null |
|
GHSA-hxv9-4gxx-v284 | SQL injection vulnerability in D-Link Online behavior audit gateway DAR-7000 V31R02B1413C allows a remote attacker to obtain sensitive information and execute arbitrary code via the editrole.php component. | [] | null | 9.8 | null | null |
|
GHSA-vqq8-vphp-8x9c | The client in OpenText Archive Center Administration through 21.2 allows XXE attacks. Authenticated users of the OpenText Archive Center Administration client (Versions 16.2.3, 21.2, and older versions) could upload XML files to the application that it did not sufficiently validate. As a result, attackers could craft XML files that, when processed by the application, would cause a negative security impact such as data exfiltration or localized denial of service against the application instance and system of the user running it. | [] | null | 7.1 | null | null |
|
CVE-2012-1986 | Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with an authorized SSL key and certain permissions on the puppet master to read arbitrary files via a symlink attack in conjunction with a crafted REST request for a file in a filebucket. | [
"cpe:2.3:a:puppet:puppet:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.1:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-hhwp-x6c3-m33w | Firefox 1.0.3 and 1.0.4, and Netscape 8.0.2, allows remote attackers to execute arbitrary code by tricking the user into using the "Set As Wallpaper" (in Firefox) or "Set as Background" (in Netscape) context menu on an image URL that is really a javascript: URL with an eval statement, aka "Firewalling." | [] | null | null | null | null |
|
GHSA-53gx-j362-742j | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Boston University (IS&T) BU Section Editing allows Reflected XSS.This issue affects BU Section Editing: from n/a through 0.9.9. | [] | null | 7.1 | null | null |
|
GHSA-68x6-p7v3-xxqm | Belledonne Belle-sip before 5.0.20 can crash applications such as Linphone via an invalid From header (request URI without a parameter) in an unauthenticated SIP message, a different issue than CVE-2021-33056. | [] | null | null | null | null |
|
GHSA-wm97-xp23-f4x4 | In the Linux kernel, the following vulnerability has been resolved:ndisc: extend RCU protection in ndisc_send_skb()ndisc_send_skb() can be called without RTNL or RCU held.Acquire rcu_read_lock() earlier, so that we can use dev_net_rcu()
and avoid a potential UAF. | [] | null | 7.8 | null | null |
|
GHSA-6qhp-jhx6-4vrq | BlogPHP 2.0 allows remote attackers to bypass authentication, and post (1) messages or (2) comments as an arbitrary user, via a modified blogphp_username field in a cookie. | [] | null | null | null | null |
|
GHSA-8pqj-vj9j-2jf2 | Missing input validation and OS command integration of the input in the utnserver Pro, utnserver ProMAX, INU-100 web-interface allows authenticated command injection.This issue affects utnserver Pro, utnserver ProMAX, INU-100 version 20.1.22 and below. | [] | null | null | null | null |
|
CVE-2022-25752 | A vulnerability has been identified in SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIPLUS NET SCALANCE X308-2. The webserver of affected devices calculates session ids and nonces in an insecure manner. This could allow an unauthenticated remote attacker to brute-force session ids and hijack existing sessions. | [
"cpe:2.3:o:siemens:scalance_x302-7eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x302-7eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x304-2fe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x304-2fe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x306-1ldfe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x306-1ldfe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x307-2eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x307-2eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x307-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x307-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x307-3ld_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x307-3ld:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2ld_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2ld:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2lh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2lh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2lh\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2lh\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2m_poe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2m_poe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x308-2m_ts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x308-2m_ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x310_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x310fe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x310fe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x320-1fe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x320-1fe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x320-1-2ldfe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x320-1-2ldfe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x408-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x408-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-4m_eec_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-4m_eec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-4m_poe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-4m_poe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-4m_poe_ts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-4m_poe_ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-12m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-12m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xr324-12m_ts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xr324-12m_ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_net_scalance_x308-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_net_scalance_x308-2:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-px3f-hrcm-xvcv | pyscriptjs (aka PyScript Demonstrator) in PyScript through 2022-05-04 allows a remote user to read Python source code. | [] | null | 7.5 | null | null |
|
GHSA-4mvv-v35x-r8h9 | Missing Authorization vulnerability in Jeroen Peters Name Directory.This issue affects Name Directory: from n/a through 1.30.0. | [] | null | 4.3 | null | null |
|
CVE-2014-8686 | CodeIgniter before 2.2.0 makes it easier for attackers to decode session cookies by leveraging fallback to a custom XOR-based encryption scheme when the Mcrypt extension for PHP is not available. | [
"cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 |
|
CVE-2024-2550 | PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway Using a Specially Crafted Packet | A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode. | [
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h10:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h9:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h8:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h7:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h6:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h5:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h4:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h14:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.1:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h5:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h4:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h12:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h11:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h10:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h9:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h8:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h7:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h6:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h5:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h4:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h4:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h4:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h13:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h6:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h5:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h4:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h16:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h15:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h14:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h13:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h12:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h11:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h9:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h8:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h7:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h6:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h5:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h13:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h12:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h11:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h10:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h9:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h8:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h7:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h6:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h5:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h4:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h5:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h4:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h3:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.2:-:*:*:*:*:*:*"
] | 8.7 | null | null | null |
GHSA-pc5r-gv46-hg46 | Kingston DataTraveler BlackBox (DTBB), DataTraveler Secure Privacy Edition (DTSP), and DataTraveler Elite Privacy Edition (DTEP) USB flash drives do not prevent password replay attacks, which allows physically proximate attackers to access the cleartext drive contents by providing a key that was captured in a USB data stream at an earlier time. | [] | null | null | null | null |
|
CVE-2025-31748 | WordPress Opal Portfolio Plugin <= 1.0.4 - Stored Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpopal Opal Portfolio allows Stored XSS. This issue affects Opal Portfolio: from n/a through 1.0.4. | [] | null | 6.5 | null | null |
CVE-2024-25730 | Hitron CODA-4582 and CODA-4589 devices have default PSKs that are generated from 5-digit hex values concatenated with a "Hitron" substring, resulting in insufficient entropy (only about one million possibilities). | [
"cpe:2.3:o:hitrontech:coda-4582u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hitrontech:coda-4589_firmware:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-49r4-3f39-m5xp | The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's aux_contact_box and aux_gmaps shortcodes in all versions up to, and including, 2.16.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-q6fw-3p2m-2c6h | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of "access control context" in the JMX RequiredModelMBean class. | [] | null | null | null | null |
|
GHSA-7q7g-fjp6-g4rg | Reflected Cross-Site Scripting (XSS) in TeamCal Neo, version 3.8.2. This allows an attacker to execute malicious JavaScript code, after injecting code via the ‘abs’ parameter in ‘/teamcal/src/index.php’. | [] | null | 6.1 | null | null |
|
RHSA-2022:7049 | Red Hat Security Advisory: OpenJDK 8u352 Windows Security Update | OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) | [
"cpe:/a:redhat:openjdk:1.8::windows"
] | null | 5.3 | null | null |
GHSA-pq5c-5x7j-h8j2 | Cross-Site Request Forgery (CSRF) vulnerability in Logaster Logaster Logo Generator plugin <= 1.3 versions. | [] | null | 4.3 | null | null |
|
GHSA-77r3-r6pq-j636 | IBM Cognos Analytics 11.2.1, 11.2.0, and 11.1.7 could allow a remote attacker to upload arbitrary files, caused by improper content validation. IBM X-Force ID: 211238. | [] | null | 9.8 | null | null |
|
GHSA-64jr-ggw8-h9jc | Credentials stored in plain text by debian-package-builder Plugin | debian-package-builder Plugin 1.6.11 and earlier stores a GPG passphrase unencrypted in its global configuration file `ru.yandex.jenkins.plugins.debuilder.DebianPackageBuilder.xml` on the Jenkins controller. This credential can be viewed by users with access to the Jenkins controller file system. | [] | null | 3.3 | null | null |
GHSA-4fcv-mw8j-p2h2 | The Panda Pods Repeater Field WordPress plugin before 1.5.4 does not sanitize and escapes a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against a user having at least Contributor permission. | [] | null | 5.4 | null | null |
|
GHSA-646r-w7g9-c4x4 | The All-in-one Floating Contact Form WordPress plugin before 2.1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 4.8 | null | null |
|
GHSA-pmrj-j463-wcmg | Multiple directory traversal vulnerabilities in telepark.wiki 2.4.23 and earlier allow remote attackers to read arbitrary files via directory traversal sequences in the css parameter to (1) getjs.php and (2) getcsslocal.php; and include and execute arbitrary local files via the (3) group parameter to upload.php. | [] | null | null | null | null |
|
GHSA-37p4-269j-q6r9 | SeaCMS v12.9 is vulnerable to Arbitrary File Read via admin_safe.php. | [] | null | 6.5 | null | null |
|
RHSA-2024:0716 | Red Hat Security Advisory: gimp security update | gimp: dds buffer overflow RCE gimp: PSD buffer overflow RCE gimp: psp integer overflow RCE gimp: psp off-by-one RCE | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2020:0799 | Red Hat Security Advisory: OpenShift Container Platform 3.11 openshift-enterprise-mediawiki-container security update | openshift/mediawiki: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 7 | null | null |
GHSA-f87c-gcf2-w8gr | Cross-site scripting (XSS) vulnerability in John Himmelman (aka DaRk2k1) PowerPortal 1.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly related to registering a user. NOTE: the provenance of this information is unknown; the details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-65hf-6m93-q9jf | This vulnerability allows remote attackers to execute arbitrary code on affected installations of TeamViewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TVS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13606. | [] | null | null | null | null |
|
GHSA-86hh-v273-w3qf | Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a long argument to the document.write method. | [] | null | null | null | null |
|
GHSA-hm95-xc86-pqpj | A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Student Attendance Management System 1.0 via the couse filed in index.php. | [] | null | 5.4 | null | null |
|
CVE-2022-33709 | Improper input validation vulnerability in ApexPackageInstaller in Galaxy Store prior to version 4.5.41.8 allows local attackers to launch activities as Galaxy Store privilege. | [
"cpe:2.3:a:samsung:galaxy_store:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
GHSA-rr28-4v9r-6wcq | A flaw was found in libwebp in versions before 1.0.1. An unitialized variable is used in function ReadSymbol. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | [] | null | 9.8 | null | null |
|
GHSA-m45f-vx7g-925j | The rsvpmaker plugin before 6.2 for WordPress has SQL injection. | [] | null | null | 9.8 | null |
|
CVE-2016-6902 | lshell 0.9.16 allows remote authenticated users to break out of a limited shell and execute arbitrary commands. | [
"cpe:2.3:a:lshell_project:lshell:0.9.16:*:*:*:*:*:*:*"
] | null | null | 9.9 | 9 |
|
GHSA-h8m2-gw8r-5752 | MySQL 3.20 through 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for attackers to decrypt the password via brute force methods. | [] | null | null | null | null |
|
GHSA-xwcw-m39w-gg87 | A vulnerability in the SSL VPN negotiation process for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to inefficient direct memory access (DMA) memory management during the negotiation phase of an SSL VPN connection. An attacker could exploit this vulnerability by sending a steady stream of crafted Datagram TLS (DTLS) traffic to an affected device. A successful exploit could allow the attacker to exhaust DMA memory on the device and cause a DoS condition. | [] | null | 7.5 | null | null |
|
GHSA-34fq-w3c7-7c97 | Skia, as used in Google Chrome before 18.0.1025.151, does not properly perform clipping, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | [] | null | null | null | null |
|
GHSA-8rx8-8w3f-mvq2 | In Bluetooth, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-209062898 | [] | null | 6.8 | null | null |
|
CVE-2024-36617 | FFmpeg n6.1.1 has an integer overflow vulnerability in the FFmpeg CAF decoder. | [] | null | 6.2 | null | null |
|
RHSA-2020:3834 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | 6.1 | null |
CVE-2021-44082 | textpattern 4.8.7 is vulnerable to Cross Site Scripting (XSS) via /textpattern/index.php,Body. A remote and unauthenticated attacker can use XSS to trigger remote code execution by uploading a webshell. To do so they must first steal the CSRF token before submitting a file upload request. | [
"cpe:2.3:a:textpattern:textpattern:4.8.7:*:*:*:*:*:*:*"
] | null | 8.3 | null | 5.1 |
|
GHSA-gjjr-63x4-v8cq | langchain_experimental vulnerable to arbitrary code execution via PALChain in the python exec method | langchain_experimental (aka LangChain Experimental) in LangChain before 0.0.306 allows an attacker to bypass the CVE-2023-36258 fix and execute arbitrary code via __import__ in Python code, which is not prohibited by pal_chain/base.py. | [] | null | 9.8 | null | null |
GHSA-4g7q-7553-2768 | Improper permissions for Intel(R) USB 3.0 Creator Utility all versions may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | null | null | 7.8 | null |
|
GHSA-fww2-2rfq-642g | Unrestricted file upload vulnerability in IMCE before 1.6, a Drupal module, allows remote authenticated users to upload arbitrary PHP code via a filename with a double extension such as .php.gif. | [] | null | null | null | null |
|
CVE-2024-6493 | NinjaTeam Header Footer Custom Code < 1.2 - Admin+ Stored XSS | The NinjaTeam Header Footer Custom Code WordPress plugin before 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:ninjateam:header_footer_custom_code:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ninjateam:header_footer_custom_code:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null |
CVE-2021-22048 | The vCenter Server contains a privilege escalation vulnerability in the IWA (Integrated Windows Authentication) authentication mechanism. A malicious actor with non-administrative access to vCenter Server may exploit this issue to elevate privileges to a higher privileged group. | [
"cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:cloud_foundation:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
GHSA-pqqv-8xrg-2jg9 | In the Linux kernel, the following vulnerability has been resolved:cxl/port: Fix delete_endpoint() vs parent unregistration raceThe CXL subsystem, at cxl_mem ->probe() time, establishes a lineage of
ports (struct cxl_port objects) between an endpoint and the root of a
CXL topology. Each port including the endpoint port is attached to the
cxl_port driver.Given that setup, it follows that when either any port in that lineage
goes through a cxl_port ->remove() event, or the memdev goes through a
cxl_mem ->remove() event. The hierarchy below the removed port, or the
entire hierarchy if the memdev is removed needs to come down.The delete_endpoint() callback is careful to check whether it is being
called to tear down the hierarchy, or if it is only being called to
teardown the memdev because an ancestor port is going through
->remove().That care needs to take the device_lock() of the endpoint's parent.
Which requires 2 bugs to be fixed:1/ A reference on the parent is needed to prevent use-after-free
scenarios like this signature:2/ In the case of RCH topologies, the parent device that needs to be
locked is not always @port->dev as returned by cxl_mem_find_port(), use
endpoint->dev.parent instead. | [] | null | 4.4 | null | null |
|
GHSA-mrmh-v2v3-3c8h | Unspecified vulnerability in the Oracle Forms component in Oracle E-Business Suite 11.5.10.2 allows remote attackers to affect integrity via unknown vectors. | [] | null | null | null | null |
|
CVE-2014-3385 | Race condition in the Health and Performance Monitoring (HPM) for ASDM feature in Cisco ASA Software 8.3 before 8.3(2.42), 8.4 before 8.4(7.11), 8.5 before 8.5(1.19), 8.6 before 8.6(1.13), 8.7 before 8.7(1.11), 9.0 before 9.0(4.8), and 9.1 before 9.1(4.5) allows remote attackers to cause a denial of service (device reload) via TCP traffic that triggers many half-open connections at the same time, aka Bug ID CSCum00556. | [
"cpe:2.3:a:cisco:asa:8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asa:8.3.2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asa:8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asa:8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asa:8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asa:8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asa:8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asa:8.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asa:8.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asa:8.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asa:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asa:8.5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asa:8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asa:8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asa:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asa:9.1:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2024-27809 | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2008-6710 | Unspecified vulnerability in the Web administration interface in Avaya Communication Manager 3.1.x before CM 3.1.4 SP2 and 4.0.x before 4.0.3 SP1 allows remote authenticated administrators to gain root privileges via unknown vectors related to "configuring data viewing or restoring credentials." | [
"cpe:2.3:a:avaya:communication_manager:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0.1:sp15215:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0.1:sp15500:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0.2:sp1:*:*:*:*:*:*",
"cpe:2.3:a:avaya:communication_manager:4.0.3:*:*:*:*:*:*:*"
] | null | null | null | 9 |
|
CVE-2024-27619 | Dlink Dir-3040us A1 1.20b03a hotfix is vulnerable to Buffer Overflow. Any user having read/write access to ftp server can write directly to ram causing buffer overflow if file or files uploaded are greater than available ram. Ftp server allows change of directory to root which is one level up than root of usb flash directory. During upload ram is getting filled and causing system resource exhaustion (no free memory) which causes system to crash and reboot. | [
"cpe:2.3:o:dlink:dir-3040_firmware:1.20b03:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
|
GHSA-j3qx-4gvc-v53m | The Site Reviews WordPress plugin before 5.13.1 does not sanitise some of its Review Details when adding a review as an admin, which could allow them to perform Cross-Site Scripting attacks when the unfiltered_html is disallowed | [] | null | null | null | null |
|
cisco-sa-fmc-sqli-WFFDnNOs | Cisco Firepower Management Center Software SQL Injection Vulnerability | A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
This vulnerability exists because the web-based management interface does not adequately validate user input. An attacker could exploit this vulnerability by authenticating to the application and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain any data from the database, execute arbitrary commands on the underlying operating system, and elevate privileges to root. To exploit this vulnerability, an attacker would need at least Read Only user credentials.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the May 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75298"]. | [] | null | 8.8 | null | null |
CVE-2018-11653 | Information disclosure in Netwave IP camera at //etc/RT2870STA.dat (via HTTP on port 8000) allows an unauthenticated attacker to exfiltrate sensitive information about the network configuration like the network SSID and password. | [
"cpe:2.3:o:seasofsolutions:ip_camera_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:seasofsolutions:ip_camera:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 5 |
|
GHSA-h5v2-45wq-whr4 | DolphinPHP 1.5.1 is vulnerable to Cross Site Scripting (XSS) via Background - > System - > system function - > configuration management. | [] | null | 5.4 | null | null |
|
CVE-2023-41138 | The AppsAnywhere macOS client-privileged helper can be tricked into executing arbitrary commands with elevated permissions by a local user process. | [
"cpe:2.3:a:appsanywhere:appsanywhere_client:1.4.0:*:*:*:*:macos:*:*",
"cpe:2.3:a:appsanywhere:appsanywhere_client:1.4.1:*:*:*:*:macos:*:*",
"cpe:2.3:a:appsanywhere:appsanywhere_client:1.5.1:*:*:*:*:macos:*:*",
"cpe:2.3:a:appsanywhere:appsanywhere_client:1.5.2:*:*:*:*:macos:*:*",
"cpe:2.3:a:appsanywhere:appsanywhere_client:1.6.0:*:*:*:*:macos:*:*",
"cpe:2.3:a:appsanywhere:appsanywhere_client:2.0.0:*:*:*:*:macos:*:*"
] | null | 7.5 | null | null |
|
CVE-2017-9588 | The "Oritani Mobile Banking" by Oritani Bank app 3.0.0 -- aka oritani-mobile-banking/id778851066 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:meafinancial:oritani_mobile_banking:3.0.0:*:*:*:*:iphone_os:*:*"
] | null | null | 5.9 | 4.3 |
|
GHSA-vjx5-qhvw-79qj | The nsTransformedTextRun::SetCapitalization function in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read of heap memory) via a crafted Cascading Style Sheets (CSS) token sequence that triggers a restyle or reflow operation. | [] | null | null | null | null |
|
GHSA-4xrm-7fmv-6pvg | Use-after-free vulnerability in the instanceof function in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code by leveraging improper reference handling, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984. | [] | null | null | 8.8 | null |
|
CVE-2024-49688 | WordPress ARPrice plugin <= 4.0.3 - Unauthenticated PHP Object Injection vulnerability | Deserialization of Untrusted Data vulnerability in NotFound ARPrice allows Object Injection. This issue affects ARPrice: from n/a through 4.0.3. | [] | null | 9.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.