id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-p795-v7xm-xvv6 | Hengan Weighing Management Information Query Platform 2019-2021 53.25 was discovered to contain a SQL injection vulnerability via the tuser_Number parameter at search_user.aspx. | [] | null | 8.2 | null | null |
|
CVE-2018-19565 | A buffer over-read in crop_masked_pixels in dcraw through 9.28 could be used by attackers able to supply malicious files to crash an application that bundles the dcraw code or leak private information. | [
"cpe:2.3:a:dcraw_project:dcraw:*:*:*:*:*:*:*:*"
] | null | null | 7.1 | 5.8 |
|
CVE-2024-40114 | A Cross Site Scripting (XSS) vulnerability in Sitecom WLX-2006 Wall Mount Range Extender N300 v1.5 and before allows an attacker to manipulate the language cookie to inject malicious JavaScript code. | [] | null | 6.1 | null | null |
|
CVE-2006-2262 | Cross-site scripting (XSS) vulnerability in index.php in singapore 0.9.7 allows remote attackers to inject arbitrary web script or HTML via the image parameter. | [
"cpe:2.3:a:singapore:singapore:0.9.7:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
CVE-2020-11635 | The Zscaler Client Connector prior to 3.1.0 did not sufficiently validate RPC clients, which allows a local adversary to execute code with system privileges or perform limited actions for which they did not have privileges. | [
"cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*"
] | null | 7.8 | null | 7.2 |
|
cisco-sa-20170322-xeci | Cisco IOS XE Software HTTP Command Injection Vulnerability | A vulnerability in the web framework of Cisco IOS XE Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges.
The vulnerability is due to insufficient input validation of HTTP parameters supplied by the user. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected web page parameter. The user must be authenticated to access the affected parameter. A successful exploit could allow the attacker to execute commands with root privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the March 22, 2017, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes five Cisco Security Advisories that describe five vulnerabilities. All the vulnerabilities have a Security Impact Rating of High. For a complete list of the advisories and links to them, see Cisco Event Response: March 2017 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-60851"]. | [] | null | null | 8.8 | null |
CVE-2021-20185 | It was found in Moodle before version 3.10.1, 3.9.4, 3.8.7 and 3.5.16 that messaging did not impose a character limit when sending messages, which could result in client-side (browser) denial of service for users receiving very large messages. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.10.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2016-0554 | Unspecified vulnerability in the Oracle Interaction Center Intelligence component in Oracle E-Business Suite 11.5.10.2, 12.1.1, 12.1.2, and 12.1.3 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Business Intelligence. | [
"cpe:2.3:a:oracle:interaction_center_intelligence:11.5.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:interaction_center_intelligence:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:interaction_center_intelligence:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:interaction_center_intelligence:12.1.3:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2024-0261 | Sentex FTPDMIN RNFR Command denial of service | A vulnerability has been found in Sentex FTPDMIN 0.96 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component RNFR Command Handler. The manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249817 was assigned to this vulnerability. | [
"cpe:2.3:a:ftpdmin_project:ftpdmin:0.96:*:*:*:*:*:*:*"
] | null | 5.3 | 5.3 | 5 |
GHSA-phhq-j3pr-xv78 | In multiple files, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262235998 | [] | null | 5.5 | null | null |
|
GHSA-w78j-vw2g-233v | A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability. | [] | null | 9.8 | null | null |
|
GHSA-2q9g-c5jx-82x3 | WebApp JSP Snoop page XSS in jetty though 6.1.21. | [] | null | null | null | null |
|
GHSA-qh2x-hpf9-cf2g | OpenStack Keystone and other components vulnerable to Improper Certificate Validation | HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates. | [] | null | 5.9 | null | null |
GHSA-vv72-36rg-vcmc | A vulnerability was found in QDocs Smart School 6.4.1. It has been classified as critical. This affects an unknown part of the file /course/filterRecords/ of the component HTTP POST Request Handler. The manipulation of the argument searchdata[0][title]/searchdata[0][searchfield]/searchdata[0][searchvalue] leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-241647. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | null | 6.3 | null |
|
CVE-2007-5220 | SQL injection vulnerability in catalog.asp in ASP Product Catalog allows remote attackers to execute arbitrary SQL commands via the cid parameter and possibly other parameters. | [
"cpe:2.3:a:asp_product_catalog:asp_product_catalog:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-35347 | Microsoft Install Service Elevation of Privilege Vulnerability | Microsoft Install Service Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
GHSA-wwqr-4v22-f2qm | Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 3.5.1 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) gallery shortcodes or (2) the content of a post. | [] | null | null | null | null |
|
GHSA-xmxp-x783-v5rx | Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /tour/admin/update_tax.php. | [] | null | 7.2 | null | null |
|
GHSA-m6q2-9pfm-2wvr | Malicious Package in wallet-address-vaildator | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [] | null | 9.1 | null | null |
CVE-2019-13680 | Inappropriate implementation in TLS in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof client IP address to websites via crafted TLS connections. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
GHSA-9f6m-8x44-j5mr | The WordPress plugin, WP Database Reset through 3.1, contains a flaw that gave any authenticated user, with minimal permissions, the ability (with a simple wp-admin/admin.php?db-reset-tables[]=users request) to escalate their privileges to administrator while dropping all other users from the table. | [] | null | null | null | null |
|
GHSA-7fmf-f9xm-8gm4 | The WHMpress - WHMCS WordPress Integration Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 6.3-revision-0 via the whmpress_domain_search_ajax_extended_results() function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. Utilizing the /admin/services.php file, this can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. | [] | null | 9.8 | null | null |
|
CVE-2025-31400 | WordPress WS Audio Player plugin <= 1.1.8 - CSRF to Stored XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in icyleaf WS Audio Player allows Stored XSS. This issue affects WS Audio Player: from n/a through 1.1.8. | [] | null | 7.1 | null | null |
GHSA-63rp-vfr8-4qw7 | Missing authentication in the StudentPopupDetails_ContactDetails method in IDAttend’s IDWeb application 3.1.052 and earlier allows extraction of sensitive student data by unauthenticated attackers. | [] | null | 7.5 | null | null |
|
CVE-2025-24964 | Remote Code Execution when accessing a malicious website while Vitest API server is listening | Vitest is a testing framework powered by Vite. Affected versions are subject to arbitrary remote Code Execution when accessing a malicious website while Vitest API server is listening by Cross-site WebSocket hijacking (CSWSH) attacks. When `api` option is enabled (Vitest UI enables it), Vitest starts a WebSocket server. This WebSocket server did not check Origin header and did not have any authorization mechanism and was vulnerable to CSWSH attacks. This WebSocket server has `saveTestFile` API that can edit a test file and `rerun` API that can rerun the tests. An attacker can execute arbitrary code by injecting a code in a test file by the `saveTestFile` API and then running that file by calling the `rerun` API. This vulnerability can result in remote code execution for users that are using Vitest serve API. This issue has been patched in versions 1.6.1, 2.1.9 and 3.0.5. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [] | null | 9.7 | null | null |
CVE-2022-43168 | Rukovoditel v3.2.1 was discovered to contain a SQL injection vulnerability via the reports_id parameter. | [
"cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-chg9-3c3p-ch23 | Lemur uses static IV per key | Lemur 0.1.4 does not use sufficient entropy in its IV when encrypting AES in CBC mode. | [] | 8.7 | 7.5 | null | null |
CVE-2024-0502 | SourceCodester House Rental Management System Edit User manage_user.php sql injection | A vulnerability was found in SourceCodester House Rental Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file manage_user.php of the component Edit User. The manipulation of the argument id/name/username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250610 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:oretnom23:house_rental_management_system:1.0:*:*:*:*:*:*:*"
] | null | 4.7 | 4.7 | 5.8 |
GHSA-h89c-ww4h-vjxj | Multiple cross-site scripting (XSS) vulnerabilities in CosmoShop ePRO 10.05.00 allow remote attackers to inject arbitrary web script or HTML via (1) the rcopy parameter to cgi-bin/admin/rubrikadmin.cgi, (2) the typ parameter to cgi-bin/admin/artikeladmin.cgi, or (3) the suchbegriff parameter to cgi-bin/admin/shophilfe_suche.cgi. | [] | null | null | null | null |
|
GHSA-m44r-gw9x-mgm2 | Synel Terminals - CWE-494: Download of Code Without Integrity Check | [] | null | 7.2 | null | null |
|
GHSA-g58f-pj48-2p3r | Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection. | [] | null | null | null | null |
|
CVE-2012-3612 | WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1. | [
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.1.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.8.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.9.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.3:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.5:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.2.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.3:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.2.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.4.0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.4.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.5.1.42:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.6.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2021-21513 | Dell EMC OpenManage Server Administrator (OMSA) version 9.5 Microsoft Windows installations with Distributed Web Server (DWS) enabled configuration contains an authentication bypass vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to gain admin access on the affected system. | [
"cpe:2.3:a:dell:openmanage_server_administrator:*:*:*:*:*:*:*:*"
] | null | 8.6 | null | null |
|
CVE-2015-7654 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK & Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted attachSound arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046. | [
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2019-11895 | Improper access control in the JSON-RPC interface of the Bosch Smart Home Controller (SHC) | A potential improper access control vulnerability exists in the JSON-RPC interface of the Bosch Smart Home Controller (SHC) before 9.8.905 that may result in a successful denial of service of the SHC and connected sensors and actuators. In order to exploit the vulnerability, the adversary needs to have successfully paired an app or service, which requires user interaction. | [
"cpe:2.3:o:bosch:smart_home_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:smart_home_controller:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
GHSA-xpwv-rp39-7pr7 | Electro Industries GaugeTech Nexus devices allow remote attackers to obtain potentially sensitive information via a direct request for the meter_information.htm, diag_system.htm, or diag_dnp_lan_wan.htm URI. | [] | null | null | 7.5 | null |
|
CVE-2010-1452 | The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path. | [
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-c3m8-fwvv-cqq8 | DSCMS v3.0 was discovered to contain an arbitrary file deletion vulnerability via /controller/Adv.php. | [] | null | 9.1 | null | null |
|
RHSA-2007:0965 | Red Hat Security Advisory: ruby security update | Net: HTTP insufficient verification of SSL certificate net:: * modules | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2024-7829 | D-Link DNS-1550-04 photocenter_mgr.cgi cgi_del_photo buffer overflow | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. This issue affects the function cgi_del_photo of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument current_path leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. | [
"cpe:2.3:h:dlink:dns-120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dnr-202l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dnr-202l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-315l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-315l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-320l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-320l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-320lw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-320lw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-321_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-321:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dnr-322l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dnr-322l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-323_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-323:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-325_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-327l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-327l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dnr-326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dnr-326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-340l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-340l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-343_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-343:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-345_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-345:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-726-4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-726-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-1100-4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-1100-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-1200-05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-1200-05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-1550-04_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dns-1550-04:-:*:*:*:*:*:*:*"
] | 8.7 | 8.8 | 8.8 | 9 |
GHSA-hhw6-r538-264m | In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117832864 | [] | null | 8.8 | null | null |
|
GHSA-7774-p5v6-hf2q | The TaxoPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Suggest Terms Title field in versions up to, and including, 3.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Editor+ permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 5.5 | null | null |
|
CVE-2022-21289 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
|
CVE-2019-19737 | MFScripts YetiShare 3.5.2 through 4.5.3 does not set the SameSite flag on session cookies, allowing the cookie to be sent in cross-site requests and potentially be used in cross-site request forgery attacks. | [
"cpe:2.3:a:mfscripts:yetishare:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-8wjx-p2f8-5rjp | OpenCRX Cross-site Scripting vulnerability | openCRX 5.2.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Name field after creation of a Tracker in Manage Activity. | [] | null | 5.4 | null | null |
GHSA-qxxh-xwx4-34gm | A path traversal vulnerability in NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series devices with Next-Generation Routing Engine (NG-RE) allows a local authenticated user to read sensitive system files. This issue only affects NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series with Next-Generation Routing Engine (NG-RE) which uses vmhost. This issue affects Juniper Networks Junos OS on NFX150 Series and QFX10K, EX9200 Series, MX Series and PTX Series with NG-RE and vmhost: 15.1F versions prior to 15.1F6-S12 16.1 versions starting from 16.1R6 and later releases, including the Service Releases, prior to 16.1R6-S6, 16.1R7-S3; 17.1 versions prior to 17.1R3; 17.2 versions starting from 17.2R1-S3, 17.2R3 and later releases, including the Service Releases, prior to 17.2R3-S1; 17.3 versions starting from 17.3R1-S1, 17.3R2 and later releases, including the Service Releases, prior to 17.3R3-S3; 17.4 versions starting from 17.4R1 and later releases, including the Service Releases, prior to 17.4R1-S6, 17.4R2-S2, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S2, 18.3R2; 18.4 versions prior to 18.4R1-S1, 18.4R2. This issue does not affect: Juniper Networks Junos OS 15.1 and 16.2. | [] | null | null | null | null |
|
CVE-2017-6379 | Some administrative paths in Drupal 8.2.x before 8.2.7 did not include protection for CSRF. This would allow an attacker to disable some blocks on a site. This issue is mitigated by the fact that users would have to know the block ID. | [
"cpe:2.3:a:drupal:drupal:8.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:8.2.6:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5.1 |
|
GHSA-vcvh-mv5m-x8ww | Cross-site scripting (XSS) vulnerability in Cybozu Office 6 and Cybozu Garoon 2.0.0 through 2.1.3 allows remote attackers to inject arbitrary web script or HTML via vectors related to "downloading graphic files from the bulletin board system." | [] | null | null | null | null |
|
GHSA-6hjg-qfm2-9xc2 | This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.10B04. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper implementation of the authentication algorithm. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the router. Was ZDI-CAN-9470. | [] | null | null | null | null |
|
GHSA-5m5m-h2hf-vfh9 | Directory traversal vulnerability in node/hooks/express/tests.js in Etherpad frontend tests before 1.6.1. | [] | null | null | 7.5 | null |
|
CVE-2022-42043 | The d8s-xml package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-html package. The affected version is 0.1.0. | [
"cpe:2.3:a:democritus:d8s-xml:0.1.0:*:*:*:*:python:*:*"
] | null | 9.8 | null | null |
|
GHSA-r8jv-c3jp-366j | Improper Input Validation vulnerability in project file upload in Nozomi Networks Guardian and CMC allows an authenticated attacker with admin or import manager roles to execute unattended commands on the appliance using web server user privileges. This issue affects: Nozomi Networks Guardian versions prior to 22.0.0. Nozomi Networks CMC versions prior to 22.0.0. | [] | 8.6 | 7.2 | null | null |
|
GHSA-j95r-rm3w-f776 | The Activity Plus Reloaded for BuddyPress plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 1.1.1 via the 'ajax_preview_link' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. | [] | null | 5.4 | null | null |
|
cisco-sa-nso-rwpesc-qrQGnh3f | Cisco Crosswork Network Services Orchestrator Vulnerabilities | Multiple vulnerabilities in the Cisco Crosswork Network Services Orchestrator (NSO) CLI could allow an authenticated, low-privileged, local attacker to read and write arbitrary files as root or elevate privileges to root on the underlying operating system.
For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
| [] | null | 7.8 | null | null |
CVE-2023-34648 | A Cross Site Scripting vulnerability in PHPgurukl User Registration Login and User Management System with admin panel v.1.0 allows a local attacker to execute arbitrary code via a crafted script to the signup.php. | [
"cpe:2.3:a:user_registration_\\&_login_and_user_management_system_with_admin_panel_project:user_registration_\\&_login_and_user_management_system_with_admin_panel:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-646r-8fcc-p82r | Subrion CMS vulnerable to Cross-site Scripting | Multiple Cross-Site Scripting (XSS) vulnerabilities in installation of Subrion CMS v.4.2.1 allows a local attacker to execute arbitrary web scripts via a crafted payload injected into the dbhost, dbname, dbuser, adminusername and adminemail. | [] | null | 6.1 | null | null |
GHSA-jx5h-5gj9-qx78 | Cybozu Mailwise before 5.4.0 allows remote attackers to inject arbitrary email headers. | [] | null | null | 4.3 | null |
|
GHSA-65x6-qq63-m88g | In the Linux kernel, the following vulnerability has been resolved:RDMA/siw: Fix a use after free in siw_alloc_mrOur code analyzer reported a UAF.In siw_alloc_mr(), it calls siw_mr_add_mem(mr,..). In the implementation of
siw_mr_add_mem(), mem is assigned to mr->mem and then mem is freed via
kfree(mem) if xa_alloc_cyclic() failed. Here, mr->mem still point to a
freed object. After, the execution continue up to the err_out branch of
siw_alloc_mr, and the freed mr->mem is used in siw_mr_drop_mem(mr).My patch moves "mr->mem = mem" behind the if (xa_alloc_cyclic(..)<0) {}
section, to avoid the uaf. | [] | null | 7.8 | null | null |
|
GHSA-vxjj-c2q3-jm5g | Certain NETGEAR devices are affected by stored XSS. This affects M4300-28G before 12.0.2.15, M4300-52G before 12.0.2.15, M4300-28G-POE+ before 12.0.2.15, M4300-52G-POE+ before 12.0.2.15, M4300-8X8F before 12.0.2.15, M4300-12X12F before 12.0.2.15, M4300-24X24F before 12.0.2.15, M4300-24X before 12.0.2.15, M4300-48X before 12.0.2.15, and M4200 before 12.0.2.15. | [] | null | null | null | null |
|
GHSA-w83h-74w5-cv79 | The Homey theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the homey_reservation_del() function in all versions up to, and including, 2.4.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary reservations and posts. | [] | null | 4.3 | null | null |
|
CVE-2016-8608 | JBoss BRMS 6 and BPM Suite 6 are vulnerable to a stored XSS via business process editor. The flaw is due to an incomplete fix for CVE-2016-5398. Remote, authenticated attackers that have privileges to create business processes can store scripts in them, which are not properly sanitized before showing to other users, including admins. | [
"cpe:2.3:a:redhat:jboss_bpm_suite:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_business_rules_management_system:6.0.0:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
|
CVE-2020-3619 | u'Non-secure memory is touched multiple times during TrustZone\u2019s execution and can lead to privilege escalation or memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8098, IPQ8074, Kamorta, MDM9150, MDM9206, MDM9607, MDM9650, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8998, QCA8081, QCS404, QCS605, QCS610, QM215, Rennell, SA415M, SC7180, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SM6150, SM7150, SM8150, SXR1130 | [
"cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] | null | 7 | null | 6.9 |
|
GHSA-fmwc-77fh-hm65 | Cross-site scripting (XSS) vulnerability in admin/admin_index.php in CJ Dynamic Poll PRO 2.0 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. | [] | null | null | null | null |
|
GHSA-9j8q-m9x5-9g6j | Data races in async-coap | An issue was discovered in the async-coap crate through 2020-12-08 for Rust.
Affected versions of this crate implement Send/Sync for `ArcGuard<RC, T>` with no trait bounds on `RC`. This allows users to send `RC: !Send` to other threads and also allows users to concurrently access `Rc: !Sync` from multiple threads.This can result in memory corruption from data race or other undefined behavior caused by sending `T: !Send` to other threads (e.g. dropping `MutexGuard<T>` in another thread that didn't lock its mutex). | [] | null | 8.1 | null | null |
CVE-2006-1509 | /sbin/passwd in HP-UX B.11.00, B.11.11, and B.11.23 before 20060326 "does not recover gracefully from some error conditions," which allows local users to cause a denial of service. | [
"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.23:*:ia64_64-bit:*:*:*:*:*"
] | null | null | null | 4.9 |
|
CVE-2021-21439 | Possible DoS attack using a special crafted URL in email body | DoS attack can be performed when an email contains specially designed URL in the body. It can lead to the high CPU usage and cause low quality of service, or in extreme case bring the system to a halt. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions; 8.0.x version 8.0.13 and prior versions. | [
"cpe:2.3:a:otrs:otrs:*:*:*:*:community:*:*:*",
"cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2022-32004 | Badminton Center Management System v1.0 is vulnerable to SQL Injection via bcms/admin/products/manage_product.php?id=. | [
"cpe:2.3:a:badminton_center_management_system_project:badminton_center_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 |
|
CVE-2023-2234 | BT HCI host union variant confusion | Union variant confusion allows any malicious BT controller to execute arbitrary code on the Zephyr host. | [
"cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
GHSA-h4x7-v6w2-9mg3 | GE Communicator, all versions prior to 4.0.517, allows a non-administrative user to replace the uninstaller with a malicious version, which could allow an attacker to gain administrator privileges to the system. | [] | null | null | null | null |
|
CVE-2024-49670 | WordPress Client Power Tools Portal plugin <= 1.8.6 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Sam Glover Client Power Tools Portal allows Reflected XSS.This issue affects Client Power Tools Portal: from n/a through 1.8.6. | [
"cpe:2.3:a:samglover:client_power_tools:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
CVE-2017-11821 | ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, and CVE-2017-11812. | [
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
CVE-2007-2856 | Buffer overflow in the Dart Communications PowerTCP ZIP Compression ActiveX control in DartZip.dll 1.8.5.3, when Internet Explorer 6 is used, allows user-assisted remote attackers to execute arbitrary code via a long first argument to the QuickZip function, a related issue to CVE-2007-2855. | [
"cpe:2.3:a:dart:powertcp_zip_compression:1.8.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2018-7505 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, a TFTP application has unrestricted file uploads to the web application without authorization, which may allow an attacker to execute arbitrary code. | [
"cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
"cpe:2.3:a:advantech:webaccess_dashboard:*:*:*:*:*:*:*:*",
"cpe:2.3:a:advantech:webaccess_scada:*:*:*:*:*:*:*:*",
"cpe:2.3:a:advantech:webaccess\\/nms:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2019-10326 | A cross-site request forgery vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attackers to reset warning counts for future builds. | [
"cpe:2.3:a:jenkins:warnings_next_generation:5.0.0:*:*:*:*:jenkins:*:*"
] | null | null | 4.3 | 4.3 |
|
CVE-2025-26617 | SQL Injection endpoint 'historico_paciente.php' parameter 'id_fichamedica' in WeGIA | WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A SQL Injection vulnerability was discovered in the WeGIA application, `historico_paciente.php` endpoint. This vulnerability could allow an attacker to execute arbitrary SQL queries, allowing unauthorized access to sensitive information. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | [] | 10 | null | null | null |
CVE-2024-40720 | CHANGING Information Technology TCBServiSign Windows Version - Improper Input Validation | The specific API in TCBServiSign Windows Version from CHANGING Information Technology does not properly validate server-side input. When a user visits a spoofed website, unauthenticated remote attackers can modify the `HKEY_CURRENT_USER` registry to execute arbitrary commands. | [
"cpe:2.3:a:changinginformationtechnology:tcbservisign:*:*:*:*:*:*:*:*",
"cpe:2.3:a:changingtec:tcb_servisign:*:*:*:*:*:windows:*:*"
] | null | 8.8 | null | null |
CVE-2024-2841 | The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widgets in all versions up to, and including, 2.6.5 due to insufficient input sanitization and output escaping on user supplied attributes such as 'id'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2012-5384 | Multiple cross-site scripting (XSS) vulnerabilities in Craig Knudsen WebCalendar allow remote attackers to inject arbitrary web script or HTML via the (1) $name or (2) $description variables in edit_entry_handler.php, or (3) $url, (4) $tempfullname, or (5) $ext_users[] variables in view_entry.php, different vectors than CVE-2012-0846. | [
"cpe:2.3:a:webcalendar_project:webcalendar:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-798q-jpvf-xqwg | Buffer overflow in print-rx.c of tcpdump 3.x (probably 3.6x) allows remote attackers to cause a denial of service and possibly execute arbitrary code via AFS RPC packets with invalid lengths that trigger an integer signedness error, a different vulnerability than CVE-2000-1026. | [] | null | null | null | null |
|
GHSA-r882-c383-6784 | Product: AndroidVersions: Android SoCAndroid ID: A-277775870 | [] | null | 9.8 | null | null |
|
GHSA-pfph-h89w-f59p | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N). | [] | null | 4.4 | null | null |
|
GHSA-hgcx-765f-h3fh | A vulnerability has been identified in JT2Go (All versions < V14.2.0.5), Teamcenter Visualization V13.2 (All versions < V13.2.0.14), Teamcenter Visualization V14.1 (All versions < V14.1.0.10), Teamcenter Visualization V14.2 (All versions < V14.2.0.5). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted TIFF file. This could allow an attacker to execute code in the context of the current process. | [] | null | 7.8 | null | null |
|
GHSA-xpgj-rhc7-55qx | An issue was discovered in Qubo Smart Plug 10A version HSP02_01_01_14_SYSTEM-10A, allows attackers to cause a denial of service (DoS) via Wi-Fi deauthentication. | [] | null | 7.5 | null | null |
|
CVE-2024-23835 | Suricata's pgsql: memory exhaustion use on record parsing | Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.3, excessive memory use during pgsql parsing could lead to OOM-related crashes. This vulnerability is patched in 7.0.3. As workaround, users can disable the pgsql app layer parser. | [
"cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-39p7-8vm9-rjp3 | A vulnerability classified as critical has been found in arekk uke. This affects an unknown part of the file lib/uke/finder.rb. The manipulation leads to sql injection. The name of the patch is 52fd3b2d0bc16227ef57b7b98a3658bb67c1833f. It is recommended to apply a patch to fix this issue. The identifier VDB-217485 was assigned to this vulnerability. | [] | null | 9.8 | null | null |
|
GHSA-8xf9-83fh-q7rf | 389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. | [] | null | null | 6.5 | null |
|
CVE-2020-17393 | This vulnerability allows local attackers to disclose information on affected installations of Parallels Desktop 15.1.3-47255. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the prl_hypervisor kext. The issue results from the lack of proper validation of user-supplied data, which can result a pointer to be leaked after the handler is done. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-10520. | [
"cpe:2.3:a:parallels:parallels_desktop:*:*:*:*:*:macos:*:*"
] | null | null | 6.5 | null |
|
PYSEC-2022-196 | null | Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. In version 0.3.1 and prior, bytestrings can have dirty bytes in them, resulting in the word-for-word comparisons giving incorrect results. Even without dirty nonzero bytes, two bytestrings can compare to equal if one ends with `"\x00"` because there is no comparison of the length. A patch is available and expected to be part of the 0.3.2 release. There are currently no known workarounds. | [] | null | null | null | null |
CVE-2022-35507 | A response-header CRLF injection vulnerability in the Proxmox Virtual Environment (PVE) and Proxmox Mail Gateway (PMG) web interface allows a remote attacker to set cookies for a victim's browser that are longer than the server expects, causing a client-side DoS. This affects Chromium-based browsers because they allow injection of response headers with %0d. This is fixed in pve-http-server 4.1-3. | [
"cpe:2.3:a:proxmox:proxmox_mail_gateway:-:*:*:*:*:*:*:*",
"cpe:2.3:a:proxmox:pve_http_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:proxmox:virtual_environment:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
CVE-2011-2400 | Cross-site scripting (XSS) vulnerability in HP SiteScope 9.x, 10.x, and 11.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:hp:sitescope:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:9.54:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-43605 | An out-of-bounds write vulnerability exists in the SetAttributeList attribute_count_request functionality of EIP Stack Group OpENer development commit 58ee13c. A specially crafted EtherNet/IP request can lead to an out of bounds write, potentially causing the server to crash or allow for remote code execution. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability. | [
"cpe:2.3:a:opener_project:opener:*:*:*:*:*:*:*:*"
] | null | 10 | null | null |
|
GHSA-h2gr-w6qq-3rf4 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Justin Tadlock Unique allows Stored XSS.This issue affects Unique: from n/a through 0.3.0. | [] | null | 6.5 | null | null |
|
GHSA-5j2h-hjvf-wxv7 | The default configuration of BlackICE Agent 3.1.eal and 3.1.ebh has a high tcp.maxconnections setting, which could allow remote attackers to cause a denial of service (memory consumption) via a large number of connections to the BlackICE system that consumes more resources than intended by the user. | [] | null | null | null | null |
|
GHSA-vcrj-h233-mj6m | The AXN-NET Ethernet module accessory 3.04 for the Accuenergy Acuvim II allows remote attackers to discover passwords and modify settings via vectors involving JavaScript. | [] | null | null | null | null |
|
CVE-2012-5305 | Cross-site scripting (XSS) vulnerability in CMD_DOMAIN in JBMC Software DirectAdmin 1.403 allows remote attackers to inject arbitrary web script or HTML via the domain parameter. | [
"cpe:2.3:a:directadmin:directadmin:1.403:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2001-0585 | Gordano NTMail 6.0.3c allows a remote attacker to create a denial of service via a long (>= 255 characters) URL request to port 8000 or port 9000. | [
"cpe:2.3:a:gordano:ntmail:6.0.3c:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2005-0767 | Race condition in the Radeon DRI driver for Linux kernel 2.6.8.1 allows local users with DRI privileges to execute arbitrary code as root. | [
"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-9g56-6v3w-f2xj | IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1under specific configurations could allow an authenticated user to cause a denial of service due to insufficient release of allocated memory resources. | [] | null | 5.3 | null | null |
|
GHSA-mxhr-3xg4-5hx7 | Snoopy 1.0 in Nagios XI 5.5.6 allows remote unauthenticated attackers to execute arbitrary commands via a crafted HTTP request. | [] | null | null | 9.8 | null |
|
GHSA-m7w5-3vfh-m648 | An improper error handling vulnerability in the component ErroreNonGestito.aspx of GruppoSCAI RealGimm 1.1.37p38 allows attackers to obtain sensitive technical information via a crafted SQL query. | [] | null | 8.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.