id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-4wvc-ffmh-rrcr | Open redirect vulnerability in index.php (aka the Login Page) in ownCloud before 3.0.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect_url parameter. | [] | null | null | null | null |
|
GHSA-j8jq-cv4q-c5x6 | Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 9.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to eCompensation Manager Desktop. | [] | null | null | null | null |
|
GHSA-3mw8-jr69-x96w | Improper File Permissions in NetScout nGeniusONE 6.3.2 build 904 allows authenticated remote users to gain permissions via a crafted payload. | [] | null | 8.8 | null | null |
|
CVE-2017-11507 | A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page. | [
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:b1:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:b10:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:b11:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:b2:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:b3:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:b4:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:b5:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:b6:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:b7:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:b8:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:b9:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p1:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p10:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p11:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p12:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p13:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p14:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p15:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p16:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p17:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p18:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p19:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p2:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p20:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p21:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p22:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p23:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p24:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p25:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p3:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p4:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p5:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p6:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p7:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p8:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.2.8:p9:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:b9:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:check_mk_project:check_mk:1.4.0:p9:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2006-4923 | Cross-site scripting (XSS) vulnerability in search.php in eSyndiCat Portal System allows remote attackers to inject arbitrary web script or HTML via the what parameter. | [
"cpe:2.3:a:esyndicat_portal_system:esyndicat_portal_system:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2006-2089 | Multiple cross-site scripting (XSS) vulnerabilities in misc.php in MySmartBB 1.1.x allow remote attackers to inject arbitrary web script or HTML via the (1) id and (2) username parameters. | [
"cpe:2.3:a:mysmartbb:mysmartbb:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mysmartbb:mysmartbb:1.1.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-w7x5-g6gj-cxw9 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: Internal Operations). Supported versions that are affected are 7.4.38 and prior, 7.5.28 and prior, 7.6.24 and prior and 8.0.31 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | [] | null | 6.3 | null | null |
|
ICSA-23-236-05 | CODESYS Development System | In CODESYS Development System versions from 3.5.11.0 and before 3.5.19.20 a missing integrity check might allow an unauthenticated remote attacker to manipulate the content of notifications received via HTTP by the CODESYS notification server. | [] | null | null | 9.6 | null |
GHSA-6xf5-f23f-5cff | A Remote Denial of Service vulnerability in Hewlett Packard Enterprise Moonshot Provisioning Manager Appliance version v1.20 was found. | [] | null | null | 9.1 | null |
|
GHSA-f6fc-pffh-c6vq | Multiple heap-based buffer overflows in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and Linux RealPlayer 11.0.2.1744 allow remote attackers to have an unspecified impact via a crafted header in an IVR file. | [] | null | null | null | null |
|
CVE-2024-20382 | A vulnerability in the VPN web client services feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a browser that is accessing an affected device. This vulnerability is due to improper validation of user-supplied input to application endpoints. An attacker could exploit this vulnerability by persuading a user to follow a link designed to submit malicious input to the affected application. A successful exploit could allow the attacker to execute arbitrary HTML or script code in the browser in the context of the web services page. | [] | null | 6.1 | null | null |
|
CVE-2001-1245 | Opera 5.0 for Linux does not properly handle malformed HTTP headers, which allows remote attackers to cause a denial of service, possibly with a header whose value is the same as a MIME header name. | [
"cpe:2.3:a:opera_software:opera_web_browser:5.0:*:linux:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2023:7215 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.2.12 | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:service_mesh:2.2::el8"
] | null | 7.5 | null | null |
CVE-2014-5447 | Zarafa WebAccess 7.1.10 and WebApp 1.6 beta uses weak permissions (644) for config.php, which allows local users to obtain sensitive information by reading the PHP session files. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0103. | [
"cpe:2.3:a:zarafa:webapp:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zarafa:zarafa:7.1.10:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2021-22791 | A CWE-787: Out-of-bounds Write vulnerability that could cause a Denial of Service on the Modicon PLC controller / simulator when updating the controller application with a specially crafted project file exists in Modicon M580 CPU (part numbers BMEP* and BMEH*, all versions), Modicon M340 CPU (part numbers BMXP34*, all versions), Modicon MC80 (part numbers BMKC80*, all versions), Modicon Momentum Ethernet CPU (part numbers 171CBU*, all versions), PLC Simulator for EcoStruxureª Control Expert, including all Unity Pro versions (former name of EcoStruxureª Control Expert, all versions), PLC Simulator for EcoStruxureª Process Expert including all HDCS versions (former name of EcoStruxureª Process Expert, all versions), Modicon Quantum CPU (part numbers 140CPU*, all versions), Modicon Premium CPU (part numbers TSXP5*, all versions). | [
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp341000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp342010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp342020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp342030:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmeh582040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmeh582040c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmeh582040s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmeh584040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmeh584040c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmeh584040s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmeh586040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmeh586040c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmeh586040s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep581020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep581020h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep582020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep582020h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep582040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep582040h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep582040s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep583020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep583040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep584020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep584040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep584040s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep585040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep585040c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep586040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep586040c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_mc80_bmkc8020301:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_mc80_bmkc8020310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_mc80_bmkc8030311:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_momentum_171cbu78090:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_momentum_171cbu98090:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_momentum_171cbu98091:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_1634m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_2634m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_2834m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_454m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_4634m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_554m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_5634m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_premium_tsxp57_6634m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_quantum_140cpu65150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_quantum_140cpu65150c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_quantum_140cpu65160:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_quantum_140cpu65160c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:plc_simulator_for_ecostruxure_control_expert:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:plc_simulator_for_ecostruxure_process_expert:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
RHSA-2022:0162 | Red Hat Security Advisory: gegl security update | gegl: shell expansion via a crafted pathname | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
GHSA-qxmp-jrhr-mhjw | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N). | [] | null | null | null | null |
|
CVE-2006-6763 | Multiple PHP remote file inclusion vulnerabilities in the Keep It Simple Guest Book (KISGB) allow remote attackers to execute arbitrary PHP code via a URL in the (1) path_to_themes parameter in (a) authenticate.php, and the (2) default_path_for_themes parameter in (b) admin.php and (c) upconfig.php. | [
"cpe:2.3:a:keep_it_simple_guest_book:keep_it_simple_guest_book:5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2010-0956 | SQL injection vulnerability in index.php in OpenCart 1.3.2 allows remote attackers to execute arbitrary SQL commands via the page parameter. | [
"cpe:2.3:a:opencart:opencart:1.3.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-cxcr-v85c-3586 | Franklin Fueling System EVO 550 and EVO 5000 are vulnerable to a Path Traversal vulnerability that could allow an attacker to access sensitive files on the system. | [] | null | 7.5 | null | null |
|
GHSA-86w6-r554-8hxh | A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attacker to execute unauthorized code or commands via the parsing of the file. | [] | null | 7.8 | null | null |
|
GHSA-5fw3-pvfm-qmmq | User Interface (UI) Misrepresentation of Critical Information vulnerability in DropBox Sign(HelloSign) allows Content Spoofing.
Displayed version does not show the layer flattened version, once download, If printed (e.g. via Google Chrome -> Examine the print preview): Will render the vulnerability only, not all layers are flattened.
This issue affects DropBox Sign(HelloSign): through 2024-12-04. | [] | 8.2 | null | null | null |
|
CVE-2006-6452 | Multiple cross-site scripting (XSS) vulnerabilities in the MyArticles module before 0.6 beta 1, for RunCMS, allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) topics.php, (2) submit.php, and (3) class/calendar.class.php. | [
"cpe:2.3:a:myarticles:myarticles:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
RHSA-2008:0524 | Red Hat Security Advisory: Red Hat Network Satellite Server security update | openmotif21 stack overflows in libxpm openmotif21 stack overflows in libxpm mod_ssl SSLCipherSuite bypass openmotif21 stack overflows in libxpm libxpm buffer overflow tomcat multiple content-length header poisioning tomcat DoS openmotif libUil buffer overflows tomcat manager example DoS tomcat examples XSS perl-Crypt-CBC weaker encryption with some ciphers jabberd SASL DoS tomcat directory listing issue httpd mod_status XSS tomcat XSS in example webapps tomcat XSS in example webapps mod_jk chunk too long java-jre: GIF buffer overflow tomcat directory traversal mod_perl PerlRun denial of service tomcat XSS in samples tomcat accept-language xss flaw mod_jk sends decoded URL to tomcat javaws vulnerabilities tomcat examples jsp XSS tomcat host manager XSS Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit BMP image parser vulnerability httpd scoreboard lack of PID protection tomcat handling of cookies tomcat handling of cookie values mod_autoindex XSS httpd: mod_imagemap XSS Absolute path traversal Apache Tomcat WEBDAV JFreeChart: XSS vulnerabilities in the image map feature apache mod_status cross-site scripting tomcat5 SSO cookie login information disclosure | [
"cpe:/a:redhat:network_satellite:4.2::el3",
"cpe:/a:redhat:network_satellite:4.2::el4"
] | null | null | null | null |
CVE-2017-16945 | The standardrestorer binary in Arq 5.10 and earlier for Mac allows local users to write to arbitrary files and consequently gain root privileges via a crafted restore path. | [
"cpe:2.3:a:haystacksoftware:arq:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2014-3453 | Eval injection vulnerability in the flag_import_form_validate function in includes/flag.export.inc in the Flag module 7.x-3.0, 7.x-3.5, and earlier for Drupal allows remote authenticated administrators to execute arbitrary PHP code via the "Flag import code" text area to admin/structure/flags/import. NOTE: this issue could also be exploited by other attackers if the administrator ignores a security warning on the permissions assignment page. | [
"cpe:2.3:a:flag_module_project:flag:*:*:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.0:-:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha1:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha2:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha3:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha4:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.0:beta1:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.0:rc1:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.1:*:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.2:*:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.3:*:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.4:*:*:*:*:drupal:*:*",
"cpe:2.3:a:flag_module_project:flag:7.x-3.x:dev:*:*:*:drupal:*:*"
] | null | null | null | 6.5 |
|
CVE-2010-1931 | SQL injection vulnerability in includes/content/cart.inc.php in CubeCart PHP Shopping cart 4.3.4 through 4.3.9 allows remote attackers to execute arbitrary SQL commands via the shipKey parameter to index.php. | [
"cpe:2.3:a:cubecart:cubecart:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cubecart:cubecart:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cubecart:cubecart:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cubecart:cubecart:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cubecart:cubecart:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cubecart:cubecart:4.3.9:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-36091 | Authentication Bypass vulnerability in D-Link DIR-895 FW102b07 allows remote attackers to gain escalated privileges via via function phpcgi_main in cgibin. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [
"cpe:2.3:h:d-link:dir-895:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-895l_firmware:1.02:b07:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-895l:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-94xv-rp86-287j | Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | [] | null | 5.4 | null | null |
|
GHSA-rq8q-fhrf-h2pp | Cisco AireOS 4.1 through 7.4.120.0, 7.5.x, and 7.6.100.0 on Wireless LAN Controller (WLC) devices allows remote attackers to cause a denial of service (device reload) via a crafted HTTP request, aka Bug ID CSCun86747. | [] | null | null | 7.5 | null |
|
CVE-2023-21857 | Vulnerability in the Oracle HCM Common Architecture product of Oracle E-Business Suite (component: Auomated Test Suite). Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HCM Common Architecture. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle HCM Common Architecture accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). | [
"cpe:2.3:a:oracle:hcm_common_architecture:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-crh3-m6cc-pcw5 | Directory traversal vulnerability in php/cal_pdf.php in Mini Web Calendar (mwcal) 1.2 allows remote attackers to read arbitrary files via directory traversal sequences in the thefile parameter. | [] | null | null | null | null |
|
GHSA-g3qh-h448-hf99 | Divide-by-zero vulnerability in the opj_tcd_init_tile function in tcd.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (application crash) via a crafted jp2 file. NOTE: this issue exists because of an incorrect fix for CVE-2014-7947. | [] | null | null | 5.5 | null |
|
CVE-2008-6235 | The Netrw plugin (netrw.vim) in Vim 7.0 and 7.1 allows user-assisted attackers to execute arbitrary commands via shell metacharacters in a filename used by the (1) "D" (delete) command or (2) b:netrw_curdir variable, as demonstrated using the netrw.v4 and netrw.v5 test cases. | [
"cpe:2.3:a:vim:vim:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:vim:7.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-rxm3-3v27-86hh | HCL iNotes v9, v10 and v11 is susceptible to a Stored Cross-Site Scripting (XSS) vulnerability due to improper handling of message content. An unauthenticated remote attacker could exploit this vulnerability using specially-crafted markup to execute script in a victim's web browser within the security context of the hosting Web site and/or steal the victim's cookie-based authentication credentials. | [] | null | null | null | null |
|
GHSA-4q6p-r6v2-jvc5 | Chaijs/get-func-name vulnerable to ReDoS | The current regex implementation for parsing values in the module is susceptible to excessive backtracking, leading to potential DoS attacks. The regex implementation in question is as follows:This vulnerability can be exploited when there is an imbalance in parentheses, which results in excessive backtracking and subsequently increases the CPU load and processing time significantly. This vulnerability can be triggered using the following input:Here is a simple PoC code to demonstrate the issue: | [] | null | 7.5 | null | null |
GHSA-37hw-m3rc-6ww4 | A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. | [] | null | 7.5 | null | null |
|
ICSA-18-275-01 | Delta Electronics ISPSoft | By opening a crafted file, an attack can cause the application to read past the boundary allocated to a stack object, which could allow execution of code under the context of the application.CVE-2018-14800 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). | [] | null | null | 5.3 | null |
CVE-2021-3479 | There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability. | [
"cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2014-1809 | The MSCOMCTL library in Microsoft Office 2007 SP3, 2010 SP1 and SP2, and 2013 Gold, SP1, RT, and RT SP1 makes it easier for remote attackers to bypass the ASLR protection mechanism via a crafted web site, as exploited in the wild in May 2014, aka "MSCOMCTL ASLR Vulnerability." | [
"cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp1:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp1:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2015-1688 | Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2005-1177 | Unknown vulnerability in (1) Webmin and (2) Usermin before 1.200 causes Webmin to change permissions and ownership of configuration files, with unknown impact. | [
"cpe:2.3:a:usermin:usermin:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.97:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.98:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.000:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.010:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.020:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.030:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.040:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.051:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.060:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.070:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.080:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.090:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.110:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.120:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.130:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:1.140:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.97:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.98:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.00:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.1.30:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:1.1.40:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2014-7335 | The Liver Health - Hepatitis C (aka gov.nyc.dohmh.HepC) application 2.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:nyc:liver_health_-_hepatitis_c:2.0.0:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-gmhr-ccqm-6w75 | A vulnerability, which was classified as problematic, has been found in SourceCodester Online Pizza Ordering System 1.0. This issue affects some unknown processing of the file admin/ajax.php?action=save_user. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221681 was assigned to this vulnerability. | [] | null | 8.8 | null | null |
|
CVE-2023-0953 | Insufficient input sanitization in the documentation feature of Devolutions Server 2022.3.12 and earlier allows an authenticated attacker to perform an SQL Injection, potentially resulting in unauthorized access to system resources.
| [
"cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-q7mc-fc87-v7w7 | OpenRefine Server-Side Request Forgery vulnerability | OpenRefine <= v3.5.2 contains a Server-Side Request Forgery (SSRF) vulnerability, which permits unauthorized users to exploit the system, potentially leading to unauthorized access to internal resources and sensitive file disclosure. | [] | null | 6.5 | null | null |
RHSA-2020:3219 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: lockdown: bypass through ACPI write via efivar_ssdt kernel: lockdown: bypass through ACPI write via acpi_configfs | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 6.4 | null | null |
GHSA-rrcq-rghp-hjgx | Buffer overflows in brouted in FreeBSD and possibly other OSes allows local users to gain root privileges via long command line arguments. | [] | null | null | null | null |
|
GHSA-rmj9-q58g-9qgg | go-unzip vulnerable to Path Traversal | Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. | [] | null | 9.1 | null | null |
GHSA-6hhx-86qx-9ffc | AdvancedLdapLodinMogule in Red Hat JBoss Enterprise Application Platform (EAP) before 6.4.1 allows attackers to obtain sensitive information via vectors involving logging the LDAP bind credential password when TRACE logging is enabled. | [] | null | null | 5.9 | null |
|
ICSA-18-058-02 | Delta Electronics WPLSoft | The application utilizes a fixed length stack buffer where a value larger than the buffer can be read from a file into the buffer, causing the buffer to be overwritten, which may allow remote code execution or cause the application to crash. CVE-2018-7494 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H). The application utilizes a fixed length heap buffer where a value larger than the buffer can be read from a file into the buffer, causing the buffer to be overwritten, which may allow remote code execution or cause the application to crash. CVE-2018-7507 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H). The application writes data from a file outside the bounds of the intended buffer space, which could cause memory corruption or may allow remote code execution. CVE-2018-7509 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H). | [] | null | null | 8.3 | null |
GHSA-mf54-6363-29h5 | Use-after-free vulnerability in Microsoft Internet Explorer 6 SP1, 6 SP2, and and 7 allows remote attackers to execute arbitrary code by assigning malformed values to certain properties, as demonstrated using the by property of an animateMotion SVG element, aka "Property Memory Corruption Vulnerability." | [] | null | 8.8 | null | null |
|
GHSA-5h6p-h5p5-pf3v | BMC Control-M Software v9.0.20.200 was discovered to contain a SQL injection vulnerability via the report-id parameter at /report/deleteReport. | [] | null | 9.8 | null | null |
|
GHSA-62qj-786m-q427 | Cross Site Scripting vulnerability in Zucchetti Ad Hoc Infinity 2.4 allows an authenticated attacker to achieve Remote Code Execution via the /servlet/gsdm_fsave_htmltmp, /servlet/gsdm_btlk_openfile components | [] | null | 5.4 | null | null |
|
CVE-2018-0566 | Cybozu Office 10.0.0 to 10.8.0 allows authenticated attackers to bypass authentication to obtain the schedules without access privilege via unspecified vectors. | [
"cpe:2.3:a:cybozu:office:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4 |
|
CVE-2003-1335 | Directory traversal vulnerability in Kai Blankenhorn Bitfolge simple and nice index file (aka snif) before 1.2.5 allows remote attackers to download files from locations above the snif directory. | [
"cpe:2.3:a:kai_blankenhorn_bitfolge:simple_and_nice_index_file:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-23703 | WordPress Arconix Shortcodes Plugin <= 2.1.7 is vulnerable to Cross Site Scripting (XSS) | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Tyche Softwares Arconix Shortcodes plugin <= 2.1.7 versions. | [
"cpe:2.3:a:tychesoftwares:arconix_shortcodes:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
GHSA-9f98-6r3f-jm6g | Improper input validation on input which is used as an array index will lead to an out of bounds issue while processing AP find event from firmware in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, SD 210/SD 212/SD 205, SD 625, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 845 / SD 850, SD 855, SDX20, SDX24, SM7150 | [] | null | null | 7.8 | null |
|
CVE-2006-3596 | The device driver for Intel-based gigabit network adapters in Cisco Intrusion Prevention System (IPS) 5.1(1) through 5.1(p1), as installed on various Cisco Intrusion Prevention System 42xx appliances, allows remote attackers to cause a denial of service (kernel panic and possibly network outage) via a crafted IP packet. | [
"cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1c\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ips_sensor_software:5.1\\(p1\\):*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2020-20453 | FFmpeg 4.2 is affected by a Divide By Zero issue via libavcodec/aaccoder, which allows a remote malicious user to cause a Denial of Service | [
"cpe:2.3:a:ffmpeg:ffmpeg:4.2:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
CVE-2016-10011 | authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process. | [
"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 |
|
GHSA-x9c7-9xx2-4682 | UPOINT @1 Event Publisher stores sensitive information under the web document root with insufifcient access control, which allows remote attackers to read private comments via a direct request to eventpublisher.txt. | [] | null | null | null | null |
|
GHSA-vgcx-6544-9rp2 | Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the list parameter in the function sub_49E098. | [] | null | 9.8 | null | null |
|
GHSA-gmmx-gqqf-wp2p | Arista EOS 4.15 before 4.15.8M, 4.16 before 4.16.7M, and 4.17 before 4.17.0F on DCS-7050 series devices allow remote attackers to cause a denial of service (device reboot) by sending crafted packets to the control plane. | [] | null | null | 7.5 | null |
|
CVE-2019-11291 | RabbitMQ XSS attack via federation and shovel endpoints | Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information. | [
"cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:rabbitmq:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*"
] | null | null | 3.1 | null |
GHSA-g743-m34x-3m6h | Directory traversal vulnerability in Moreover.com cached_feed.cgi script version 4.July.00 allows remote attackers to read arbitrary files via a .. (dot dot) attack on the category or format parameters. | [] | null | null | null | null |
|
CVE-2016-5878 | Open redirect vulnerability in IBM FileNet Workplace 4.0.2 before 4.0.2.14 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | [
"cpe:2.3:a:ibm:filenet_workplace:4.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_workplace:4.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_workplace:4.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_workplace:4.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_workplace:4.0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_workplace:4.0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_workplace:4.0.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_workplace:4.0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_workplace:4.0.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_workplace:4.0.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_workplace:4.0.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_workplace:4.0.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_workplace:4.0.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_workplace:4.0.2.13:*:*:*:*:*:*:*"
] | null | null | 6.8 | 4.9 |
|
CVE-2021-37991 | Race in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5.1 |
|
GHSA-c6q8-fx49-c26r | The _bfd_elf_parse_attributes function in elf-attrs.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (_bfd_elf_attr_strdup heap-based buffer over-read and application crash) via a crafted ELF file. | [] | null | null | 5.5 | null |
|
GHSA-8c44-wv8g-r976 | Hospital Management System 1.0 was discovered to contain a SQL injection vulnerability via the pat_number parameter at his_admin_view_single_patient.php. | [] | null | 8.8 | null | null |
|
GHSA-f5rw-5wqh-76m9 | Multiple stored cross-site scripting (XSS) vulnerabilities in Emlog Pro v2.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Article Title or Article Summary parameters. | [] | null | 5.4 | null | null |
|
CVE-2019-0254 | SAP Disclosure Management (before version 10.1 Stack 1301) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. | [
"cpe:2.3:a:sap:disclosure_management:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-h88v-572r-gvxx | The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Photo Stack Widget in all versions up to, and including, 3.10.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
RHSA-2023:4507 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update | jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.5 | null | null |
GHSA-93gj-m35w-q9v5 | Improper Access Control in Samsung Voice Recorder prior to versions 21.4.15.01 in Android 12 and Android 13, 21.4.50.17 in Android 14 allows physical attackers to access Voice Recorder information on the lock screen. | [] | null | 6.8 | null | null |
|
CVE-2022-2413 | Slide Anything < 2.3.47 - Author+ Cross Site Scripting in slide title | The Slide Anything WordPress plugin before 2.3.47 does not properly sanitize or escape the slide title before outputting it in the admin pages, allowing a logged in user with roles as low as Author to inject a javascript payload into the slide title even when the unfiltered_html capability is disabled. | [
"cpe:2.3:a:simonpedge:slide_anything:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
GHSA-43rp-qmpv-m433 | In libpbc.a in PBC through 2017-03-02, there is a Segmentation fault in _pbcB_register_fields in bootstrap.c. | [] | null | 9.8 | null | null |
|
CVE-2021-39761 | In Media, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-179783181 | [
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2018-1431 | A vulnerability in GSKit affects IBM Spectrum Scale 4.1.1, 4.2.0, 4.2.1, 4.2.3, and 5.0.0 that could allow a local attacker to obtain control of the Spectrum Scale daemon and to access and modify files in the Spectrum Scale file system, and possibly to obtain administrator privileges on the node. IBM X-Force ID: 139240. | [
"cpe:2.3:a:ibm:general_parallel_file_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spectrum_scale:*:*:*:*:*:*:*:*"
] | null | null | 7.4 | null |
|
PYSEC-2020-161 | null | A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected. | [] | null | null | null | null |
CVE-2024-30426 | WordPress Hash Elements plugin <= 1.3.3 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HashThemes Hash Elements allows Stored XSS.This issue affects Hash Elements: from n/a through 1.3.3.
| [] | null | 6.5 | null | null |
GHSA-w7fm-92w5-g2m4 | Dell EMC ECS, versions prior to 3.5, contains an Exposure of Resource vulnerability. A remote unauthenticated attacker can access the list of DT (Directory Table) objects of all internally running services and gain knowledge of sensitive data of the system. | [] | null | null | null | null |
|
GHSA-7m75-fp2v-fxr7 | In cta, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07025415; Issue ID: ALPS07025415. | [] | null | 7.8 | null | null |
|
RHSA-2022:4800 | Red Hat Security Advisory: rsyslog security update | rsyslog: Heap-based overflow in TCP syslog server | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.1 | null | null |
CVE-2013-5051 | Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2016-6308 | statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages. | [
"cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*"
] | null | null | 5.9 | 7.1 |
|
CVE-2020-27696 | Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a specific Windows system directory which can lead to obtaining administrative privileges during the installation of the product. | [
"cpe:2.3:a:trendmicro:antivirus\\+_security_2020:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:internet_security_2020:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:maximum_security_2020:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:premium_security_2020:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.9 |
|
CVE-2014-2103 | Cisco Intrusion Prevention System (IPS) Software allows remote attackers to cause a denial of service (MainApp process outage) via malformed SNMP packets, aka Bug IDs CSCum52355 and CSCul49309. | [
"cpe:2.3:a:cisco:intrusion_prevention_system:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intrusion_prevention_system:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intrusion_prevention_system:6.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intrusion_prevention_system:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(1\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(2\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(2\\)e4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(3\\)e4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(4\\)e4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(5a\\)e4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(6\\)e4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(7\\)e4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(8\\)e4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(9\\)e4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intrusion_prevention_system:7.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:intrusion_prevention_system:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-6g49-f785-8862 | An improper restriction of xml external entity reference in Fortinet FortiNAC version 9.4.0 through 9.4.1, FortiNAC version 9.2.0 through 9.2.7, FortiNAC version 9.1.0 through 9.1.8, FortiNAC version 8.8.0 through 8.8.11, FortiNAC version 8.7.0 through 8.7.6, FortiNAC version 8.6.0 through 8.6.5, FortiNAC version 8.5.0 through 8.5.4, FortiNAC version 8.3.7 allows attacker to read arbitrary files or trigger a denial of service via specifically crafted XML documents. | [] | null | 9.1 | null | null |
|
CVE-2020-14746 | Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Popup windows). Supported versions that are affected are 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). | [
"cpe:2.3:a:oracle:applications_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:applications_framework:12.1.3:*:*:*:*:*:*:*"
] | null | 4.7 | null | null |
|
CVE-2018-17176 | A replay issue was discovered on Neato Botvac Connected 2.2.0 devices. Manual control mode requires authentication, but once recorded, the authentication (always transmitted in cleartext) can be replayed to /bin/webserver on port 8081. There are no nonces, and timestamps are not checked at all. | [
"cpe:2.3:o:neatorobotics:botvac_d4_connected_firmware:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:neatorobotics:botvac_d4_connected:-:*:*:*:*:*:*:*",
"cpe:2.3:o:neatorobotics:botvac_d6_connected_firmware:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:neatorobotics:botvac_d6_connected:-:*:*:*:*:*:*:*",
"cpe:2.3:o:neatorobotics:botvac_d7_connected_firmware:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:neatorobotics:botvac_d7_connected:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-qr9w-4vx5-7gf3 | Cross-site request forgery (CSRF) vulnerability in HP Systems Insight Manager (SIM) before 6.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. | [] | null | null | null | null |
|
GHSA-3h69-fjjv-586m | Buffer overflow in XiongMai uc-httpd 1.0.0 has unspecified impact and attack vectors, a different vulnerability than CVE-2017-16725. | [] | null | null | 9.8 | null |
|
GHSA-6hm2-c6p5-fc7q | A remote code execution vulnerability in the Android system ui. Product: Android. Versions: 7.1.1, 7.1.2. Android ID: A-35639138. | [] | null | null | 7.8 | null |
|
CVE-2018-1369 | IBM Security Guardium Big Data Intelligence (SonarG) 3.1 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 137767. | [
"cpe:2.3:a:ibm:security_guardium_big_data_intelligence:3.1:*:*:*:*:*:*:*"
] | null | null | 3.7 | null |
|
GHSA-qhxf-m7jm-jc57 | CSRF vulnerability in Pipeline GitHub Notify Step Plugin allows capturing credentials | A cross-site request forgery vulnerability in Jenkins Pipeline GitHub Notify Step Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [] | null | 7.1 | null | null |
GHSA-gp94-rxvr-x5cx | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981. | [] | null | null | 9.8 | null |
|
RHSA-2020:2291 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic | [
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 5.9 | null | null |
CVE-2024-23688 | Consensys Discovery Nonce Reuse | Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.
| [
"cpe:2.3:a:consensys:discovery:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-3gjj-f2w8-w88q | modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password. | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.