id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-j6j6-rqgq-38xw | IBM Maximo Asset Management 7.5 and 7.6 generates error messages that could reveal sensitive information that could be used in further attacks against the system. IBM X-Force ID: 125153. | [] | null | null | 5.3 | null |
|
CVE-2021-22205 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 10 | null | null |
|
GHSA-c8x5-69w4-954r | In TrustZone in all Android releases from CAF using the Linux kernel, an Information Exposure Through Timing Discrepancy vulnerability could potentially exist. | [] | null | null | 5.5 | null |
|
GHSA-3g9w-ghrc-hc72 | In ARM mbed TLS before 2.7.0, there is a bounds-check bypass through an integer overflow in PSK identity parsing in the ssl_parse_client_psk_identity() function in library/ssl_srv.c. | [] | null | null | 9.8 | null |
|
CVE-2007-5939 | The gss_userok function in appl/ftp/ftpd/gss_userok.c in Heimdal 0.7.2 does not allocate memory for the ticketfile pointer before calling free, which allows remote attackers to have an unknown impact via an invalid username. NOTE: the vulnerability was originally reported for ftpd.c, but this is incorrect. | [
"cpe:2.3:a:heimdal:heimdal:0.7.2:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-c5qg-72q9-j764 | There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. | [] | null | 7.5 | null | null |
|
RHSA-2024:4479 | Red Hat Security Advisory: OpenShift Container Platform 4.14.33 bug fix and security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-retryablehttp: url might write sensitive information to log file openssh: regreSSHion - race condition in SSH allows RCE/DoS | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 8.1 | null | null |
GHSA-m5xw-hwxw-fq3j | Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R package versions 4.0.0 through 16.1.0 allows arbitrary code execution. An application is vulnerable if it
reads Arrow IPC, Feather or Parquet data from untrusted sources (for
example, user-supplied input files). This vulnerability only affects the arrow R package, not other Apache Arrow
implementations or bindings unless those bindings are specifically used via the R package (for example, an R application that embeds a Python interpreter and uses PyArrow to read files from untrusted sources is still vulnerable if the arrow R package is an affected version). It is recommended that users of the arrow R package upgrade to 17.0.0 or later. Similarly, it
is recommended that downstream libraries upgrade their dependency
requirements to arrow 17.0.0 or later. If using an affected
version of the package, untrusted data can read into a Table and its internal to_data_frame() method can be used as a workaround (e.g., read_parquet(..., as_data_frame = FALSE)$to_data_frame()).This issue affects the Apache Arrow R package: from 4.0.0 through 16.1.0.Users are recommended to upgrade to version 17.0.0, which fixes the issue. | [] | null | 9.8 | null | null |
|
CVE-2025-26921 | WordPress Booking and Rental Manager Plugin <= 2.2.6 - PHP Object Injection vulnerability | Deserialization of Untrusted Data vulnerability in magepeopleteam Booking and Rental Manager allows Object Injection. This issue affects Booking and Rental Manager: from n/a through 2.2.6. | [] | null | 8.8 | null | null |
CVE-2025-23042 | Gradio Blocked Path ACL Bypass Vulnerability | Gradio is an open-source Python package that allows quick building of demos and web application for machine learning models, API, or any arbitrary Python function. Gradio's Access Control List (ACL) for file paths can be bypassed by altering the letter case of a blocked file or directory path. This vulnerability arises due to the lack of case normalization in the file path validation logic. On case-insensitive file systems, such as those used by Windows and macOS, this flaw enables attackers to circumvent security restrictions and access sensitive files that should be protected. This issue can lead to unauthorized data access, exposing sensitive information and undermining the integrity of Gradio's security model. Given Gradio's popularity for building web applications, particularly in machine learning and AI, this vulnerability may pose a substantial threat if exploited in production environments. This issue has been addressed in release version 5.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [] | 8.7 | null | null | null |
CVE-2008-2793 | SQL injection vulnerability in group_posts.php in ClipShare before 3.0.1 allows remote attackers to execute arbitrary SQL commands via the tid parameter. | [
"cpe:2.3:a:clip-share:clipshare:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2016-8008 | Privilege escalation vulnerability in Windows 7 and Windows 10 in McAfee Security Scan Plus (SSP) 3.11.376 allows attackers to load a replacement of the version.dll file via McAfee McUICnt.exe onto a Windows system. | [
"cpe:2.3:a:mcafee:security_scan_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 7.2 |
|
RHSA-2021:0765 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: bad kfree in auditfilter.c may lead to escalation of privilege kernel: performance counters race condition use-after-free kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c kernel: ICMP rate limiting can be used for DNS poisoning attack kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free | [
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.8 | null | null |
CVE-2021-24333 | Content Copy Protection & Prevent Image Save <= 1.3 - CSRF to Stored Cross-Site Scripting (XSS) | The Content Copy Protection & Prevent Image Save WordPress plugin through 1.3 does not check for CSRF when saving its settings, not perform any validation and sanitisation on them, allowing attackers to make a logged in administrator set arbitrary XSS payloads in them. | [
"cpe:2.3:a:content_copy_protection_\\&_prevent_image_save_project:content_copy_protection_\\&_prevent_image_save:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | 4.3 |
GHSA-xh3c-49q5-vp78 | lunary-ai/lunary version 1.0.0 is vulnerable to unauthorized evaluation creation due to missing server-side checks for user account status during evaluation creation. While the web UI restricts evaluation creation to paid accounts, the server-side API endpoint '/v1/evaluations' does not verify if the user has a paid account, allowing users with free or self-hosted accounts to create unlimited evaluations without upgrading their account. This vulnerability is due to the lack of account status validation in the evaluation creation process. | [] | null | null | 5.3 | null |
|
GHSA-pp9v-vrjh-4q7m | The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data. | [] | null | 8.2 | null | null |
|
GHSA-w792-393v-4wjj | Directory traversal vulnerability in Microsoft Internet Explorer allows remote attackers to read arbitrary files via directory traversal sequences in a URI with a certain scheme, possibly related to "..%5C" (encoded backslash) sequences. | [] | null | null | null | null |
|
CVE-2022-1033 | Unrestricted Upload of File with Dangerous Type in crater-invoice/crater | Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0.6. | [
"cpe:2.3:a:craterapp:crater:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | null |
GHSA-g87c-v886-hqf3 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.3. A remote attacker may be able to leak memory. | [] | null | null | null | null |
|
GHSA-9r44-rxj7-mwq3 | IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 190837. | [] | null | 5.9 | null | null |
|
GHSA-qw3g-35hc-fcrh | Cross-Site Scripting (XSS) in restify | Affected versions of `restify` are susceptible to a cross-site scripting vulnerability when using URL encoded script tags in a non-existent URL.Proof of Concept:RequestWill be included in response:```<script>alert(73541);</script>```RecommendationUpdate to version 4.1.0 or later. | [] | null | null | 6.1 | null |
cisco-sa-uccx-xss-GO9L9xxr | Cisco Unified Contact Center Express Stored Cross-Site Scripting Vulnerability | A vulnerability in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX) could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack.
This vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by entering crafted text into various input fields within the web-based management interface. A successful exploit could allow the attacker to perform a stored XSS attack, which could allow the execution of scripts within the context of other users of the interface.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 5.4 | null | null |
RHSA-2025:8183 | Red Hat Security Advisory: gstreamer1-plugins-bad-free security update | GStreamer: GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.8 | null | null |
GHSA-q77x-cxrq-988j | Jenkins Azure VM Agents Plugin missing permission checks | Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier does not perform permission checks in several HTTP endpoints.This allows attackers with Overall/Read permission to connect to an attacker-specified Azure Cloud server using attacker-specified credentials IDs obtained through another method.Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.Azure VM Agents Plugin 853.v4a_1a_dd947520 requires POST requests and the appropriate permissions for the affected HTTP endpoints. | [] | null | 4.3 | null | null |
GHSA-9gp7-jvm2-r4mx | Apache Struts Improper Input Validation vulnerability | If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. Solution is to upgrade to Apache Struts version 2.5.12. | [] | null | null | 5.9 | null |
CVE-2019-6265 | The Scripting and AutoUpdate functionality in Cordaware bestinformed Microsoft Windows client versions before 6.2.1.0 are affected by insecure implementations which allow remote attackers to execute arbitrary commands and escalate privileges. | [
"cpe:2.3:a:cordaware:bestinformed:*:*:*:*:*:windows:*:*"
] | null | null | 7.8 | 4.6 |
|
GHSA-vqc6-2j8r-xqpr | Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters ). Supported versions that are affected are 8.5.2 and 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data as well as unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS v3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). | [] | null | null | 8.6 | null |
|
GHSA-prj7-2jhj-62fj | In some cases, Kea log files or lease files may be world-readable.
This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8. | [] | null | 4 | null | null |
|
GHSA-qg4c-8pj4-qgw2 | A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors. | [] | null | 9.1 | null | null |
|
CVE-2015-7761 | Mail in Apple OS X before 10.11 does not properly recognize user preferences, which allows attackers to obtain sensitive information via an unspecified action during the printing of an e-mail message, a different vulnerability than CVE-2015-7760. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-4fhw-67rp-wjhj | Heap-based buffer overflow in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allows attackers to complete a transition from Low Integrity to Medium Integrity via unspecified vectors. | [] | null | null | null | null |
|
CVE-2014-1265 | The systemsetup program in the Date and Time subsystem in Apple OS X before 10.9.2 allows local users to bypass intended access restrictions by changing the current time on the system clock. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.5:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.5:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2007-5625 | Cross-site scripting (XSS) vulnerability in filename.asp in ASP Site Search SearchSimon Lite 1.0 allows remote attackers to inject arbitrary web script or HTML via the QUERY parameter. | [
"cpe:2.3:a:simongibson:asp_site_search_searchsimon_lite:1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-p4cv-qgmg-7q4w | The WordPress Single Sign-On (SSO) plugin for WordPress is vulnerable to unauthorized access due to a misconfigured capability check on a function in all versions up to, and including, the *.5.3 versions of the plugin. This makes it possible for unauthenticated attackers to extract sensitive data including site content that has been restricted to certain users and/or roles. | [] | null | 5.3 | null | null |
|
CVE-2021-39035 | IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 213965. | [
"cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*",
"cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*"
] | null | null | 5.4 | null |
|
GHSA-9m8g-jq9x-h3f8 | Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). The supported version that is affected is 11.1.1.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher). While the vulnerability is in BI Publisher (formerly XML Publisher), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of BI Publisher (formerly XML Publisher) accessible data as well as unauthorized read access to a subset of BI Publisher (formerly XML Publisher) accessible data. CVSS 3.0 Base Score 7.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N). | [] | null | null | null | null |
|
GHSA-vcgf-5qvw-2fwc | SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via draw_stroke at /gfxpoly/stroke.c. | [] | null | 5.5 | null | null |
|
CVE-2015-6114 | Microsoft Silverlight 5 before 5.1.41105.00 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Microsoft Silverlight Information Disclosure Vulnerability," a different vulnerability than CVE-2015-6165. | [
"cpe:2.3:a:microsoft:silverlight:5.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2018-8792 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function cssp_read_tsrequest() that results in a Denial of Service (segfault). | [
"cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2023-52472 | crypto: rsa - add a check for allocation failure | In the Linux kernel, the following vulnerability has been resolved:
crypto: rsa - add a check for allocation failure
Static checkers insist that the mpi_alloc() allocation can fail so add
a check to prevent a NULL dereference. Small allocations like this
can't actually fail in current kernels, but adding a check is very
simple and makes the static checkers happy. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-48fj-hh68-6w6q | Replay Attackin ABB, Busch-Jaeger, FTS Display (version 1.00) and BCU (version 1.3.0.33) allows attacker to capture/replay KNX telegram to local KNX Bus-System | [] | 7.3 | 9.2 | null | null |
|
CVE-2019-0671 | A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0672, CVE-2019-0673, CVE-2019-0674, CVE-2019-0675. | [
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-p988-h6pg-9xrg | Directory traversal vulnerability in DJcalendar.cgi in DJCalendar allows remote attackers to read arbitrary files via a .. (dot dot) in the TEMPLATE parameter. | [] | null | null | null | null |
|
CVE-2024-43747 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null |
GHSA-r9c2-8gff-gw8f | Multiple unknown vulnerabilities in the (1) DHCP and (2) Telnet dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (abort). | [] | null | null | null | null |
|
CVE-2019-1439 | An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-rq43-vgrv-48m9 | Insufficient memory write check in SMM service for EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access. | [] | null | null | 6.7 | null |
|
GHSA-hmvg-cx6j-hfj7 | In the Linux kernel, the following vulnerability has been resolved:tomoyo: fix UAF write bug in tomoyo_write_control()Since tomoyo_write_control() updates head->write_buf when write()
of long lines is requested, we need to fetch head->write_buf after
head->io_sem is held. Otherwise, concurrent write() requests can
cause use-after-free-write and double-free problems. | [] | null | 7.8 | null | null |
|
CVE-2021-45815 | Quectel UC20 UMTS/HSPA+ UC20 6.3.14 is affected by a Cross Site Scripting (XSS) vulnerability. | [
"cpe:2.3:o:quectel:uc20_firmware:6.3.14:*:*:*:*:*:*:*",
"cpe:2.3:h:quectel:uc20:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2014-5238 | XML external entity (XXE) vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev11 and 7.6.x before 7.6.0-rev9 allows remote attackers to read arbitrary files and possibly other unspecified impact via a crafted OpenDocument Text document. | [
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision1:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision10:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision2:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision3:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision4:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision5:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision6:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision7:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision8:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:revision9:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision1:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision2:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision3:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision4:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision5:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision6:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision7:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.0:revision8:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-pwq7-q338-mgmf | The Mozilla Updater can be made to choose an arbitrary target working directory for output files resulting from the update process. This vulnerability requires local system access. Note: this issue only affects Windows operating systems. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50. | [] | null | null | 5.5 | null |
|
CVE-2020-22673 | Memory leak in the senc_Parse function in MP4Box in gpac 0.8.0 allows attackers to cause a denial of service (DoS) via a crafted input. | [
"cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2018-9544 | In register_app of btif_hd.cc, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-113037220 | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 |
|
CVE-2001-0293 | Directory traversal vulnerability in FtpXQ FTP server 2.0.93 allows remote attackers to read arbitrary files via a .. (dot dot) in the GET command. | [
"cpe:2.3:a:datawizard:ftpxq:2.0.93:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-v875-jf7g-hg8j | Heap buffer overflow in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [] | null | null | null | null |
|
CVE-2005-4799 | Multiple cross-site scripting (XSS) vulnerabilities in Yet Another PHP Image Gallery (YaPIG) 0.95b and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the Homepage field (aka the Website field) in an "image-related comment" and (2) the img_size field in view.php. NOTE: due to lack of details from the researcher, it is not clear whether the comment vector overlaps CVE-2005-1886. | [
"cpe:2.3:a:yapig:yapig:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yapig:yapig:0.92b:*:*:*:*:*:*:*",
"cpe:2.3:a:yapig:yapig:0.93u:*:*:*:*:*:*:*",
"cpe:2.3:a:yapig:yapig:0.94u:*:*:*:*:*:*:*",
"cpe:2.3:a:yapig:yapig:0.95:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
CVE-2020-7485 | **VERSION NOT SUPPORTED WHEN ASSIGNED** A legacy support account in the TriStation software version v4.9.0 and earlier could cause improper access to the TriStation host machine. This was addressed in TriStation version v4.9.1 and v4.10.1 released on May 30, 2013.1 | [
"cpe:2.3:a:schneider-electric:tristation_1131:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:tristation_1131:4.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:tristation_1131:4.12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2020-2193 | Jenkins ECharts API Plugin 4.7.0-3 and earlier does not escape the parser identifier when rendering charts, resulting in a stored cross-site scripting vulnerability. | [
"cpe:2.3:a:jenkins:echarts_api:*:*:*:*:*:jenkins:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2005-4497 | Cross-site scripting (XSS) vulnerability in Tangora Portal CMS 4.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the action parameter in a search page, as demonstrated using (1) page1631.aspx and (2) page496.aspx. | [
"cpe:2.3:a:tangora:tangora_portal_cms:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2024:8118 | Red Hat Security Advisory: OpenJDK 8u432 Security Update for Portable Linux Builds | giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644) | [
"cpe:/a:redhat:openjdk:1.8"
] | null | 4.8 | null | null |
RHSA-2020:2320 | Red Hat Security Advisory: rh-maven35-jackson-databind security update | jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.1 | null | null |
GHSA-rjmm-pv9x-pm33 | Cross-site scripting (XSS) vulnerability in WCONSOLE.DLL in Rockliffe MailSite 5.x and 6.1.22 and earlier allows remote attackers to inject arbitrary web script or HTML via the query string. | [] | null | null | null | null |
|
cisco-sa-ucsfi-imm-syn-p6kZTDQC | Cisco UCS 6400 and 6500 Series Fabric Interconnects Intersight Managed Mode Denial of Service Vulnerability | A vulnerability in system resource management in Cisco UCS 6400 and 6500 Series Fabric Interconnects that are in Intersight Managed Mode (IMM) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the Device Console UI of an affected device.
This vulnerability is due to insufficient rate-limiting of TCP connections to an affected device. An attacker could exploit this vulnerability by sending a high number of TCP packets to the Device Console UI. A successful exploit could allow an attacker to cause the Device Console UI process to crash, resulting in a DoS condition. A manual reload of the fabric interconnect is needed to restore complete functionality.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 5.3 | null | null |
CVE-2024-8078 | TOTOLINK AC1200 T8 setTracerouteCfg buffer overflow | A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been declared as critical. This vulnerability affects the function setTracerouteCfg. The manipulation leads to buffer overflow. The attack can be initiated remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:h:totolink:ac1200_t8:4.1.5cu.862_b20230228:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:t8_firmware:4.1.5cu.862_b20230228:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*"
] | 8.7 | 8.8 | 8.8 | 9 |
CVE-2012-1723 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot. | [
"cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update28:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update32_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update32_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update28:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:redhat:icedtea6:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2010-2899 | Unspecified vulnerability in the layout implementation in Google Chrome before 5.0.375.125 allows remote attackers to obtain sensitive information from process memory via unknown vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
PYSEC-2021-739 | null | TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `tf.raw_ops.CTCLoss` allows an attacker to trigger an OOB read from heap. The fix will be included in TensorFlow 2.5.0. We will also cherrypick these commits on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | [] | null | null | null | null |
CVE-2019-6603 | In BIG-IP 11.5.1-11.5.8, 11.6.1-11.6.3, 12.1.0-12.1.3, and 13.0.0-13.0.1, malformed TCP packets sent to a self IP address or a FastL4 virtual server may cause an interruption of service. The control plane is not exposed to this issue. This issue impacts the data plane virtual servers and self IPs. | [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:h:f5:big-ip_protocol_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2022-36789 | Improper access control in BIOS firmware for some Intel(R) NUC 10 Performance Kits and Intel(R) NUC 10 Performance Mini PCs before version FNCML357.0053 may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnkn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnkn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhja_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhja:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhca_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhca:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhj_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhj:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhja_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhja:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhja_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhja:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkp:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2007-6496 | Hosting Controller 6.1 Hot fix 3.3 and earlier allows remote attackers to register arbitrary users via a request to hosting/addsubsite.asp with the loginname and password parameters set, when preceded by certain requests to hosting/default.asp and hosting/selectdomain.asp, a related issue to CVE-2005-1654. | [
"cpe:2.3:a:hosting_controller:hosting_controller:6.1_hotfix_3.3:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2023-1921 | The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_start_cdn_integration_ajax_request_callback function. This makes it possible for unauthenticated attackers to change cdn settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:wpfastestcache:wp_fastest_cache:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
|
GHSA-pfwp-8pq4-g7pv | Incomplete List of Disallowed Inputs in SOFA-Hessian | SOFA-Hessian through 4.0.2 allows remote attackers to execute arbitrary commands via a crafted serialized Hessian object because blacklisting of com.caucho.naming.QName and com.sun.org.apache.xpath.internal.objects.XString is mishandled, related to Resin Gadget. | [] | null | null | 9.8 | null |
GHSA-rv7x-qjc3-m67h | The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to unauthorized user registration due to a missing capability check on the 'register' function in all versions up to, and including, 4.2.6.8.1. This makes it possible for unauthenticated attackers to bypass disabled user registration to create a new account with the default role. | [] | null | 5.3 | null | null |
|
GHSA-cjm7-rmgv-2xvx | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Themewinter Eventin allows Stored XSS.This issue affects Eventin: from n/a through 4.0.5. | [] | null | 5.9 | null | null |
|
CVE-2008-4172 | SQL injection vulnerability in page.php in Cars & Vehicle (aka Cars-Vehicle Script) allows remote attackers to execute arbitrary SQL commands via the lnkid parameter. | [
"cpe:2.3:a:rfaah:cars-vehicles_script:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-21274 | In convertSubgraphFromHAL of ShimConverter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
| [
"cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-6j6w-975j-pgqc | Cross-site scripting vulnerability in index.php in PHP Fusebox 4.0.6 allows remote attackers to inject arbitrary web script or HTML via the fuseaction parameter. | [] | null | null | null | null |
|
CVE-2021-40833 | Denial-of-Service (DoS) Vulnerability | A vulnerability affecting F-Secure antivirus engine was discovered whereby unpacking UPX file can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine. | [
"cpe:2.3:a:f-secure:atlant:-:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:internet_gatekeeper:-:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:linux_security:-:*:*:*:*:*:x86:*",
"cpe:2.3:a:f-secure:linux_security_64:-:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:elements_endpoint_protection:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2024-11969 | Incorrect default permissions in Cradlepoint NetCloud Exchange | The NetCloud Exchange client for Windows, version 1.110.50, contains an insecure file and folder permissions vulnerability. A normal (non-admin) user could exploit the weakness in file and folder permissions to escalate privileges, execute arbitrary code and maintain persistence on the compromised machine. It has been identified that full control permissions exist on the ‘Everyone’ group (i.e. any user who has local access to the operating system regardless of their privileges). | [
"cpe:2.3:a:cradlepoint:netcloud_exhange_client:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2021-41916 | A Cross-Site Request Forgery (CSRF) vulnerability in webTareas version 2.4 and earlier allows a remote attacker to create a new administrative profile and add a new user to the new profile. without the victim's knowledge, by enticing an authenticated admin user to visit an attacker's web page. | [
"cpe:2.3:a:webtareas_project:webtareas:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-pq85-mpmh-g85v | Stack overflow in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure and/or denial of service via network access. | [] | null | 8.1 | null | null |
|
CVE-2021-3128 | In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set. | [
"cpe:2.3:o:asus:zenwifi_ax_\\(xt8\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:zenwifi_ax_\\(xt8\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ax3000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ax55_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ax56u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ax58u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ax68u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ax68u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ax82u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ax82u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ax86u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ax86u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ax88u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac66u_b1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac1750_b1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac1750_b1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac1900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac1900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac1900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac1900u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac1900u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac2900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac2900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac3100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac5300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac58u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac58u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac65u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac65u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac68p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac68p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac68r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac68r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac68rw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac68rw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac68w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac68w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac85u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac85u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac86u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac88u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2016-6829 | The trove service user in (1) Openstack deployment (aka crowbar-openstack) and (2) Trove Barclamp (aka barclamp-trove and crowbar-barclamp-trove) in the Crowbar Framework has a default password, which makes it easier for remote attackers to obtain access via unspecified vectors. | [
"cpe:2.3:a:barclamp-trove_project:barclamp-trove:-:*:*:*:*:*:*:*",
"cpe:2.3:a:crowbar-openstack_project:crowbar-openstack:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-j98c-38q6-r4r2 | Buffer overflow in Yahoo! Messenger 5.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long (1) message or (2) IMvironment field. | [] | null | null | null | null |
|
CVE-2025-25823 | A cross-site scripting (XSS) vulnerability in Emlog Pro v2.5.4 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the article header at /admin/article.php. | [] | null | 7.3 | null | null |
|
CVE-2024-57538 | Linksys E8450 v1.2.00.360516 was discovered to contain a buffer overflow vulnerability. The parsed field (anonymous_protect_status) is copied to the stack without length verification. | [] | null | 6.5 | null | null |
|
CVE-2024-49260 | WordPress Limb Gallery plugin <= 1.5.7 - Arbitrary File Upload vulnerability | Unrestricted Upload of File with Dangerous Type vulnerability in Limb WordPress Gallery Plugin – Limb Image Gallery allows Code Injection.This issue affects WordPress Gallery Plugin – Limb Image Gallery: from n/a through 1.5.7. | [
"cpe:2.3:a:limb:limb_image_gallery:*:*:*:*:*:*:*:*"
] | null | 9.9 | null | null |
GHSA-59cr-f2p3-c96w | rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices. | [] | null | null | null | null |
|
CVE-2025-6847 | code-projects Simple Forum forum_edit.php sql injection | A vulnerability classified as critical was found in code-projects Simple Forum 1.0. This vulnerability affects unknown code of the file /forum_edit.php. The manipulation of the argument iii leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2024-11246 | code-projects Farmacia adicionar-cliente.php cross site scripting | A vulnerability, which was classified as problematic, was found in code-projects Farmacia 1.0. Affected is an unknown function of the file /adicionar-cliente.php. The manipulation of the argument nome/cpf/dataNascimento leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions the parameter "nome" to be affected. But further inspection indicates that other parameters might be affected as well. | [
"cpe:2.3:a:code-projects:farmacia:*:*:*:*:*:*:*:*",
"cpe:2.3:a:anisha:farmacia:1.0:*:*:*:*:*:*:*"
] | 5.3 | 3.5 | 3.5 | 4 |
CVE-2018-25047 | In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user. | [
"cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
CVE-2022-0994 | Hummingbird < 3.3.2 - Admin+ Stored Cross-Site Scripting | The Hummingbird WordPress plugin before 3.3.2 does not sanitise and escape the Config Name, which could allow high privilege users, such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed | [
"cpe:2.3:a:incsub:hummingbird:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 |
CVE-2024-13163 | Deserialization of untrusted data in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to achieve remote code execution. Local user interaction is required. | [] | null | 7.8 | null | null |
|
CVE-2017-9268 | open-build-service retrigger / wipebinaries hitting the wrong project bypassing access permissions | In the open build service before 201707022 the wipetrigger and rebuild actions checked the wrong project for permissions, allowing authenticated users to cause operations on projects where they did not have permissions leading to denial of service (resource consumption). | [
"cpe:2.3:a:opensuse:open_build_service:*:*:*:*:*:*:*:*"
] | null | null | 4.4 | null |
CVE-2023-26486 | Vega `scale` expression function cross site scripting | Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. The Vega `scale` expression function has the ability to call arbitrary functions with a single controlled argument. The scale expression function passes a user supplied argument group to getScale, which is then used as if it were an internal context. The context.scales[name].value is accessed from group and called as a function back in scale. This can be exploited to escape the Vega expression sandbox in order to execute arbitrary JavaScript. This issue has been fixed in version 5.13.1. | [
"cpe:2.3:a:vega-functions_project:vega-functions:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:vega_project:vega:*:*:*:*:*:node.js:*:*"
] | null | 6.5 | null | null |
GHSA-h7cg-cp8w-6f8h | Cross Site Scripting vulnerability in num parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL. | [] | null | 6.1 | null | null |
|
CVE-2017-3337 | Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:marketing:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:marketing:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:marketing:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:marketing:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:marketing:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:marketing:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:marketing:12.2.6:*:*:*:*:*:*:*"
] | null | null | 7.1 | 7.8 |
|
GHSA-7hmq-jcvc-j3gv | Unspecified vulnerability in Investintech.com Able2Doc and Able2Doc Professional allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted document. | [] | null | null | null | null |
|
GHSA-gj5f-9m2c-w52m | A vulnerability in the crypto engine of the Cisco Integrated Services Module for VPN (ISM-VPN) running Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient handling of VPN traffic by the affected device. An attacker could exploit this vulnerability by sending crafted VPN traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to hang or crash, resulting in a DoS condition. Cisco Bug IDs: CSCvd39267. | [] | null | null | 7.5 | null |
|
CVE-2023-4769 | Server-Side Request Forgery in ManageEngine Desktop Central | A SSRF vulnerability has been found in ManageEngine Desktop Central affecting version 9.1.0, specifically the /smtpConfig.do component. This vulnerability could allow an authenticated attacker to launch targeted attacks, such as a cross-port attack, service enumeration and other attacks via HTTP requests. | [
"cpe:2.3:a:manageengine:desktop_central:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_desktop_central:9.1.0:*:*:*:*:*:*:*"
] | null | 6.6 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.