id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2021-33824 | An issue was discovered on MOXA Mgate MB3180 Version 2.1 Build 18113012. Attackers can use slowhttptest tool to send incomplete HTTP request, which could make server keep waiting for the packet to finish the connection, until its resource exhausted. Then the web server is denial-of-service. | [
"cpe:2.3:o:moxa:mgate_mb3180_firmware:2.1:build_18113012:*:*:*:*:*:*",
"cpe:2.3:h:moxa:mgate_mb3180:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-vg4r-p8pw-h88f | PHPBlogger stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing an admin password hash via a direct request for data/pref.db. NOTE: this can be easily leveraged for administrative access because composing the authentication cookie only requires the password hash, not the cleartext version. | [] | null | null | null | null |
|
GHSA-mvwf-xw7r-mvpr | xosview 1.5.1 in Red Hat 5.1 allows local users to gain root access via a long HOME environmental variable. | [] | null | null | null | null |
|
CVE-2024-21356 | Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability | Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-vq94-9pfv-ccqr | SQL injection in Apache Traffic Control | An SQL injection vulnerability in Traffic Ops in Apache Traffic Control <= 8.0.1, >= 8.0.0 allows a privileged user with role "admin", "federation", "operations", "portal", or "steering" to execute arbitrary SQL against the database by sending a specially-crafted PUT request.Users are recommended to upgrade to version Apache Traffic Control 8.0.2 if you run an affected version of Traffic Ops. | [] | null | 8.8 | null | null |
GHSA-vj3r-c4pc-hrp4 | FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the stp_conf_name parameter in the web_stp_globalSetting_post function. | [] | null | 9.8 | null | null |
|
RHSA-2024:0889 | Red Hat Security Advisory: oniguruma security update | oniguruma: Use-after-free in onig_new_deluxe() in regext.c oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | 6.5 | null |
GHSA-x5rw-hv6h-jjmw | The simple-share-buttons-adder plugin before 6.0.0 for WordPress has XSS. | [] | null | null | 6.1 | null |
|
GHSA-8vp7-j5cj-vvm2 | Ability to expose data in Sylius by using an unintended serialisation group | ImpactResourceBundle accepts and uses any serialisation groups to be passed via a HTTP header. This might lead to data exposure by using an unintended serialisation group - for example it could make Shop API use a more permissive group from Admin API.Anyone exposing an API with ResourceBundle's controller is affected. The vulnerable versions are: `<1.3 || >=1.3.0 <=1.3.12 || >=1.4.0 <=1.4.5 || >=1.5.0 <=1.5.0 || >=1.6.0 <=1.6.2`.PatchesThe patch is provided for ResourceBundle 1.3.13, 1.4.6, 1.5.1 and 1.6.3, but not for any versions below 1.3.After it is applied, It allows to choose only the groups that are defined in `serialization_groups` or `allowed_serialization_groups` route definition. Any group not defined in those will not be used.This behaviour might be a BC break for those using custom groups via the HTTP header, please adjust `allowed_serialization_groups` accordingly.WorkaroundsService `sylius.resource_controller.request_configuration_factory` can be overridden with an implementation copied from `\Sylius\Bundle\ResourceBundle\Controller\RequestConfigurationFactory` where the part that handles custom serialisation groups is deleted. | [] | null | 4.4 | null | null |
GHSA-9wfq-hrqc-6wfv | Unspecified vulnerability in the Oracle Application Testing Suite component in Oracle Enterprise Manager Grid Control 12.4.0.2 and 12.5.0.2 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Test Manager for Web Apps, a different vulnerability than CVE-2016-0490. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a directory traversal vulnerability in the process method in the ActionServlet servlet, which allows remote attackers to bypass authentication via directory traversal sequences following an unspecified URI string. | [] | null | null | null | null |
|
GHSA-g43m-56w9-qc5h | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | [] | null | 8.8 | null | null |
|
GHSA-fmrh-jfvw-wcmr | An issue was discovered on Samsung mobile devices with O(8.x) and P(9.0) software. Data may leak via a Bluetooth debug command. The Samsung ID is SVE-2019-15398 (November 2019). | [] | null | null | null | null |
|
CVE-2025-20084 | Uncontrolled resource consumption for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access. | [] | 5.1 | 3.5 | null | null |
|
GHSA-xfff-cfmp-p8vp | OX App Suite before 7.10.3-rev32 and 7.10.4 before 7.10.4-rev18 allows XSS via a code snippet (user-generated content) when a sharing link is created and an App Loader relative URL is used. | [] | null | null | null | null |
|
RHSA-2015:1622 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 tomcat security update | tomcat: non-persistent DoS attack by feeding data by aborting an upload Tomcat/JbossWeb: security manager bypass via EL expressions | [
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el7"
] | null | null | null | null |
GHSA-56q7-7qfv-m92r | The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14. An app may be able to cause a denial-of-service. | [] | null | 5.5 | null | null |
|
GHSA-rxqg-9cwv-cw87 | Multiple cross-site scripting (XSS) vulnerabilities in Ktools.net PhotoStore allow remote attackers to inject arbitrary web script or HTML via the (1) gid parameter in details.php, or the (2) photogid parameter in view_photog.php. | [] | null | null | null | null |
|
RHSA-2021:2136 | Red Hat Security Advisory: Openshift Logging security and bugs update (5.0.4) | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:logging:5.0::el8"
] | null | 8.6 | null | null |
GHSA-958q-v58v-6fr2 | In the Linux kernel, the following vulnerability has been resolved:platform/x86: think-lmi: Fix password opcode ordering for workstationsThe Lenovo workstations require the password opcode to be run before
the attribute value is changed (if Admin password is enabled).Tested on some Thinkpads to confirm they are OK with this order too. | [] | null | 7.8 | null | null |
|
CVE-2024-21102 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.33_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.29_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.36_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_ndb_cluster:8.3.0_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
GHSA-hq3r-79m9-8fph | Multiple SQL injection vulnerabilities in Active Price Comparison 4 allow remote attackers to execute arbitrary SQL commands via the (1) ProductID parameter to reviews.aspx or the (2) linkid parameter to links.asp. | [] | null | null | null | null |
|
GHSA-6prr-mp53-33xp | Stack-based buffer overflow in Triologic Media Player 7 and 8.0.0.0 allows user-assisted remote attackers to execute arbitrary code via a long string in a .m3u playlist file. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-x526-g954-qx57 | Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | [] | null | null | null | null |
|
CVE-2018-11046 | Pivotal Operations Manager, versions 2.1.x prior to 2.1.6 and version 2.0.14, includes NGINX packages that lacks security vulnerability patches. An attacker with access to the NGINX processes and knowledge of how to exploit the unpatched vulnerabilities may be able to impact Operations Manager | [
"cpe:2.3:a:pivotal_software:operations_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pivotal_software:operations_manager:2.0.14:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
CVE-2019-2869 | Vulnerability in the Data Store component of Oracle Berkeley DB. Supported versions that are affected are 12.1.6.1.23, 12.1.6.1.26, 12.1.6.1.29, 12.1.6.1.36, 12.1.6.2.23 and 12.1.6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:berkeley_db:12.1.6.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:12.1.6.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:12.1.6.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:12.1.6.1.36:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:12.1.6.2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:12.1.6.2.32:*:*:*:*:*:*:*"
] | null | null | 7 | 3.7 |
|
RHSA-2023:6385 | Red Hat Security Advisory: liblouis security update | liblouis: buffer overflow in lou_logFile function at logginc.c liblouis: buffer overflow in lou_setDataPath liblouis: buffer overflow in Lou_Trace | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
GHSA-p9g8-3jw8-v3h3 | The Spotify Play Button WordPress plugin through 1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [] | null | 5.4 | null | null |
|
CVE-2017-3338 | Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). | [
"cpe:2.3:a:oracle:marketing:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:marketing:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:marketing:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:marketing:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:marketing:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:marketing:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:marketing:12.2.6:*:*:*:*:*:*:*"
] | null | null | 8.2 | 5.8 |
|
CVE-2021-4226 | RSFirewall < 1.1.25 - IP Block Bypass | RSFirewall tries to identify the original IP address by looking at different HTTP headers. A bypass is possible due to the way it is implemented. | [
"cpe:2.3:a:rsjoomla:rsfirewall\\!:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null |
GHSA-vgc3-2w4v-5m3j | A type confusion issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6. | [] | null | null | 8.8 | null |
|
GHSA-m84x-g88w-3fr7 | A vulnerability has been found in code-projects Online Book System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /cart.php. The manipulation of the argument quantity/remove leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258205 was assigned to this vulnerability. | [] | null | 6.3 | null | null |
|
CVE-2022-33974 | WordPress Custom Twitter Feeds (Tweets Widget) Plugin <= 1.8.4 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Smash Balloon Custom Twitter Feeds (Tweets Widget) plugin <= 1.8.4 versions. | [
"cpe:2.3:a:smashballoon:custom_twitter_feeds:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
GHSA-5qj6-vw7x-6j4g | The random-number generator on Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 does not have sufficient entropy, which makes it easier for remote attackers to defeat cryptographic protection mechanisms and hijack sessions via unspecified vectors, a different vulnerability than CVE-2014-2251. | [] | null | null | null | null |
|
RHSA-2023:1655 | Red Hat Security Advisory: OpenShift Container Platform 4.10.56 security update | kube-apiserver: Aggregated API server can cause clients to be redirected (SSRF) spring-security-oauth2-client: Privilege Escalation in spring-security-oauth2-client spring-security: Authorization rules can be bypassed via forward or include dispatcher types in Spring Security apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin haproxy: request smuggling attack in HTTP/1 header parsing Jenkins: XSS vulnerability in plugin manager Jenkins: Temporary plugin file created with insecure permissions Jenkins: Temporary file parameter created with insecure permissions Jenkins: Information disclosure through error stack traces related to agents | [
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 5.3 | null | null |
CVE-1999-1323 | Norton AntiVirus for Internet Email Gateways (NAVIEG) 1.0.1.7 and earlier, and Norton AntiVirus for MS Exchange (NAVMSE) 1.5 and earlier, store the administrator password in cleartext in (1) the navieg.ini file for NAVIEG, and (2) the ModifyPassword registry key in NAVMSE. | [
"cpe:2.3:a:symantec:norton_antivirus:*:*:internet_email_gateways:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:*:*:exchange:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2013-3381 | Cisco Hosted Collaboration Mediation allows remote attackers to cause a denial of service (CPU consumption) via a flood of malformed UDP packets on port 162, aka Bug ID CSCug85756. | [
"cpe:2.3:a:cisco:hosted_collaboration_solution:-:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2021-44489 | An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can cause an integer underflow of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c in order to cause a segmentation fault and crash the application. This is a "- digs" subtraction. | [
"cpe:2.3:a:fisglobal:gt.m:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yottadb:yottadb:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-4xf9-4r44-86rc | ImpressPages CMS RCE | ImpressPages CMS v1.0.12 has Unspecified Remote Code Execution (fixed in v1.0.13) | [] | null | 9.8 | null | null |
CVE-2023-25895 | ZDI-CAN-19540: Adobe Dimension USD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability | Adobe Dimension versions 3.4.7 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-xgqr-693c-m9jh | A vulnerability has been found in SourceCodester Take-Note App 1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-239350 is the identifier assigned to this vulnerability. | [] | null | null | 4.3 | null |
|
GHSA-p7wf-2w5g-7chw | The Live updates from Excel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ipushpull_page' shortcode in versions up to, and including, 2.3.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-px2w-2hm4-m39w | rmuser utility in FreeBSD 4.2 and 4.3 creates a copy of the master.passwd file with world-readable permissions while updating the original file, which could allow local users to gain privileges by reading the copied file while rmuser is running, obtain the password hashes, and crack the passwords. | [] | null | null | null | null |
|
CVE-2001-1267 | Directory traversal vulnerability in GNU tar 1.13.19 and earlier allows local users to overwrite arbitrary files during archive extraction via a tar file whose filenames contain a .. (dot dot). | [
"cpe:2.3:a:gnu:tar:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2022-29506 | Out-of-bounds read vulnerability exist in the simulator module contained in the graphic editor 'V-SFT' v6.1.3.0 and earlier, which may allow an attacker to obtain information and/or execute arbitrary code by having a user to open a specially crafted image file. | [
"cpe:2.3:a:fujielectric:v-server:*:*:*:*:-:*:*:*",
"cpe:2.3:a:fujielectric:v-server:*:*:*:*:lite:*:*:*",
"cpe:2.3:a:fujielectric:v-sft:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2023-41320 | Account takeover via SQL Injection in UI layout preferences in GLPI | GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. UI layout preferences management can be hijacked to lead to SQL injection. This injection can be use to takeover an administrator account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
GHSA-r7qr-w3m7-gjwm | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Ella van Durpe Slides & Presentations allows Code Injection.This issue affects Slides & Presentations: from n/a through 0.0.39. | [] | null | 5.4 | null | null |
|
CVE-2021-30523 | Use after free in WebRTC in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2023-31410 | A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK EventCam App. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the EventCam App and the Client, and potentially manipulate the data being transmitted. | [
"cpe:2.3:a:sick:sick_eventcam_app:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2005-1801 | The vCard viewer in Nokia 9500 allows attackers to cause a denial of service (crash) via a vCard with a long Name field, which causes the crash when the user views it. | [
"cpe:2.3:a:nokia:9500:*:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
CVE-2006-3053 | PHP remote file inclusion vulnerability in common.php in PHORUM 5.1.13 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the PHORUM[http_path] parameter. NOTE: this issue has been disputed by the vendor, who states "common.php is checked on the very first line of non-comment code that it is not being called directly. It has been this way in all 5.x version of Phorum." CVE analysis concurs with the vendor | [
"cpe:2.3:a:phorum:phorum:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.1.1_pre:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.1.1_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.1.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.2.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.2.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.3.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.3.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.3.2b3:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:3.4.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.3_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.7_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.15a:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.17a:*:*:*:*:*:*:*",
"cpe:2.3:a:phorum:phorum:5.0.18:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-f6h6-4v35-rxvq | Amano Xoffice parking solutions 7.1.3879 is vulnerable to SQL Injection. | [] | null | 9.8 | null | null |
|
CVE-2017-9450 | The Amazon Web Services (AWS) CloudFormation bootstrap tools package (aka aws-cfn-bootstrap) before 1.4-19.10 allows local users to execute arbitrary code with root privileges by leveraging the ability to create files in an unspecified directory. | [
"cpe:2.3:a:amazon:amazon_web_services_cloudformation_bootstrap:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
GHSA-wj24-xmc5-hjw4 | Jenkins Team Concert Plugin missing permission check | A missing permission check in Jenkins Team Concert Plugin 1.3.0 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. | [] | null | 4.3 | null | null |
GHSA-xr6m-vwc7-4qxx | Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: SSO Engine). Supported versions that are affected are 11.1.2.3.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Access Manager, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Access Manager accessible data as well as unauthorized read access to a subset of Oracle Access Manager accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). | [] | null | null | null | null |
|
CVE-2025-22913 | RE11S v1.11 was discovered to contain a stack overflow via the rootAPmac parameter in the formStaDrvSetup function. | [] | null | 9.8 | null | null |
|
CVE-2022-33990 | Misinterpretation of special domain name characters in dproxy-nexgen (aka dproxy nexgen) leads to cache poisoning because domain names and their associated IP addresses are cached in their misinterpreted form. | [
"cpe:2.3:a:dproxy-nexgen_project:dproxy-nexgen:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2017-6913 | Cross-site scripting (XSS) vulnerability in the Open-Xchange webmail before 7.6.3-rev28 allows remote attackers to inject arbitrary web script or HTML via the event attribute in a time tag. | [
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-c8x3-rg72-fwwg | Privilege escalation in Hashicorp Nomad | HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.0.10 and 1.1.4. | [] | null | 8.8 | null | null |
GHSA-x9wp-hprc-2gvq | The FormCraft WordPress plugin before 3.8.28 does not validate the URL parameter in the formcraft3_get AJAX action, leading to SSRF issues exploitable by unauthenticated users | [] | null | 9.1 | null | null |
|
GHSA-frwp-8f86-7mhx | KGet 2.4.2 in KDE SC 4.0.0 through 4.4.3 does not properly request download confirmation from the user, which makes it easier for remote attackers to overwrite arbitrary files via a crafted metalink file. | [] | null | null | null | null |
|
GHSA-9r7p-3jj4-29v6 | Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6. | [] | null | 5.5 | null | null |
|
GHSA-vcm3-phm4-6c23 | Xerox AltaLink B8045/B8055/B8065/B8075/B8090, AltaLink C8030/C8035/C8045/C8055/C8070 with software releases before 103.xxx.030.32000 includes two accounts with weak hard-coded passwords which can be exploited and allow unauthorized access which cannot be disabled. | [] | null | null | null | null |
|
CVE-2023-30375 | In Tenda AC15 V15.03.05.19, the function "getIfIp" contains a stack-based buffer overflow vulnerability. | [
"cpe:2.3:o:tenda:ac15_firmware:15.03.05.19:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-fv96-f45h-hpj6 | In PESCMS Team 2.2.1, attackers may upload and execute arbitrary PHP code through /Public/?g=Team&m=Setting&a=upgrade by placing a .php file in a ZIP archive. | [] | null | null | 9.8 | null |
|
CVE-2020-0532 | Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access. | [
"cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | 4.8 |
|
GHSA-q6f6-gfq8-34cx | Use of Out-of-range Pointer Offset in Conda vim prior to 8.2. | [] | null | 7.8 | null | null |
|
GHSA-gv97-jrx5-pj3x | The default configuration of ExShortcut\Web.config in EMC SourceOne Email Management before 6.6 SP1, when the Mobile Services component is used, does not properly set the localOnly attribute of the trace element, which allows remote authenticated users to obtain sensitive information via ASP.NET Application Tracing. | [] | null | null | null | null |
|
GHSA-7792-hjmw-g787 | The Build App Online plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.0.21. This is due to missing authentication checking in the 'set_user_cart' function with the 'user_id' header value. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. | [] | null | 9.8 | null | null |
|
CVE-2024-27266 | IBM Maximo Application Suite XML external entity injection | IBM Maximo Application Suite 7.6.1.3 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 284566. | [
"cpe:2.3:a:ibm:maximo_application_suite:7.6.1.3:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
GHSA-2xpr-684m-v738 | Unspecified vulnerability in the Oracle Email Center component in Oracle E-Business Suite 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect integrity via vectors related to Email Center Agent Console, a different vulnerability than CVE-2016-3559. | [] | null | null | 4.7 | null |
|
GHSA-m8r8-3226-6wp8 | BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file | [] | null | 5.3 | null | null |
|
GHSA-4m38-6q8p-p29r | Possible assertion due to lack of physical layer state validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking | [] | null | null | null | null |
|
GHSA-5fqw-fcpr-6qgf | The hevc_write_frame function in libbpg.c in libbpg 0.9.7 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted BPG file, related to improper interaction with hls_pcm_sample in hevc.c in libavcodec in FFmpeg and put_pcm_var in hevcdsp_template.c in libavcodec in FFmpeg. | [] | null | null | 8.8 | null |
|
GHSA-72m8-2j54-r5xg | inc.login.php in PHPsFTPd 0.2 through 0.4 allows remote attackers to obtain the administrator's username and password by setting the do_login parameter and performing an edit action using user.php, which causes the login check to be bypassed and leaks the password in the response. | [] | null | null | null | null |
|
CVE-2024-3188 | Shortcodes Ultimate < 7.1.0 - Contributor+ Stored XSS | The WP Shortcodes Plugin — Shortcodes Ultimate WordPress plugin before 7.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks | [
"cpe:2.3:a:getshortcodes:shortcodes_ultimate:-:*:*:*:*:wordpress:*:*"
] | null | 6.3 | null | null |
CVE-2007-0191 | Cross-site scripting (XSS) vulnerability in admin.php in MKPortal allows remote attackers to inject arbitrary web script or HTML via two certain fields in a contents_new operation in the ad_contents section. | [
"cpe:2.3:a:mkportal:mkportal:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-xf4h-5cm9-5xfc | Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0 allows local users to gain privileges via a Trojan horse bin/catfish.py under the current working directory. | [] | null | null | null | null |
|
GHSA-89c9-2mcj-c9gr | The 'HTML5 Video Player' WordPress Plugin, version < 2.5.25 is affected by an unauthenticated SQL injection vulnerability in the 'id' parameter in the 'get_view' function. | [] | null | 8.6 | null | null |
|
CVE-2017-8915 | sinopia, as used in SAP HANA XS 1.00 and 2.00, allows remote attackers to cause a denial of service (assertion failure and service crash) by pushing a package with a filename containing a $ (dollar sign) or % (percent) character, aka SAP Security Note 2407694. | [
"cpe:2.3:a:sap:hana_xs:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:hana_xs:2.00:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2013-6668 | Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.66:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.70:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.71:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.73:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.75:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.76:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.79:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.81:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.82:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.83:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.85:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.88:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.89:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.90:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.91:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.92:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.93:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.104:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.106:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.107:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.108:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.109:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.110:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.111:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.112:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.113:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.115:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.116:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.117:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.124:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.125:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.126:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.132:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.133:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.135:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.136:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:v8:3.24.34:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-j6cp-32xj-xr29 | phpMyAdmin through 5.0.2 allows CSV injection via Export Section | [] | null | null | null | null |
|
GHSA-r99f-79rc-6fjj | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Contact Form With Captcha allows Reflected XSS.This issue affects Contact Form With Captcha: from n/a through 1.6.8. | [] | null | 7.1 | null | null |
|
GHSA-4hqj-82pv-rf9g | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | [] | null | 7 | null | null |
|
GHSA-32p9-x7g8-8m43 | Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] | null | 5.4 | null | null |
|
CVE-2017-7923 | A Password in Configuration File issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build 161125, DS-2CD4x2xFWD Series V5.2.0 build 140721 to V5.4.0 Build 160414, DS-2CD4xx5 Series V5.2.0 build 140721 to V5.4.0 Build 160421, DS-2DFx Series V5.2.0 build 140805 to V5.4.5 Build 160928, and DS-2CD63xx Series V5.0.9 build 140305 to V5.3.5 Build 160106 devices. The password in configuration file vulnerability could allow a malicious user to escalate privileges or assume the identity of another user and access sensitive information. | [
"cpe:2.3:o:hikvision:ds-2cd2032-i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2112-i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2132-i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2212-i5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2232-i5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2312-i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2332-i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2412f-i\\(w\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2432f-i\\(w\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2512f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2532f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2612f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2632f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2712f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2732f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2t32-i3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2t32-i5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd2t32-i8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4012f-\\(a\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4012f-\\(p\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4012f-\\(w\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4012fwd-\\(a\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4012fwd-\\(p\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4012fwd-\\(w\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4024f-\\(a\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4024f-\\(p\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4024f-\\(w\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4032fwd-\\(a\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4032fwd-\\(p\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4032fwd-\\(w\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4112f-i\\(z\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4112fwd-i\\(z\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4124f-i\\(z\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4132fwd-i\\(z\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4212f-i\\(h\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4212f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4212f-i\\(z\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4212fwd-i\\(h\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4212fwd-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4212fwd-i\\(z\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4224f-i\\(h\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4224f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4224f-i\\(z\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4232fwd-i\\(h\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4232fwd-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4232fwd-i\\(z\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4312f-i\\(h\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4312f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4312f-i\\(z\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4324f-i\\(h\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4324f-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4324f-i\\(z\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4332fwd-i\\(h\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4332fwd-i\\(s\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd4332fwd-i\\(z\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd6412fwd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2032-i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2112-i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2132-i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2212-i5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2232-i5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2312-i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2332-i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2412f-i\\(w\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2432f-i\\(w\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2512f-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2532f-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2612f-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2632f-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2712f-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2732f-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2t32-i3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2t32-i5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd2t32-i8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4012f-\\(a\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4012f-\\(p\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4012f-\\(w\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4012fwd-\\(a\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4012fwd-\\(p\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4012fwd-\\(w\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4024f-\\(a\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4024f-\\(p\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4024f-\\(w\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4032fwd-\\(a\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4032fwd-\\(p\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4032fwd-\\(w\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4112f-i\\(z\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4112fwd-i\\(z\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4124f-i\\(z\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4132fwd-i\\(z\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4212f-i\\(h\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4212f-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4212f-i\\(z\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4212fwd-i\\(h\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4212fwd-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4212fwd-i\\(z\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4224f-i\\(h\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4224f-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4224f-i\\(z\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4232fwd-i\\(h\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4232fwd-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4232fwd-i\\(z\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4312f-i\\(h\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4312f-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4312f-i\\(z\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4324f-i\\(h\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4324f-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4324f-i\\(z\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4332fwd-i\\(h\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4332fwd-i\\(s\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd4332fwd-i\\(z\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd6412fwd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2dfx_series_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2dfx_series:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-2cd63xx_series_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-2cd63xx_series:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 4 |
|
CVE-2022-45393 | A cross-site request forgery (CSRF) vulnerability in Jenkins Delete log Plugin 1.0 and earlier allows attackers to delete build logs. | [
"cpe:2.3:a:jenkins:delete_log:*:*:*:*:*:jenkins:*:*"
] | null | 3.5 | null | null |
|
CVE-2011-2022 | The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl call, a different vulnerability than CVE-2011-1745. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-g4r5-jgp4-qm3c | admin/Lib/Action/FpluginAction.class.php in FDCMS (aka Fangfa Content Manage System) 4.2 allows SQL Injection. | [] | null | null | 7.5 | null |
|
GHSA-vrvr-rv69-wvh3 | Skia, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation, a different vulnerability than CVE-2012-2883. | [] | null | null | null | null |
|
GHSA-36pj-pfw6-cc65 | Cross-site scripting (XSS) vulnerability in the Search module before 1.2.2 in Jamroom allows remote attackers to inject arbitrary web script or HTML via the query string to search/results/. | [] | null | null | null | null |
|
RHSA-2017:1450 | Red Hat Security Advisory: openstack-heat security and bug fix update | openstack-heat: Template source URL allows network port scan | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 3.5 | null |
GHSA-3gp6-fj2v-m5f7 | Heap-based buffer overflow in the Siemens WinCC Runtime Advanced Loader, as used in SIMATIC WinCC flexible Runtime and SIMATIC WinCC (TIA Portal) Runtime Advanced, allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted packet to TCP port 2308. | [] | null | null | null | null |
|
CVE-2022-30959 | A missing permission check in Jenkins SSH Plugin 2.6.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [
"cpe:2.3:a:jenkins:ssh:*:*:*:*:*:jenkins:*:*"
] | null | 6.5 | null | 4 |
|
CVE-2024-38353 | CodiMD - Missing Image Access Controls and Unauthorized Image Access | CodiMD allows realtime collaborative markdown notes on all platforms. CodiMD before 2.5.4 is missing authentication and access control vulnerability allowing an unauthenticated attacker to gain unauthorised access to image data uploaded to CodiMD. CodiMD does not require valid authentication to access uploaded images or to upload new image data. An attacker who can determine an uploaded image's URL can gain unauthorised access to uploaded image data. Due to the insecure random filename generation in the underlying Formidable library, an attacker can determine the filenames for previously uploaded images and the likelihood of this issue being exploited is increased. This vulnerability is fixed in 2.5.4.
| [
"cpe:2.3:a:hackmd:codimd:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-mrm7-vh23-g98v | In the Linux kernel, the following vulnerability has been resolved:io_uring: fix memleak in io_init_wq_offload()I got memory leak report when doing fuzz test:BUG: memory leak
unreferenced object 0xffff888107310a80 (size 96):
comm "syz-executor.6", pid 4610, jiffies 4295140240 (age 20.135s)
hex dump (first 32 bytes):
01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N..........
backtrace:
[<000000001974933b>] kmalloc include/linux/slab.h:591 [inline]
[<000000001974933b>] kzalloc include/linux/slab.h:721 [inline]
[<000000001974933b>] io_init_wq_offload fs/io_uring.c:7920 [inline]
[<000000001974933b>] io_uring_alloc_task_context+0x466/0x640 fs/io_uring.c:7955
[<0000000039d0800d>] __io_uring_add_tctx_node+0x256/0x360 fs/io_uring.c:9016
[<000000008482e78c>] io_uring_add_tctx_node fs/io_uring.c:9052 [inline]
[<000000008482e78c>] __do_sys_io_uring_enter fs/io_uring.c:9354 [inline]
[<000000008482e78c>] __se_sys_io_uring_enter fs/io_uring.c:9301 [inline]
[<000000008482e78c>] __x64_sys_io_uring_enter+0xabc/0xc20 fs/io_uring.c:9301
[<00000000b875f18f>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<00000000b875f18f>] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
[<000000006b0a8484>] entry_SYSCALL_64_after_hwframe+0x44/0xaeCPU0 CPU1
io_uring_enter io_uring_enter
io_uring_add_tctx_node io_uring_add_tctx_node
__io_uring_add_tctx_node __io_uring_add_tctx_node
io_uring_alloc_task_context io_uring_alloc_task_context
io_init_wq_offload io_init_wq_offload
hash = kzalloc hash = kzalloc
ctx->hash_map = hash ctx->hash_map = hash <- one of the hash is leakedWhen calling io_uring_enter() in parallel, the 'hash_map' will be leaked,
add uring_lock to protect 'hash_map'. | [] | null | 5.5 | null | null |
|
RHSA-2008:0857 | Red Hat Security Advisory: kernel security and bug fix update | kernel snd_seq_oss_synth_make_info leak Linux kernel local filesystem DoS Linux kernel dccp_setsockopt_change() integer overflow Linux kernel sctp_setsockopt_auth_key() integer overflow kernel: tmpfs: fix kernel BUG in shmem_delete_inode kernel: fix off-by-one error in iov_iter_advance() kernel: sctp: fix potential panics in the SCTP-AUTH API kernel: nfsd: fix buffer overrun decoding NFSv4 acl kernel: sctp_getsockopt_hmac_ident information disclosure kernel: sctp: fix random memory dereference with SCTP_HMAC_IDENT option | [
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2024:3846 | Red Hat Security Advisory: python-idna security update | python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
GHSA-q2h2-m58v-58r8 | Buffer overflow in Foxmail 2.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long MAIL FROM command. | [] | null | null | null | null |
|
GHSA-cx4x-4wcx-cq8q | A vulnerability has been identified in OZW672 (All versions < V6.0), OZW772 (All versions < V6.0). The web service of affected devices is vulnerable to SQL injection when checking authentication data. This could allow an unauthenticated remote attacker to bypass the check and authenticate as
Administrator user. | [] | 9.3 | 9.8 | null | null |
|
GHSA-m6pg-gcp3-79h5 | Cross-site scripting (XSS) vulnerability in FTPoed Blog Engine 1.1 allows remote attackers to inject arbitrary web script or HTML via the comment_body parameter, as used by the comment field, when posting a comment. | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.