id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
RHSA-2003:073 | Red Hat Security Advisory: : Updated sendmail packages fix critical security issues | security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
]
| null | null | null | null |
GHSA-44vq-656c-r27f | Integer overflow vulnerability in FFmpeg before n6.1, allows remote attackers to execute arbitrary code via the JJPEG XL Parser. | []
| null | 9.8 | null | null |
|
CVE-2023-52214 | WordPress Void Contact Form 7 Widget For Elementor Page Builder plugin <= 2.3 - Broken Access Control vulnerability | Missing Authorization vulnerability in voidCoders Void Contact Form 7 Widget For Elementor Page Builder.This issue affects Void Contact Form 7 Widget For Elementor Page Builder: from n/a through 2.3.
| []
| null | 4.3 | null | null |
GHSA-9x38-6qv2-vw32 | PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions. | []
| null | null | null | null |
|
CVE-2017-12990 | The ISAKMP parser in tcpdump before 4.9.2 could enter an infinite loop due to bugs in print-isakmp.c, several functions. | [
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
GHSA-rxwq-x6h5-x525 | Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions. | []
| null | 10 | null | null |
|
CVE-2019-1269 | An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system, aka 'Windows ALPC Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1272. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 7.2 |
|
RHSA-2010:0329 | Red Hat Security Advisory: curl security update | curl: zlib-compression causes curl to pass more than CURL_MAX_WRITE_SIZE bytes to write callback | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
GHSA-h58g-wwg5-499q | Cross-site scripting (XSS) vulnerability in the getWindowOpenJavaScript function in org.apache.wicket.extensions.ajax.markup.html.modal.ModalWindow in Apache Wicket 1.5.x before 1.5.15, 6.x before 6.22.0, and 7.x before 7.2.0 might allow remote attackers to inject arbitrary web script or HTML via a ModalWindow title. | []
| null | null | 6.1 | null |
|
GHSA-6cv4-q37v-xqw7 | Cross-site request forgery (CSRF) vulnerability in NetApp Snap Creator Framework before 4.3.0P1 allows remote attackers to hijack the authentication of users for requests that have unspecified impact via unknown vectors. | []
| null | null | 6.3 | null |
|
CVE-2018-10124 | The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
]
| null | null | 5.5 | 2.1 |
|
GHSA-72r6-cpj9-gh8x | A buffer overflow in lsof allows local users to obtain root privilege. | []
| null | null | null | null |
|
GHSA-2hr3-rh39-x685 | The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations." | []
| null | null | null | null |
|
GHSA-254j-3m2w-23xr | Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow remote web sites to install arbitrary extensions by using interactive events to manipulate the XPInstall Security dialog box. | []
| null | null | null | null |
|
GHSA-7gx5-mgj3-hpjc | An information disclosure vulnerability exists in the OAS Engine configuration management functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to a disclosure of sensitive information. An attacker can send a sequence of requests to trigger this vulnerability. | []
| null | 3.1 | null | null |
|
CVE-2021-36037 | Magento Commerce Improper Authorization Vulnerability Could Lead To Information Exposure | Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper improper authorization vulnerability. An authenticated attacker could leverage this vulnerability to achieve sensitive information disclosure. | [
"cpe:2.3:a:adobe:adobe_commerce:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_commerce:2.4.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:magento_open_source:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:magento_open_source:2.4.2:p1:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
CVE-2020-5933 | On versions 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, when a BIG-IP system that has a virtual server configured with an HTTP compression profile processes compressed HTTP message payloads that require deflation, a Slowloris-style attack can trigger an out-of-memory condition on the BIG-IP system. | [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 7.8 |
|
GHSA-3vwr-jj4f-h98x | eZ Publish Remote code execution in file uploads | This Security Advisory is about a vulnerability in the way eZ Platform and eZ Publish Legacy handles file uploads, which can in the worst case lead to remote code execution (RCE), a very serious threat. An attacker would need access to uploading files to be able to exploit the vulnerability, so if you have strict controls on this and trust all who have this permission, you're not affected. On the basis of the tests we have made, we also believe the vulnerability cannot be exploited as long as our recommended vhost configuration is used. Here is the v2.5 recommendation for Nginx, as an example:https://github.com/ezsystems/ezplatform/blob/2.5/doc/nginx/vhost.template#L31This vhost template specifies that only the file app.php in the web root is executed, while vulnerable configurations allow execution of any php file. Apache is affected in the same way as Nginx, and is also protected by using the recommended configuration. The build-in webserver in PHP stays vulnerable, as it doesn't use this type of configuration (this webserver should only be used for development, never for production). We cannot be 100% certain our configuration is not vulnerable. We also do not know if all our users use the recommended configuration, so we send out this fix to be on the safe side.The fix includes a blacklist feature for uploaded filenames, such as ".php". The file types on the blacklist cannot be uploaded. The blacklist is configurable. In eZ Platform you will find it as ezsettings.default.io.file_storage.file_type_blacklist in eZ/Bundle/EzPublishCoreBundle/Resources/config/default_settings.yml in vendors/ezsystems/ezpublish-kernel. In eZ Publish Legacy you will find it as FileExtensionBlackList in settings/file.ini. By default it blocks these file types: php, php3, phar, phpt, pht, phtml, pgif. The fix also inclues a new block against path traversal attacks, though this kind of attack was not reproducible in our tests. | []
| null | null | null | null |
CVE-2024-4370 | WPZOOM Addons for Elementor (Templates, Widgets) <= 1.1.36 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image Box Widget | The WPZOOM Addons for Elementor (Templates, Widgets) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widget Image Box in all versions up to, and including, 1.1.36 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:wpzoom:wpzoom_addons_for_elementor:*:*:*:*:*:*:*:*"
]
| null | 6.4 | null | null |
CVE-2020-17432 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.922. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CR2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-11335. | [
"cpe:2.3:a:foxitsoftware:foxit_studio_photo:3.6.6.922:*:*:*:*:*:*:*"
]
| null | null | 3.3 | null |
|
CVE-2018-7636 | The URL filtering "continue page" hosted by PAN-OS 8.0.10 and earlier may allow an attacker to inject arbitrary JavaScript or HTML via specially crafted URLs. | [
"cpe:2.3:o:paloaltonetworks:pan-os:8.0.10:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
GHSA-p5vq-hvjq-p3g6 | NetApp Clustered Data ONTAP 8.1 through 9.1P1, when NFS or SMB is enabled, allows remote attackers to cause a denial of service via unspecified vectors. | []
| null | null | 7.5 | null |
|
GHSA-mxjj-953w-2c2v | Data corruption in tensorflow-lite | ImpactWhen determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/types.h#L437-L442Since the function always returns the dimension of the first tensor, malicious attackers can craft cases where this is larger than that of the second tensor. In turn, this would result in reads/writes outside of bounds since the interpreter will wrongly assume that there is enough data in both tensors.PatchesWe have patched the issue in 8ee24e7949a20 and will release patch releases for all versions between 1.15 and 2.3.We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by members of the Aivul Team from Qihoo 360. | []
| 8.6 | 7.4 | null | null |
RHSA-2017:1552 | Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update | tomcat: security manager bypass via IntrospectHelper utility function tomcat: security manager bypass via JSP Servlet config parameters wildfly: Arbitrary file read via path traversal | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
]
| null | null | 7.7 | null |
GHSA-m322-x4xg-4gvq | Multiple SQL injection vulnerabilities in My Photo Scrapbook 1.0 and earlier allow remote attackers to execute arbitrary SQL commands via the key parameter in (1) Displayview.asp and (2) Details_Photo_bv.asp. | []
| null | null | null | null |
|
RHSA-2020:0573 | Red Hat Security Advisory: nodejs:10 security update | nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string nodejs: HTTP request smuggling using malformed Transfer-Encoding header nodejs: HTTP header values do not have trailing optional whitespace trimmed npm: Symlink reference outside of node_modules folder through the bin field upon installation npm: Arbitrary file write via constructed entry in the package.json bin field npm: Global node_modules Binary Overwrite | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
]
| null | 4.8 | null | null |
GHSA-jgg8-q968-j8hx | A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition. | []
| null | null | null | null |
|
GHSA-r9gf-v8wf-j3wq | The goTenna Pro ATAK Plugin has a payload length vulnerability that
makes it possible to tell the length of the payload regardless of the
encryption used. | []
| 5.3 | 4.3 | null | null |
|
GHSA-fmpj-qrfc-pcgv | Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | []
| null | 5.4 | null | null |
|
CVE-2019-20105 | The EditApplinkServlet resource in the Atlassian Application Links plugin before version 5.4.20, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.1, and from version 7.1.0 before version 7.1.3 allows remote attackers who have obtained access to administrator's session to access the EditApplinkServlet resource without needing to re-authenticate to pass "WebSudo" in products that support "WebSudo" through an improper access control vulnerability. | [
"cpe:2.3:a:atlassian:application_links:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:application_links:7.0.0:*:*:*:*:*:*:*"
]
| null | 4.9 | null | 4 |
|
GHSA-jp3h-xgvc-w3w2 | D-Link COVR-2600R and COVR-3902 Kit before 1.01b05Beta01 use hardcoded credentials for telnet connection, which allows unauthenticated attackers to gain privileged access to the router, and to extract sensitive data or modify the configuration. | []
| null | 9.8 | null | null |
|
CVE-2019-9646 | The Contact Form Email plugin before 1.2.66 for WordPress allows wp-admin/admin.php item XSS, related to cp_admin_int_edition.inc.php in the "custom edition area." | [
"cpe:2.3:a:codepeople:contact_form_email:*:*:*:*:*:wordpress:*:*"
]
| null | null | 6.1 | 4.3 |
|
RHSA-2020:1276 | Red Hat Security Advisory: OpenShift Container Platform 4.3.10 openshift security update | kubernetes: crafted requests to kubelet API allow for memory exhaustion | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
]
| null | 4.3 | null | null |
CVE-2025-22703 | WordPress Forge – Front-End Page Builder plugin <= 1.4.6 - CSRF to Stored Cross Site Scripting (XSS) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in manuelvicedo Forge – Front-End Page Builder allows Stored XSS. This issue affects Forge – Front-End Page Builder: from n/a through 1.4.6. | []
| null | 7.1 | null | null |
cisco-sa-20190417-umbrella-xss | Cisco Umbrella Cross-Site Scripting Vulnerability | A vulnerability in the URL block page of Cisco Umbrella could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user in a network protected by Umbrella.
The vulnerability is due to insufficient validation of input parameters passed to that page. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-umbrella-xss ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-umbrella-xss"] | []
| null | null | 6.1 | null |
GHSA-vcc2-f4x4-778q | Cross-site scripting (XSS) vulnerability in index.php in GANTTy 1.0.3 allows remote attackers to inject arbitrary HTML and web script via the message parameter in a login action. | []
| null | null | null | null |
|
GHSA-5w7j-r72q-24v8 | Stack-based buffer over-read in disasm in nasm 2.16 allows attackers to cause a denial of service (crash). | []
| null | 5.5 | null | null |
|
GHSA-95jp-3qwq-rj66 | In the Linux kernel, the following vulnerability has been resolved:btrfs: send: handle path ref underflow in header iterate_inode_ref()Change BUG_ON to proper error handling if building the path buffer
fails. The pointers are not printed so we don't accidentally leak kernel
addresses. | []
| null | null | null | null |
|
GHSA-h475-7v3c-26q7 | Command injection in OpenTSDB | Due to insufficient validation of parameters passed to the legacy HTTP query API, it is possible to inject crafted OS commands into multiple parameters and execute malicious code on the OpenTSDB host system. This exploit exists due to an incomplete fix that was made when this vulnerability was previously disclosed as CVE-2020-35476. Regex validation that was implemented to restrict allowed input to the query API does not work as intended, allowing crafted commands to bypass validation. | []
| null | 9.8 | null | null |
GHSA-33hx-6698-q89r | A logic issue was addressed with improved state management. This issue is fixed in iOS 15 and iPadOS 15. In certain situations, the baseband would fail to enable integrity and ciphering protection. | []
| null | 7.5 | null | null |
|
CVE-2023-6466 | Thecosy IceCMS User Comment planet cross site scripting | A vulnerability was found in Thecosy IceCMS 2.0.1. It has been declared as problematic. This vulnerability affects unknown code of the file /planet of the component User Comment Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246616. | [
"cpe:2.3:a:thecosy:icecms:2.0.1:*:*:*:*:*:*:*"
]
| null | 3.5 | 3.5 | 4 |
CVE-2017-5800 | A Remote Cross-Site Scripting (XSS) vulnerability in HPE Operations Bridge Analytics version v3.0 was found. | [
"cpe:2.3:a:hp:operations_bridge_analytics:3.0:*:*:*:*:*:*:*"
]
| null | null | 5.4 | 3.5 |
|
CVE-2018-19784 | The str_rot_pass function in vendor/atholn1600/php-proxy/src/helpers.php in PHP-Proxy 5.1.0 uses weak cryptography, which makes it easier for attackers to calculate the authorization data needed for local file inclusion. | [
"cpe:2.3:a:php-proxy:php-proxy:5.1.0:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
GHSA-2w2h-r9hg-5f4m | Cross-site request forgery (CSRF) vulnerability in Mahara before 1.4.1 allows remote attackers to hijack the authentication of administrators for requests that add a user to an institution. | []
| null | null | null | null |
|
CVE-2012-4994 | SQL injection vulnerability in admin/admin.php in LimeSurvey before 1.91+ Build 120224 allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a browse action. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.50:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.52:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.53\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.70\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.71\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.72:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.80\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.81\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.82\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.85:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.86:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.87\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:limesurvey:limesurvey:1.90\\+:*:*:*:*:*:*:*"
]
| null | null | null | 6.5 |
|
RHSA-2025:7427 | Red Hat Security Advisory: xterm security update | xterm: code execution via OSC 50 input sequences | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 7.4 | null | null |
GHSA-w4q7-prfx-q89f | The server in Citilog 8.0 allows an attacker (in a man in the middle position between the server and its smart camera Axis M1125) to see FTP credentials in a cleartext HTTP traffic. These can be used for FTP access to the server. | []
| null | 5.9 | null | null |
|
CVE-2022-22241 | Junos OS: Vulnerability in J-Web may allow deserialization without authentication | An Improper Input Validation vulnerability in the J-Web component of Juniper Networks Junos OS may allow an unauthenticated attacker to access data without proper authorization. Utilizing a crafted POST request, deserialization may occur which could lead to unauthorized local file access or the ability to execute arbitrary commands. This issue affects Juniper Networks Junos OS: all versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S7, 19.4R3-S9; 20.1 versions prior to 20.1R3-S5; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R2-S2, 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R1-S1, 22.1R2. | [
"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*"
]
| null | 8.1 | null | null |
CVE-2022-25323 | ZEROF Web Server 2.0 allows /admin.back XSS. | [
"cpe:2.3:a:zerof:web_server:2.0:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
ICSA-24-123-01 | CyberPower PowerPanel Business | The application code contains a hard-coded set of authentication credentials. This could result in an attacker bypassing authentication and gaining administrator privileges. The application code contains a hard-coded JWT signing key. This could result in an attacker forging JWT tokens to bypass authentication. A specially crafted Zip file containing path traversal characters can be imported to the server, which allows file writing to the server outside the intended scope, and could allow an attacker to achieve remote code execution. Hard-coded credentials are used by the platform to authenticate to the database, other services, and the cloud. This could result in an attacker gaining access to services with the privileges of a Powerpanel Business application. Hard-coded credentials for the test server can be found in the production code. This might result in an attacker gaining access to the testing or production server. The key used to encrypt passwords stored in the database can be found in the application code, allowing the passwords to be recovered. An attacker with certain MQTT permissions can create malicious messages to all Power Panel devices. This could result in an attacker injecting SQL syntax, writing arbitrary files to the system, and executing remote code. The devices Power Panel manages use identical certificates based on a hard-coded cryptographic key. This can allow an attacker to impersonate any client in the system and send malicious data. Certain MQTT wildcards are not blocked on the system, which might result in an attacker obtaining data from throughout the system after gaining access to any device. | []
| null | 4.9 | 6.5 | null |
CVE-2024-43309 | WordPress WP Telegram Widget and Join Link plugin <= 2.1.27 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Socio WP Telegram Widget and Join Link allows Stored XSS.This issue affects WP Telegram Widget and Join Link: from n/a through 2.1.27. | [
"cpe:2.3:a:wpsocio:wp_telegram_widget_and_join_link:*:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | null |
CVE-2017-17284 | Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00 have a resource management error vulnerability. A remote attacker may send huge number of specially crafted SIP messages to the affected products. Due to improper handling of some value in the messages, successful exploit will cause some services abnormal. | [
"cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*"
]
| null | null | 5.3 | 5 |
|
GHSA-xf2c-wp2f-v3jr | WebCore/platform/graphics/texmap/TextureMapperLayer.cpp in WebKit, as used in WebKitGTK+ prior to version 2.20.2, is vulnerable to a use after free for a WebCore::TextureMapperLayer object. | []
| null | null | 8.8 | null |
|
CVE-2017-10930 | The ZXR10 1800-2S before v3.00.40 incorrectly restricts access to a resource from an unauthorized actor, resulting in ordinary users being able to download configuration files to steal information like administrator accounts and passwords. | [
"cpe:2.3:o:zte:zxr10_1800-2s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zte:zxr10_1800-2s:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 5 |
|
CVE-2013-2039 | Directory traversal vulnerability in lib/files/view.php in ownCloud before 4.0.15, 4.5.x 4.5.11, and 5.x before 5.0.6 allows remote authenticated users to access arbitrary files via unspecified vectors. | [
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.5:*:*:*:*:*:*:*"
]
| null | null | null | 4 |
|
GHSA-pj5g-v5v3-3c22 | In lunary-ai/lunary version 1.2.2, an incorrect synchronization vulnerability allows unprivileged users to rename projects they do not have access to. Specifically, an unprivileged user can send a PATCH request to the project's endpoint with a new name for a project, despite not having the necessary permissions or being assigned to the project. This issue allows for unauthorized modification of project names, potentially leading to confusion or unauthorized access to project resources. | []
| null | null | 7.1 | null |
|
GHSA-6m76-9vmm-c44v | The CGE page with download function contains a Directory Traversal vulnerability. Attackers can use this loophole to download system files arbitrarily. | []
| null | null | null | null |
|
GHSA-8336-f5fq-9373 | A use after free vulnerability was discovered in PDFTron SDK version 9.2.0. A crafted PDF can overwrite RIP with data previously allocated on the heap. This issue affects: PDFTron PDFTron SDK 9.2.0 on OSX; 9.2.0 on Linux; 9.2.0 on Windows. | []
| null | 7.8 | null | null |
|
GHSA-28xp-c478-9qjp | A vulnerability was found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file bsenordering/admin/category/index.php of the component GET Parameter Handler. The manipulation of the argument view with the input <script>alert(233)</script> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224243. | []
| null | 6.1 | null | null |
|
CVE-2014-6818 | The OHBM 20th Annual Meeting (aka com.coreapps.android.followme.ohbm2014) application 6.0.9.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:core-apps:ohbm_20th_annual_meeting:6.0.9.2:*:*:*:*:android:*:*"
]
| null | null | null | 5.4 |
|
GHSA-gq3f-55qh-j3xm | The Quiz module 6.x-4.x before 6.x-4.5 for Drupal allows remote authenticated users with the "view any quiz results" or "view results for own quiz" permission to delete arbitrary results via the delete option. | []
| null | null | null | null |
|
GHSA-rwq7-fqhw-gq6p | The (1) updateuser.php and (2) forums_prune.php scripts in PHP-Fusion 4.00 allow remote attackers to obtain sensitive information via a direct HTTP request, which reveals the installation path in an error message. | []
| null | null | null | null |
|
RHSA-2024:2577 | Red Hat Security Advisory: shadow-utils security update | shadow-utils: possible password leak during passwd(1) change | [
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
]
| null | 4.7 | null | null |
GHSA-49wr-6x3m-4p8x | Cross-site request forgery (CSRF) vulnerability in Forms/PortForwarding_Edit_1 on the ZyXEL O2 DSL Router Classic allows remote attackers to hijack the authentication of administrators for requests that insert cross-site scripting (XSS) sequences via the PortRule_Name parameter. | []
| null | null | null | null |
|
GHSA-mcvj-6jjv-7hw9 | In the Linux kernel, the following vulnerability has been resolved:mm/slab_common: fix possible double free of kmem_cacheWhen doing slub_debug test, kfence's 'test_memcache_typesafe_by_rcu'
kunit test case cause a use-after-free error:BUG: KASAN: use-after-free in kobject_del+0x14/0x30
Read of size 8 at addr ffff888007679090 by task kunit_try_catch/261CPU: 1 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.0.0-rc5-next-20220916 #17
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
<TASK>
dump_stack_lvl+0x34/0x48
print_address_description.constprop.0+0x87/0x2a5
print_report+0x103/0x1ed
kasan_report+0xb7/0x140
kobject_del+0x14/0x30
kmem_cache_destroy+0x130/0x170
test_exit+0x1a/0x30
kunit_try_run_case+0xad/0xc0
kunit_generic_run_threadfn_adapter+0x26/0x50
kthread+0x17b/0x1b0
</TASK>The cause is inside kmem_cache_destroy():kmem_cache_destroy
acquire lock/mutex
shutdown_cache
schedule_work(kmem_cache_release) (if RCU flag set)
release lock/mutex
kmem_cache_release (if RCU flag not set)In some certain timing, the scheduled work could be run before
the next RCU flag checking, which can then get a wrong value
and lead to double kmem_cache_release().Fix it by caching the RCU flag inside protected area, just like 'refcnt' | []
| null | 7.8 | null | null |
|
CVE-2001-1067 | Buffer overflow in AOLserver 3.0 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via an HTTP request with a long Authorization header. | [
"cpe:2.3:a:aol:aol_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:aol:aol_server:3.2:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2014-3010 | Cross-site scripting (XSS) vulnerability in the Web UI in IBM WebSphere Service Registry and Repository (WSRR) 6.2, 6.3 before 6.3.0.6, 7.0 before 7.0.0.6, 7.5 before 7.5.0.5, and 8.0 before 8.0.0.3 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. | [
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:6.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:6.3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:6.3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:6.3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:6.3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:7.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:7.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:7.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:7.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_service_registry_and_repository:8.0.0.2:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-2vvq-mgpq-88xw | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | []
| null | null | null | null |
|
GHSA-qfx3-gm9m-cwhg | Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engines fail to render when handling objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8517 and CVE-2017-8522. | []
| null | null | 7.5 | null |
|
RHSA-2022:2191 | Red Hat Security Advisory: gzip security update | gzip: arbitrary-file-write vulnerability | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 8.8 | null | null |
CVE-2019-14997 | The AccessLogFilter class in Jira before version 8.4.0 allows remote anonymous attackers to learn details about other users, including their username, via an information expose through caching vulnerability when Jira is configured with a reverse Proxy and or a load balancer with caching or a CDN. | [
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*"
]
| null | 4.3 | null | 4.3 |
|
GHSA-52j5-46fc-2h8g | Uncontrolled search path for some Intel(R) QuickAssist Technology software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | []
| 5.4 | 6.7 | null | null |
|
GHSA-xwc2-2xh3-v7qg | Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages. | []
| null | null | null | null |
|
GHSA-h7cx-25rj-xm45 | Accounting Journal Management 1.0 is vulnerable to XSS-PHPSESSID-Hijacking. The parameter manage_user from User lists is vulnerable to XSS-Stored and PHPSESSID attacks. The malicious user can attack the system by using the already session which he has from inside and outside of the network. | []
| null | null | null | null |
|
CVE-2024-23468 | SolarWinds Access Rights Manager Directory Traversal and Information Disclosure Vulnerability | The SolarWinds Access Rights Manager was susceptible to a Directory Traversal and Information Disclosure Vulnerability. This vulnerability allows an unauthenticated user to perform arbitrary file deletion and leak sensitive information. | [
"cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*"
]
| null | 7.6 | null | null |
CVE-2020-0227 | In onCommand of CompanionDeviceManagerService.java, there is a possible permissions bypass due to a missing permission check. This could lead to local escalation of privilege allowing background data usage or launching from the background, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-129476618 | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 7.2 |
|
CVE-2012-2995 | Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro InterScan Messaging Security Suite 7.1-Build_Win32_1394 allow remote attackers to inject arbitrary web script or HTML via (1) the wrsApprovedURL parameter to addRuleAttrWrsApproveUrl.imss or (2) the src parameter to initUpdSchPage.imss. | [
"cpe:2.3:a:trendmicro:interscan_messaging_security_suite:7.1:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
RHSA-2019:1782 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.4.12 security update | jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver jackson-databind: arbitrary code execution in slf4j-ext class jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes jackson-databind: improper polymorphic deserialization in axis2-transport-jms class jackson-databind: improper polymorphic deserialization in openjpa class jackson-databind: improper polymorphic deserialization in jboss-common-core class | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:6.4"
]
| null | null | 7.3 | null |
CVE-2020-9871 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. | [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 6.8 |
|
GHSA-g9vh-rmj6-m6r2 | The Wbcom Designs – Custom Font Uploader plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'cfu_delete_customfont' function in all versions up to, and including, 2.3.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete any custom font. | []
| null | 4.3 | null | null |
|
CVE-2021-43657 | A Stored Cross-site scripting (XSS) vulnerability via MAster.php in Sourcecodetester Simple Client Management System (SCMS) 1.0 allows remote attackers to inject arbitrary web script or HTML via the vulnerable input fields. | [
"cpe:2.3:a:simple_client_management_system_project:simple_client_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
|
CVE-2023-28831 | The OPC UA implementations (ANSI C and C++) in affected products contain an integer overflow vulnerability that could cause the application to run into an infinite loop during certificate validation.
This could allow an unauthenticated remote attacker to create a denial of service condition by sending a specially crafted certificate. | [
"cpe:2.3:o:siemens:simatic_cloud_connect_7_cc712_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cloud_connect_7_cc712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cloud_connect_7_cc716_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cloud_connect_7_cc716:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_drive_controller_cpu_1504d_tf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_drive_controller_cpu_1504d_tf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_drive_controller_cpu_1507d_tf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_drive_controller_cpu_1507d_tf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_et_200sp_open_controller_cpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_et_200sp_open_controller_cpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1200_cpu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1510sp-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1510sp-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1510sp_f-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1510sp_f-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511c-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511c-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511f-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511f-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511t-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511t-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511tf-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511tf-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1512c-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1512c-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1512sp-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1512sp-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1512sp_f-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1512sp_f-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1513-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1513-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1513f-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1513f-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1513r-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1513r-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1514sp-2_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1514sp-2_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1514sp_f-2_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1514sp_f-2_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1514spt-2_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1514spt-2_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1514spt_f-2_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1514spt_f-2_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515-2_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515-2_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515f-2_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515f-2_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515r-2_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515r-2_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515t-2_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515t-2_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1515tf-2_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1515tf-2_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516-3_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516f-3_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516f-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516t-3_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516t-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1516tf-3_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1516tf-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517-3_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517f-3_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517f-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517h-3_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517h-3_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517t-3_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517t-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1517tf-3_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1517tf-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518-4_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_pn\\/dp_mfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518-4_pn\\/dp_mfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518f-4_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518hf-4_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518hf-4_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518t-4_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518t-4_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518tf-4_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518tf-4_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_s7-1518-4_pn\\/dp_odk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_s7-1518-4_pn\\/dp_odk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_cpu_s7-1518f-4_pn\\/dp_odk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_cpu_s7-1518f-4_pn\\/dp_odk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_et_200pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_et_200pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-1500_software_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_software_controller:v2:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-1500_software_controller:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_s7-plcsim_advanced_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_s7-plcsim_advanced:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cpu_1510sp-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cpu_1510sp-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cpu_1510sp-1_pn_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cpu_1510sp-1_pn_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cpu_1510sp_f-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cpu_1510sp_f-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cpu_1510sp_f-1_pn_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cpu_1510sp_f-1_pn_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cpu_1512sp-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cpu_1512sp-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cpu_1512sp-1_pn_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cpu_1512sp-1_pn_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1511-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1511-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1511-1_pn_t1_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1511-1_pn_t1_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1511-1_pn_tx_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1511-1_pn_tx_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1511f-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1511f-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1513-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1513-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1513f-1_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1513f-1_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1515f-2_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1515f-2_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1515f-2_pn_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1515f-2_pn_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1515f-2_pn_t2_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1515f-2_pn_t2_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1515r-2_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1515r-2_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1515r-2_pn_tx_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1515r-2_pn_tx_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1516-3_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1516-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1516-3_pn\\/dp_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1516-3_pn\\/dp_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1516-3_pn\\/dp_tx_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1516-3_pn\\/dp_tx_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1516f-3_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1516f-3_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1516f-3_pn\\/dp_rail_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1516f-3_pn\\/dp_rail:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1517h-3_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1517h-3_pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1518-4_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1518-4_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1518-4_pn\\/dp_mfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1518-4_pn\\/dp_mfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1518f-4_pn\\/dp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1518f-4_pn\\/dp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siplus_s7-1500_cpu_1518hf-4_pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siplus_s7-1500_cpu_1518hf-4_pn:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2018-16393 | Several buffer overflows when handling responses from a Gemsafe V1 Smartcard in gemsafe_get_cert_len in libopensc/pkcs15-gemsafeV1.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. | [
"cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*"
]
| null | null | 6.8 | 4.6 |
|
GHSA-wgcm-rvmx-wh95 | Trustwave ModSecurity 3.0.5 through 3.0.8 before 3.0.9 allows a denial of service (worker crash and unresponsiveness) because some inputs cause a segfault in the Transaction class for some configurations. | []
| null | 7.5 | null | null |
|
GHSA-3vrg-5j8v-8v4x | The built-in web servers for multiple networking devices do not set the Secure attribute for sensitive cookies in HTTPS sessions, which could cause the user agent to send those cookies in plaintext over an HTTP session with the same server. | []
| null | null | null | null |
|
GHSA-28gm-vh7p-5c7v | Multiple cross-site scripting (XSS) vulnerabilities in Joker Board (aka JBoard) 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the notice parameter to editform.php, (2) the edit_user_message parameter to core/edit_user_message.php, or (3) the user_title parameter to inc/head.inc.php, reachable through any PHP script. | []
| null | null | null | null |
|
ICSA-22-088-03 | Hitachi Energy LinkOne WebView | Multiple stored XSS vulnerabilities exist in the LinkOne application, allowing multiple web attacks and the theft of sensitive information.CVE-2021-40337 has been assigned to these vulnerabilities. A CVSS v3 base score of 4.2 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N). When an error happens during the query operation in the application due to a misconfiguration in the web server configuration file, debug mode in LinkOne application is activated and shows the full path of the directory.CVE-2021-40338 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). The LinkOne application is lacking HTTP Headers, allowing an attacker to retrieve sensitive information.CVE-2021-40339 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). Misconfiguration in the ASP server causes server and ASP.net information to be shown. An attacker can use this information as a reconnaissance for further exploitation.CVE-2021-40340 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). | []
| null | null | 3.7 | null |
GHSA-hcgg-293c-27px | The NonManagedConnectionFactory in JBoss Enterprise Application Platform (EAP) 5.1.2 and 5.2.0, Web Platform (EWP) 5.1.2 and 5.2.0, and BRMS Platform before 5.3.1 logs the username and password in cleartext when an exception is thrown, which allows local users to obtain sensitive information by reading the log file. | []
| null | null | null | null |
|
CVE-2025-25082 | WordPress flexIDX Home Search plugin <= 2.1.2 - Stored Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Max Chirkov FlexIDX Home Search allows Stored XSS. This issue affects FlexIDX Home Search: from n/a through 2.1.2. | []
| null | 6.5 | null | null |
CVE-2021-40795 | Adobe Premiere Pro 3GP File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability | Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
CVE-2025-29985 | Dell Common Event Enabler, version(s) CEE 9.0.0.0, contain(s) an Initialization of a Resource with an Insecure Default vulnerability in the Common Anti-Virus Agent (CAVA). An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access. | []
| null | 6.5 | null | null |
|
GHSA-2gc2-4gm5-9ghf | The GIT Integration component in IBM Rational Team Concert (RTC) 5.x before 5.0.2 iFix14 and 6.x before 6.0.1 iFix5 and Rational Collaborative Lifecycle Management 5.x before 5.0.2 iFix14 and 6.x before 6.0.1 iFix5 allows remote authenticated users to obtain sensitive information via a malformed request. | []
| null | null | 6.5 | null |
|
GHSA-49w9-5v8p-jcmw | In the Linux kernel, the following vulnerability has been resolved:spi: sn-f-ospi: Fix division by zeroWhen there is no dummy cycle in the spi-nor commands, both dummy bus cycle
bytes and width are zero. Because of the cpu's warning when divided by
zero, the warning should be avoided. Return just zero to avoid such
calculations. | []
| null | 5.5 | null | null |
|
CVE-2021-42554 | An issue was discovered in Insyde InsydeH2O with Kernel 5.0 before 05.08.42, Kernel 5.1 before 05.16.42, Kernel 5.2 before 05.26.42, Kernel 5.3 before 05.35.42, Kernel 5.4 before 05.42.51, and Kernel 5.5 before 05.50.51. An SMM memory corruption vulnerability in FvbServicesRuntimeDxe allows a possible attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM. | [
"cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_ape1808:-:*:*:*:*:*:*:*"
]
| null | 8.2 | null | 7.2 |
|
GHSA-6jjj-32gv-4rx9 | Multiple cross-site scripting (XSS) vulnerabilities in (1) dsp_main.php and (2) dsp_task_editor.php in SamTodo 1.1 allow remote attackers to inject arbitrary web script or HTML via the (a) tid parameter in a main.taskeditor edit action, and the (b) completed parameter in a main.default action, to index.php. | []
| null | null | null | null |
|
CVE-2015-9514 | The Easy Digital Downloads (EDD) Free Downloads extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. | [
"cpe:2.3:a:sandhillsdev:easy_digital_downloads:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:easydigitaldownloads:free_downloads:-:*:*:*:*:easy_digital_downloads:*:*"
]
| null | 6.1 | null | 4.3 |
|
GHSA-8fw7-92vf-w5ff | An issue was discovered on TerraMaster FS-210 4.0.19 devices. Normal users can use 1.user.php for privilege elevation. | []
| null | 8.8 | null | null |
|
CVE-2017-9693 | The length of attribute value for STA_EXT_CAPABILITY in __wlan_hdd_change_station in Android for MSM, Firefox OS for MSM, and QRD Android before 2017-06-06 being less than the actual lenth of StaParams.extn_capability results in a read for extra bytes when a memcpy is done from params->ext_capab to StaParams.extn_capability using the sizeof(StaParams.extn_capability). | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 2.1 |
|
CVE-2023-6957 | The Fluent Forms plugin for WordPress by Fluent Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 5.1.9 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The exploitation level depends on who is granted the right to create forms by an administrator. This level can be as low as contributor, but by default is admin. | []
| null | 4.9 | null | null |
|
CVE-2012-6465 | Opera before 12.10 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a malformed SVG image. | [
"cpe:2.3:a:opera:opera_browser:*:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.10:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.00:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:3.62:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.00:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:4.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:alpha:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.20:alpha:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.60:alpha:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.00:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.10:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.50:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.52.1100:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.60:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.64:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.65:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:11.66:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:12.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:12.00:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:12.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:12.02:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.