id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-wwj3-xjmp-vq7m | InDesign Desktop versions ID19.4, ID18.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
| null | 7.8 | null | null |
|
GHSA-h46m-x98h-gxg6 | A vulnerability classified as problematic has been found in PHPGurukul Online Notes Sharing System 1.0. Affected is an unknown function of the file /user/profile.php of the component Contact Information Handler. The manipulation of the argument mobilenumber leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-248742 is the identifier assigned to this vulnerability. | []
| null | 4.3 | null | null |
|
GHSA-8jg5-4gwh-7gh9 | The process_trap function in trapper/trapper.c in Zabbix Server before 1.6.6 allows remote attackers to cause a denial of service (crash) via a crafted request with data that lacks an expected : (colon) separator, which triggers a NULL pointer dereference. | []
| null | null | null | null |
|
CVE-2008-5073 | Heap-based buffer overflow in an ActiveX control in Novell ZENworks Desktop Management 6.5 allows remote attackers to execute arbitrary code via a long argument to the CanUninstall method. | [
"cpe:2.3:a:novell:zenworks_desktop_management:6.5:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
RHSA-2024:4977 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.0.3 release and security update | tomcat: Improper Handling of Exceptional Conditions tomcat: Denial of Service in Tomcat | [
"cpe:/a:redhat:jboss_enterprise_web_server:6.0"
]
| null | 7.5 | null | null |
GHSA-2qvp-8c85-3h32 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Thom Stark Eyes Only: User Access Shortcode plugin <= 1.8.2 versions. | []
| null | 5.9 | null | null |
|
CVE-2022-31093 | Improper Handling of `callbackUrl` parameter in next-auth | NextAuth.js is a complete open source authentication solution for Next.js applications. In affected versions an attacker can send a request to an app using NextAuth.js with an invalid `callbackUrl` query parameter, which internally is converted to a `URL` object. The URL instantiation would fail due to a malformed URL being passed into the constructor, causing it to throw an unhandled error which led to the **API route handler timing out and logging in to fail**. This has been remedied in versions 3.29.5 and 4.5.0. If for some reason you cannot upgrade, the workaround requires you to rely on Advanced Initialization. Please see the documentation for more. | [
"cpe:2.3:a:nextauth.js:next-auth:*:*:*:*:*:node.js:*:*"
]
| null | 7.5 | null | null |
CVE-2020-10842 | An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) (S.LSI chipsets) software. There is a heap out-of-bounds write in the tsmux driver. The Samsung ID is SVE-2019-16295 (February 2020). | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 4.6 |
|
CVE-2009-3445 | Unspecified vulnerability in Code-Crafters Ability Mail Server before 2.70 allows remote attackers to cause a denial of service (daemon crash) via an IMAP4 FETCH command. | [
"cpe:2.3:a:code-crafters:ability_mail_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.01b:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.02b:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.03b:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.04b:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.05b:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.51:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.52:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.53:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.54:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.55:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.56:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.57:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.58:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.60:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.61:*:*:*:*:*:*:*",
"cpe:2.3:a:code-crafters:ability_mail_server:2.62:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-hpf6-jp82-wrpj | The JobSearch WP Job Board plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.8.8. This is due to improper configurations in the 'jobsearch_xing_response_data_callback', 'set_access_tokes', and 'google_callback' functions. This makes it possible for unauthenticated attackers to log in as the first connected Xing user, or any connected Xing user if the Xing id is known. It is also possible for unauthenticated attackers to log in as the first connected Google user if the user has logged in, without subsequently logging out, in thirty days. The vulnerability was partially patched in version 2.8.4. | []
| null | 8.1 | null | null |
|
CVE-2024-20418 | Cisco Ultra-Reliable Wireless Backhaul Software Command Injection Vulnerability | A vulnerability in the web-based management interface of Cisco Unified Industrial Wireless Software for Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points could allow an unauthenticated, remote attacker to perform command injection attacks with root privileges on the underlying operating system.
This vulnerability is due to improper validation of input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system of the affected device. | [
"cpe:2.3:a:cisco:aironet_access_point_software:*:*:*:*:*:*:*:*"
]
| null | 10 | null | null |
GHSA-hr59-w483-qhff | The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the bitform-form-entry-edit endpoint in all versions up to, and including, 2.17.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view all form submissions from other users. | []
| null | 4.3 | null | null |
|
GHSA-x57r-5929-78vm | Windows Remote Access Connection Manager Information Disclosure Vulnerability. | []
| null | 5.5 | null | null |
|
CVE-2022-39351 | Dependency-Track vulnerable to logging of API keys in clear text when handling API requests using keys with insufficient permissions | Dependency-Track is a Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain. Prior to version 4.6.0, performing an API request using a valid API key with insufficient permissions causes the API key to be written to Dependency-Track's audit log in clear text. Actors with access to the audit log can exploit this flaw to gain access to valid API keys. The issue has been fixed in Dependency-Track 4.6.0. Instead of logging the entire API key, only the last 4 characters of the key will be logged. It is strongly recommended to check historic logs for occurrences of this behavior, and re-generating API keys in case of leakage. | [
"cpe:2.3:a:owasp:dependency-track:*:*:*:*:*:*:*:*"
]
| null | 4.4 | null | null |
GHSA-qp57-c66w-h9pw | PHP remote file inclusion vulnerability in ajax/savetag.php in the Theme Tuner plugin for WordPress before 0.8 allows remote attackers to execute arbitrary PHP code via a URL in the tt-abspath parameter. | []
| null | null | null | null |
|
CVE-2012-5348 | SQL injection vulnerability in MangosWeb Enhanced 3.0.3 allows remote attackers to execute arbitrary SQL commands via the login parameter in a login action to index.php. | [
"cpe:2.3:a:wilson_steven:mangosweb_enhanced:3.0.3:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2018-18808 | TIBCO JasperReports Server Privilege Escalation Via Race Condition | The domain management component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a race-condition vulnerability that may allow any users with domain save privileges to gain superuser privileges. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Server: versions up to and including 6.3.4; 6.4.0; 6.4.1; 6.4.2; 6.4.3; 7.1.0, TIBCO JasperReports Server Community Edition: versions up to and including 7.1.0, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.3, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 7.1.0, and TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 7.1.0. | [
"cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:activematrix_bpm:*:*",
"cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:community:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jaspersoft:*:*:*:*:*:aws_with_multi-tenancy:*:*",
"cpe:2.3:a:tibco:jaspersoft_reporting_and_analytics:*:*:*:*:*:aws:*:*"
]
| null | null | 8.8 | null |
CVE-2014-7023 | The Find Color (aka com.chudong.color) application 1.1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:find_color_project:find_color:1.1.1:*:*:*:*:android:*:*"
]
| null | null | null | 5.4 |
|
CVE-2013-7271 | The x25_recvmsg function in net/x25/af_x25.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*"
]
| null | null | null | 4.9 |
|
GHSA-g42c-hpcx-483f | Buffer overflow in the Bluetooth HCI_ISO dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file | []
| null | 7.5 | null | null |
|
CVE-2021-4405 | The ElasticPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.5.3. This is due to missing or incorrect nonce validation on the epio_send_autosuggest_allowed() function. This makes it possible for unauthenticated attackers to send allowed parameters for autosuggest to elasticpress[.]io via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:10up:elasticpress:*:*:*:*:*:wordpress:*:*"
]
| null | 4.3 | null | null |
|
CVE-2022-43673 | Wire through 3.22.3993 on Windows advertises deletion of sent messages; nonetheless, all messages can be retrieved (for a limited period of time) from the AppData\Roaming\Wire\IndexedDB\https_app.wire.com_0.indexeddb.leveldb database. | [
"cpe:2.3:a:wire:wire:*:*:*:*:*:windows:*:*"
]
| null | 4.7 | null | null |
|
GHSA-c676-3xc7-p5gp | SQL injection vulnerability in the Job Search module (job.module) 4.6 before revision 1.3.2.1 in Drupal allows remote attackers to execute arbitrary SQL commands via a job or resume search. | []
| null | null | null | null |
|
CVE-2017-15630 | TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-remotesubnet variable in the pptp_client.lua file. | [
"cpe:2.3:o:tp-link:er5110g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5110g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5120g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5120g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5510g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5510g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5520g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5520g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4149g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4149g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4239g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4239g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4299g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4299g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473gp-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473gp-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473p-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473p-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478g\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478g\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r483g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r483g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r483_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r483:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r488_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r488:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war1300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war1300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war1750l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war1750l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war2600l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war2600l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war450l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war450l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war458l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war458l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war458_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war458:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war900l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war900l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1300g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1750l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1750l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr2600l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr2600l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr4300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr4300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr450l_firmware:1.0161125:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr450l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr458l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr458l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr900g_firmware:3.0_170306:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr900g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr900l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr900l:-:*:*:*:*:*:*:*"
]
| null | null | 7.2 | 9 |
|
CVE-2020-10831 | An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. Attackers can trigger an update to arbitrary touch-screen firmware. The Samsung ID is SVE-2019-16013 (March 2020). | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-vjmq-qgx6-29w9 | Address bar search suggestions in private browsing mode were re-using session data from normal mode. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 89. | []
| null | null | null | null |
|
GHSA-64qq-cvrh-w3cq | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in snstheme Valen - Sport, Fashion WooCommerce WordPress Theme allows PHP Local File Inclusion. This issue affects Valen - Sport, Fashion WooCommerce WordPress Theme: from n/a through 2.4. | []
| null | 8.1 | null | null |
|
GHSA-v688-qxmq-mg2j | IBM Tivoli Monitoring V6 could allow an unauthenticated user to access SOAP queries that could contain sensitive information. IBM X-Force ID: 117696. | []
| null | null | 5.3 | null |
|
CVE-2022-32453 | HTTP header injection vulnerability in Cybozu Office 10.0.0 to 10.8.5 may allow a remote attacker to obtain and/or alter the data of the product via unspecified vectors. | [
"cpe:2.3:a:cybozu:office:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
|
CVE-2008-6648 | SQL injection vulnerability in crumbs.php in Ktools PhotoStore 3.4.3 and 3.5.2 allows remote attackers to execute arbitrary SQL commands via the gid parameter to about_us.php. NOTE: this might be the same issue as CVE-2008-6647. | [
"cpe:2.3:a:ktools:photostore:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ktools:photostore:3.5.2:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2024-25573 | Stored Cross-Site Scripting in Administrative Console Context | Unsanitized user-supplied data saved in the PingFederate Administrative Console could trigger the execution of JavaScript code in subsequent user processing. | []
| 6.9 | null | null | null |
RHSA-2024:3233 | Red Hat Security Advisory: libssh security update | libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname libssh: Missing checks for return values for digests | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 3.7 | null | null |
RHSA-2014:1354 | Red Hat Security Advisory: rhev-hypervisor6 security update | nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73) bash: specially-crafted environment variables can be used to inject shell commands bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) bash: parser can allow out-of-bounds memory access while handling redir_stack bash: off-by-one error in deeply nested flow control constructs | [
"cpe:/a:redhat:rhev_manager:3"
]
| null | null | null | null |
GHSA-c274-3m34-wwp8 | Windows DNS Server Remote Code Execution Vulnerability | []
| null | 7.2 | null | null |
|
CVE-2007-6548 | Multiple direct static code injection vulnerabilities in RunCMS before 1.6.1 allow remote authenticated administrators to inject arbitrary PHP code via the (1) header and (2) footer parameters to modules/system/admin.php in a meta-generator action, (3) the disclaimer parameter to modules/system/admin.php in a disclaimer action, (4) the disclaimer parameter to modules/mydownloads/admin/index.php in a mydownloadsConfigAdmin action, (5) the disclaimer parameter to modules/newbb_plus/admin/forum_config.php, (6) the disclaimer parameter to modules/mylinks/admin/index.php in a myLinksConfigAdmin action, or (7) the intro parameter to modules/sections/admin/index.php in a secconfig action, which inject PHP sequences into (a) sections/cache/intro.php, (b) mylinks/cache/disclaimer.php, (c) mydownloads/cache/disclaimer.php, (d) newbb_plus/cache/disclaimer.php, (e) system/cache/disclaimer.php, (f) system/cache/footer.php, (g) system/cache/header.php, or (h) system/cache/maintenance.php in modules/. | [
"cpe:2.3:a:runcms:runcms:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2016-4589 | WebKit in Apple iOS before 9.3.3, Safari before 9.1.2, and tvOS before 9.2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4622, CVE-2016-4623, and CVE-2016-4624. | [
"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
CVE-2022-1441 | MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this function, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so is the length, which causes a buffer overflow. | [
"cpe:2.3:a:gpac:gpac:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 6.8 |
|
GHSA-4ghh-5wcp-69w2 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in QODE Interactive Qi Addons For Elementor allows PHP Local File Inclusion.This issue affects Qi Addons For Elementor: from n/a through 1.6.3. | []
| null | 6.4 | null | null |
|
CVE-2024-31946 | An issue was discovered in Stormshield Network Security (SNS) 3.7.0 through 3.7.41, 3.10.0 through 3.11.29, 4.0 through 4.3.24, and 4.4.0 through 4.7.4. A user who has access to the SNS with write access on the email alerts page has the ability to create alert email containing malicious JavaScript, executed by the template preview. The following versions fix this: 3.7.42, 3.11.30, 4.3.25, and 4.7.5. | []
| null | 4.2 | null | null |
|
GHSA-q632-p9m7-396r | Directory traversal vulnerability in HOUSE GATE App for iOS 1.7.8 and earlier allows remote attackers to read arbitrary files via unspecified vectors. | []
| null | null | 7.5 | null |
|
CVE-2019-2871 | Vulnerability in the Data Store component of Oracle Berkeley DB. Supported versions that are affected are 12.1.6.1.23, 12.1.6.1.26, 12.1.6.1.29, 12.1.6.1.36, 12.1.6.2.23 and 12.1.6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:berkeley_db:12.1.6.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:12.1.6.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:12.1.6.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:12.1.6.1.36:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:12.1.6.2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:12.1.6.2.32:*:*:*:*:*:*:*"
]
| null | null | 7 | 3.7 |
|
CVE-2005-2382 | Oray PeanutHull 3.0.1.0 and earlier does not properly drop SYSTEM privileges when launched from the system tray, which allows local users to gain privileges by accessing the Help functionality. | [
"cpe:2.3:a:oray:peanuthull:3.0.1.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
RHSA-2022:0547 | Red Hat Security Advisory: ruby:2.5 security update | rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
]
| null | 8.8 | null | null |
CVE-2010-0502 | iChat Server in Apple Mac OS X Server before 10.6.3, when group chat is used, does not perform logging for all types of messages, which might allow remote attackers to avoid message auditing via an unspecified selection of message type. | [
"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-w493-rcc4-rw32 | Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8 and Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8 allow command injection by authenticated users, aka OSFOURK-23554. | []
| null | 8.8 | null | null |
|
GHSA-f4cw-6r4q-vjw9 | Xovis PC2, PC2R, and PC3 devices through 3.6.0 allow CSRF. | []
| null | null | 8.8 | null |
|
GHSA-wjqc-3m5q-798m | in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory. | []
| null | 3.3 | null | null |
|
CVE-2008-1409 | Multiple directory traversal vulnerabilities in the Default theme in Exero CMS 1.0.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the theme parameter to (1) index.php, (2) editpassword.php, and (3) avatar.php in usercp/; (4) custompage.php; (5) errors/404.php; (6) memberslist.php and (7) profile.php in members/; (8) index.php and (9) fullview.php in news/; and (10) nopermission.php. | [
"cpe:2.3:a:exero:exero_cms:1.0.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
RHSA-2022:0759 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update | QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
]
| null | 7 | null | null |
CVE-2019-8929 | An issue was discovered in Zoho ManageEngine Netflow Analyzer Professional 7.0.0.2. XSS exists in the Administration zone /netflow/jspui/selectDevice.jsp file in these GET parameters: param and rtype. | [
"cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:7.0.0.2:*:*:*:professional:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2016-4303 | The parse_string function in cjson.c in the cJSON library mishandles UTF8/16 strings, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a non-hex character in a JSON string, which triggers a heap-based buffer overflow. | [
"cpe:2.3:a:iperf3_project:iperf3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
RHSA-2011:0175 | Red Hat Security Advisory: JBoss Web Framework Kit 1.0.0 removal | 3.0.3): Arbitrary Java code execution via an HTTP request containing a specially-crafted .jar file | [
"cpe:/a:redhat:jboss_web_framework_kit:1::el4",
"cpe:/a:redhat:jboss_web_framework_kit:1::el5"
]
| null | null | null | null |
CVE-2002-0457 | Cross-site scripting vulnerability in signgbook.php for BG GuestBook 1.0 allows remote attackers to execute arbitrary Javascript via encoded tags such as <, >, and & in fields such as (1) name, (2) email, (3) AIM screen name, (4) website, (5) location, or (6) message. | [
"cpe:2.3:a:bg_guestbook:bg_guestbook:1.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.6 |
|
GHSA-rfhq-fr38-m693 | Multiple cross-site scripting (XSS) vulnerabilities in Microsoft W3Who ISAPI (w3who.dll) allow remote attackers to inject arbitrary HTML and web script via (1) HTTP headers such as "Connection" or (2) invalid parameters whose values are echoed in the resulting error message. | []
| null | null | null | null |
|
CVE-2020-1832 | E6878-370 products with versions of 10.0.3.1(H557SP27C233) and 10.0.3.1(H563SP1C00) have a stack buffer overflow vulnerability. The program copies an input buffer to an output buffer without verification. An attacker in the adjacent network could send a crafted message, successful exploit could lead to stack buffer overflow which may cause malicious code execution. | [
"cpe:2.3:o:huawei:e6878-370_firmware:10.0.3.1\\(h557sp27c233\\):*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:e6878-370_firmware:10.0.3.1\\(h563sp1c233\\):*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:e6878-370:-:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 5.8 |
|
CVE-2000-0687 | Auction Weaver CGI script 1.03 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack in the catdir parameter. | [
"cpe:2.3:a:cgi_script_center:auction_weaver:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2023-29410 |
A CWE-20: Improper Input Validation vulnerability exists that could allow an authenticated
attacker to gain the same privilege as the application on the server when a malicious payload is
provided over HTTP for the server to execute.
| [
"cpe:2.3:o:schneider-electric:insighthome_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:insighthome_firmware:1.16:-:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:insighthome_firmware:1.16:build_004:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:insighthome:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:insightfacility_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:insightfacility_firmware:1.16:-:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:insightfacility_firmware:1.16:build_004:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:insightfacility:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:conext_gateway_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:conext_gateway_firmware:1.16:-:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:conext_gateway_firmware:1.16:build_004:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:conext_gateway:-:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
|
CVE-2017-0012 | Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to spoof web content via a crafted web site, aka "Microsoft Browser Spoofing Vulnerability." This vulnerability is different from those described in CVE-2017-0033 and CVE-2017-0069. | [
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
]
| null | null | 4.3 | 4.3 |
|
CVE-2020-0537 | Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access. | [
"cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*"
]
| null | 4.9 | null | 4 |
|
CVE-2012-1187 | Bitlbee does not drop extra group privileges correctly in unix.c | [
"cpe:2.3:a:bitlbee:bitlbee:3.0.4:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-fc2m-c6gh-gwrm | Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution. | []
| null | null | null | null |
|
GHSA-j5vp-mc48-6xm9 | Missing Authorization vulnerability in Reservation Diary ReDi Restaurant Reservation allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects ReDi Restaurant Reservation: from n/a through 24.0422. | []
| null | 5.4 | null | null |
|
GHSA-4pq4-59v5-5mpm | In the Linux kernel, the following vulnerability has been resolved:net: netconsole: fix wrong warningA warning is triggered when there is insufficient space in the buffer
for userdata. However, this is not an issue since userdata will be sent
in the next iteration.Current warning message:The code incorrectly issues a warning when this_chunk is zero, which is
a valid scenario. The warning should only be triggered when this_chunk
is negative. | []
| null | 3.3 | null | null |
|
GHSA-wgv7-4h99-hxvq | Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | []
| null | null | null | null |
|
CVE-2025-25349 | PHPGurukul Daily Expense Tracker System v1.1 is vulnerable to SQL Injection in /dets/add-expense.php via the costitem parameter. | []
| null | 9.8 | null | null |
|
GHSA-mjq5-4h2v-323x | PHP remote file inclusion vulnerability in djpage.php in PHPDJ 0.5 allows remote attackers to execute arbitrary PHP code via a URL in the page parameter. | []
| null | null | null | null |
|
GHSA-q9xm-v767-x65c | Inappropriate implementation in accessibility in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. | []
| null | 6.5 | null | null |
|
CVE-2024-53676 | A directory traversal vulnerability in Hewlett Packard Enterprise Insight Remote Support may allow remote code execution. | [
"cpe:2.3:a:hpe:insight_remote_support:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2024-29808 | WordPress Photo Gallery Plugin <= 1.8.21 Reflected Cross Site Scripting in editimage_bwg image_id | The image_id parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is vulnerable to reflected Cross Site Scripting. The value of the image_id parameter is embedded within an existing JavaScript within the response allowing arbitrary JavaScript to be inserted and executed. The attacker must target a an authenticated user with permissions to access this component to exploit this issue. | [
"cpe:2.3:a:10web:photo_gallery:1.0.1:*:*:*:*:wordpress:*:*"
]
| null | 5.4 | null | null |
GHSA-mw3w-f2gc-g47m | vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. | []
| null | 9.8 | null | null |
|
GHSA-xrfw-635c-5mwq | Multiple cross-site scripting (XSS) vulnerabilities in BolinOS 4.6.1 allow remote attackers to inject arbitrary web script or HTML via the (1) url parameter to (a) system/actionspages/_b/contentFiles/gBImageViewer.php, (2) ForEditor parameter to (b) system/actionspages/_b/contentFiles/gBselectorContents.php, (3) the PATH_INFO to (c) gBLoginPage.php and (d) gBPassword.php in system/actionspages/_b/contentFiles/, (4) formlogin parameter to system/actionspages/_b/contentFiles/gBLoginPage.php, and the (5) bolini_searchengine46Search parameter to (e) help/index.php. | []
| null | null | null | null |
|
GHSA-5hfv-mg5x-mv32 | Improper Limitation of a Pathname to a Restricted Directory in Jenkins Pipeline: Shared Groovy Libraries Plugin | Jenkins Pipeline: Shared Groovy Libraries Plugin does not restrict the names of resources passed to the libraryResource step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system. | []
| null | 6.5 | null | null |
CVE-2020-10576 | An issue was discovered in Janus through 0.9.1. plugins/janus_voicemail.c in the VoiceMail plugin has a race condition that could cause a server crash. | [
"cpe:2.3:a:meetecho:janus:*:*:*:*:*:*:*:*"
]
| null | 5.9 | null | 4.3 |
|
GHSA-j6gj-863p-72m9 | Illustrator versions 29.2.1, 28.7.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
| null | 5.5 | null | null |
|
CVE-2015-5154 | Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands. | [
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
CVE-2020-8150 | A cryptographic issue in Nextcloud Server 19.0.1 allowed an attacker to downgrade the encryption scheme and break the integrity of encrypted files. | [
"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*"
]
| null | 4.1 | null | 1.9 |
|
CVE-2025-32217 | WordPress Ai Image Alt Text Generator for WP plugin <= 1.0.8 - Broken Access Control vulnerability | Missing Authorization vulnerability in WP Messiah Ai Image Alt Text Generator for WP allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Ai Image Alt Text Generator for WP: from n/a through 1.0.8. | []
| null | 5.4 | null | null |
GHSA-vgxg-wwfg-46jp | The Command Line Interface (CLI), aka Adonis Administration Console, on the BlueCat Networks Adonis DNS/DHCP appliance 5.0.2.8 allows local admin users to gain root privileges on the underlying operating system via shell metacharacters in a command. | []
| null | null | null | null |
|
CVE-2022-32771 | A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the "success" parameter which is inserted into the document with insufficient sanitization. | [
"cpe:2.3:a:wwbn:avideo:11.6:*:*:*:*:*:*:*"
]
| null | null | 9.6 | null |
|
CVE-2023-51951 | SQL Injection vulnerability in Stock Management System 1.0 allows a remote attacker to execute arbitrary code via the id parameter in the manage_bo.php file. | [
"cpe:2.3:a:stock_management_system_project:stock_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2005-4879 | Multiple cross-site scripting (XSS) vulnerabilities in jax_guestbook.php in Jax Guestbook 3.1 and 3.31 allow remote attackers to inject arbitrary web script or HTML via the (1) gmt_ofs and (2) language parameters. NOTE: the page parameter is already covered by CVE-2006-1913. NOTE: it was later reported that 3.50 is also affected. | [
"cpe:2.3:a:jax_scripts:jax_guestbook:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jax_scripts:jax_guestbook:3.31:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-w8f8-xp64-gw98 | In wifi driver, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure to a proximal attacker with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-187231638 | []
| null | null | null | null |
|
CVE-2017-17955 | PHP Scripts Mall PHP Multivendor Ecommerce has XSS via the shopping-cart.php cusid parameter. | [
"cpe:2.3:a:php_multivendor_ecommerce_project:php_multivendor_ecommerce:-:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
GHSA-c7fp-f8xf-wg7c | In wlan driver, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00364733; Issue ID: MSV-1331. | []
| null | 6.6 | null | null |
|
CVE-2025-3096 | Clinics Patient Management System SQL Injection | Clinic’s Patient Management System versions 2.0 suffers from a SQL injection vulnerability in the login page. | []
| 9.3 | null | null | null |
GHSA-w23m-r3m4-fqhr | Cross-site scripting (XSS) vulnerability in search-results.dot in dotCMS 1.x allows remote attackers to inject arbitrary web script or HTML via the search_query parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
| null | null | null | null |
|
CVE-2011-2209 | Integer signedness error in the osf_sysinfo function in arch/alpha/kernel/osf_sys.c in the Linux kernel before 2.6.39.4 on the Alpha platform allows local users to obtain sensitive information from kernel memory via a crafted call. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.39:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.39:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.39:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.39:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.39:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.39:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.39:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.39.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.39.2:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
CVE-2025-27426 | Malicious websites utilizing a server-side redirect to an internal error page could result in a spoofed website URL This vulnerability affects Firefox for iOS < 136. | []
| null | 5.4 | null | null |
|
CVE-2022-39346 | Missing length validation of user displayname in nextcloud server | Nextcloud server is an open source personal cloud server. Affected versions of nextcloud server did not properly limit user display names which could allow a malicious users to overload the backing database and cause a denial of service. It is recommended that the Nextcloud Server is upgraded to 22.2.10, 23.0.7 or 24.0.3. There are no known workarounds for this issue. | [
"cpe:2.3:a:nextcloud:nextcloud_enterprise_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
]
| null | 3.5 | null | null |
GHSA-q85c-8hf8-xfw7 | In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | []
| null | 5.5 | null | null |
|
GHSA-fxjx-xx78-2944 | SAP NetWeaver Application Server ABAP and ABAP Platform - versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 793, SAP_BASIS 804, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could allow an attacker to read sensitive information which can be used in a subsequent serious attack. | []
| null | 4.9 | null | null |
|
GHSA-qxjh-rmr9-893r | Multiple buffer overflows in Cain & Abel before 2.67 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via (1) an IKE packet with a large ID field that is not properly handled by the PSK sniffer filter, (2) the HTTP sniffer filter, or the (3) POP3, (4) SMTP, (5) IMAP, (6) NNTP, or (7) TDS sniffer filters. | []
| null | null | null | null |
|
CVE-2016-6967 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1089, CVE-2016-1091, CVE-2016-6944, CVE-2016-6945, CVE-2016-6946, CVE-2016-6949, CVE-2016-6952, CVE-2016-6953, CVE-2016-6961, CVE-2016-6962, CVE-2016-6963, CVE-2016-6964, CVE-2016-6965, CVE-2016-6968, CVE-2016-6969, CVE-2016-6971, CVE-2016-6979, CVE-2016-6988, and CVE-2016-6993. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
CVE-2022-30171 | Microsoft Office Information Disclosure Vulnerability | Microsoft Office Information Disclosure Vulnerability | [
"cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
CVE-2018-6433 | A vulnerability in the secryptocfg export command of Brocade Fabric OS versions before 8.2.1, 8.1.2f, 8.0.2f, 7.4.2d could allow a local attacker to bypass the export file access restrictions and initiate a file copy from the source to a remote system. | [
"cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 2.1 |
|
GHSA-8c59-347w-2hff | Unspecified vulnerability in the administrative interface in Avaya Messaging Storage Server (MSS) 3.1 before SP1, and Message Networking (MN) 3.1, allows remote attackers to cause a denial of service via unspecified vectors related to "input validation." | []
| null | null | null | null |
|
CVE-2023-52760 | gfs2: Fix slab-use-after-free in gfs2_qd_dealloc | In the Linux kernel, the following vulnerability has been resolved:
gfs2: Fix slab-use-after-free in gfs2_qd_dealloc
In gfs2_put_super(), whether withdrawn or not, the quota should
be cleaned up by gfs2_quota_cleanup().
Otherwise, struct gfs2_sbd will be freed before gfs2_qd_dealloc (rcu
callback) has run for all gfs2_quota_data objects, resulting in
use-after-free.
Also, gfs2_destroy_threads() and gfs2_quota_cleanup() is already called
by gfs2_make_fs_ro(), so in gfs2_put_super(), after calling
gfs2_make_fs_ro(), there is no need to call them again. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
CVE-2023-47117 | Object Relational Mapper Leak Vulnerability in Filtering Task in Label Studio | Label Studio is an open source data labeling tool. In all current versions of Label Studio prior to 1.9.2post0, the application allows users to insecurely set filters for filtering tasks. An attacker can construct a filter chain to filter tasks based on sensitive fields for all user accounts on the platform by exploiting Django's Object Relational Mapper (ORM). Since the results of query can be manipulated by the ORM filter, an attacker can leak these sensitive fields character by character. In addition, Label Studio had a hard coded secret key that an attacker can use to forge a session token of any user by exploiting this ORM Leak vulnerability to leak account password hashes. This vulnerability has been addressed in commit `f931d9d129` which is included in the 1.9.2post0 release. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:humansignal:label_studio:*:*:*:*:*:*:*:*",
"cpe:2.3:a:humansignal:label_studio:1.9.2:-:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
GHSA-m73m-6ff8-fwgm | An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to upload an arbitrary file via the file parameter in the HTTP POST body. A successful request returns the absolute, server-side filesystem path of the uploaded file. | []
| null | null | null | null |
|
GHSA-rcx6-j954-7rj5 | A PHP code injection vulnerability in MaianAffiliate v.1.0 allows an authenticated attacker to gain RCE through the MaianAffiliate admin panel. | []
| null | 4.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.