id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-h7h5-c3fr-4rj2
|
SunnyToo stblogsearch up to v1.0.0 was discovered to contain a SQL injection vulnerability via the StBlogSearchClass::prepareSearch component.
|
[] | null | 9.8 | null | null | null |
|
GHSA-x2qm-672h-5482
|
A vulnerability, which was classified as critical, was found in SimpleMachines SMF 2.1.4. Affected is an unknown function of the file /index.php?action=profile;u=2;area=showalerts;do=remove of the component Delete User Handler. The manipulation of the argument aid leads to improper control of resource identifiers. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-273522 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 5.4 | null | null | null |
|
GHSA-7pmw-j64m-whv3
|
Cross-site scripting (XSS) vulnerability in Apache jUDDI before 2.0 allows remote attackers to inject arbitrary web script or HTML via the dsname parameter to happyjuddi.jsp.
|
[] | null | null | 6.1 | null | null |
|
GHSA-h8fr-cpxv-cfj9
|
Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.0.1-12.4.0 and 14.0.0-14.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N).
|
[] | null | 7.1 | null | null | null |
|
CVE-2023-31823
|
An issue found in Marui Co Marui Official app v.13.6.1 allows a remote attacker to gain access to sensitive information via the channel access token in the miniapp Marui Official Store function.
|
[
"cpe:2.3:a:marui:marui:13.6.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-9m5w-7xhr-393x
|
A DLL hijacking vulnerability in AMD μProf could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.
|
[] | null | 7.3 | null | null | null |
|
GHSA-84v3-8746-q3rg
|
Man-in-the-middle (MitM) attack vulnerability in non-Mac OS agents in McAfee (now Intel Security) Agent (MA) 4.8.0 patch 2 and earlier allows attackers to make a McAfee Agent talk with another, possibly rogue, ePO server via McAfee Agent migration to another ePO server.
|
[] | null | null | 5.3 | null | null |
|
CVE-2020-14204
|
In WebFOCUS Business Intelligence 8.0 (SP6), the administration portal allows remote attackers to read arbitrary local files or forge server-side HTTP requests via a crafted HTTP request to /ibi_apps/WFServlet.cfg because XML external entity injection is possible. This is related to making changes to the application repository configuration.
|
[
"cpe:2.3:a:ibi:webfocus_business_intelligence:8.0:sp6:*:*:*:*:*:*"
] | null | 8.2 | null | 5.8 | null |
|
CVE-2019-13264
|
D-link DIR-825AC G1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. In order to transfer data from the host network to the guest network, the sender joins and then leaves an IGMP group. After it leaves, the router (following the IGMP protocol) creates an IGMP Membership Query packet with the Group IP and sends it to both the Host and the Guest networks. The data is transferred within the Group IP field, which is completely controlled by the sender.
|
[
"cpe:2.3:o:dlink:dir-825\\/ac_g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-825\\/ac_g1:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 5.8 | null |
|
RHSA-2015:1925
|
Red Hat Security Advisory: kvm security update
|
qemu: Heap overflow vulnerability in ne2000_receive() function
|
[
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null | null |
CVE-2020-25703
|
The participants table download in Moodle always included user emails, but should have only done so when users' emails are not hidden. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5 and 3.7 to 3.7.8. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, and 3.10.
|
[
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
CVE-2023-49418
|
TOTOLink A7000R V9.1.0u.6115_B20201022has a stack overflow vulnerability via setIpPortFilterRules.
|
[
"cpe:2.3:o:totolink:a7000r_firmware:9.1.0u.6115_b20201022:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-cww9-5x9q-cmh7
|
SQL injection vulnerability in frontpage.php in Goople CMS 1.8.2 and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter.
|
[] | null | null | null | null | null |
|
GHSA-5855-c4ch-q7j5
|
app/controllers/frontend/PostController.php in ROCBOSS V2.2.1 has SQL injection via the Post:doReward score paramter, as demonstrated by the /do/reward/3 URI.
|
[] | null | null | 9.8 | null | null |
|
CVE-2023-32578
|
WordPress Column-Matic Plugin <= 1.3.3 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Twinpictures Column-Matic plugin <= 1.3.3 versions.
|
[
"cpe:2.3:a:column-matic_project:column-matic:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
ICSA-25-135-12
|
Siemens SIMATIC PCS
|
Affected products do not correctly invalidate user sessions upon user logout. This could allow a remote unauthenticated attacker, who has obtained the session token by other means, to re-use a legitimate user's session even after logout.
|
[] | null | 8.8 | null | null | null |
RHSA-2009:1453
|
Red Hat Security Advisory: pidgin security update
|
Pidgin: NULL pointer dereference by handling IRC topic(s) (DoS) pidgin: ignores SSL/TLS requirements with old jabber servers Pidgin: NULL pointer dereference by processing incomplete MSN SLP invite (DoS) Pidgin: NULL pointer dereference by processing a custom smiley (DoS)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null | null |
CVE-2022-49855
|
net: wwan: iosm: fix memory leak in ipc_pcie_read_bios_cfg
|
In the Linux kernel, the following vulnerability has been resolved:
net: wwan: iosm: fix memory leak in ipc_pcie_read_bios_cfg
ipc_pcie_read_bios_cfg() is using the acpi_evaluate_dsm() to
obtain the wwan power state configuration from BIOS but is
not freeing the acpi_object. The acpi_evaluate_dsm() returned
acpi_object to be freed.
Free the acpi_object after use.
|
[] | null | 5.5 | null | null | null |
GHSA-3pxg-2hq3-gqf4
|
Hospital Management System v4 was discovered to contain multiple SQL injection vulnerabilities in contact.php via the txtname, txtphone, and txtmail parameters.
|
[] | null | 9.8 | null | null | null |
|
PYSEC-2011-6
| null |
Cross-site scripting (XSS) vulnerability in the reStructuredText (rst) parser in parser/text_rst.py in MoinMoin before 1.9.3, when docutils is installed or when "format rst" is set, allows remote attackers to inject arbitrary web script or HTML via a javascript: URL in the refuri attribute. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
CVE-2014-1539
|
Mozilla Firefox before 30.0 and Thunderbird through 24.6 on OS X do not ensure visibility of the cursor after interaction with a Flash object and a DIV element, which makes it easier for remote attackers to conduct clickjacking attacks via JavaScript code that produces a fake cursor image.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
RHSA-2014:0563
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.3 update
|
JBossSX/PicketBox: World readable audit.log file
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null | null |
CVE-2021-24677
|
Find My Blocks < 3.4.0 - Private Post Titles Disclosure
|
The Find My Blocks WordPress plugin before 3.4.0 does not have authorisation checks in its REST API, which could allow unauthenticated users to enumerate private posts' titles.
|
[
"cpe:2.3:a:find_my_blocks_project:find_my_blocks:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | 5 | null |
RHSA-2022:0971
|
Red Hat Security Advisory: virt:av and virt-devel:av security and bug fix update
|
QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 libnbd: nbdcopy: missing error handling may create corrupted destination image
|
[
"cpe:/a:redhat:advanced_virtualization:8.4::el8"
] | null | 4.8 | null | null | null |
GHSA-q9j5-pjjv-jw6j
|
SugarCRM before 8.0.4 and 9.x before 9.0.2 allows PHP code injection in the EmailMan module by an Admin user.
|
[] | null | null | null | null | null |
|
CVE-2007-0776
|
Heap-based buffer overflow in the _cairo_pen_init function in Mozilla Firefox 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to execute arbitrary code via a large stroke-width attribute in the clipPath element in an SVG file.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2024-50318
|
A null pointer dereference in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service.
|
[
"cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-mfqv-9gj9-6f5v
|
A heap buffer overflow vulnerability inside of BMP image processing was found at [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v6.0.0. Using this vulnerability, an attacker is able to gain remote code executions on DocumentServer.
|
[] | null | null | null | null | null |
|
CVE-2007-1090
|
Microsoft Windows Explorer on Windows XP and 2003 allows remote user-assisted attackers to cause a denial of service (crash) via a malformed WMF file, which triggers the crash when the user browses the folder.
|
[
"cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:windows_explorer:*:*:*:*:*:*:*:*"
] | null | null | null | 7.1 | null |
|
ICSA-24-347-04
|
Siemens Parasolid
|
The affected applications contain an out of bounds write vulnerability when parsing specially crafted PAR files.
This could allow an attacker to execute code in the context of the current process.
|
[] | null | 7.8 | null | null | null |
CVE-2008-5113
|
WordPress 2.6.3 relies on the REQUEST superglobal array in certain dangerous situations, which makes it easier for remote attackers to conduct delayed and persistent cross-site request forgery (CSRF) attacks via crafted cookies, as demonstrated by attacks that (1) delete user accounts or (2) cause a denial of service (loss of application access). NOTE: this issue relies on the presence of an independent vulnerability that allows cookie injection.
|
[
"cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-rpcc-jvgm-8vrr
|
Vembu BDR Suite before 4.2.0 allows Unauthenticated Remote Code Execution by placing a command in a GET request (issue 1 of 2).
|
[] | null | 9.8 | null | null | null |
|
CVE-2020-15005
|
In MediaWiki before 1.31.8, 1.32.x and 1.33.x before 1.33.4, and 1.34.x before 1.34.2, private wikis behind a caching server using the img_auth.php image authorization security feature may have had their files cached publicly, so any unauthorized user could view them. This occurs because Cache-Control and Vary headers were mishandled.
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 3.1 | null | 2.6 | null |
|
CVE-2024-2962
|
The Networker - Tech News WordPress Theme with Dark Mode theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the admin_reload_nav_menu() function in all versions up to, and including, 1.1.9. This makes it possible for unauthenticated attackers to modify the location of display menus.
|
[
"cpe:2.3:a:codesupplyco:networker_technews_wordpress_theme_with_dark_mode:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-67fq-9626-6542
|
SQL injection vulnerability in admin/admin_acronyms.php in the Acronym Mod 0.9.5 for phpBB2 Plus 1.53 allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] | null | null | null | null | null |
|
GHSA-r6cm-wg48-rh2r
|
Exposure of Private Personal Information to an Unauthorized Actor in alextselegidis/easyappointments
|
The software is a booking management system that has a public form to place bookings, and a private area for the calendar and management of services, users, settings, etc. There is a backend API that allows data manipulation, including listing the appointments for a specific time range. This happens on this endpoint: /index.php/backend_api/ajax_get_calendar_events Unfortunately, there is no authentication / permissions-check on that endpoint, the only required parameters in a POST request are "startDate", "endDate" and "csrfToken". Because the csrfToken can be obtained by any unauthenticated user just visiting the public form (and is valid for the backend as well), any attacker can query the backend API and obtain all sorts of private information about the appointment, in JSON format.
|
[] | null | 9.1 | null | null | null |
CVE-2017-14480
|
In the MMM::Agent::Helpers::Network::clear_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for FreeBSD), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability.
|
[
"cpe:2.3:a:mysql-mmm:mysql_multi-master_replication_manager:2.2.1:*:*:*:*:freebsd:*:*"
] | null | null | 9.8 | null | null |
|
CVE-2016-3423
|
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53, 8.54, and 8.55 allows remote authenticated users to affect confidentiality and integrity via vectors related to Rich Text Editor, a different vulnerability than CVE-2016-0698.
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
GHSA-6r4p-h752-6w2r
|
The integrated server of the ZGR TPS200 NG on its 2.00 firmware version and 1.01 hardware version, allows a remote attacker to perform actions with the permissions of a victim user. For this to happen, the victim user has to have an active session and triggers the malicious request.
|
[] | null | 8.8 | null | null | null |
|
GHSA-v865-6qv6-w5m2
|
Creative Cloud Desktop versions 6.1.0.587 and earlier are affected by an Uncontrolled Search Path Element vulnerability that could result in a security feature bypass. An attacker could exploit this vulnerability to load and execute malicious libraries, leading to arbitrary file delete. Exploitation of this issue requires user interaction.
|
[] | null | 5.5 | null | null | null |
|
GHSA-mhvg-867q-v735
|
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.6.5, macOS Sonoma 14.4, iOS 17.4 and iPadOS 17.4, watchOS 10.4, iOS 16.7.6 and iPadOS 16.7.6. An app may be able to access user-sensitive data.
|
[] | null | 3.3 | null | null | null |
|
GHSA-cxf2-qmxj-h596
|
SolarWinds Serv-U File Server before 15.2.1 has a "Cross-script vulnerability," aka Case Numbers 00041778 and 00306421.
|
[] | null | null | null | null | null |
|
RHSA-2025:8203
|
Red Hat Security Advisory: thunderbird security update
|
thunderbird: Sender Spoofing via Malformed From Header in Thunderbird thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links thunderbird: JavaScript Execution via Spoofed PDF Attachment and file:/// Link thunderbird: Tracking Links in Attachments Bypassed Remote Content Blocking
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null | null |
CVE-2025-30139
|
An issue was discovered on G-Net Dashcam BB GONX devices. Default credentials for SSID cannot be changed. It broadcasts a fixed SSID with default credentials that cannot be changed. This allows any nearby attacker to connect to the dashcam's network without restriction. Once connected, an attacker can sniff on connected devices such as the user's smartphone. The SSID is also always broadcasted.
|
[] | null | 9.8 | null | null | null |
|
CVE-2007-2352
|
Multiple format string vulnerabilities in AFFLIB 2.2.6 allow remote attackers to execute arbitrary code via certain command line parameters, which are used in (1) warn and (2) err calls, possibly involving (a) lib/s3.cpp, (b) tools/afconvert.cpp, (c) tools/afcopy.cpp, (d) tools/afinfo.cpp, (e) aimage/imager.cpp, and (f) tools/afxml.cpp. NOTE: this identifier is intended to address the vectors that were not fixed in CVE-2007-2054, but the unfixed vectors were not explicitly listed.
|
[
"cpe:2.3:a:afflib:afflib:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-c8r9-3pm5-m364
|
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause information leak.
|
[] | null | 4.4 | null | null | null |
|
GHSA-6fvf-x8c6-2f6j
|
Cross-site Scripting (XSS) in DataObject Any Getter grid operator
|
ImpactStored cross site scripting vulnerability in operator any getter in dataobject grid configuration.PatchesUpdate to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/6946f8a5a0a93b516c49f17a5b45044eebd73480.patchWorkaroundsApply patch https://github.com/pimcore/pimcore/commit/6946f8a5a0a93b516c49f17a5b45044eebd73480.patch manually.Referenceshttps://huntr.dev/bounties/bb1537a5-fe7b-4c77-a582-10a82435fbc2/
|
[] | null | 5.4 | null | null | null |
CVE-2024-49076
|
Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
|
Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2023-43135
|
There is an unauthorized access vulnerability in TP-LINK ER5120G 4.0 2.0.0 Build 210817 Rel.80868n, which allows attackers to obtain sensitive information of the device without authentication, obtain user tokens, and ultimately log in to the device backend management.
|
[
"cpe:2.3:h:tp-link:er5120g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-er5120g_firmware:2.0.0:build_210817:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-er5120g:4.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2020-24676
|
Insecure Windows Services in Symphony Plus
|
In Symphony Plus Operations and Symphony Plus Historian, some services can be vulnerable to privilege escalation attacks. An unprivileged (but authenticated) user could execute arbitrary code and result in privilege escalation, depending on the user that the service runs as.
|
[
"cpe:2.3:a:abb:symphony_\\+_historian:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:symphony_\\+_historian:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:symphony_\\+_operations:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:symphony_\\+_operations:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:symphony_\\+_operations:2.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:abb:symphony_\\+_operations:2.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:abb:symphony_\\+_operations:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:symphony_\\+_operations:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:symphony_\\+_operations:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:symphony_\\+_operations:3.3:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-24gf-j9ch-cj9r
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
|
[] | null | null | null | null | null |
|
RHSA-2021:4909
|
Red Hat Security Advisory: nss security update
|
nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS)
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 9.8 | null | null | null |
GHSA-ww8g-33x9-v3qw
|
IBM Informix Dynamic Server Enterprise Edition 12.1 could allow a local user logged in with database administrator user to gain root privileges through a symbolic link vulnerability in onmode. IBM X-Force ID: 144430.
|
[] | null | 6.7 | null | null | null |
|
PYSEC-2017-60
| null |
Multiple open redirect vulnerabilities in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the referer parameter to (1) %2b%2bgroupdashboard%2b%2bplone.dashboard1%2bgroup/%2b/portlets.Actions or (2) folder/%2b%2bcontextportlets%2b%2bplone.footerportlets/%2b /portlets.Actions or the (3) came_from parameter to /login_form.
|
[] | null | null | null | null | null |
CVE-2007-5093
|
The disconnect method in the Philips USB Webcam (pwc) driver in Linux kernel 2.6.x before 2.6.22.6 "relies on user space to close the device," which allows user-assisted local attackers to cause a denial of service (USB subsystem hang and CPU consumption in khubd) by not closing the device after the disconnect is invoked. NOTE: this rarely crosses privilege boundaries, unless the attacker can convince the victim to unplug the affected device.
|
[
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2024-37476
|
WordPress Newspack Campaigns plugin <= 2.31.1 - Cross Site Scripting (XSS) vulnerability
|
Cross Site Scripting (XSS) vulnerability in Automattic Newspack Campaigns allows Stored XSS.This issue affects Newspack Campaigns: from n/a through 2.31.1.
|
[
"cpe:2.3:a:automattic:newspack_popups:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
CVE-2020-8759
|
Improper access control in the installer for Intel(R) SSD DCT versions before 3.0.23 may allow a privileged user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:ssd_data_center_tool:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 | null |
|
CVE-2015-2793
|
Cross-site scripting (XSS) vulnerability in templates/openid-selector.tmpl in ikiwiki before 3.20150329 allows remote attackers to inject arbitrary web script or HTML via the openid_identifier parameter in a verify action to ikiwiki.cgi.
|
[
"cpe:2.3:a:ikiwiki:ikiwiki:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-f8r3-32j3-c29h
|
The Instagram for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 2.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-c2f6-rf2r-6j6f
|
Tokens stored in plain text by PaaSLane Estimate Plugin
|
Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier stores PaaSLane authentication tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
|
[] | null | 4.3 | null | null | null |
GHSA-p2gr-8xqx-rxmg
|
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Bunkerity Bunker Web on Linux allows Phishing.This issue affects Bunker Web: 1.6.2.
|
[] | 4.8 | null | null | null | null |
|
GHSA-gv87-4wrx-xhh7
|
Helix GNOME Updater helix-update 0.5 and earlier allows local users to install arbitrary RPM packages by creating the /tmp/helix-install installation directory before root has begun installing packages.
|
[] | null | null | null | null | null |
|
GHSA-9x39-xf9p-4wrq
|
In Messaging, There has unauthorized broadcast, this could cause Local Deny of Service.Product: AndroidVersions: Android SoCAndroid ID: A-242259920
|
[] | null | 5.5 | null | null | null |
|
GHSA-5fpw-29p6-8pp5
|
Directory traversal vulnerability on ONKYO TX-NR686 1030-5000-1040-0010 A/V Receiver devices allows remote attackers to read arbitrary files via a .. (dot dot) and %2f to the default URI.
|
[] | null | null | 7.5 | null | null |
|
GHSA-9x3m-rc7j-5r64
|
An information disclosure vulnerability in the kernel ION subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Low because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-35644815.
|
[] | null | null | 4.7 | null | null |
|
GHSA-2jrr-xw62-5ggf
|
An issue was discovered on Samsung mobile devices with M(6.0) and N(7.x) software. There is a buffer overflow in process_cipher_tdea. The Samsung ID is SVE-2017-8973 (July 2017).
|
[] | null | null | null | null | null |
|
CVE-2023-24689
|
An issue in Mojoportal v2.7.0.0 and below allows an authenticated attacker to list all css files inside the root path of the webserver via manipulation of the "s" parameter in /DesignTools/ManageSkin.aspx
|
[
"cpe:2.3:a:mojoportal:mojoportal:2.7.0.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
|
GHSA-rhhv-6w3f-j654
|
Generation of Error Message Containing Sensitive Information vulnerability in Dave Kiss Vimeography allows Retrieve Embedded Sensitive Data.This issue affects Vimeography: from n/a through 2.4.4.
|
[] | null | 5.3 | null | null | null |
|
GHSA-2gwp-84r9-4mgj
|
In multiple functions of ConnectivityService.java, there is a possible way for a Wi-Fi AP to determine what site a device has connected to through a VPN due to side channel information disclosure. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 7.5 | null | null | null |
|
CVE-2021-24230
|
Patreon WordPress < 1.7.0 - CSRF to Overwrite/Create User Meta
|
The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged in user overwrite or create arbitrary user metadata on the victim’s account once visited. If exploited, this bug can be used to overwrite the “wp_capabilities” meta, which contains the affected user account’s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content.
|
[
"cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*"
] | null | 8.1 | null | 5.8 | null |
GHSA-9869-mhm7-vvmm
|
In Ifme, versions v5.0.0 to v7.32 are vulnerable against an improper access control, which makes it possible for admins to ban themselves leading to their deactivation from Ifme account and complete loss of admin access to Ifme.
|
[] | null | null | null | null | null |
|
CVE-2018-10084
|
CMS Made Simple (CMSMS) through 2.2.6 contains a privilege escalation vulnerability from ordinary user to admin user by arranging for the eff_uid value within $_COOKIE[$this->_loginkey] to equal 1, because an SHA-1 cryptographic protection mechanism can be bypassed.
|
[
"cpe:2.3:a:cmsmadesimple:cms_made_simple:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
CVE-2024-11381
|
Control horas <= 1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
|
The Control horas plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ch_registro' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
CVE-2022-45355
|
WordPress WP Pipes Plugin <= 1.33 is vulnerable to SQL Injection (SQLi)
|
Auth. (admin+) SQL Injection (SQLi) vulnerability in ThimPress WP Pipes plugin <= 1.33 versions.
|
[
"cpe:2.3:a:thimpress:wp_pipes:*:*:*:*:*:wordpress:*:*"
] | null | 8.2 | null | null | null |
CVE-2009-3984
|
Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0a1:*:pre:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0a1pre:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-qhf3-77w4-c8w8
|
IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the libc.a library to expose sensitive information. IBM X-Force ID: 206084.
|
[] | null | null | null | null | null |
|
CVE-2011-0492
|
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file.
|
[
"cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-83gh-q9xf-w4xr
|
In the Linux kernel, the following vulnerability has been resolved:filemap: avoid truncating 64-bit offset to 32 bitsOn 32-bit kernels, folio_seek_hole_data() was inadvertently truncating a
64-bit value to 32 bits, leading to a possible infinite loop when writing
to an xfs filesystem.
|
[] | null | 5.5 | null | null | null |
|
RHSA-2011:0882
|
Red Hat Security Advisory: Red Hat Network Satellite server jabberd security update
|
jabberd: DoS via the XML "billion laughs attack"
|
[
"cpe:/a:redhat:network_satellite:5.4::el5"
] | null | null | null | null | null |
GHSA-fhcq-p46p-2xvm
|
Heap-based buffer overflow in the CRC32 verification in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
|
[] | null | 7.8 | null | null | null |
|
GHSA-vmpq-wpxg-r7rp
|
In the Linux kernel, the following vulnerability has been resolved:net: netdevsim: don't try to destroy PHC on VFsPHC gets initialized in nsim_init_netdevsim(), which
is only called if (nsim_dev_port_is_pf()).Create a counterpart of nsim_init_netdevsim() and
move the mock_phc_destroy() there.This fixes a crash trying to destroy netdevsim with
VFs instantiated, as caught by running the devlink.sh test:
|
[] | null | 5.5 | null | null | null |
|
GHSA-3gvj-xgpf-vh28
|
The default configuration of mod_perl for Apache as installed on Mandrake Linux 6.1 through 7.1 sets the /perl/ directory to be browseable, which allows remote attackers to list the contents of that directory.
|
[] | null | null | null | null | null |
|
GHSA-3c29-57fg-g53g
|
Buffer overflow in Cambridge Computer Corporation vxFtpSrv 2.0.3 allows remote attackers to cause a denial of service (crash and hang) and possibly execute arbitrary code via a long CWD request.
|
[] | null | null | null | null | null |
|
GHSA-qrfj-wm94-84c5
|
Adobe Reader and Acrobat 8.x before 8.3 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2023-32634
|
An authentication bypass vulnerability exists in the CiRpcServerThread() functionality of SoftEther VPN 5.01.9674 and 4.41-9782-beta. An attacker can perform a local man-in-the-middle attack to trigger this vulnerability.
|
[
"cpe:2.3:a:softether:vpn:4.41-9782:beta:*:*:*:*:*:*",
"cpe:2.3:a:softether:vpn:5.01.9674:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-726r-vfh2-3vvj
|
A stored cross-site scripting (XSS) vulnerability exists in phpipam version 1.5.2, specifically in the circuits options functionality. This vulnerability allows an attacker to inject malicious scripts via the 'option' parameter in the POST request to /phpipam/app/admin/circuits/edit-options-submit.php. The injected script can be executed in the context of the user's browser, leading to potential cookie theft and end-user file disclosure. The issue is fixed in version 1.7.0.
|
[] | null | null | 2.4 | null | null |
|
CVE-2005-2712
|
The LDAP server (nldap.exe) in IBM Lotus Domino before 7.0.1, 6.5.5, and 6.5.4 FP2 allows remote attackers to cause a denial of service (crash) via a long bind request, which triggers a null dereference.
|
[
"cpe:2.3:a:ibm:lotus_domino:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:7.0:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
CVE-2021-38260
|
NXP MCUXpresso SDK v2.7.0 was discovered to contain a buffer overflow in the function USB_HostParseDeviceConfigurationDescriptor().
|
[
"cpe:2.3:a:nxp:mcuxpresso_software_development_kit:2.7.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
GHSA-hc67-v29c-7g78
|
Cross-site Scripting in DaSchTour matomo-mediawiki-extension
|
A vulnerability classified as problematic has been found in DaSchTour matomo-mediawiki-extension up to 2.4.2. This affects an unknown part of the file Piwik.hooks.php of the component Username Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.4.3 is able to address this issue. The name of the patch is 681324e4f518a8af4bd1f93867074c728eb9923d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220203.
|
[] | null | 6.1 | null | null | null |
GHSA-28w6-v9pv-jfvr
|
Multiple cross-site scripting (XSS) vulnerabilities in BLOG:CMS 4.2.1b allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) admin.php or (2) index.php in photo/.
|
[] | null | null | null | null | null |
|
CVE-2021-21029
|
Magento Commerce Reflected Cross-site Scripting Vulnerability Could Lead To Arbitrary JavaScript Execution
|
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by a Reflected Cross-site Scripting vulnerability via 'file' parameter. Successful exploitation could lead to arbitrary JavaScript execution in the victim's browser. Access to the admin console is required for successful exploitation.
|
[
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.3.6:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.6:-:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:-:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:p1:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.4.1:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.1:-:*:*:open_source:*:*:*"
] | null | 4.8 | null | null | null |
GHSA-2mwm-hhv7-v7hx
|
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access.
|
[] | null | 9.8 | null | null | null |
|
GHSA-rh23-w5x7-xjm4
|
In the Linux kernel, the following vulnerability has been resolved:net_sched: hfsc: Address reentrant enqueue adding class to eltree twiceSavino says:
"We are writing to report that this recent patch
(141d34391abbb315d68556b7c67ad97885407547) [1]
can be bypassed, and a UAF can still occur when HFSC is utilized with
NETEM.To fix both the UAF and the infinite loop, with netem as an hfsc child,
check explicitly in hfsc_enqueue whether the class is already in the eltree
whenever the HFSC_RSC flag is set.[1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547
[2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572
[3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677
[4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574
[5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u
|
[] | null | null | null | null | null |
|
CVE-2024-40511
|
Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMServerAdmin.asmx function.
|
[
"cpe:2.3:a:openpetra:openpetra:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
|
GHSA-p59x-w56c-2jj2
|
A cloud infrastructure misconfiguration in OneLogin AD Connector results in log data being sent to a hardcoded S3 bucket (onelogin-adc-logs-production) without validating bucket ownership. An attacker who registers this unclaimed bucket can begin receiving log files from other OneLogin tenants. These logs may contain sensitive data such as directory tokens, user metadata, and environment configuration. This enables cross-tenant leakage of secrets, potentially allowing JWT signing key recovery and user impersonation.
|
[] | 9 | null | null | null | null |
|
GHSA-vvvg-pm5p-r68f
|
The grub_ext2_read_block function in fs/ext2.c in GNU GRUB before 2013-11-12, as used in shlr/grub/fs/ext2.c in radare2 1.5.0, allows remote attackers to cause a denial of service (excessive stack use and application crash) via a crafted binary file, related to use of a variable-size stack array.
|
[] | null | null | 7.5 | null | null |
|
GHSA-w349-42x9-rx83
|
Multiple cross-site scripting (XSS) vulnerabilities in Zoho ManageEngine SupportCenter Plus 7.9 before hotfix 7941 allow remote attackers to inject arbitrary web script or HTML via the (1) fromCustomer, (2) username, or (3) password parameter to HomePage.do.
|
[] | null | null | null | null | null |
|
GHSA-r8mv-jqpq-mx92
|
Emerson OpenBSI through 2022-04-29 mishandles credential storage. It is an engineering environment for the ControlWave and Bristol Babcock line of RTUs. This environment provides access control functionality through user authentication and privilege management. The credentials for various users are stored insecurely in the SecUsers.ini file by using a simple string transformation rather than a cryptographic mechanism.
|
[] | null | 5.5 | null | null | null |
|
PYSEC-2022-201
| null |
Cross-site Scripting (XSS) - Generic in GitHub repository octoprint/octoprint prior to 1.8.0.
|
[] | null | null | null | null | null |
GHSA-74vh-rqgr-pmmw
|
HGiga EIP product contains SQL Injection vulnerability. Attackers can inject SQL commands into specific URL parameter (online registration) to obtain database schema and data.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.